Search
Now showing items 111-120 of 150
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Proportionally fair approach for tor's circuits scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ...
Multi-layer security scheme for implantable medical devices
(
Springer
, 2020 , Article)
Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ...
FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers Locations
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a ...
Transcoding resources forecasting and reservation for crowdsourced live streaming
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
During the last decade, empowered by the technological advances of mobile devices and the revolution of wireless mobile network access, crowdsourced live streaming has become more popular. Ensuring a stable high-quality ...
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
(
Elsevier Ltd
, 2019 , Article)
With the wide application of Unmanned Aerial Vehicles (UAVs) in production and life, more and more attention has been paid to the autonomous track planning of UAVs. When UAV path planning algorithm is dealing with flying ...
Robust Decentralized Federated Learning Using Collaborative Decisions
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Federated Learning (FL) has attracted a lot of attention in numerous applications due to recent data privacy regulations and increased awareness about data handling issues, combined with the ever-increasing big-data sizes. ...
Federated Learning Stability Under Byzantine Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Federated Learning (FL) is a machine learning approach that enables private and decentralized model training. Although FL has been shown to be very useful in several applications, its privacy constraints cause a lack of ...