1 code implementation • 14 Aug 2022 • Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das
Not only this, but we can also distinguish between targeted and untargeted attacks among malicious clients, unlike most prior works which only consider one type of the attacks.
no code implementations • 9 Aug 2021 • Mao V. Ngo, Tie Luo, Tony Q. S. Quek
In comparison with both baseline and state-of-the-art schemes, our adaptive approach strikes the best accuracy-delay tradeoff on the univariate dataset, and achieves the best accuracy and F1-score on the multivariate dataset with only negligibly longer delay than the best (but inflexible) scheme.
no code implementations • 15 Apr 2020 • Mao V. Ngo, Tie Luo, Hakima Chaouchi, Tony Q. S. Quek
We build an HEC testbed, implement our proposed approach, and evaluate it using real IoT datasets.
no code implementations • 10 Jan 2020 • Mao V. Ngo, Hakima Chaouchi, Tie Luo, Tony Q. S. Quek
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.