Search
Now showing items 91-100 of 415
Dynamic Resource Allocation of eMBB-uRLLC Traffic in 5G New Radio
(
IEEE Computer Society
, 2020 , Conference Paper)
5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB) and massive Machine Type Communication ...
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ...
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ...
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Proportionally fair approach for tor's circuits scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results
(
Springer Science and Business Media Deutschland GmbH
, 2020 , Conference Paper)
Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing ...
FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers Locations
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a ...
A comprehensive rheological study for a flowing polymer-based drilling fluid used for wellbore strengthening
(
Society of Petroleum Engineers (SPE)
, 2020 , Conference Paper)
Loss circulation encountered in highly fractured formations, depleted reservoir, or HP/HT intervals is the root cause of many problems plaguing the oil and gas sector for many years. High pore pressure narrows the window ...