Zobrazeno 1 - 10
of 109
pro vyhledávání: '"Zou, Cliff"'
Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification). Packet padding obfuscates packet-length characteristics with a high d
Externí odkaz:
http://arxiv.org/abs/2309.05941
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes. Our study of major adversaria
Externí odkaz:
http://arxiv.org/abs/2306.00314
Publikováno v:
2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 2022, pp. 6091-6096
In many VoIP systems, Voice Activity Detection (VAD) is often used on VoIP traffic to suppress packets of silence in order to reduce the bandwidth consumption of phone calls. Unfortunately, although VoIP traffic is fully encrypted and secured, traffi
Externí odkaz:
http://arxiv.org/abs/2306.00095
In dealing with altered multimedia news content, also referred to as fake news, we present a ready-to-deploy scheme based on existing public key infrastructure as a new fake news defense paradigm. This scheme enables news organizations to certify/end
Externí odkaz:
http://arxiv.org/abs/2104.04671
Autor:
Alwhbi, Ibrahim A.1 (AUTHOR) ibrahim.alharbi@ucf.edu, Zou, Cliff C.1 (AUTHOR) changchun.zou@ucf.edu, Alharbi, Reem N.1 (AUTHOR)
Publikováno v:
Sensors (14248220). Jun2024, Vol. 24 Issue 11, p3509. 17p.
Internet of Things (IoT) devices have been increasingly integrated into our daily life. However, such smart devices suffer a broad attack surface. Particularly, attacks targeting the device software at runtime are challenging to defend against if IoT
Externí odkaz:
http://arxiv.org/abs/2007.05876
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ling, Zhen, Liu, Kaizheng, Xu, Yiling, Gao, Chao, Jin, Yier, Zou, Cliff, Fu, Xinwen, Zhao, Wei
In this paper, we present an end-to-end view of IoT security and privacy and a case study. Our contribution is three-fold. First, we present our end-to-end view of an IoT system and this view can guide risk assessment and design of an IoT system. We
Externí odkaz:
http://arxiv.org/abs/1805.05853
Publikováno v:
IEEE International Conference on Mobile Ad-hoc Sensor Systems(IEEE MASS 2017), pp.550-554, October 2017
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data throug
Externí odkaz:
http://arxiv.org/abs/1801.08185