Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Biomedical Engineering and Bioengineering (2)
- Computer and Systems Architecture (2)
- Electrical and Computer Engineering (2)
- Systems and Communications (2)
- Applied Mathematics (1)
-
- Artificial Intelligence and Robotics (1)
- Bacteria (1)
- Bioimaging and Biomedical Optics (1)
- Bioinformatics (1)
- Business (1)
- Business Analytics (1)
- Computational Engineering (1)
- Computer Sciences (1)
- Data Science (1)
- Data Storage Systems (1)
- Disease Modeling (1)
- Diseases (1)
- Graphics and Human Computer Interfaces (1)
- Hardware Systems (1)
- Life Sciences (1)
- Medicine and Health Sciences (1)
- Numerical Analysis and Scientific Computing (1)
- Organisms (1)
- Other Applied Mathematics (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Physical Sciences and Mathematics (1)
- Institution
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Digital Communications and Networking
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Zero-Bias Deep Learning For Accurate Identification Of Internet Of Things (Iot) Devices, Yongxin Liu, Houbing Song, Thomas Yang, Jian Wang, Jianqiang Li, Shuteng Niu, Zhong Ming
Publications
The Internet of Things (IoT) provides applications and services that would otherwise not be possible. However, the open nature of IoT makes it vulnerable to cybersecurity threats. Especially, identity spoofing attacks, where an adversary passively listens to the existing radio communications and then mimic the identity of legitimate devices to conduct malicious activities. Existing solutions employ cryptographic signatures to verify the trustworthiness of received information. In prevalent IoT, secret keys for cryptography can potentially be disclosed and disable the verification mechanism. Noncryptographic device verification is needed to ensure trustworthy IoT. In this article, we propose an enhanced deep learning framework …
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
FIU Electronic Theses and Dissertations
Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.
The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …