Search
Search Results
-
Target-Oriented Regret Minimization for Satisficing Monopolists
We study a robust monopoly pricing problem where a seller aspires to sell an item to a buyer. We assume that the seller, unaware of the buyer’s... -
Optimization of Energy Distribution with Demand Response Control in 6G Next Generation Smart Grids
The transition to an intelligent electrical network that is more respectful to the environment and consumers’ needs requires the adoption of... -
Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing
In an era of rapidly evolving mobile computing, integrating satellite technologies with the Internet of Things (IoT) creates new communication and... -
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing
With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid... -
Comparative Analysis of Terahertz MAC Protocols for Wireless Data Center
Over the last few years, generation of Internet data by the users has drastically increased. As this data is accessed, processed, shared, and... -
TTWiFi: Time-Triggered WiFi for Mobile Robotics in Human Environments
WiFi is a ubiquitous protocol, but exhibits flaws that become particularly critical for teams of robots in human environments. We demonstrate that... -
Cellular-V2X and VANET(DSRC) Based End-to-End Guidance for Smart Parking
Nowadays, Vehicle-to-everything (V2X) is one of the main emerging technologies attracting significant interest of researchers and industries who aim... -
Learning Markov Chain Models from Sequential Data Under Local Differential Privacy
Markov chain models are frequently used in the analysis and modeling of sequential data such as location traces, time series, natural language, and... -
Item-Oriented Personalized LDP for Discrete Distribution Estimation
Discrete distribution estimation is a fundamental statistical tool, which is widely used to perform data analysis tasks in various applications... -
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks
Remotely Triggered Black Hole (RTBH) is a common DDoS mitigation approach that has been in use for the last two decades. Usually, it is implemented... -
LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing
File systems (FSes) store crucial data. However, FS bugs can lead to data loss and security vulnerabilities. FS fuzzing is an effective technique for... -
FSmell: Recognizing Inline Function in Binary Code
Function recognition is one of the most critical tasks in binary analysis and reverse engineering. However, the recognition of inline functions still... -
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection
The emergence of WebAssembly allows attackers to hide the malicious functionalities of JavaScript malware in cross-language interoperations, termed... -
Traffic Analysis by Adversaries with Partial Visibility
Mixnets are a fundamental privacy enhancing technology in the context of anonymous communication that have been extensively studied in terms of a... -
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
5G network technology is being rapidly adopted in various critical infrastructures, mainly due to its unique benefits (e.g., higher throughput, lower... -
Enforcing the GDPR
Violations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement... -
Identity-Based Matchmaking Encryption with Enhanced Privacy – A Generic Construction with Practical Instantiations
Identity-based matchmaking encryption (IB-ME), proposed by Ateniese et al. (Crypto 2019), is a type of matchmaking encryption (ME). In IB-ME, the... -
Protocol Dialects as Formal Patterns
A protocol dialect is a lightweight method to obfuscate the communication exchanges between legitimate protocol users to make it hard for malicious... -
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
Zigbee is one of the global most popular IoT standards widely deployed by millions of devices and customers. Its fast market growth also incentivizes... -
Everlasting ROBOT: The Marvin Attack
In this paper we show that Bleichenbacher-style attacks on RSA decryption are not only still possible, but also that vulnerable implementations are...