世界中学生文摘最新文献

筛选
英文 中文
Passive Device Identification with Packet Timing Analysis 无源设备识别与包定时分析
世界中学生文摘 Pub Date : 2023-10-02 DOI: 10.1145/3615591.3615675
Federico Cifuentes-Urtubey, Deepak Vasisht, R. Kravets
{"title":"Passive Device Identification with Packet Timing Analysis","authors":"Federico Cifuentes-Urtubey, Deepak Vasisht, R. Kravets","doi":"10.1145/3615591.3615675","DOIUrl":"https://doi.org/10.1145/3615591.3615675","url":null,"abstract":"We present preliminary results on identifying unique devices using an attack exploiting temporal patterns on packet bursts during Wi-Fi network discovery. The attack achieves a 94.1% success rate in detecting unique mobile devices.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73412803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Configurable LoRa testbed for reproducible PHY and MAC research 可配置的LoRa测试平台可重复的PHY和MAC的研究
世界中学生文摘 Pub Date : 2023-10-02 DOI: 10.1145/3615591.3615676
Raghav Subbaraman, Dinesh Bharadia
{"title":"Configurable LoRa testbed for reproducible PHY and MAC research","authors":"Raghav Subbaraman, Dinesh Bharadia","doi":"10.1145/3615591.3615676","DOIUrl":"https://doi.org/10.1145/3615591.3615676","url":null,"abstract":"This demo introduces a highly configurable, cross-platform compatible LoRa testbed. Developed for evaluating the BSMA LoRa system, the testbed supports comprehensive PHY and MAC parameter configurations, diverse hardware setups, and offers scalability and ease of use. It aims to encourage comparative studies, reproducibility, and collaboration in LoRa research. The open-source code is available at https://github.com/ucsdwcsng/bsma_lora.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"57 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72409129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 14th ACM Wireless of the Students, by the Students, and for the Students (S3) Workshop 第14届ACM学生无线会议论文集,由学生,为学生(S3)研讨会
世界中学生文摘 Pub Date : 2023-01-01 DOI: 10.1145/3615591
{"title":"Proceedings of the 14th ACM Wireless of the Students, by the Students, and for the Students (S3) Workshop","authors":"","doi":"10.1145/3615591","DOIUrl":"https://doi.org/10.1145/3615591","url":null,"abstract":"","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87102216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ViWatch ViWatch
世界中学生文摘 Pub Date : 2022-10-17 DOI: 10.1145/3556563.3558532
Wenqiang Chen, John Stankovic
{"title":"ViWatch","authors":"Wenqiang Chen, John Stankovic","doi":"10.1145/3556563.3558532","DOIUrl":"https://doi.org/10.1145/3556563.3558532","url":null,"abstract":"Wearable devices like smartwatches and smart wristbands have gained substantial popularity in recent years. While enabling a variety of computing applications, such devices are not always convenient to interact with because of the limited size of the touchscreen. A wide variety of approaches have been considered to improve user experiences, ranging from using customized RF sensors, to multiple sensors in smartwatches. These solutions have limitations related to the characteristics of their technology. We propose ViWatch (Vibration Watch), which harnesses vibrations with an IMU sensor on commodity smartwatches to enable fine-grained finger interactions. We detect subtle finger vibrations from noise and design a novel adversarial neural network to mitigate human body variations. ViWatch is able to recognize finger typing and writing induced vibrations with accuracy, even when users are in different states of motion or in noisy environments.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79227818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BloomXNOR-Net: privacy-preserving machine learning in IoT BloomXNOR-Net:物联网中的隐私保护机器学习
世界中学生文摘 Pub Date : 2022-10-17 DOI: 10.1145/3556563.3558534
Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Sanjay Jha
{"title":"BloomXNOR-Net: privacy-preserving machine learning in IoT","authors":"Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Sanjay Jha","doi":"10.1145/3556563.3558534","DOIUrl":"https://doi.org/10.1145/3556563.3558534","url":null,"abstract":"In recent years, the Internet of Things (IoT) has become a dominant data generation framework for establishing a higher level of system intelligence. At the same time, to avail the full advantage of this domain, the adopters of IoT are also keen on applying Machine Learning (ML) algorithms to these datasets to reveal new business insights. However, these datasets contain sensitive information that demands careful processing to prevent privacy breaches. Many existing privacy-preserving ML (PPML) algorithms are unsuitable for these resource-constrained devices. We propose a novel PPML technique that can be executed on IoT devices using the Bloom Filter encoded IoT dataset in XNOR-Net architecture. The preliminary experimental result using the MNIST dataset shows satisfactory performance.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79423593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NextG-UP: a longitudinal and cross-sectional study of uplink performance of 5G networks NextG-UP: 5G网络上行性能的纵向和横断面研究
世界中学生文摘 Pub Date : 2022-10-14 DOI: 10.1145/3556563.3558533
Moinak Ghoshal, Imran Khan, Qiang Xu, Z. Kong, Y. C. Hu, Dimitrios Koutsonikolas
{"title":"NextG-UP: a longitudinal and cross-sectional study of uplink performance of 5G networks","authors":"Moinak Ghoshal, Imran Khan, Qiang Xu, Z. Kong, Y. C. Hu, Dimitrios Koutsonikolas","doi":"10.1145/3556563.3558533","DOIUrl":"https://doi.org/10.1145/3556563.3558533","url":null,"abstract":"5G networks are being deployed rapidly across the world and have opened door to many uplink-oriented, bandwidth- intensive applications such as Augmented Reality and Con- nected Autonomous Vehicles. However, the roll-out is still in the early phase and the nature of deployment also varies across different geographic regions of theworld. In this demo, we present NextG-UP, an Android-based tool designed to help understand the performance and evolution of 5G net- works around the world. The crowd-sourcing mobile app collects various cellular network metrics and runs a short uplink throughput/latency test.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"319 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77137148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EDGY: on-device paralinguistic privacy protection 设备上的副语言隐私保护
