Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Antenna arrays (3)
- Genetic algorithms (3)
- Cybersecurity (2)
- Internet of Things (2)
- 6LowPAN (1)
-
- 6LowPSec (1)
- 6TiSCH (1)
- Adaboost (1)
- Adaptive arrays (1)
- Adversarial testing (1)
- Alma-Summon integration (1)
- Big Data Analytics (1)
- Block-chain (1)
- CoAP (1)
- CoAPs (1)
- Computer forensics (1)
- Content caching (1)
- Cooperative cognitive radio network (1)
- Cryptography (1)
- Deep Learning (1)
- Deep learning (1)
- Deep models (1)
- Dependability (1)
- Detection (1)
- Differential privacy (1)
- Discovery services (1)
- DoS (1)
- Earth terminals (1)
- Edge server (1)
- First-person video (1)
Articles 1 - 14 of 14
Full-Text Articles in Computer Engineering
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Publications
The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential …
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Publications
The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel
Publications
Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the dynamic …
Piecing Together Summon Over Alma Documentation, James M. Day
Piecing Together Summon Over Alma Documentation, James M. Day
Publications
Ex Libris provides some useful documentation for “Alma-Summon Integration” but it is not complete. Most Alma documentation and online help pages assume you are using Primo. Sometimes the Alma configurations for Primo apply to Summon, but mostly they do not. The ELUNA Summon Product Working Group members using Summon over Alma started a project to identify existing documentation, consolidate it, and create supplemental documentation where necessary. We hope this will help Ex Libris provide better support for Summon over Alma.
Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng
Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng
Publications
The proliferation of mobile devices that support the acceleration of data services (especially smartphones) has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceeding the throughput of the backhaul. To improve spectrum utilization and increase mobile network traffic, in combination with content caching, we study the cooperation between primary and secondary networks via content caching. We consider that the secondary base station assists the primary user by pre-caching some popular primary contents. Thus, the secondary base station can obtain more licensed bandwidth to serve its own user. We mainly focus on the time delay …
Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang
Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang
Publications
Deep learning is increasingly applied to safety-critical application domains such as autonomous cars and medical devices. It is of significant importance to ensure their reliability and robustness. In this paper, we propose DLFuzz, the coverage guided differential adversarial testing framework to guide deep learing systems exposing incorrect behaviors. DLFuzz keeps minutely mutating the input to maximize the neuron coverage and the prediction difference between the original input and the mutated input, without manual labeling effort or cross-referencing oracles from other systems with the same functionality. We also design multiple novel strategies for neuron selection to improve the neuron coverage. The …
Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg
Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg
Publications
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, …
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad
Publications
Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen
Publications
With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …
Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro
Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro
Publications
A system including at least first and second wearable mobile devices and optionally one or more smartphones or other computing devices for allowing a wearable mobile device wearer, an on-site observer, and a remote observer to research and test usability of products in mobile settings, mobile applications, mobile devices, and wearable mobile devices, desktop usability settings, and other settings and devices. The devices nm a software application for generating first-person video and third-person video, transmitting the video to the other devices, marking the videos with time stamps, and allowing the remote observer to send messages and other information to the …
Scan Loss Pattern Synthesis For Adaptive Array Ground Stations, William C. Barott, Mary Ann Ingram, Paul G. Steffes
Scan Loss Pattern Synthesis For Adaptive Array Ground Stations, William C. Barott, Mary Ann Ingram, Paul G. Steffes
Publications
We present several techniques for maximizing the contact time between low Earth orbiting satellites (LEOs) and a ground station (GS). The GS comprises an adaptive array of electronically steered space-fed lenses (SFLs). Each SFL is manufactured as a low-cost printed circuit with the result that it exhibits scanning loss. By differently orienting the boresights of the SFLs in the adaptive array, the SFL's scanning losses can be made to optimally complement the path loss of the LEO, thereby reducing the cost of the GS while maximizing the download capacity of the satellite link. The optimization, implemented with a genetic algorithm …
Grating Lobe Reduction In Aperiodic Linear Arrays Of Physically Large Antennas, William C. Barott, Paul G. Steffes
Grating Lobe Reduction In Aperiodic Linear Arrays Of Physically Large Antennas, William C. Barott, Paul G. Steffes
Publications
We present performance bounds obtained from the optimization of the sidelobe levels of aperiodic linear arrays. The antennas comprising these arrays are large compared to the distance between neighboring antennas, a case not addressed in previously published work. This optimization is performed in pattern-space and is applicable over a wide range of scan angles. We show that grating lobes can be suppressed even when the elemental antennas are several wavelengths in size, provided that the ratio of the antenna size to the average spacing between the antenna center-points does not exceed 80%.
A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes
A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes
Publications
A three-dimensional pattern-space representation is presented for volumetric arrays. In this representation, the radiation pattern of an array is formed by the evaluation of the three-dimensional pattern-space on a spherical surface. The scan angle of the array determines the position of this surface within the pattern-space. This pattern-space representation is used in conjunction with a genetic algorithm to minimize the sidelobe levels exhibited by a thinned volumetric array during scanning.
Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling
Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling
Publications
Computer crime investigation is a multidisciplinary profession and almost no one today has been trained purely as a computer forensic analyst. Toward that end, investigators need professional reference guides and texts that cover the major points of computer forensics. In this article, we discuss some broad issues related to forensic computing and include a review of four texts on the subject:
- Computer Forensics: Incident Response Essentials, Warren G. Kruse II & Jay G. Heiser
- Computer Forensics & Privacy, Michael Caloyannides
- Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, edited by Albert J. …