Search
Search Results
-
Leak Detection in Water Distribution Networks via Pressure Analysis Using a Machine Learning Ensemble
Water distribution networks (WDNs) are vital infrastructure which serve as a means for public utilities to deliver potable water to consumers.... -
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries
Android app developers are expected to specify the use of dangerous permissions in their app descriptions. The absence of such data indicates...
-
BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols
Bluetooth vulnerabilities have become increasingly popular in recent years due to, in part, the remote exploitability of Bluetooth. Unfortunately, in... -
Construction of Power System Communication Network Based on Edge Computing
In order to overcome the problem of network congestion in the traditional cloud computing mode of power system, the author introduces edge computing... -
A study of accelerometer signal decay in small pipelines
Accelerometers are a powerful tool when it comes to leak detection, especially in small pipelines. The increase in accelerometer research related to...
-
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social...
-
Atmospheric Dispersion Prediction for Toxic Gas Clouds by Using Machine Learning Approaches
The to the frequent industrial accidents of chemical origin present today, some tools can predict atmospheric dispersion considering meteorological... -
Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls
Android security researchers utilize taint analysis to uncover apps’ bugs and policy-violating behaviors. However, the investigations are unsafe...
-
Intercept and Inject: DNS Response Manipulation in the Wild
DNS is a protocol responsible for translating human-readable domain names into IP addresses. Despite being essential for many Internet services to... -
Listening Between the Bits: Privacy Leaks in Audio Fingerprints
Audio content recognition is an emerging technology that forms the basis for mobile services, such as automatic song recognition, second-screen... -
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed...
-
Proving SIFA protection of masked redundant circuits
Implementation attacks like side-channel and fault attacks pose a considerable threat to cryptographic devices that are physically accessible by an...
-
Location Independence
In the not too distant past, most programs ran on a single computer. After the proliferation of JavaScript in the web browser, apps on mobile phones,... -
A Novel Location Privacy Protection Scheme with Generative Adversarial Network
With the booming development of technology and location tracking, location-based services (LBSs) are widely used in mobile phone applications.... -
Privacy Concerns in Smart Indoor Environments in the Internet of Everything Era: A Smart University Campus Case Study
In the Internet of Everything era, indoor environment provides multiple benefits across different domains to their occupants such as improving their... -
AI-enabled Underground Water Pipe non -destructive Inspection
A study conducted by the World Bank indicated that the global annual economic losses from the water leakage are estimated at US$ 14.6 billion. For...
-
A practical privacy-preserving nearest neighbor searching method over encrypted spatial data
To realize the great flexibility and cost savings for providing location-based service, data owners are incentivized to migrate their data to cloud...
-
Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation
Today’s success of state of the art methods for semantic segmentation is driven by large datasets. Data is considered an important asset that needs... -
Supporting secure dynamic alert zones using searchable encryption and graph embedding
Location-based alerts have gained increasing popularity in recent years, whether in the context of healthcare (e.g., COVID-19 contact tracing),...
-
An Innovative and Reliable Water Leak Detection Service Supported by Data-Intensive Remote Sensing Processing
The WADI project (Water-tightness Airborne Detection Implementation), integrated within the H2020 initiative, is develo** an airborne water leak...