[HTML][HTML] Privacy-preserving human activity sensing: A survey
With the prevalence of various sensors and smart devices in people's daily lives, numerous
types of information are being sensed. While using such information provides critical and …
types of information are being sensed. While using such information provides critical and …
A Multi-Faceted Examination of Social Robots Adoption: Influences of Perceived Enjoyment, Social Attraction, and Pet Experience
H Jo, DH Park - IEEE Access, 2024 - ieeexplore.ieee.org
This research undertakes a thorough investigation into the adoption of social robots, an
emerging field of significance as these technologies become more ingrained in daily life. By …
emerging field of significance as these technologies become more ingrained in daily life. By …
EL-GRILLO: Leaking Data Ultrasonically from Air-Gapped PCs via the Tiny Motherboard Buzzer
M Guri - 2023 20th Annual International Conference on Privacy …, 2023 - ieeexplore.ieee.org
Air-gapped workstations are separated from the Internet because they contain confidential
or sensitive information. Studies have shown that attackers can leak data from air-gapped …
or sensitive information. Studies have shown that attackers can leak data from air-gapped …
Power data attribution revocation searchable encrypted cloud storage
J Li, T Zhang - 2023 3rd International Conference on Consumer …, 2023 - ieeexplore.ieee.org
Grid business data contains a large amount of electricity data customer privacy data, serving
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
Sucurity Protection Framework for Power 5G Services Based on Zero-Trust Model
P Zhou, Y Guo, X Chen, L Chen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The Energy Internet is one of the core components of the Industrial Internet, with trillions of
terminals connected to the network, linking all aspects of energy production, transmission …
terminals connected to the network, linking all aspects of energy production, transmission …
Security attack situation awareness based on massive log data mining
Y Xu, P Yu, W Shen, Z Li - 2022 5th International Conference …, 2022 - ieeexplore.ieee.org
Security situation awareness usually uses massive log information to discover abnormal
attacks based on basic user attributes, user behavioral actions and user interactions through …
attacks based on basic user attributes, user behavioral actions and user interactions through …
Deep learning based on byte sample entropy for VPN encrypted traffic identification
Y Wang, G Yu, W Shen, L Sun - 2022 5th International …, 2022 - ieeexplore.ieee.org
Network traffic identification is important for traffic engineering, resource allocation, network
management, attack detection and improving network QoS. However, with the rapid …
management, attack detection and improving network QoS. However, with the rapid …
Secure Access for Massive Devices in the Industrial Internet of Things (IIoT)
B Zhang, Z Xi, J Zhou, C He, B Lu… - 2023 4th International …, 2023 - ieeexplore.ieee.org
In the context of the widespread adoption of Industrial Internet of Things (IIoT) technology,
the number of IoT devices is rapidly increasing, leading to a significant security concern in …
the number of IoT devices is rapidly increasing, leading to a significant security concern in …
Intelligent Recognition and Classification of IoT Devices via Information Physics-Based Multi-Source Data Association
J Xu, H Cheng, X Wang, X Ding… - 2024 5th International …, 2024 - ieeexplore.ieee.org
With the development of information and intelligence in the power system, the massive
integration of heterogeneous IoT devices poses new challenges in system administration …
integration of heterogeneous IoT devices poses new challenges in system administration …
Power IoT Terminal Exploit Script Generated Based on Attack Vector
W Wang, G Wei, X Sun, L Han… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
In this article, a rich attack vector library is constructed. The attack vector generation method
based on operator expression is adopted, and the attack vector is modeled based on the …
based on operator expression is adopted, and the attack vector is modeled based on the …