dc.contributor.author | Vähäkainu, Petri | |
dc.contributor.author | Lehto, Martti | |
dc.contributor.author | Kariluoto, Antti | |
dc.contributor.editor | Payne, Brian K. | |
dc.contributor.editor | Wu, Hongyi | |
dc.date.accessioned | 2021-11-30T06:25:30Z | |
dc.date.available | 2021-11-30T06:25:30Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Vähäkainu, P., Lehto, M., & Kariluoto, A. (2020). IoT -based adversarial attack's effect on cloud data platform services in a smart building context. In B. K. Payne, & H. Wu (Eds.), <i>ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security</i> (pp. 457-465). Academic Conferences International. The proceedings of the ... international conference on cyber warfare and security. <a href="https://doi.org/10.34190/ICCWS.20.041" target="_blank">https://doi.org/10.34190/ICCWS.20.041</a> | |
dc.identifier.other | CONVID_35375441 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/78828 | |
dc.description.abstract | IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private on-premises cloud services, public or hybrid cloud services into a metadata database. This study focuses on reviewing adversarial attack threats towards artificial intelligence systems in the smart building's context where the DaaS cloud data platform services under various information propagation chain structures utilizing ML models and reviews. Adversarial examples can be malicious inputs to ML models providing erroneous model outputs while appearing to be unmodified in human eyes. This kind of attack can knock out the classifier, prevent ML model from generalizing well, and from learning high-level representation, but instead to learn superficial dataset regularity. The purpose of this study is to investigate, detect, and prevent cyber-attack vectors, such as adversarial attacks towards DaaS cloud data platform. | en |
dc.format.extent | 658 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | The proceedings of the ... international conference on cyber warfare and security | |
dc.rights | In Copyright | |
dc.subject.other | adversarial attacks | |
dc.subject.other | artificial intelligence-based applications | |
dc.subject.other | attack vectors | |
dc.subject.other | cloud service | |
dc.subject.other | data platform | |
dc.title | IoT -based adversarial attack's effect on cloud data platform services in a smart building context | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202111305833 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-912764-52-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 457-465 | |
dc.relation.issn | 2048-9870 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Academic Conferences International, 2020 | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | International Conference on Cyber Warfare and Security | |
dc.subject.yso | tekoäly | |
dc.subject.yso | älytekniikka | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | älytalot | |
dc.subject.yso | pilvipalvelut | |
dc.subject.yso | tietoturva | |
dc.subject.yso | esineiden internet | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2616 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27260 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24344 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24167 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27206 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.34190/ICCWS.20.041 | |
dc.type.okm | A4 | |