Projects

IEEE CYBER SECURITY DOMAIN PROJECTS

  • Empirical Studies of TESLA Protocol Properties Implementations and Replacement of Public Cryptography Using Biometric Authentication
  • CyberPhysical Attack Conduction and Detection in Decentralized Power Systems
  • DivergenceBased Transferability Analysis for SelfAdaptive Smart Grid Intrusion Detection With Transfer Learning
  • False Data Detection in a Clustered Smart Grid Using Unscented Kalman Filter
  • Parkinsons Disease Management via Wearable Sensors A Systematic Review
  • Sentiment Analysis of Weibo Comments Based on Graph Neural Network
  • Robust Network Intrusion Detection Through Explainable Artificial Intelligence XAI
  • Adversarial Machine Learning in Text Processing A Literature Survey
  • Combining LongTerm Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML
  • RTIDS A Robust TransformerBased Approach for Intrusion Detection System
  • SimCSE for Encrypted Traffic Detection and ZeroDay Attack Detection
  • A Generalized Hold Based Countermeasure Against ZeroDynamics Attack With Application to DCDC Converter
  • TTIDS TransmissionResuming TimeBased Intrusion Detection System for Controller Area Network CAN
  • A Comprehensive Analysis of Todays Malware and Its Distribution Network Common Adversary Strategies and Implications
  • A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities
  • Machine Learning and Deep Learning Approaches for CyberSecurity A Review
  • Robust Natural Language Processing Recent Advances Challenges and Future Directions
  • Containment Control of Multiagent Systems Subject to Denial of Service Attacks
  • Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
  • A New Injection Threat on S71500 PLCs Disrupting the Physical Process Offline
  • DVAEGMM Dual Variational Autoencoder With Gaussian Mixture Model for Anomaly Detection on Attributed Networks
  • A Hybrid Approach Toward Efficient and Accurate Intrusion Detection for InVehicle Networks
  • A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During CyberAttacks