Salil Kanhere
Latest
- Evaluating Honeyfile Realism and Enticement Metrics
- Evaluating Honeyfile Realism and Enticement Metrics
- Predicting IoT Device Vulnerability Fix Times with Survival and Failure Time Models
- Predicting IoT Device Vulnerability Fix Times with Survival and Failure Time Models
- Unsupervised Power Load Super-Resolution Based on Contrastive and Internal Learning
- Unsupervised Power Load Super-Resolution Based on Contrastive and Internal Learning
- VEH-Attack: Stealthy Tracking of Train Passengers With Side-Channel Attack on Vibration Energy Harvesting Wearables
- VEH-Attack: Stealthy Tracking of Train Passengers With Side-Channel Attack on Vibration Energy Harvesting Wearables
- Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning
- Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning
- Enabling Safe ITS: EEG-Based Microsleep Detection in VANETs
- Enabling Safe ITS: EEG-Based Microsleep Detection in VANETs
- Advanced Networking and Applications for Metaverse and Web 3.0
- Advanced Networking and Applications for Metaverse and Web 3.0
- Reinforcing Industry 4.0 With Digital Twins and Blockchain-Assisted Federated Learning
- Reinforcing Industry 4.0 With Digital Twins and Blockchain-Assisted Federated Learning
- A blockchain framework data integrity enhanced recommender system
- A blockchain framework data integrity enhanced recommender system
- Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots
- Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots
- Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
- Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
- A Decentralized Architecture for Trusted Dataset Sharing Using Smart Contracts and Distributed Storage
- A Decentralized Architecture for Trusted Dataset Sharing Using Smart Contracts and Distributed Storage
- Deep Reinforcement Learning for Dynamic Things of Interest Recommendation in Intelligent Ambient Environment
- Deep Reinforcement Learning for Dynamic Things of Interest Recommendation in Intelligent Ambient Environment
- Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications
- Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications
- IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?
- IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?
- A Novel Model-Based Security Scheme for LoRa Key Generation
- A Novel Model-Based Security Scheme for LoRa Key Generation
- Contextual Bandit Learning for Activity-Aware Things-of-Interest Recommendation in an Assisted Living Environment
- Contextual Bandit Learning for Activity-Aware Things-of-Interest Recommendation in an Assisted Living Environment
- Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions
- Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions
- DaaS: Dew Computing as a Service for Intelligent Intrusion Detection in Edge-of-Things Ecosystem
- DaaS: Dew Computing as a Service for Intelligent Intrusion Detection in Edge-of-Things Ecosystem
- Editor's note
- Editor's note
- EMPOWERING SUSTAINABLE ENERGY INFRASTRUCTURES VIA AI-ASSISTED WIRELESS COMMUNICATIONS
- EMPOWERING SUSTAINABLE ENERGY INFRASTRUCTURES VIA AI-ASSISTED WIRELESS COMMUNICATIONS
- Temporary immutability: A removable blockchain solution for prosumer-side energy trading
- Temporary immutability: A removable blockchain solution for prosumer-side energy trading
- A Novel Modeling Involved Security Approach for LoRa Key Generation
- A Novel Modeling Involved Security Approach for LoRa Key Generation
- Adaptive Two-Dimensional Embedded Image Clustering
- Adaptive Two-Dimensional Embedded Image Clustering
- Is Privacy Regulation Slowing Down Research on Pervasive Computing?
- Is Privacy Regulation Slowing Down Research on Pervasive Computing?
