Backdoor Attacks Against Learning-Based Algorithms |
Autore | Li Shaofeng |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (161 pages) |
Altri autori (Persone) |
ZhuHaojin
WuWen ShenXuemin (Sherman) |
Collana | Wireless Networks Series |
ISBN | 3-031-57389-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Acronyms -- 1 Introduction -- 1.1 Background -- 1.2 Security and Privacy of Deep Learning -- 1.2.1 Security Issues in Deep Learning -- 1.2.2 Privacy Issues in Deep Learning -- 1.2.3 Artificial Intelligence (AI) Governance -- 1.3 Motivation and Challenges -- 1.3.1 Motivation -- 1.3.2 Challenges in Backdoor Attacks -- 1.3.2.1 Backdoor Attacks in Computer Vision -- 1.3.2.2 Backdoor Attacks in Natural Language Processing (NLP) -- 1.3.2.3 Backdoor Attacks in Federated Learning (FL) -- 1.4 Invisible and Hidden Backdoor Attacks -- 1.4.1 Invisible Backdoor Attacks Against Image Classification -- 1.4.2 Hidden Backdoor Attacks Against Natural Language Processing (NLP) -- 1.4.3 Backdoor Detection in Federated Learning (FL) -- 1.5 Aim of the Monograph -- References -- 2 Literature Review of Backdoor Attacks -- 2.1 Applications of Deep Neural Networks -- 2.1.1 Computer Vision Applications -- 2.1.2 NLP Applications -- 2.1.3 FL Applications -- 2.2 Backdoor Attacks -- 2.2.1 Threat Model and Attack Assumption -- 2.2.1.1 Threat Model -- 2.2.1.2 Attack Assumption -- 2.2.2 Implementation of Backdoor Attacks -- 2.2.3 Measurements of Backdoor Attacks -- 2.2.4 Formalization of Backdoor Attacks -- 2.3 Related Works -- 2.3.1 Backdoor Attacks in CV -- 2.3.2 Backdoor Attacks in NLP -- 2.3.3 Backdoor Attacks in FL -- 2.4 Summary -- References -- 3 Invisible Backdoor Attacks in Image Classification Based Network Services -- 3.1 Problem Statement -- 3.2 Background -- 3.2.1 Backdoor Attacks and Detection -- 3.2.2 Steganography -- 3.3 System Design of Invisible Backdoor Attack -- 3.3.1 Threat Model -- 3.3.2 System Overview -- 3.3.3 Attack Performance Measurements -- 3.3.3.1 Performance -- 3.3.3.2 Invisibility -- 3.4 System Implementation of Invisible Backdoor Attacks -- 3.4.1 Attack 1: Adding Triggers via Steganography.
3.4.2 Attack 2: Optimizing Triggers via Regularization -- 3.4.2.1 Step 1: Finding Anchor Positions -- 3.4.2.2 Step 2(a): Optimization with L2 Regularization -- 3.4.2.3 Step 2(b): Optimization with L0 Regularization -- 3.4.2.4 Step 2(c): Optimization with L∞ Regularization -- 3.4.2.5 Step 3: The Universal Backdoor Attack -- 3.5 Performance Evaluation -- 3.5.1 Single Target Backdoor Attacks via Steganography -- 3.5.1.1 MNIST -- 3.5.1.2 CIFAR10 -- 3.5.1.3 GTSRB -- 3.5.1.4 Pollution Rate -- 3.5.1.5 Invisibility Metrics -- 3.5.2 Universal Backdoor Attacks via Regularization -- 3.5.2.1 Performance -- 3.5.2.2 Pollution Rate -- 3.5.2.3 Invisibility Metrics -- 3.5.3 Evading Neural Cleanse Detection -- 3.6 Discussion -- 3.7 Summary -- References -- 4 Hidden Backdoor Attacks in NLP Based Network Services -- 4.1 Problem Statement -- 4.2 Background and Related Work -- 4.2.1 Pre-processing of Language Models -- 4.2.1.1 Language Models -- 4.2.1.2 N-Gram Models -- 4.2.1.3 Neural Language Models -- 4.2.1.4 Pre-processing in the NLP Pipeline -- 4.2.1.5 Pre-processing for RNN/LSTM -- 4.2.1.6 Pre-processing for Transformers -- 4.2.2 Homographs -- 4.2.3 Related Work -- 4.2.3.1 Word Perturbations-Based NLP Backdoors -- 4.2.3.2 Sentence Perturbations-Based NLP Backdoors -- 4.2.3.3 Injecting Trojans into Pre-trained Models -- 4.3 System Design -- 4.3.1 Threat Model -- 4.3.1.1 Attacker's Goals -- 4.3.1.2 Attacker's Knowledge and Capability -- 4.3.2 Attack Overview -- 4.3.3 Attack Performance Measurements -- 4.3.3.1 Performance -- 4.3.3.2 Perplexity -- 4.4 Hidden Backdoor Attacks -- 4.4.1 Attack 1: Homograph Backdoor Attacks -- 4.4.1.1 Homographs Dictionary -- 4.4.1.2 Trigger Definition -- 4.4.1.3 Fine-Tuning to Inject the Backdoor Trojan -- 4.4.1.4 Explaining the Attack from the Perspective of a Tokenized Sentence -- 4.4.2 Attack 2: Dynamic Sentence Backdoor Attacks. 