بحث بسيط
السجلات المعروضة 1 -- 10 من 22
DistPrivacy: Privacy-Aware Distributed Deep Neural Networks in IoT surveillance systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning technologies have witnessed an increasing adoption. To support the requirements of such paradigm in terms of memory and computation, ...
Performance Evaluation of Hyperledger Fabric
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Blockchain is a distributed secure ledger that eliminates the need for centralized authority to store data. The centralized approach has several limitations as it is a Single-Point-of-Failure and a third-party might be ...
Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Commercial unmanned aerial vehicles, or drones, are getting increasingly popular in the last few years. The fact that these drones are highly accessible to public may bring a range of security and technical issues to ...
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ...
Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
National security is a top priority to mitigate intrusions and criminal acts. Governments require robust national surveillance system that can cover all geographical areas, including the blind spots that may hold violence ...
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ...
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ...
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
(
Elsevier B.V.
, 2020 , Article)
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers Locations
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a ...