世界中学生文摘 Pub Date : 2021-10-25 DOI: 10.1145/3477087.3478382
Ranya Aloufi, H. Haddadi, David Boyle
{"title":"EDGY: on-device paralinguistic privacy protection","authors":"Ranya Aloufi, H. Haddadi, David Boyle","doi":"10.1145/3477087.3478382","DOIUrl":"https://doi.org/10.1145/3477087.3478382","url":null,"abstract":"Voice user interfaces and assistants are rapidly entering our lives and becoming singular touchpoints spanning our devices. Raw audio signals collected through these devices contain a host of sensitive paralinguistic information (e.g., emotional patterns) that is transmitted to service providers regardless of deliberate or false triggers. We thus encounter a new generation of privacy risks by using these services. To tackle this issue, we have developed EDGY; a configurable, lightweight, disentangled representation learning framework that transforms and filters high-dimensional voice data to identify and selectively filter sensitive attributes at the edge prior to offloading to the cloud. Our results show that EDGY runs in tens of milliseconds with 0.2% relative improvement in ABX score and minimal performance penalties in learning linguistic representations from raw signals on a CPU and single-core ARM processor with no specialized hardware.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"49 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73024721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet service via UAV: user centric comprehensive attack surface analysis 无人机互联网服务:以用户为中心的综合攻击面分析
世界中学生文摘 Pub Date : 2021-10-25 DOI: 10.1145/3477087.3478379
Sreejesh Sidharthan, A. Ashok, A. Bourgeois
{"title":"Internet service via UAV: user centric comprehensive attack surface analysis","authors":"Sreejesh Sidharthan, A. Ashok, A. Bourgeois","doi":"10.1145/3477087.3478379","DOIUrl":"https://doi.org/10.1145/3477087.3478379","url":null,"abstract":"Usage of Unmanned Aerial Vehicles (UAVs) in civil application domains such as real-time monitoring, wireless internet, remote sensing, delivery of foods, security, and surveillance, and industrial infrastructure inspection has grown rapidly in recent times. The proliferation of UAVs in commercial and civilian use has increased the importance of security in these applications. In this paper, we are exploring the security threats associated with a civilian UAV use case. We are addressing the use case of UAVs providing internet to users and exploring the attack surface of UAV internet scenarios specifically focused on user-level security. We list specific threats associated with UAV internet scenarios and compiles various attack vectors to present a comprehensive attack surface analysis. This research work has identified 4 attack cases for the initial study. 1) Malicious UAV trying to exploit a user through the service. 2) Adversary targeting the legitimate UAV and users connected to the service. 3) User is targeted through malicious entity or a program in the user's device, and 4) External entity or a hacker attacking the user through a UAV communication channel. We are exploring the attack surfaces of the UAV internet use case extending the 4 cases mentioned above.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76885977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Passive IoT device fingerprinting using WiFi 使用WiFi进行被动物联网设备指纹识别
世界中学生文摘 Pub Date : 2021-10-25 DOI: 10.1145/3477087.3478381
Aynaz Nazerian, Farideh Parastar
{"title":"Passive IoT device fingerprinting using WiFi","authors":"Aynaz Nazerian, Farideh Parastar","doi":"10.1145/3477087.3478381","DOIUrl":"https://doi.org/10.1145/3477087.3478381","url":null,"abstract":"Recent computing and hardware advances have resulted in the proliferation of autonomous embedded networked devices in modern homes and industrial production systems which comprises several IoT devices in different physical environments. In this work, we take the first step towards investigating the feasibility of IoT devices fingerprinting by analyzing their WiFi packet signal level information along with MAC level information. We consider a scenario where a commodity WiFi Access Point is configured to passively listen to the WiFi packets and extract not only their MAC layer information but also the signal level information. Using such information, our results demonstrate that the adversary can successfully build fingerprinting profiles for different IoT devices.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90356838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Demo and dataset for mmWave multi-beam tracking using mMobile 28 GHz testbed 基于mMobile 28ghz测试平台的毫米波多波束跟踪演示和数据集
世界中学生文摘 Pub Date : 2021-10-25 DOI: 10.1145/3477087.3478383
I. Jain, Raghav Subbaraman, Dinesh Bharadia
{"title":"Demo and dataset for mmWave multi-beam tracking using mMobile 28 GHz testbed","authors":"I. Jain, Raghav Subbaraman, Dinesh Bharadia","doi":"10.1145/3477087.3478383","DOIUrl":"https://doi.org/10.1145/3477087.3478383","url":null,"abstract":"Constructive multi-beam communication for mmWave is a new trend where the base station utilizes multiple paths to improve link throughput and reliability. This demo addresses a key challenge on maintaining a mmWave multi-beam link under user mobility. Traditional user-tracking algorithms for single-beam links do not directly apply to a multi-beam link due to large probing overhead. We demonstrate a low-overhead channel-based solution that only requires multi-beam channel estimates in the background to track multi-beams. We collect and release a one-of-its-kind channel dataset using our 28 GHz mMobile testbed.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88245196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信