An overview of machine learning within embedded and mobile devices–optimizations and applications

TS Ajani, AL Imoize, AA Atayero - Sensors, 2021 - mdpi.com
Embedded systems technology is undergoing a phase of transformation owing to the novel
advancements in computer architecture and the breakthroughs in machine learning …

A survey on application of machine learning for Internet of Things

L Cui, S Yang, F Chen, Z Ming, N Lu, J Qin - International Journal of …, 2018 - Springer
Abstract Internet of Things (IoT) has become an important network paradigm and there are
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …

DÏoT: A federated self-learning anomaly detection system for IoT

TD Nguyen, S Marchal, M Miettinen… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …

Iot sentinel: Automated device-type identification for security enforcement in iot

M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …

Audi: Toward autonomous iot device-type identification using periodic communication

S Marchal, M Miettinen, TD Nguyen… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
IoT devices are being widely deployed. But the huge variance among them in the level of
security and requirements for network resources makes it unfeasible to manage IoT …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

[图书][B] Designing social research: The logic of anticipation

N Blaikie, J Priest - 2019 - books.google.com
Designing Social Research is a uniquely comprehensive and student-friendly guide to the
core knowledge and types of skills required for planning social research. The authors …

Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors

U Iqbal, S Englehardt, Z Shafiq - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Browser fingerprinting is an invasive and opaque stateless tracking technique. Browser
vendors, academics, and standards bodies have long struggled to provide meaningful …

Identifying ecus using inimitable characteristics of signals in controller area networks

W Choi, HJ Jo, S Woo, JY Chun… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As the functions of vehicles are more computerized for the safety and convenience of
drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …