CRCMD&R: Cluster and Reputation basedCooperative Malicious Node Detection & Removal Scheme in MANETs

CRCMD&R: Cluster and Reputation basedCooperative Malicious Node Detection & Removal Scheme in MANETs

ABSTRACT While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the […]

Resilience of DoS Attacks in DesigningAnonymous User Authentication Protocol forWireless Sensor Networks

Resilience of DoS Attacks in DesigningAnonymous User Authentication Protocol forWireless Sensor Networks

ABSTRACT Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that employ sensors to check environmental or physical conditions. These autonomous instruments or nodes blend with routers or gateway to make several WSN-based real-time applications. In many critical applications, an external user can directly access the real-time data from sensor node. In this context, before […]

A Game-theoretic Approach toFake-Acknowledgment Attack on Cyber-PhysicalSystems

A Game-theoretic Approach toFake-Acknowledgment Attack on Cyber-PhysicalSystems

ABSTRACT A class of malicious attacks against remote state estimation in Cyber-Physical Systems is considered. A sensor adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance under limited resources. To launch malicious attacks, the attacker can modify the ACKs from the remote estimator and convey fake information to the sensor, […]

Human-Powered Data Cleaning for Probabilistic Reachability Queries on Uncertain Graphs

Human-Powered Data Cleaning for Probabilistic Reachability Queries on Uncertain Graphs

ABSTRACT Uncertain graph models are widely used in real-world applications such as knowledge graphs and social networks. To capture the uncertainty, each edge in an uncertain graph is associated with an existential probability that signifies the likelihood of the existence of the edge. One notable issue of querying uncertain graphs is that the results are […]

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

ABSTRACT Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of outsourcing data is moving large-scale datasets, including large-scale spatial datasets, to public clouds. Meanwhile, due to the concern […]

Decentralized Configuration of Embedded Web Services for Smart Home Applications Detection

Decentralized Configuration of Embedded Web Services for Smart Home Applications Detection

ABSTRACT Web Services can be used as a communication structure for embedded devices. Out of numerous Web Service specifications there is a subset (Profile) to implement Web Services on resource constrained devices, called Devices Pro- file for Web Services (DPWS). The resulting service oriented architecture enables the user to discover new devices, e.g., in the […]

Towards Real-Time, Country-Level Location Classification of Worldwide Tweets

Towards Real-Time, Country-Level Location Classification of Worldwide Tweets

ABSTRACT The increase of interest in using social media as a source for research has motivated tackling the challenge of automatically geolocating tweets, given the lack of explicit location information in the majority of tweets. In contrast to much previous work that has focused on location classification of tweets restricted to a specific country, here […]

Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks Storage space and Key Maker

Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks Storage space and Key Maker

ABSTRACT Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, aWBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) […]

Progressive Shape-distribution-encoder for 3D Shape Retrieval Breakdown

Progressive Shape-distribution-encoder for 3D Shape Retrieval Breakdown

ABSTRACT In this paper, we propose a deep shape descriptor by learning the shape distributions at different diffusion time via a progressive deep shape-distribution-encoder. First, we develop a shape distribution representation with the kernel density estimator to characterize the intrinsic geometrical structure of the shape. Then, we propose to learn discriminative shape features through a […]

A Parallel Nonlocal Means Algorithm for Remote Sensing Image Denoising on an Intel Xeon Phi Platform

A Parallel Nonlocal Means Algorithm for Remote Sensing Image Denoising on an Intel Xeon Phi Platform

ABSTRACT The nonlocal means (NLM) algorithm is one of the best image denoising algorithms because of its superior capability to retain the texture details of an image and is widely used in remote sensing (RS) image preprocessing. However, the time complexity of the algorithm is very high due to its nonlocality when searching for similar […]