4.4.2.1 Poisoned Sentences Generated via LSTM-BeamSearch -- 4.4.2.2 Poisoned Sentences Generated via PPLM -- 4.4.2.3 Characterizing the Generated Sentences -- 4.5 Case Study: Toxic Comment Detection -- 4.5.1 Experimental Setting -- 4.5.2 Attack Performance Evaluation -- 4.5.2.1 Homograph Attack -- 4.5.2.2 Dynamic Sentence Backdoor Attack -- 4.5.2.3 Comparison with Baseline Attack and Prior Works -- 4.5.3 Overhead Evaluation -- 4.6 Case Study: Neural Machine Translation -- 4.6.1 Experimental Setting -- 4.6.2 Homograph Attack -- 4.6.2.1 Trigger Definition -- 4.6.2.2 Examples of Trigger Sentences -- 4.6.2.3 Poisoned Data Generation -- 4.6.2.4 Results and Analysis -- 4.6.3 Dynamic Sentence Backdoor Attack -- 4.6.3.1 Trigger Definition -- 4.6.3.2 Poisoned Data Generation -- 4.6.3.3 Attack Evaluation -- 4.7 Case Study: Question Answering -- 4.7.1 Experimental Setting -- 4.7.2 Homograph Attack -- 4.7.2.1 Poisoned Data Generation -- 4.7.2.2 Results and Analysis -- 4.7.3 Dynamic Sentence Backdoor Attack -- 4.7.3.1 Results and Analysis -- 4.7.3.2 Attack Analysis on Decision Boundary -- 4.8 Backdoor Defenses in NLP -- 4.8.1 Perplexity-Based Defenses -- 4.8.2 Generative Model-Based Defenses -- 4.8.3 Defense Comparison -- 4.8.4 Heuristic Defense Scheme -- 4.9 Summary -- References -- 5 Backdoor Attacks and Defense in FL -- 5.1 Problem Statement -- 5.2 Background and Threat Model -- 5.2.1 Background of FL in e-Health Tasks -- 5.2.2 Backdoor Attacks and Defenses in FL -- 5.2.3 Threat Model -- 5.3 Backdoor Attack in e-Health FL Scenarios -- 5.3.1 Attack Overview -- 5.3.1.1 Step 1: Poisoning the Attacker's Dataset -- 5.3.1.2 Step 2: Injecting Backdoor -- 5.3.2 Attack Performance -- 5.3.2.1 System Setup -- 5.3.2.2 Measurements -- 5.3.2.3 Attack Results -- 5.3.3 Characteristics of the Attack -- 5.4 Detection Scheme Design -- 5.4.1 Scheme Overview. 5.4.2 Mechanism Design -- 5.4.2.1 BatFL Algorithm -- 5.4.2.2 Leave One Out -- 5.4.3 Algorithm Implementation -- 5.4.3.1 Median Absolute Deviation and Anomaly Index -- 5.4.3.2 Overhead Optimization -- 5.5 Performance Evaluation -- 5.5.1 Detection Performance on Text Classification -- 5.5.2 Detection Performance on Image Classification -- 5.5.2.1 The Accumulated Shapley value -- 5.5.2.2 Monotonicity -- 5.5.2.3 Evaluation on Different Attack Settings -- 5.5.2.4 Performance Comparison with Existing Work -- 5.5.3 Overhead Analysis -- 5.6 Discussion -- 5.7 Summary -- References -- 6 Summary and Future Directions -- 6.1 Summary -- 6.1.1 Invisible Trigger Design in Image Classification -- 6.1.2 Hidden Backdoor Attack Scheme in NLP -- 6.1.3 Backdoor Detection Framework in FL -- 6.2 Open Research Problems -- 6.2.1 Backdoor Attacks Against Robust Machine Learning (ML) Models -- 6.2.2 Defenses Against NLP Backdoors -- 6.2.3 Secure FL Architecture Design. |
Record Nr. | UNINA-9910865259403321 |
Li Shaofeng
![]() |
||
Cham : , : Springer International Publishing AG, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security assessment in vehicular networks / / Suguo Du, Haojin Zhu |
Autore | Du Suguo |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York : , : Springer, , 2013 |
Descrizione fisica | 1 online resource (xi, 49 pages) : illustrations (some color) |
Disciplina | 58 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Vehicular ad hoc networks (Computer networks) - Security measures
Computer science Data protection Data encryption (Computer science) Telecommunication |
ISBN | 1-4614-9357-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to Vehicular Networks Security -- Security Assessment via Attack Tree Model -- Attack-Defense Tree Based Security Assessment -- A VANETs Attack-Defense Game -- Modelling of Multiple Phased Attack on VANET Security. |
Record Nr. | UNINA-9910437587303321 |
Du Suguo
![]() |
||
New York : , : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in Smart Home Networks / / by Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen |
Autore | Meng Yan |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (177 pages) |
Disciplina |
