Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Mohammad Abu Alsheikh"'
Publikováno v:
IEEE Access, Vol 10, Pp 11296-11307 (2022)
Digital privacy has become an essential component of information and communications technology (ICT) systems. There are many existing methods for digital privacy protection, including network security, cryptography, and access control. However, there
Externí odkaz:
https://doaj.org/article/2c491ba864b045159b6fb8d173ca36eb
Internet of things (IoT) produces massive data from devices embedded with sensors. The IoT data allows creating profitable services using machine learning. However, previous research does not address the problem of optimal pricing and bundling of mac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::62293ffc273545a6b55203493264fcbe
Publikováno v:
GLOBECOM
In this paper, we consider a smart jammer that only attacks the channel if it detects activities of legitimate devices on that channel. To cope with smart jamming attacks, we propose an intelligent deception strategy in which the legitimate device wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b569a0dad40d78c3c3cd04dc9b375d82
https://hdl.handle.net/10453/167956
https://hdl.handle.net/10453/167956
Publikováno v:
IEEE Transactions on Vehicular Technology. 66:5995-6008
With the proliferation of sensors, such as accelerometers, in mobile devices, activity and motion tracking has become a viable technology to understand and create an engaging user experience. This paper proposes a fast adaptation and learning scheme
Publikováno v:
IEEE Communications Magazine. 55:132-139
Mobile crowdsensing has emerged as an efficient sensing paradigm that combines the crowd intelligence and the sensing power of mobile devices, such as mobile phones and Internet of Things gadgets. This article addresses the contradicting incentives o
Autor:
Shimin Gong, Mohammad Abu Alsheikh, Eryk Dutkiewicz, Dusit Niyato, Diep N. Nguyen, Dinh Thai Hoang, Zhu Han
In this article, we introduce a novel deception strategy which is inspired by the "Borrowing Arrows with Thatched Boats", one of the most famous military tactics in the history, in order to defeat reactive jamming attacks for low-power IoT networks.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::010693313e7a1e91d347f14c4303a99e
Autor:
Tianhong Li, Mingmin Zhao, Rumen Hristov, Yonglong Tian, Dina Katabi, Zachary Kabelac, Mohammad Abu Alsheikh, Antonio Torralba, Hang Zhao
Publikováno v:
MIT web domain
SIGCOMM
SIGCOMM
This paper introduces RF-Pose3D, the first system that infers 3D human skeletons from RF signals. It requires no sensors on the body, and works with multiple people and across walls and occlusions. Further, it generates dynamic skeletons that follow
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d242dd84db6ee4fe18debd825a178707
https://hdl.handle.net/1721.1/125227
https://hdl.handle.net/1721.1/125227
Autor:
Tianhong Li, Dina Katabi, Hang Zhao, Mohammad Abu Alsheikh, Yonglong Tian, Mingmin Zhao, Antonio Torralba
Publikováno v:
CVPR
This paper demonstrates accurate human pose estimation through walls and occlusions. We leverage the fact that wireless signals in the WiFi frequencies traverse walls and reflect off the human body. We introduce a deep neural network approach that pa
Publikováno v:
WCNC
A big data service is any data-originated resource that is offered over the Internet. The performance of a big data service depends on the data bought from the data collectors. However, the problem of optimal pricing and data allocation in big data s
With the emerging sensing technologies such as mobile crowdsensing and Internet of Things (IoT), people-centric data can be efficiently collected and used for analytics and optimization purposes. This data is typically required to develop and render
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4f4eed974abb8b1f4290605607e62539