We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 5,708 results
  1. Multiproduct Pipeline Leak Detection and Localization System Using Artificial Intelligence

    The modeling and simulation of a leak detection system with incidence localization for a multiproduct unidirectional flow pipeline is presented in...

    Bukunmi Omojugba, Samson Oyetunji, Oluwumi Adetan in SN Computer Science
    Article 23 April 2020
  2. When Machine Learning Models Leak: An Exploration of Synthetic Training Data

    We investigate an attack on a machine learning classifier that predicts the propensity of a person or household to move (i.e., relocate) in the next...
    Manel Slokom, Peter-Paul de Wolf, Martha Larson in Privacy in Statistical Databases
    Conference paper 2022
  3. Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability

    The increasing use of hand-held devices which have access to location information, has raised the risk of privacy disclosure. To implement privacy...

    Huiwen Luo, Haoming Zhang, ... Yi Lin in Multimedia Tools and Applications
    Article 20 March 2021
  4. Frequency-Domain Generalized Phase Transform Method in Pipeline Leaks Locating

    This article considers the problem of instrumental-assisted determination of the location of leaks in water pipes using acoustic correlation leak...
    Conference paper 2023
  5. A Dummy Location Selection Algorithm Based on Location Semantics and Physical Distance

    With the development of smart devices and mobile positioning technologies, location-based services (LBS) has become more and more popular. While...
    Dongdong Yang, Baopeng Ye, ... **aobin Qian in Information Security Practice and Experience
    Conference paper 2021
  6. An Improved Dummy Generation Approach for Enhancing User Location Privacy

    Location-based services (LBS), which provide personalized and timely information, entail privacy concerns such as unwanted leak of current user...
    Shadaab Siddiqie, Anirban Mondal, P. Krishna Reddy in Database Systems for Advanced Applications
    Conference paper 2021
  7. Protecting Encrypted Video Stream Against Information Leak Using Adversarial Traces

    TLS protocol encryption hides the specific packet content but not the network characteristics. The adversary can determine the relevant information...
    Ziwei Zhang, Dengpan Ye in Image and Graphics
    Conference paper 2021
  8. Constructing dummy query sequences to protect location privacy and query privacy in location-based services

    Location-based services (LBS) have become an important part of people’s daily life. However, while providing great convenience for mobile users, LBS...

    Zongda Wu, Guiling Li, ... Guandong Xu in World Wide Web
    Article 06 July 2020
  9. Data-driven approaches and model-based methods for detecting and locating leaks in water distribution systems: a literature review

    Water distribution systems are made up of interconnected components that should allow water systems to meet demand, but leaks can waste enough water...

    Waid Nimri, Yong Wang, ... Kristofor Sellstrom in Neural Computing and Applications
    Article 06 April 2023
  10. Internet network location privacy protection with multi-access edge computing

    Privacy is an increasing concern of mobile Internet users as both research and real-world incidents show that leaking of communication and location...

    ** Zhang, Mimoza Durresi, Arjan Durresi in Computing
    Article 03 November 2020
  11. A method for constructing sliding windows leak from noisy cache timing information

    This paper presents a method for constructing an operation sequence of sliding window exponentiation from the noisy cache information of RSA, which...

    Rei Ueno, Junko Takahashi, ... Naofumi Homma in Journal of Cryptographic Engineering
    Article Open access 12 June 2020
  12. Recognition and monitoring of gas leakage using infrared imaging technique with machine learning

    Gas leakage in the domestic sector leads to numerous dangerous hazards. The earlier prediction is one of the safety measures to prevent various...

    C. P. Shirley, J Immanuel John Raja, ... I. Titus in Multimedia Tools and Applications
    Article 29 September 2023
  13. Joint Location-Value Privacy Protection for Spatiotemporal Data Collection via Mobile Crowdsensing

    Due to the development of the Internet of Things, mobile crowdsensing has emerged as a promising pervasive sensing paradigm for online spatiotemporal...
    Conference paper 2021
  14. Novel Leak Location Approach in Water Distribution Networks with Zone Clustering and Classification

    A novel leak location approach for large-scale water distribution networks (WDNs) is discussed in this paper. The location task is formulated as a...
    Marcos Quiñones-Grueiro, Cristina Verde, Orestes Llanes-Santiago in Pattern Recognition
    Conference paper 2019
  15. Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme

    Symmetric Searchable Encryption (SSE) allows users to outsource encrypted data to a possibly untrusted remote location while simultaneously being...
    Alexandros Bakas, Antonis Michalas in Data and Applications Security and Privacy XXXV
    Conference paper 2021
  16. A Novel Location Privacy-Preserving Task Allocation Scheme for Spatial Crowdsourcing

    With the increasing popularity of big data and sharing economics, spatial crowdsourcing as a new computing paradigm has attracted the attention of...
    Xuelun Huang, Shao**g Fu, ... Liu Lin in Mobile Multimedia Communications
    Conference paper 2021
  17. RAMBO: Leaking Secrets from Air-Gap Computers by Spelling Covert Radio Signals from Computer RAM

    Air-gapped systems are physically separated from external networks, including the Internet. This isolation is achieved by kee** the air-gap...
    Mordechai Guri in Secure IT Systems
    Conference paper 2024
  18. A hybrid cellular automata-based model for leakage detection in smart drip irrigation water pipeline structure using IoT sensors

    The hybrid Cellular Automata (CA) based leak detection model which considers flow rate, pressure, soil moisture sensors, and rain sensor reading is...

    Arpita Banerjee, C. Banerjee in Innovations in Systems and Software Engineering
    Article 12 December 2022
  19. Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks

    The transient-execution attack Meltdown leaks sensitive information by transiently accessing inaccessible data during out-of-order execution....
    Daniel Weber, Fabian Thomas, ... Michael Schwarz in Computer Security – ESORICS 2023
    Conference paper 2024
  20. Detecting Illicit Data Leaks on Android Smartphones Using an Artificial Intelligence Models

    In today’s digital landscape, hackers and espionage agents are increasingly targeting Android, the world’s most prevalent mobile operating system. We...
    Serge Lionel Nikiema, Aminata Sabane, ... Tégawendé F. Bissyande in Artificial Intelligence Applications and Innovations
    Conference paper 2024
Did you find what you were looking for? Share feedback.