929.605
643.60285 |
Collana | Wireless Networks |
Soggetto topico |
Telecommunication
Computer networks Data protection Computational intelligence Communications Engineering, Networks Computer Communication Networks Data and Information Security Computational Intelligence |
ISBN | 3-031-24185-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Era of Smart Home -- Smart Home Network Architectures -- Security and Privacy Challenges in Smart Home -- Security Challenges and Requirements of Smart Home -- Mobile Device Layer: Privacy Breaches and Countermeasures -- Voice Interface Layer: Liveness Detections against Voice Spoofing -- Application Platform Layer: Anomaly Detection via Wireless Traffic Analysis -- Conclusion on Security and Privacy in Smart Home -- Conclusion. |
Record Nr. | UNINA-9910645892603321 |
Meng Yan
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Algorithms, Systems, and Applications [[electronic resource] ] : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVII, 858 p. 345 illus.) |
Disciplina | 621.3821 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
ISBN | 3-319-21837-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based “Handprint” Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks. |
Record Nr. | UNISA-996215647003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Wireless Algorithms, Systems, and Applications : 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings / / edited by Kuai Xu, Haojin Zhu |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVII, 858 p. 345 illus.) |
Disciplina | 621.3821 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Algorithms
Computer networks Application software Electronic digital computers—Evaluation Electronic data processing—Management Computer Communication Networks Computer and Information Systems Applications System Performance and Evaluation IT Operations |
ISBN | 3-319-21837-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environments -- Multi-proxy Multi-signature Binding Positioning Protocol -- Efficient Network Structure of 5G Mobile Communications -- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs -- A Group Bandwidth Reservation Scheme for the Control Channel in IEEE 802.11p/1609 Networks -- k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks -- Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams -- Radio Signal Based Device-Free Velocity Recognition -- Minimum-Cost Information Dissemination in Social Networks -- Finding Overlapping Communities with Random Walks on Line Graph and Attraction Intensity -- Computing an Optimal Path with the Minimum Number of Distinct Sensors -- ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device -- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs -- Impact of a Deterministic Delay in the DCA Protocol -- EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET -- iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired -- Estimation Based Adaptive ACB Scheme for M2M Communications -- Optimal Power Allocations for Two-Users Spectrum Sharing Cognitive Radio with Interference Limit -- Adaptive Resource Allocation for Anti-money Laundering Based on SMDP -- Infrastructure Deployment and Optimization for Cloud-Radio Access Networks -- A Cluster Head Rotation Cooperative MIMO Scheme for Wireless Sensor Networks -- A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network -- A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs -- Online Channel Assignment, Transmission Scheduling, and Transmission Mode Selection in Multi-channel Full-duplex Wireless LANs -- Optimal Preference Detection Based on Golden Section and Genetic Algorithm for Affinity Propagation Clustering -- DRL: A New Mobility Model in Mobile Social Networks -- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems -- A Bidder-Oriented Privacy-Preserving VCG Auction Scheme -- A Secure Multi-unit Sealed First-Price Auction Mechanism -- Flow-Level Performance of Device-to-Device Overlaid OFDM Cellular Networks -- Bernoulli Sampling