- Selected papers from the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
- Selected papers from the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
- Special issue on \"Crowd-sensed Big Data for Internet of Things Services\"
- Special issue on \"Crowd-sensed Big Data for Internet of Things Services\"
- Editorial: Receiving the Baton
- Editorial: Receiving the Baton
- Guest Editorial: Introduction to the Special Section on Sensor Data Computing as a Service in Internet of Things
- Guest Editorial: Introduction to the Special Section on Sensor Data Computing as a Service in Internet of Things
- How mobility patterns drive disease spread: A case study using public transit passenger card travel data
- How mobility patterns drive disease spread: A case study using public transit passenger card travel data
- HydraDoctor: Real-time Liquids Intake Monitoring by Collaborative Sensing
- HydraDoctor: Real-time Liquids Intake Monitoring by Collaborative Sensing
- Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
- Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
- Peer-to-Peer EnergyTrade: A Distributed Private Energy Trading Platform
- Peer-to-Peer EnergyTrade: A Distributed Private Energy Trading Platform
- Reminder Care System: An Activity-Aware Cross-Device Recommendation System
- Reminder Care System: An Activity-Aware Cross-Device Recommendation System
- Towards a Privacy-Preserving Way of Vehicle Data Sharing - A Case for Blockchain Technology?
- Towards a Privacy-Preserving Way of Vehicle Data Sharing - A Case for Blockchain Technology?
- Zero-Shot Object Detection with Textual Descriptions
- Zero-Shot Object Detection with Textual Descriptions
- Algorithmic Governance in Smart Cities The Conundrum and the Potential of Pervasive Computing Solutions
- Algorithmic Governance in Smart Cities The Conundrum and the Potential of Pervasive Computing Solutions
- Demo: A Delay-Tolerant Payment Scheme on the Ethereum Blockchain
- Demo: A Delay-Tolerant Payment Scheme on the Ethereum Blockchain
- Carrots and Sticks - Incentives that Make Mobile Crowdsensing Work (CASPer 2016 Keynote Paper)
- Carrots and Sticks - Incentives that Make Mobile Crowdsensing Work (CASPer 2016 Keynote Paper)
- Smart Cities: Intelligent Environments and Dumb People?
- Smart Cities: Intelligent Environments and Dumb People?
- Ear-Phone: A context-aware noise mapping using smart phones
- Ear-Phone: A context-aware noise mapping using smart phones
- Optimizing HTTP-Based Adaptive Streaming in Vehicular Environment Using Markov Decision Process
- Optimizing HTTP-Based Adaptive Streaming in Vehicular Environment Using Markov Decision Process
- A Distributed Mechanism for Dynamic Resource Trading in Cooperative Mobile Video Streaming
- A Distributed Mechanism for Dynamic Resource Trading in Cooperative Mobile Video Streaming
- HTTP-based Adaptive Streaming for Mobile Clients using Markov Decision Process
- HTTP-based Adaptive Streaming for Mobile Clients using Markov Decision Process
- Platform Zero: A Context-based Computing Platform for Collaboration
- Platform Zero: A Context-based Computing Platform for Collaboration
- Priority-based coverage path planning for Aerial Wireless Sensor Networks
- Priority-based coverage path planning for Aerial Wireless Sensor Networks
- Trust Assessment in Social Participatory Networks
- Trust Assessment in Social Participatory Networks
- Automatic Image Capturing and Processing for PetrolWatch
- Automatic Image Capturing and Processing for PetrolWatch
- Authentication and Confidentiality in Wireless Ad Hoc Networks
- Authentication and Confidentiality in Wireless Ad Hoc Networks
- Poster Abstract: Experimental Evaluation of Multi-Hop Routing Protocols for Wireless Sensor Networks
- Poster Abstract: Experimental Evaluation of Multi-Hop Routing Protocols for Wireless Sensor Networks
- Safety Assurance and Rescue Communication Systems in High-Stress Environments: A Mining Case Study
- Safety Assurance and Rescue Communication Systems in High-Stress Environments: A Mining Case Study
- Multi-Channel Interference in Wireless Sensor Networks
- Multi-Channel Interference in Wireless Sensor Networks
- Poster Abstract: Ear-Phone Assessment of Noise Pollution with Mobile Phones
- Poster Abstract: Ear-Phone Assessment of Noise Pollution with Mobile Phones
- Detection and Tracking Using Wireless Sensor Networks
- Detection and Tracking Using Wireless Sensor Networks
- INDICT: INtruder Detection, Identification, Containment and Termination
- INDICT: INtruder Detection, Identification, Containment and Termination