Zobrazeno 1 - 10
of 197
pro vyhledávání: '"Mun Choon Chan"'
Autor:
Mohan Gurusamy, Mun Choon Chan, Dinil Mon Divakaran, Zixu Tian, Kushan Sudheera Kalupahana Liyanage
Publikováno v:
2022 IEEE International Performance, Computing, and Communications Conference (IPCCC).
Networks regularly face various threats and attacks that manifest in their communication traffic. Recent works proposed unsupervised approaches, e.g., using a variational autoencoder, that are not only effective in detecting anomalies in network traf
Publikováno v:
Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services.
Publikováno v:
Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services.
Publikováno v:
2022 IFIP Networking Conference (IFIP Networking).
Publikováno v:
Computer Networks. 224:109607
Autor:
Xingyu Feng, Chengwen Luo, Bo Wei, Jin Zhang, Jianqiang Li, Huihui Wang, Weitao Xu, Mun Choon Chan, Victor C. M. Leung
Recently we have witnessed the rise of Artificial Intelligence of Things (AIoT) and the shift of sensing paradigm from cloud-centric to the edge-centric, which effectively improves the sensing capability of intelligence transportation systems. To imp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19ed3ea0ae6faec8b824752fe83d8eee
https://doi.org/10.1109/tits.2022.3170028
https://doi.org/10.1109/tits.2022.3170028
Publikováno v:
CSI Transactions on ICT. 8:69-76
In this paper, we present a short survey of programmable networks starting from pre-Software Defined Networking efforts to the more recent programmable data-plane. In particular, we highlight the benefits of data-plane programmability and present som
TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals
We are witnessing a heightened surge in remote privacy attacks on laptop computers. These attacks often exploit malware to remotely gain access to webcams and microphones in order to spy on the victim users. While webcam attacks are somewhat defended
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f4cac407956305ccaa1556b70ad5d549
Publikováno v:
Proceedings of the Symposium on Architectures for Networking and Communications Systems.
Publikováno v:
Proceedings of the 27th Annual International Conference on Mobile Computing and Networking.
5G networks are gaining pace in development and deployment in recent years. One of 5G's key objective is to support a variety of use cases with different Service Level Objectives (SLOs). Slicing is a key part of 5G that allows operators to provide a