Show simple item record

dc.contributor.authorVähäkainu, Petri
dc.contributor.authorLehto, Martti
dc.contributor.authorKariluoto, Antti
dc.contributor.editorPayne, Brian K.
dc.contributor.editorWu, Hongyi
dc.date.accessioned2021-11-30T06:25:30Z
dc.date.available2021-11-30T06:25:30Z
dc.date.issued2020
dc.identifier.citationVähäkainu, P., Lehto, M., & Kariluoto, A. (2020). IoT -based adversarial attack's effect on cloud data platform services in a smart building context. In B. K. Payne, & H. Wu (Eds.), <i>ICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security</i> (pp. 457-465). Academic Conferences International. The proceedings of the ... international conference on cyber warfare and security. <a href="https://doi.org/10.34190/ICCWS.20.041" target="_blank">https://doi.org/10.34190/ICCWS.20.041</a>
dc.identifier.otherCONVID_35375441
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/78828
dc.description.abstractIoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private on-premises cloud services, public or hybrid cloud services into a metadata database. This study focuses on reviewing adversarial attack threats towards artificial intelligence systems in the smart building's context where the DaaS cloud data platform services under various information propagation chain structures utilizing ML models and reviews. Adversarial examples can be malicious inputs to ML models providing erroneous model outputs while appearing to be unmodified in human eyes. This kind of attack can knock out the classifier, prevent ML model from generalizing well, and from learning high-level representation, but instead to learn superficial dataset regularity. The purpose of this study is to investigate, detect, and prevent cyber-attack vectors, such as adversarial attacks towards DaaS cloud data platform.en
dc.format.extent658
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofICCWS 2020 : Proceedings of the 15th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the ... international conference on cyber warfare and security
dc.rightsIn Copyright
dc.subject.otheradversarial attacks
dc.subject.otherartificial intelligence-based applications
dc.subject.otherattack vectors
dc.subject.othercloud service
dc.subject.otherdata platform
dc.titleIoT -based adversarial attack's effect on cloud data platform services in a smart building context
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202111305833
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-52-5
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange457-465
dc.relation.issn2048-9870
dc.type.versionacceptedVersion
dc.rights.copyright© Academic Conferences International, 2020
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.subject.ysotekoäly
dc.subject.ysoälytekniikka
dc.subject.ysoverkkohyökkäykset
dc.subject.ysoälytalot
dc.subject.ysopilvipalvelut
dc.subject.ysotietoturva
dc.subject.ysoesineiden internet
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
jyx.subject.urihttp://www.yso.fi/onto/yso/p27260
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p24344
jyx.subject.urihttp://www.yso.fi/onto/yso/p24167
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p27206
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.34190/ICCWS.20.041
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright