Select Publications
Books
2023, Responsible Graph Neural Networks, http://dx.doi.org/10.1201/9781003329701
,2022, Deep learning approaches for security threats in IoT environments, http://dx.doi.org/10.1002/9781119884170
,2022, Preface
,2022, Preface i
,2022, Preface ii
,2022, Deep Learning Techniques for IoT Security and Privacy, Springer International Publishing, http://dx.doi.org/10.1007/978-3-030-89025-4
,2020, Preface
,Book Chapters
2022, 'Challenges, Opportunities, and Future Prospects', in Deep Learning Techniques for IoT Security and Privacy, pp. 229 - 257, http://dx.doi.org/10.1007/978-3-030-89025-4_10
,2022, 'Deep Reinforcement Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 203 - 213, http://dx.doi.org/10.1007/978-3-030-89025-4_8
,2022, 'Digital Forensics in Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 113 - 130, http://dx.doi.org/10.1007/978-3-030-89025-4_4
,2022, 'Federated Learning for Privacy-Preserving Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 215 - 228, http://dx.doi.org/10.1007/978-3-030-89025-4_9
,2022, 'Internet of Things Security Requirements, Threats, Attacks, and Countermeasures', in Deep Learning Techniques for IoT Security and Privacy, pp. 67 - 112, http://dx.doi.org/10.1007/978-3-030-89025-4_3
,2022, 'Internet of Things, Preliminaries and Foundations', in Deep Learning Techniques for IoT Security and Privacy, pp. 37 - 65, http://dx.doi.org/10.1007/978-3-030-89025-4_2
,2022, 'Introduction Conceptualization of Security, Forensics, and Privacy of Internet of Things: An Artificial Intelligence Perspective', in Deep Learning Techniques for IoT Security and Privacy, pp. 1 - 35, http://dx.doi.org/10.1007/978-3-030-89025-4_1
,2022, 'Semi-supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 181 - 202, http://dx.doi.org/10.1007/978-3-030-89025-4_7
,2022, 'Supervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 131 - 166, http://dx.doi.org/10.1007/978-3-030-89025-4_5
,2022, 'Unsupervised Deep Learning for Secure Internet of Things', in Deep Learning Techniques for IoT Security and Privacy, pp. 167 - 180, http://dx.doi.org/10.1007/978-3-030-89025-4_6
,2021, 'A Systemic IoT–Fog–Cloud Architecture for Big-Data Analytics and Cyber Security Systems', in Secure Edge Computing, CRC Press, pp. 41 - 50, http://dx.doi.org/10.1201/9781003028635-4
,2020, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1265 - 1271, http://dx.doi.org/10.1007/978-3-319-78262-1_119
,2018, 'A Network Forensic Scheme Using Correntropy-Variation for Attack Detection', in Advances in Digital Forensics XIV, Springer, Cham, IFIP International Federation for Information Processing 2018, http://dx.doi.org/10.1007/978-3-319-99277-8_13
,2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1
,2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-59439-2_5
,Journal articles
2024, 'SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems', Cognitive Computation, 16, pp. 2626 - 2641, http://dx.doi.org/10.1007/s12559-024-10310-3
,2024, 'Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach', Digital Communications and Networks, 10, pp. 404 - 415, http://dx.doi.org/10.1016/j.dcan.2022.12.013
,2024, 'Deep-Federated-Learning-Based Threat Detection Model for Extreme Satellite Communications', IEEE Internet of Things Journal, 11, pp. 3853 - 3867, http://dx.doi.org/10.1109/JIOT.2023.3301626
,2024, 'Explainable deep learning for attack intelligence and combating cyber–physical attacks', Ad Hoc Networks, 153, http://dx.doi.org/10.1016/j.adhoc.2023.103329
,2024, 'Feature extraction for machine learning-based intrusion detection in IoT networks', Digital Communications and Networks, 10, pp. 205 - 216, http://dx.doi.org/10.1016/j.dcan.2022.08.012
,2024, 'Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, 70, pp. 1359 - 1369, http://dx.doi.org/10.1109/TCE.2023.3319039
,2024, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, 11, pp. 4681 - 4697, http://dx.doi.org/10.1109/TCSS.2021.3134463
,2024, 'A threat intelligence framework for protecting smart satellite-based healthcare networks', Neural Computing and Applications, 36, pp. 15 - 35, http://dx.doi.org/10.1007/s00521-021-06441-5
,2024, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, 11, pp. 4636 - 4648, http://dx.doi.org/10.1109/TCSS.2022.3184387
,2024, 'Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments', IEEE Communications Surveys and Tutorials, http://dx.doi.org/10.1109/COMST.2024.3408277
,2024, 'Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems', IEEE Transactions on Sustainable Computing, http://dx.doi.org/10.1109/TSUSC.2024.3443256
,2024, 'Cybersecurity when working from home during COVID-19: considering the human factors', Journal of Cybersecurity, 10, http://dx.doi.org/10.1093/cybsec/tyae001
,2024, 'Dynamic Hypersphere Embedding Scale Against Adversarial Attacks', IEEE Transactions on Engineering Management, 71, pp. 12475 - 12486, http://dx.doi.org/10.1109/TEM.2022.3194487
,2024, 'Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things', IEEE Open Journal of the Communications Society, http://dx.doi.org/10.1109/OJCOMS.2024.3413790
,2024, 'RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks', IEEE Transactions on Information Forensics and Security, 19, pp. 3772 - 3787, http://dx.doi.org/10.1109/TIFS.2024.3368879
,2023, 'CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships', IEEE Transactions on Sustainable Computing, 8, pp. 627 - 638, http://dx.doi.org/10.1109/TSUSC.2023.3240411
,2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3560816
,2023, 'A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities', Sensors, 23, http://dx.doi.org/10.3390/s23177391
,2023, 'An improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks', Neural Computing and Applications, 35, pp. 18665 - 18680, http://dx.doi.org/10.1007/s00521-023-08695-7
,2023, 'An explainable deep learning-enabled intrusion detection framework in IoT networks', Information Sciences, 639, http://dx.doi.org/10.1016/j.ins.2023.119000
,2023, 'DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 7485 - 7493, http://dx.doi.org/10.1109/TITS.2022.3166631
,2023, 'Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations', IEEE Journal of Biomedical and Health Informatics, 27, pp. 1691 - 1700, http://dx.doi.org/10.1109/JBHI.2021.3126339
,2023, 'AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges', IEEE Transactions on Services Computing, 16, pp. 1485 - 1504, http://dx.doi.org/10.1109/TSC.2022.3155447
,2023, 'Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection', Journal of Network and Systems Management, 31, http://dx.doi.org/10.1007/s10922-022-09691-3
,2023, 'DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks', IEEE Transactions on Industrial Informatics, 19, pp. 3300 - 3309, http://dx.doi.org/10.1109/TII.2021.3108811
,2023, 'Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications', IEEE Internet of Things Journal, 10, pp. 2821 - 2831, http://dx.doi.org/10.1109/JIOT.2021.3098980
,2023, 'The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 2368 - 2381, http://dx.doi.org/10.1109/TITS.2021.3106378
,2023, 'Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions', IEEE Communications Surveys and Tutorials, http://dx.doi.org/10.1109/COMST.2023.3280465
,