Based (epsilon, delta)-Approximate Frequency Query in Mobile Ad Hoc Networks -- Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing -- A Dynamic Differentiated QoS Based Call Admission Control Service Model for Core Node in Wireless Sensor Network Topology Control -- Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks -- SDP: Separate Design Principle for Multichannel Scheduling in Priority-Aware Packet Collection -- On Computing Multi-agent Itinerary Planning in Distributed Wireless Sensor Networks -- FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication -- Energy-Aware Clustering and Routing Scheme inWireless Sensor Network -- Serial Number Based Encryption and Its Application for Mobile Networks -- Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds -- Big-Little-Cell Based “Handprint” Positioning System -- Spectrum Sublet Game Among Secondary Users in Cognitive Radio Networks -- Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks -- Rogue Access Point Detection in Vehicular Environments -- Information-Centric Resource Management for Air Pollution Monitoring with Multihop Cellular Network Architecture -- A Novel Location Privacy Mining Threat in Vehicular Internet Access Service -- iProtect: Detecting Physical Assault Using Smartphone -- Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework -- A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks -- Domatic Partition in Homogeneous Wireless Sensor Networks -- High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity -- Influential Spatial Facility Prediction over Dynamic Objects -- A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs -- Minimum-Latency Broadcast and Data Aggregation Scheduling in Secure Wireless Sensor Networks -- Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks -- A Double Pulse Control Strategy for Misinformation Propagation in Human Mobile Opportunistic Networks -- Efficient Line K-Coverage Algorithms in Mobile Sensor Network -- A Trust Evolution Mechanism for Mobile Social Networks Based on Wright-Fisher -- A Localized Channel Allocation Approach for Realtime Reliable and High Throughput Communication in Multi-channel Networks -- An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud -- Cooperative Spectrum and Infrastructure Leasing on TV Bands -- Information Security Enhancement with Actual Access Statuses of Users in the Multi-user System -- Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages -- Network Reachability Analysis on Temporally Varying Interaction Networks -- Performance of Target Tracking in Radar Network System Under Deception Attack -- Resource Allocation in Cooperative Cognitive Maritime Wireless Mesh/Ad Hoc Networks: An Game Theory View -- Security and Privacy Issues of Fog Computing: A Survey -- Mobile Data Gathering with Time-Constraints inWireless Sensor Networks -- A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model -- PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks -- Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications -- Cooperative Beamforming and Artificial Noise Design for Secure Multi-pair Communications in Wireless Two-Way Relay Networks -- On the Stable Throughput in Wireless LANs -- Antenna Selection in Large-Scale Multiple Antenna Systems -- Energy-Balanced Backpressure Routing for Stochastic Energy Harvesting WSNs -- Motion Recognition by Using a Stacked Autoencoder-Based Deep Learning Algorithm with Smart Phones -- SDN-Based Routing for Efficient Message Propagation in VANET -- Critical Point Aware Data Acquisition Algorithm in Sensor Networks -- Constructing Virtual Backbone with Bounded Diameters in Cognitive Radio Networks -- A Simplified Attack-Defense Game Model for NSSA -- Hadoop-Based Analysis for Large-Scale Click-Through Patterns in 4G Network -- Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks -- Ant Colony-Based Energy Control Routing Protocol for Mobile Ad Hoc Networks. |
Record Nr. | UNINA-9910483971403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|