Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Computer Engineering

Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue Feb 2021

Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue

Publications

The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential …


Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming Aug 2020

Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming

Publications

The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …


W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel Mar 2020

W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel

Publications

Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the dynamic …


Piecing Together Summon Over Alma Documentation, James M. Day Feb 2020

Piecing Together Summon Over Alma Documentation, James M. Day

Publications

Ex Libris provides some useful documentation for “Alma-Summon Integration” but it is not complete. Most Alma documentation and online help pages assume you are using Primo. Sometimes the Alma configurations for Primo apply to Summon, but mostly they do not. The ELUNA Summon Product Working Group members using Summon over Alma started a project to identify existing documentation, consolidate it, and create supplemental documentation where necessary. We hope this will help Ex Libris provide better support for Summon over Alma.


Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng Feb 2020

Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng

Publications

The proliferation of mobile devices that support the acceleration of data services (especially smartphones) has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceeding the throughput of the backhaul. To improve spectrum utilization and increase mobile network traffic, in combination with content caching, we study the cooperation between primary and secondary networks via content caching. We consider that the secondary base station assists the primary user by pre-caching some popular primary contents. Thus, the secondary base station can obtain more licensed bandwidth to serve its own user. We mainly focus on the time delay …


Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang Jan 2020

Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang

Publications

Deep learning is increasingly applied to safety-critical application domains such as autonomous cars and medical devices. It is of significant importance to ensure their reliability and robustness. In this paper, we propose DLFuzz, the coverage guided differential adversarial testing framework to guide deep learing systems exposing incorrect behaviors. DLFuzz keeps minutely mutating the input to maximize the neuron coverage and the prediction difference between the original input and the mutated input, without manual labeling effort or cross-referencing oracles from other systems with the same functionality. We also design multiple novel strategies for neuron selection to improve the neuron coverage. The …


Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg Nov 2019

Security Of The Internet Of Things: Vulnerabilities, Attacks And Countermeasures, Ismail Butun, Houbing Song, Patrik Osterberg

Publications

Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium technologies and have wide range of applications in our surrounding environment. The reason behind the vast adoption of WSNs in various applications is that they have tremendously appealing features, e.g., low production cost, low installation cost, unattended network operation, autonomous and longtime operation. WSNs have started to merge with the Internet of Things (IoT) through the introduction of Internet access capability in sensor nodes and sensing ability in Internet-connected devices. Thereby, the IoT is providing access to huge amount of data, collected by the WSNs, over the Internet. Hence, …


Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad Aug 2019

Guest Editorial Special Issue On Toward Securing Internet Of Connected Vehicles (Iov) From Virtual Vehicle Hijacking, Yue Cao, Houbing Song, Omprakash Kaiwartya, Sinem Coleri Ergen, Jaime Lloret, Naveed Ahmad

Publications

Today’s vehicles are no longer stand-alone transportation means, due to the advancements on vehicle-tovehicle (V2V) and vehicle-to-infrastructure (V2I) communications enabled to access the Internet via recent technologies in mobile communications, including WiFi, Bluetooth, 4G, and even 5G networks. The Internet of vehicles was aimed toward sustainable developments in transportation by enhancing safety and efficiency. The sensor-enabled intelligent automation of vehicles’ mechanical operations enhances safety in on-road traveling, and cooperative traffic information sharing in vehicular networks improves traveling efficiency.


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Jul 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Publications

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …


Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro Jan 2018

Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro

Publications

A system including at least first and second wearable mobile devices and optionally one or more smartphones or other computing devices for allowing a wearable mobile device wearer, an on-site observer, and a remote observer to research and test usability of products in mobile settings, mobile applications, mobile devices, and wearable mobile devices, desktop usability settings, and other settings and devices. The devices nm a software application for generating first-person video and third-person video, transmitting the video to the other devices, marking the videos with time stamps, and allowing the remote observer to send messages and other information to the …


Scan Loss Pattern Synthesis For Adaptive Array Ground Stations, William C. Barott, Mary Ann Ingram, Paul G. Steffes Jul 2010

Scan Loss Pattern Synthesis For Adaptive Array Ground Stations, William C. Barott, Mary Ann Ingram, Paul G. Steffes

Publications

We present several techniques for maximizing the contact time between low Earth orbiting satellites (LEOs) and a ground station (GS). The GS comprises an adaptive array of electronically steered space-fed lenses (SFLs). Each SFL is manufactured as a low-cost printed circuit with the result that it exhibits scanning loss. By differently orienting the boresights of the SFLs in the adaptive array, the SFL's scanning losses can be made to optimally complement the path loss of the LEO, thereby reducing the cost of the GS while maximizing the download capacity of the satellite link. The optimization, implemented with a genetic algorithm …


Grating Lobe Reduction In Aperiodic Linear Arrays Of Physically Large Antennas, William C. Barott, Paul G. Steffes Dec 2009

Grating Lobe Reduction In Aperiodic Linear Arrays Of Physically Large Antennas, William C. Barott, Paul G. Steffes

Publications

We present performance bounds obtained from the optimization of the sidelobe levels of aperiodic linear arrays. The antennas comprising these arrays are large compared to the distance between neighboring antennas, a case not addressed in previously published work. This optimization is performed in pattern-space and is applicable over a wide range of scan angles. We show that grating lobes can be suppressed even when the elemental antennas are several wavelengths in size, provided that the ratio of the antenna size to the average spacing between the antenna center-points does not exceed 80%.


A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes Dec 2008

A Three-Dimensional Pattern-Space Representation For Volumetric Arrays, William C. Barott, Paul G. Steffes

Publications

A three-dimensional pattern-space representation is presented for volumetric arrays. In this representation, the radiation pattern of an array is formed by the evaluation of the three-dimensional pattern-space on a spherical surface. The scan angle of the array determines the position of this surface within the pattern-space. This pattern-space representation is used in conjunction with a genetic algorithm to minimize the sidelobe levels exhibited by a thinned volumetric array during scanning.


Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling Jan 2002

Computer Forensics: The Issues And Current Books In The Field, Gary C. Kessler, Michael Schirling

Publications

Computer crime investigation is a multidisciplinary profession and almost no one today has been trained purely as a computer forensic analyst. Toward that end, investigators need professional reference guides and texts that cover the major points of computer forensics. In this article, we discuss some broad issues related to forensic computing and include a review of four texts on the subject:

  • Computer Forensics: Incident Response Essentials, Warren G. Kruse II & Jay G. Heiser
  • Computer Forensics & Privacy, Michael Caloyannides
  • Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, edited by Albert J. …