بحث بسيط
السجلات المعروضة 1 -- 10 من 24
3D Beamforming with Massive Cylindrical Arrays for Physical Layer Secure Data Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this letter, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. A part of the arrays is used for transmitting a signal reliably from source to destination using highly ...
A secure client-side framework for protecting the privacy of health data stored on the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ...
Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Physical layer security has attracted research attention as a means to achieve secure communication without the need for complicated upper layer encryption techniques. The secure degrees of freedom (SDoF) of various networks ...
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Unmanned aerial vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation ...
Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
Robust Decentralized Federated Learning Using Collaborative Decisions
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Federated Learning (FL) has attracted a lot of attention in numerous applications due to recent data privacy regulations and increased awareness about data handling issues, combined with the ever-increasing big-data sizes. ...
Federated Learning Stability Under Byzantine Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Federated Learning (FL) is a machine learning approach that enables private and decentralized model training. Although FL has been shown to be very useful in several applications, its privacy constraints cause a lack of ...
Towards Secure IoT Networks in Healthcare Applications: A Game Theoretic Anti-Jamming Framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource constrained smart devices. This makes such networks exposed to various types of malicious attacks. In particular, jamming ...
Hybrid Physical Layer Security for Passive RFID Communication
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such ...