High Throughput Opportunistic Cooperative Device-to-Device Communications withCaching (IEEE 2017).

High Throughput Opportunistic Cooperative Device-to-Device Communications withCaching (IEEE 2017).

Abstract: To achieve the potential in providing high through- put for cellular networks by device-to-device (D2D) communi- cations, the interference among D2D links should be carefully managed. In this paper, we propose an opportunistic cooper- ation strategy for D2D transmission by exploiting the caching capability at the users to control the interference among D2D links. […]

Estimation and Control of Quality of Service in Demand Dispatch flexible optical networks (IEEE 2017).

Estimation and Control of Quality of Service in Demand Dispatch flexible optical networks (IEEE 2017).

Abstract: It is now well known that flexibility of energy con- sumption can be harnessed for the purposes of grid-level ancillary services. In particular, through distributed control of a collection of loads, a balancing authority regulation signal can be tracked accurately, while ensuring that the quality of service (QoS) for each load is acceptable on […]

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks Networks (IEEE 2017).

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks Networks (IEEE 2017).

Abstract: Internet of Things (IoT) is expanding the network by integrating huge amount of surrounding objects which requires the secure and reliable transmission of the high volume data generation, and the mobile relay technique is one of efficient ways to meet the on-board data explosion in LTE-Advanced (LTE-A) networks. However, the practice of the mobile […]

Research on the Security of Microsoft’s Two-layer Captcha

Research on the Security of Microsoft’s Two-layer Captcha

ABSTRACT Captcha is a security mechanism designed to differentiate between computers and humans, and is used to defend against malicious bot programs. Text-based Captchas are the most widely deployed differentiation mechanism, and almost all text-based Captchas are single-layered. Numerous successful attacks on the single-layer text-based Captchas deployed by Google, Yahoo! and Amazon have been reported. […]

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks Networks (IEEE 2017).

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks Networks (IEEE 2017).

ABSTRACT: Internet of Things (IoT) is expanding the network by integrating huge amount of surrounding objects which requires the secure and reliable transmission of the high volume data generation, and the mobile relay technique is one of efficient ways to meet the on-board data explosion in LTE-Advanced (LTE-A) networks. However, the practice of the mobile […]

Recommendation Generation Using Typicality Based Collaborative Filtering(IEEE 2017)

Recommendation Generation Using Typicality Based Collaborative Filtering(IEEE 2017)

ABSTRACT  The rapid growth of information availability on the Web related to movies, news, books, hotels, medicines, jobs etc. have increased the scope of information filtering techniques. Recommender System is software application that uses filtering techniques and algorithms to generate personalized preferences to support decision making of the users. Collaborative Filtering is one type of […]

A Coalition Formation Game for Distributed Node Clustering in Mobile Ad Hoc Networks taxonomy (IEEE 2017).

A Coalition Formation Game for Distributed Node Clustering in Mobile Ad Hoc Networks taxonomy (IEEE 2017).

ABSTRACT: In the context of wireless mobile ad hoc networks, node clustering is a well known solution for handling the scalability issue. While existing work focused on unstructured (i.e., flat) networks, this paper investigates a clustering algorithm to handle stable size-restricted clusters for structured (i.e., groupbased) networks. In addition, we have identified that the ad […]

Efficient Secure Outsourcing of Large-scale Sparse Linear Systems of Equations (IEEE 2017)

Efficient Secure Outsourcing of Large-scale Sparse Linear Systems of Equations (IEEE 2017)

ABSTRACT Solving large-scale sparse linear systems of equations (SLSEs) is one of the most common and fundamental problems in big data, but it is very challenging for resource-limited users. Cloud computing has been proposed as a timely, efficient, and cost-effective way of solving such expensive computing tasks. Nevertheless, one critical concern in cloud computing is […]

Towards a framework for cyber-attack impact analysis of electric cyber physical systems Systems (IEEE 2017).

Towards a framework for cyber-attack impact analysis of electric cyber physical systems Systems (IEEE 2017).

ABSTRACT: This paper proposes an unified framework for electrical cyber physical systems (ECPSs) and studies the mechanism of cyber attacks and cyber security. Communication networks are designed by characteristics of power grids. This model is universal to both transmission and distribution grids. The fragility of ECPSs under cyber attacks (DoS attacks and false data injection […]

A Hierarchical Detection and Response System to Enhance Security against Lethal Cyber-Attacks in UAV Networks (IEEE 2017).

A Hierarchical Detection and Response System to Enhance Security against Lethal Cyber-Attacks in UAV Networks (IEEE 2017).

ABSTRACT: Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, […]