Salil S. Kanhere
Latest
- PRepChain: A versatile privacy-preserving reputation system for dynamic supply chain environments
- PRepChain: A versatile privacy-preserving reputation system for dynamic supply chain environments
- Demo: TOSense – What Did You Just Agree to?
- Demo: TOSense – What Did You Just Agree to?
- VAlign-GLAR: Graph Retrieval-Based Vulnerability Intelligence Alignment via Structured LLM-Guided Inference
- VAlign-GLAR: Graph Retrieval-Based Vulnerability Intelligence Alignment via Structured LLM-Guided Inference
- BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning
- BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning
- Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence
- Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence
- TOSense: We Read, You Click
- TOSense: We Read, You Click
- What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation?
- What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation?
- Zero Trust Driven Access Control Delegation Using Blockchain
- Zero Trust Driven Access Control Delegation Using Blockchain
- BeyondLife: Third-Party Digital Will Application
- BeyondLife: Third-Party Digital Will Application
- LSTM-H: A Hybrid Deep Learning Model for Accurate Livestock Movement Prediction in UAV-Based Monitoring Systems
- LSTM-H: A Hybrid Deep Learning Model for Accurate Livestock Movement Prediction in UAV-Based Monitoring Systems
- Navigating the Gray Interventions: The Impact of Soft Moderation Techniques Across Social Media Platforms
- Navigating the Gray Interventions: The Impact of Soft Moderation Techniques Across Social Media Platforms
- DeepSneak: User GPS Trajectory Reconstruction from Federated Route Recommendation Models
- DeepSneak: User GPS Trajectory Reconstruction from Federated Route Recommendation Models
- BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management
- BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management
- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention
- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention
- Instance-Wise Monotonic Calibration by Constrained Transformation
- Instance-Wise Monotonic Calibration by Constrained Transformation
- Revisit Time Series Classification Benchmark: The Impact of Temporal Information for Classification
- Revisit Time Series Classification Benchmark: The Impact of Temporal Information for Classification
- Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning
- Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning
- Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement
- Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement
- Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics
- Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics
- Synthetic Trajectory Generation Through Convolutional Neural Networks
- Synthetic Trajectory Generation Through Convolutional Neural Networks
- Honeyfile Camouflage: Hiding Fake Files in Plain Sight
- Honeyfile Camouflage: Hiding Fake Files in Plain Sight
- Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity
- Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity
- SoK: Can Trajectory Generation Combine Privacy and Utility?
- SoK: Can Trajectory Generation Combine Privacy and Utility?
- SoK: Trusting Self-Sovereign Identity
- SoK: Trusting Self-Sovereign Identity
- Challenges in Designing Blockchain for Cyber-Physical Systems
- Challenges in Designing Blockchain for Cyber-Physical Systems
- OCHJRNChain: A Blockchain-Based Security Data Sharing Framework for Online Car-Hailing Journey
- OCHJRNChain: A Blockchain-Based Security Data Sharing Framework for Online Car-Hailing Journey
- Optimally Mitigating Backdoor Attacks in Federated Learning
- Optimally Mitigating Backdoor Attacks in Federated Learning
- Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
- Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation
- Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach
- Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach
- A blockchain-based IoT data marketplace
- A blockchain-based IoT data marketplace
- A systematic review of federated learning from clients' perspective: challenges and solutions
- A systematic review of federated learning from clients' perspective: challenges and solutions
- BAILIF: A Blockchain Agnostic Interoperability Framework
- BAILIF: A Blockchain Agnostic Interoperability Framework
- Barriers to blockchain-based decentralised energy trading: a systematic review
- Barriers to blockchain-based decentralised energy trading: a systematic review
- Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads
- Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads
- Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT
- Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT
- Trust and Reputation Management for Blockchain-enabled IoT
- Trust and Reputation Management for Blockchain-enabled IoT
- VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms
- VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms
- <i>CredTrust</i>: Credential Based Issuer Management for Trust in Self-Sovereign Identity
- <i>CredTrust</i>: Credential Based Issuer Management for Trust in Self-Sovereign Identity
- A machine learning and blockchain based secure and cost-effective framework for minor medical consultations
- A machine learning and blockchain based secure and cost-effective framework for minor medical consultations
- A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases
- A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases
- A review on Virtual Reality and Augmented Reality use-cases of Brain Computer Interface based applications for smart cities
- A review on Virtual Reality and Augmented Reality use-cases of Brain Computer Interface based applications for smart cities
- A survey of data minimisation techniques in blockchain-based healthcare
- A survey of data minimisation techniques in blockchain-based healthcare
- A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions
- A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions
- AI for Next Generation Computing: Emerging Trends and Future Directions
- AI for Next Generation Computing: Emerging Trends and Future Directions
- AQA: An Adaptive Quality Assessment Framework for Online Review Systems
- AQA: An Adaptive Quality Assessment Framework for Online Review Systems
- Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores
- Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores
- Blockchain-Based Decentralized Federated Learning
- Blockchain-Based Decentralized Federated Learning
