世界中学生文摘最新文献

筛选
英文 中文
Demo: LiShield: Create a Capture-Resistant Environment Against Photographing 演示:lisshield:创建一个防拍摄环境
世界中学生文摘 Pub Date : 2017-10-20 DOI: 10.1145/3131348.3131354
Shilin Zhu, Chi Zhang, Xinyu Zhang
{"title":"Demo: LiShield: Create a Capture-Resistant Environment Against Photographing","authors":"Shilin Zhu, Chi Zhang, Xinyu Zhang","doi":"10.1145/3131348.3131354","DOIUrl":"https://doi.org/10.1145/3131348.3131354","url":null,"abstract":"The ubiquity of mobile camera devices has been triggering an outcry of privacy concerns. In this demo, we introduce LiShield, which automatically protects a physical scene against photographing, by illuminating it with smart LEDs flickering in specialized waveform. We have also designed mechanisms to unblock authorized cameras and enable graceful degradation under strong ambient light interference.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3131348.3131354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72521618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Demo Session 会话详细信息:演示会话
世界中学生文摘 Pub Date : 2017-10-20 DOI: 10.1145/3256029
Teng Wei
{"title":"Session details: Demo Session","authors":"Teng Wei","doi":"10.1145/3256029","DOIUrl":"https://doi.org/10.1145/3256029","url":null,"abstract":"","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73173707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Information Transfer Between Nearby Wireless Devices 附近无线设备之间的安全信息传输
世界中学生文摘 Pub Date : 2017-10-20 DOI: 10.1145/3131348.3131355
Timothy J. Pierson, Reza Rawassizadeh, Ronald A. Peterson, D. Kotz
{"title":"Secure Information Transfer Between Nearby Wireless Devices","authors":"Timothy J. Pierson, Reza Rawassizadeh, Ronald A. Peterson, D. Kotz","doi":"10.1145/3131348.3131355","DOIUrl":"https://doi.org/10.1145/3131348.3131355","url":null,"abstract":"Securely transferring data between two devices that have never previously met nor shared a secret is a difficult task. Previous solutions to the problem are susceptible to well-known attacks or may require extensive infrastructure that may not be suitable for wireless devices such as Internet of Things sensors that do not have advanced computational capabilities. We propose a new approach: using jamming to thwart adversaries located more than a few centimeters away, while still allowing devices in close physical proximity to securely share data. To accomplish this secure data transfer we exploit MIMO antennas and the Inverse-Square Law.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88509263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Session details: Paper Session 1: Wireless Technologies 会议详情:论文会议1:无线技术
世界中学生文摘 Pub Date : 2017-10-20 DOI: 10.1145/3256026
Phuc Nguyen
{"title":"Session details: Paper Session 1: Wireless Technologies","authors":"Phuc Nguyen","doi":"10.1145/3256026","DOIUrl":"https://doi.org/10.1145/3256026","url":null,"abstract":"","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82598640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taming of the Wild: IoT in Public Spaces 驯服野性:公共空间中的物联网
世界中学生文摘 Pub Date : 2017-10-20 DOI: 10.1145/3131348.3134466
R. Kravets
{"title":"Taming of the Wild: IoT in Public Spaces","authors":"R. Kravets","doi":"10.1145/3131348.3134466","DOIUrl":"https://doi.org/10.1145/3131348.3134466","url":null,"abstract":"The progression of wireless communication into lower power, smaller form factor devices has heralded the age of the Internet of Things (IoT). Predictions show the integration of IoT devices into all facets of our public and private lives. It is not hard to imagine an IoT-enabled home that allows a user to interact with their personal environment or an IoT-enhanced store that advertises available products, enhanced with targeted offers to nearby or frequent shoppers. However, there are many dangers inherent in the use of IoT in public spaces, including violations of a user's privacy and overwhelming the limited bandwidth in dense IoT deployments. Challenges lie at all layers of the IoT ecosystem and privacy must ultimately be built into the devices and protocols we use.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75311702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 9th ACM Workshop on Wireless of the Students, by the Students, and for the Students 第九届ACM学生无线研讨会论文集,由学生参与,为学生服务
世界中学生文摘 Pub Date : 2017-01-01 DOI: 10.1145/3131348
{"title":"Proceedings of the 9th ACM Workshop on Wireless of the Students, by the Students, and for the Students","authors":"","doi":"10.1145/3131348","DOIUrl":"https://doi.org/10.1145/3131348","url":null,"abstract":"","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82952226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: A Cell Biology Inspired Model for Controlling Redundant Rebroadcasts in Mobile Ad-hoc Networks 海报:在移动自组织网络中控制冗余重广播的细胞生物学启发模型
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2801713
S. Sooriyaarachchi
