no code implementations • IEEE 2020 • Jianyi Liu, Yu Tian, Ru Zhang, (Member, IEEE), YOUQIANG SUN, AND CHAN WANG
And 77. 58% success rate is obtained in the transfer test attack.
no code implementations • IEEE 2020 • SHIWEN ZHANG 1, 2, (Member, TINGTING YAO3, WEI LIANG 4, VOUNDI KOE ARTHUR SANDOR4, AND KUAN-CHING LI 5, (Senior Member, IEEE)
In this article, aiming at a multi-keywords query in LBS, we propose a novel efficient and privacy-preserving multi-keyword query scheme (PPMQ) over the outsourced cloud, which satisfies the requirements of the location and query content privacy protection, query efficiency, the confidentiality of LBS data and scalability regarding the data users.
no code implementations • journal 2020 • YUTING LI AND YUANMING WU, (Member, IEEE)
To defend selective forwarding attacks of malicious nodes, our scheme isolates them from the network.
no code implementations • IEEE Access 2020 • SEO JIN LEE1, PAUL D. YOO 2, A. TAUFIQ ASYHARI 3, YOONCHAN JHI4, LOUNIS CHERMAK 1, (Member, CHAN YEOB YEUN 5, AND KAMAL TAHA 5, (Senior Member, IEEE)
Specifically, the study proposes a lightweight ML-based IDS model namely IMPACT (IMPersonation Attack deteCTion using deep auto-encoder and feature abstraction).
no code implementations • IEEE 2018 • WEIDONG MIN, (Member, IEEE), HAO CUI, HONG RAO, ZHIXUN LI, AND LEIYUE YAO
Through measuring the changes of these characteristics and judging the relations between the people and furniture nearby, the falls on furniture can be effectively detected.