An overview of machine learning within embedded and mobile devices–optimizations and applications
Embedded systems technology is undergoing a phase of transformation owing to the novel
advancements in computer architecture and the breakthroughs in machine learning …
advancements in computer architecture and the breakthroughs in machine learning …
A survey on application of machine learning for Internet of Things
Abstract Internet of Things (IoT) has become an important network paradigm and there are
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …
lots of smart devices connected by IoT. IoT systems are producing massive data and thus …
DÏoT: A federated self-learning anomaly detection system for IoT
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …
vulnerable due to insecure design, implementation, and configuration. As a result, many …
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …
devices have become prominent. Several vendors are producing IP-connected devices for …
Audi: Toward autonomous iot device-type identification using periodic communication
IoT devices are being widely deployed. But the huge variance among them in the level of
security and requirements for network resources makes it unfeasible to manage IoT …
security and requirements for network resources makes it unfeasible to manage IoT …
Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
[图书][B] Designing social research: The logic of anticipation
N Blaikie, J Priest - 2019 - books.google.com
Designing Social Research is a uniquely comprehensive and student-friendly guide to the
core knowledge and types of skills required for planning social research. The authors …
core knowledge and types of skills required for planning social research. The authors …
Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors
Browser fingerprinting is an invasive and opaque stateless tracking technique. Browser
vendors, academics, and standards bodies have long struggled to provide meaningful …
vendors, academics, and standards bodies have long struggled to provide meaningful …
Identifying ecus using inimitable characteristics of signals in controller area networks
As the functions of vehicles are more computerized for the safety and convenience of
drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have …
drivers, attack surfaces of vehicle are accordingly increasing. Many attack results have …
Physical layer authentication in wireless communication networks: A survey
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …
research attentions in recent years. Unlike cryptography-based methods applied in upper …