Zobrazeno 1 - 10
of 128
pro vyhledávání: '"Chan, Mun Choon"'
Autor:
Csikor, Levente, Lim, Hoon Wei, Wong, Jun Wen, Ramesh, Soundarya, Parameswarath, Rohini Poolat, Chan, Mun Choon
Publikováno v:
ACM Transactions on Cyber-Physical Systems, 2024
Today's RKE systems implement disposable rolling codes, making every key fob button press unique, effectively preventing simple replay attacks. However, a prior attack called RollJam was proven to break all rolling code-based systems in general. By a
Externí odkaz:
http://arxiv.org/abs/2210.11923
TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals
We are witnessing a heightened surge in remote privacy attacks on laptop computers. These attacks often exploit malware to remotely gain access to webcams and microphones in order to spy on the victim users. While webcam attacks are somewhat defended
Externí odkaz:
http://arxiv.org/abs/2209.03197
Autor:
Nguyen, Quoc Phong, Oikawa, Ryutaro, Divakaran, Dinil Mon, Chan, Mun Choon, Low, Bryan Kian Hsiang
As the use of machine learning (ML) models is becoming increasingly popular in many real-world applications, there are practical challenges that need to be addressed for model maintenance. One such challenge is to 'undo' the effect of a specific subs
Externí odkaz:
http://arxiv.org/abs/2202.13585
Collaborative machine learning (ML) is an appealing paradigm to build high-quality ML models by training on the aggregated data from many parties. However, these parties are only willing to share their data when given enough incentives, such as a gua
Externí odkaz:
http://arxiv.org/abs/2010.12797
5G presents a unique set of challenges for cellular network architecture. The architecture needs to be versatile in order to handle a variety of use cases. While network slicing has been proposed as a way to provide such versatility, it is also impor
Externí odkaz:
http://arxiv.org/abs/2003.01841
This paper looks into the problem of detecting network anomalies by analyzing NetFlow records. While many previous works have used statistical models and machine learning techniques in a supervised way, such solutions have the limitations that they r
Externí odkaz:
http://arxiv.org/abs/1903.06661
Publikováno v:
In Computer Networks April 2023 224
Zoomable video streaming refers to a new class of interactive video applications, where users can zoom into a video stream to view a selected region of interest in higher resolutions and pan around to move the region of interest. The zoom and pan eff
Externí odkaz:
http://arxiv.org/abs/1505.01933
Mobile device users can now easily capture and socially share video clips in a timely manner by uploading them wirelessly to a server. When attending crowded events, such as an exhibition or the Olympic Games, however, timely sharing of videos become
Externí odkaz:
http://arxiv.org/abs/1211.2063
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.