We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Target-Oriented Regret Minimization for Satisficing Monopolists

    We study a robust monopoly pricing problem where a seller aspires to sell an item to a buyer. We assume that the seller, unaware of the buyer’s...
    Napat Rujeerapaiboon, Yize Wei, Yilin Xue in Web and Internet Economics
    Conference paper 2024
  2. Optimization of Energy Distribution with Demand Response Control in 6G Next Generation Smart Grids

    The transition to an intelligent electrical network that is more respectful to the environment and consumers’ needs requires the adoption of...
    Rola Naja, Asma Tannous, ... Nazih Moubayed in Wireless Internet
    Conference paper 2024
  3. Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing

    In an era of rapidly evolving mobile computing, integrating satellite technologies with the Internet of Things (IoT) creates new communication and...
    Messaoud Babaghayou, Noureddine Chaib, ... Carol Marsh in Wireless Internet
    Conference paper 2024
  4. Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing

    With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid...
    **rong Fu, Yiwen Liu, ... Tao Feng in Wireless Internet
    Conference paper 2024
  5. Comparative Analysis of Terahertz MAC Protocols for Wireless Data Center

    Over the last few years, generation of Internet data by the users has drastically increased. As this data is accessed, processed, shared, and...
    Muhammad Absaruddin, Saim Ghafoor, Mubashir Husain Rehmani in Wireless Internet
    Conference paper 2024
  6. TTWiFi: Time-Triggered WiFi for Mobile Robotics in Human Environments

    WiFi is a ubiquitous protocol, but exhibits flaws that become particularly critical for teams of robots in human environments. We demonstrate that...
    Carl Lusty, Vladimir Estivill-Castro, René Hexel in Wireless Internet
    Conference paper 2024
  7. Cellular-V2X and VANET(DSRC) Based End-to-End Guidance for Smart Parking

    Nowadays, Vehicle-to-everything (V2X) is one of the main emerging technologies attracting significant interest of researchers and industries who aim...
    Mohamed Darqaoui, Moussa Coulibaly, Ahmed Errami in Wireless Internet
    Conference paper 2024
  8. Learning Markov Chain Models from Sequential Data Under Local Differential Privacy

    Markov chain models are frequently used in the analysis and modeling of sequential data such as location traces, time series, natural language, and...
    Efehan Guner, M. Emre Gursoy in Computer Security – ESORICS 2023
    Conference paper 2024
  9. Item-Oriented Personalized LDP for Discrete Distribution Estimation

    Discrete distribution estimation is a fundamental statistical tool, which is widely used to perform data analysis tasks in various applications...
    **n Li, Hong Zhu, ... Meiyi **e in Computer Security – ESORICS 2023
    Conference paper 2024
  10. Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks

    Remotely Triggered Black Hole (RTBH) is a common DDoS mitigation approach that has been in use for the last two decades. Usually, it is implemented...
    Radu Anghel, Swaathi Vetrivel, ... Yury Zhauniarovich in Computer Security – ESORICS 2023
    Conference paper 2024
  11. LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing

    File systems (FSes) store crucial data. However, FS bugs can lead to data loss and security vulnerabilities. FS fuzzing is an effective technique for...
    Wenqing Liu, An-I Andy Wang in Computer Security – ESORICS 2023
    Conference paper 2024
  12. FSmell: Recognizing Inline Function in Binary Code

    Function recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still...
    Wei Lin, Qingli Guo, ... **aorui Gong in Computer Security – ESORICS 2023
    Conference paper 2024
  13. Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

    The emergence of WebAssembly allows attackers to hide the malicious functionalities of JavaScript malware in cross-language interoperations, termed...
    Yifan **a, ** He, ... Wenhai Wang in Computer Security – ESORICS 2023
    Conference paper 2024
  14. Traffic Analysis by Adversaries with Partial Visibility

    Mixnets are a fundamental privacy enhancing technology in the context of anonymous communication that have been extensively studied in terms of a...
    Iness Ben Guirat, Claudia Diaz, ... Hadas Zeilberger in Computer Security – ESORICS 2023
    Conference paper 2024
  15. Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

    5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower...
    Md Nazmul Hoq, Jia Wei Yao, ... Mourad Debbabi in Computer Security – ESORICS 2023
    Conference paper 2024
  16. Enforcing the GDPR

    Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement...
    François Hublet, David Basin, Srđan Krstić in Computer Security – ESORICS 2023
    Conference paper 2024
  17. Identity-Based Matchmaking Encryption with Enhanced Privacy – A Generic Construction with Practical Instantiations

    Identity-based matchmaking encryption (IB-ME), proposed by Ateniese et al. (Crypto 2019), is a type of matchmaking encryption (ME). In IB-ME, the...
    Xavier Boyen, Qinyi Li in Computer Security – ESORICS 2023
    Conference paper 2024
  18. Protocol Dialects as Formal Patterns

    A protocol dialect is a lightweight method to obfuscate the communication exchanges between legitimate protocol users to make it hard for malicious...
    D. Galán, V. García, ... J. Meseguer in Computer Security – ESORICS 2023
    Conference paper 2024
  19. Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference

    Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes...
    Mengfei Ren, Haotian Zhang, ... Yu Lei in Computer Security – ESORICS 2023
    Conference paper 2024
  20. Everlasting ROBOT: The Marvin Attack

    In this paper we show that Bleichenbacher-style attacks on RSA decryption are not only still possible, but also that vulnerable implementations are...
    Conference paper 2024
Did you find what you were looking for? Share feedback.