Search
Search Results
-
Multiproduct Pipeline Leak Detection and Localization System Using Artificial Intelligence
The modeling and simulation of a leak detection system with incidence localization for a multiproduct unidirectional flow pipeline is presented in...
-
When Machine Learning Models Leak: An Exploration of Synthetic Training Data
We investigate an attack on a machine learning classifier that predicts the propensity of a person or household to move (i.e., relocate) in the next... -
Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability
The increasing use of hand-held devices which have access to location information, has raised the risk of privacy disclosure. To implement privacy...
-
Frequency-Domain Generalized Phase Transform Method in Pipeline Leaks Locating
This article considers the problem of instrumental-assisted determination of the location of leaks in water pipes using acoustic correlation leak... -
A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance
With the development of smart devices and mobile positioning technologies, location-based services (LBS) has become more and more popular. While... -
An Improved Dummy Generation Approach for Enhancing User Location Privacy
Location-based services (LBS), which provide personalized and timely information, entail privacy concerns such as unwanted leak of current user... -
Protecting Encrypted Video Stream Against Information Leak Using Adversarial Traces
TLS protocol encryption hides the specific packet content but not the network characteristics. The adversary can determine the relevant information... -
Constructing dummy query sequences to protect location privacy and query privacy in location-based services
Location-based services (LBS) have become an important part of people’s daily life. However, while providing great convenience for mobile users, LBS...
-
Data-driven approaches and model-based methods for detecting and locating leaks in water distribution systems: a literature review
Water distribution systems are made up of interconnected components that should allow water systems to meet demand, but leaks can waste enough water...
-
Internet network location privacy protection with multi-access edge computing
Privacy is an increasing concern of mobile Internet users as both research and real-world incidents show that leaking of communication and location...
-
A method for constructing sliding windows leak from noisy cache timing information
This paper presents a method for constructing an operation sequence of sliding window exponentiation from the noisy cache information of RSA, which...
-
Recognition and monitoring of gas leakage using infrared imaging technique with machine learning
Gas leakage in the domestic sector leads to numerous dangerous hazards. The earlier prediction is one of the safety measures to prevent various...
-
Joint Location-Value Privacy Protection for Spatiotemporal Data Collection via Mobile Crowdsensing
Due to the development of the Internet of Things, mobile crowdsensing has emerged as a promising pervasive sensing paradigm for online spatiotemporal... -
Novel Leak Location Approach in Water Distribution Networks with Zone Clustering and Classification
A novel leak location approach for large-scale water distribution networks (WDNs) is discussed in this paper. The location task is formulated as a... -
Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme
Symmetric Searchable Encryption (SSE) allows users to outsource encrypted data to a possibly untrusted remote location while simultaneously being... -
A Novel Location Privacy-Preserving Task Allocation Scheme for Spatial Crowdsourcing
With the increasing popularity of big data and sharing economics, spatial crowdsourcing as a new computing paradigm has attracted the attention of... -
RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM
Air-gapped systems are physically separated from external networks, including the Internet. This isolation is achieved by kee** the air-gap... -
A hybrid cellular automata-based model for leakage detection in smart drip irrigation water pipeline structure using IoT sensors
The hybrid Cellular Automata (CA) based leak detection model which considers flow rate, pressure, soil moisture sensors, and rain sensor reading is...
-
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inaccessible data during out-of-order execution.... -
Detecting Illicit Data Leaks on Android Smartphones Using an Artificial Intelligence Models
In today’s digital landscape, hackers and espionage agents are increasingly targeting Android, the world’s most prevalent mobile operating system. We...