Proactive anti-eavesdropping with trap deployment in wireless networks

Q He, S Fang, T Wang, Y Liu, S Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Due to the open nature of the wireless medium, wireless communications are especially
vulnerable to eavesdropping attacks. This article designs a new wireless communication …

An Imperceptible Eavesdropping Attack on WiFi Sensing Systems

L Lu, M Chen, J Yu, Z Ba, F Lin, J Han… - … /ACM Transactions on …, 2024 - ieeexplore.ieee.org
Recent years have witnessed enormous research efforts on WiFi sensing to enable
intelligent services of Internet of Things. However, due to the omni-directional broadcasting …

Smart spying via deep learning: inferring your activities from encrypted wireless traffic

T Hou, T Wang, Z Lu, Y Liu - 2019 IEEE Global Conference on …, 2019 - ieeexplore.ieee.org
Wireless networks nowadays are ubiquitous in our daily life. Due to the open channel
nature, wireless networks are vulnerable to eavesdropping attacks. Though wireless …

iCoding: Countermeasure against interference and eavesdropping in wireless communications

Y Liu, Z Li, KG Shin, Z Yan, J Liu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid development of wireless communication technologies, interference
management (IM) and security/privacy in data transmission have become critically important …

Encrypted rich-data steganography using generative adversarial networks

D Shu, W Cong, J Chai, CS Tucker - … of the 2nd ACM Workshop on …, 2020 - dl.acm.org
Steganography has received a great deal of attention within the information security domain
due to its potential utility in ensuring network security and privacy. Leveraging …

A Review of IoT Security Solutions Using Machine Learning and Deep Learning

A Chauhan, K Sharma - International Conference on Data Analytics & …, 2023 - Springer
Abstract The Internet of Things (IoT) is a rapidly developing field, projected to connect 22
billion smart devices in a global market worth 1567 billion USD by 2025. The integrated and …

ActListener: Imperceptible activity surveillance by pervasive wireless infrastructures

L Lu, Z Ba, F Lin, J Han, K Ren - 2022 IEEE 42nd International …, 2022 - ieeexplore.ieee.org
Recent years have witnessed enormous research efforts on WiFi sensing to enable
intelligent services of Internet of Things. However, due to the omni-directional broadcasting …

Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered Strategies

T Hou - 2022 - search.proquest.com
Securing Critical Cyber Infrastructures and Functionalities via Machine Learning Empowered
Strategies by Tao Hou A dissertation Page 1 Securing Critical Cyber Infrastructures and …

[图书][B] Authentication Usability Methodology

JB Subils - 2019 - search.proquest.com
Nowadays many systems require end users to authenticate themselves. Authentication is
one of the security activities that end users perform the most. Thus, the usability of this …

[引用][C] Deception in Wireless Communications: Benefits and Perils

Q He - 2024