{"title":"Poster: A Cell Biology Inspired Model for Controlling Redundant Rebroadcasts in Mobile Ad-hoc Networks","authors":"S. Sooriyaarachchi","doi":"10.1145/2801694.2801713","DOIUrl":"https://doi.org/10.1145/2801694.2801713","url":null,"abstract":"Dense MANETs should be designed to be as stateless as possible and the nodes should not keep global network-wide states. Blind rebroadcasting agrees with this requirement but it causes broadcast storm problem. We propose a protocol consisting of (i) storm control and (ii) flood control mechanisms to operate as a link layer protocol to carry unicast data in multihop manner. Our protocol startes with blind rebroadcasting and controls redundant rebroadcasts through a method inspired by chalone mechanism found in biological cell proliferation control in organ growth.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"83 6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83559403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Autoregressive Integrated Models for Time Synchronization in Wireless Sensor Networks 无线传感器网络时间同步的自回归集成模型研究
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2801699
Wasif Masood, J. F. Schmidt
{"title":"Exploring Autoregressive Integrated Models for Time Synchronization in Wireless Sensor Networks","authors":"Wasif Masood, J. F. Schmidt","doi":"10.1145/2801694.2801699","DOIUrl":"https://doi.org/10.1145/2801694.2801699","url":null,"abstract":"Time synchronization provides the basis for several applications in wireless sensor networks but the limited memory and computational power, and the use of low precision oscillators make the task of time synchronization non-trivial. In this demonstration, we present a novel time synchronization scheme that is based on time series analysis. To provide a general model for the practical behavior of low precision oscillators, autoregressive integrated moving average models are explored. Based on the analysis of experimental data, an autoregressive integrated model (ARI (1,1)) is derived. Unlike the resource hungry Kalman filter based formulations, the proposed scheme is resource efficient as it results in simple linear regression processing. Experiments are performed on real sensor devices including Zolertia and TelosB, where an accuracy below 1 clock tick1 is achieved.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"154 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86273265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demo: Dynamic Neutralization of Data Leakages 演示:数据泄漏的动态中和
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2802141
Kirill Kononenko
{"title":"Demo: Dynamic Neutralization of Data Leakages","authors":"Kirill Kononenko","doi":"10.1145/2801694.2802141","DOIUrl":"https://doi.org/10.1145/2801694.2802141","url":null,"abstract":"The security of hardware-software systems is at risk from a wide range of attack vectors that appear at various stages during the execution of machine code. The existing approaches for repairing software defects have numerous restrictions with respect to their applicability and functionality and to the range of vulnerabilities that can be identified and eliminated. We propose an approach for removing software errors in program code that is based on just-in-time compilation in a virtual execution environment. The virtual environment uses static, dynamic, and hybrid analyses of the intermediate representation of vulnerable code and re-compiles such code to be safe. The language of code annotations allows us to manage static and dynamic analyses and code transformations. We can change the level of analysis and the amount of time spent on such analyses by dynamically adapting the precision.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91264964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demo: AntMonitor: Network Traffic Monitoring and Real-Time Prevention of Privacy Leaks in Mobile Devices 演示:AntMonitor:移动设备的网络流量监控和实时防止隐私泄露
世界中学生文摘 Pub Date : 2015-09-11 DOI: 10.1145/2801694.2801696
A. Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, A. Markopoulou
{"title":"Demo: AntMonitor: Network Traffic Monitoring and Real-Time Prevention of Privacy Leaks in Mobile Devices","authors":"A. Shuba, Anh Le, Minas Gjoka, Janus Varmarken, Simon Langhoff, A. Markopoulou","doi":"10.1145/2801694.2801696","DOIUrl":"https://doi.org/10.1145/2801694.2801696","url":null,"abstract":"Mobile devices play an essential role in the Internet today, and there is an increasing interest in using them as a vantage point for network measurement from the edge. At the same time, these devices store personal, sensitive information, and there is a growing number of applications that leak it. We propose AntMonitor -- the first system of its kind that supports (i) collection of large-scale, semantic-rich network traffic in a way that respects users' privacy preferences and (ii) detection and prevention of leakage of private information in real time. The first property makes AntMonitor a powerful tool for network researchers who want to collect and analyze large-scale yet fine-grained mobile measurements. The second property can work as an incentive for using AntMonitor and contributing data for analysis. As a proof-of-concept, we have developed a prototype of AntMonitor, deployed it to monitor 9 users for 2 months, and collected and analyzed 20 GB of mobile data from 151 applications. Preliminary results show that fine-grained data collected from AntMonitor could enable application classification with higher accuracy than state-of-the-art approaches. In addition, we demonstrated that AntMonitor could help prevent several apps from leaking private information over unencrypted traffic, including phone numbers, emails, and device identifiers.","PeriodicalId":62224,"journal":{"name":"世界中学生文摘","volume":"89 6 Pt 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89410102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信