- Chain or DAG? Underlying data structures, architectures, topologies and consensus in distributed ledger technology: A review, taxonomy and research issues
- Chain or DAG? Underlying data structures, architectures, topologies and consensus in distributed ledger technology: A review, taxonomy and research issues
- Consensus Algorithms on Appendable-Block Blockchains: Impact and Security Analysis
- Consensus Algorithms on Appendable-Block Blockchains: Impact and Security Analysis
- DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains
- DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains
- Device Identification in Blockchain-Based Internet of Things
- Device Identification in Blockchain-Based Internet of Things
- DIMY: Enabling privacy-preserving contact tracing
- DIMY: Enabling privacy-preserving contact tracing
- Estimating Passenger Queue for Bus Resource Optimization Using LoRaWAN-Enabled Ultrasonic Sensors
- Estimating Passenger Queue for Bus Resource Optimization Using LoRaWAN-Enabled Ultrasonic Sensors
- HARB: A Hypergraph-Based Adaptive Consortium Blockchain for Decentralized Energy Trading
- HARB: A Hypergraph-Based Adaptive Consortium Blockchain for Decentralized Energy Trading
- Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines
- Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines
- MetaGanFi: Cross-Domain Unseen Individual Identification Using WiFi Signals
- MetaGanFi: Cross-Domain Unseen Individual Identification Using WiFi Signals
- Monetizing Parking IoT Data via Demand Prediction and Optimal Space Sharing
- Monetizing Parking IoT Data via Demand Prediction and Optimal Space Sharing
- Privacy in targeted advertising on mobile devices: a survey
- Privacy in targeted advertising on mobile devices: a survey
- PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains
- PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains
- Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks
- Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks
- TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces
- TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces
- Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings
- Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings
- WIDE: A witness-based data priority mechanism for vehicular forensics
- WIDE: A witness-based data priority mechanism for vehicular forensics
- The Road to Accountable and Dependable Manufacturing
- The Road to Accountable and Dependable Manufacturing
- Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy
- Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy
- A Novel Blockchain-as-a-Service (BaaS) Platform for Local 5G Operators
- A Novel Blockchain-as-a-Service (BaaS) Platform for Local 5G Operators
- Appendable-Block Blockchains
- Appendable-Block Blockchains
- Attacking with bitcoin: Using bitcoin to build resilient botnet armies
- Attacking with bitcoin: Using bitcoin to build resilient botnet armies
- B-FERL: Blockchain based framework for securing smart vehicles
- B-FERL: Blockchain based framework for securing smart vehicles
- BlockTorrent: A privacy-preserving data availability protocol for multiple stakeholder scenarios
- BlockTorrent: A privacy-preserving data availability protocol for multiple stakeholder scenarios
- Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study
- Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study
- Context-Induced Activity Monitoring for On-Demand Things-of-Interest Recommendation in an Ambient Intelligent Environment
- Context-Induced Activity Monitoring for On-Demand Things-of-Interest Recommendation in an Ambient Intelligent Environment
- Cost-Effective Blockchain-based IoT Data Marketplaces with a Credit Invariant
- Cost-Effective Blockchain-based IoT Data Marketplaces with a Credit Invariant
- Cost-effective IoT devices as trustworthy data sources for a blockchain-based water management system in precision agriculture
- Cost-effective IoT devices as trustworthy data sources for a blockchain-based water management system in precision agriculture
- Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
- Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
- Deception for Cyber Defence: Challenges and Opportunities
- Deception for Cyber Defence: Challenges and Opportunities
- Detecting Internet of Things Bots: A Comparative Study
- Detecting Internet of Things Bots: A Comparative Study
- Energy and Service-priority aware Trajectory Design for UAV-BSs using Double Q-Learning
- Energy and Service-priority aware Trajectory Design for UAV-BSs using Double Q-Learning
- Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples
- Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples
- Gate-ID: WiFi-Based Human Identification Irrespective of Walking Directions in Smart Home
- Gate-ID: WiFi-Based Human Identification Irrespective of Walking Directions in Smart Home
- IEEE International Conference on Pervasive Computing and Communications (PerCom) 2020
- IEEE International Conference on Pervasive Computing and Communications (PerCom) 2020
- In Situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources
- In Situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources
- MB-EHR: A Multilayer Blockchain-based EHR
- MB-EHR: A Multilayer Blockchain-based EHR
- MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System
- MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System
- Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
- Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
- Towards a blockchain powered IoT data marketplace
- Towards a blockchain powered IoT data marketplace
- Towards Automated Data Sharing in Personal Data Stores
- Towards Automated Data Sharing in Personal Data Stores
- Towards Privacy-preserving Digital Contact Tracing
- Towards Privacy-preserving Digital Contact Tracing
- Traceable, trustworthy and privacy preserving agri-food supply chains
- Traceable, trustworthy and privacy preserving agri-food supply chains
- TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply Chains
- TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply Chains
- Trust-Based Blockchain Authorization for IoT
- Trust-Based Blockchain Authorization for IoT
- VID: Human identification through vein patterns captured from commodity depth cameras
- VID: Human identification through vein patterns captured from commodity depth cameras
- Forthcoming applications of quantum computing: peeking into the future
- Forthcoming applications of quantum computing: peeking into the future
- A Decentralized Peer-to-Peer Remote Health Monitoring System
- A Decentralized Peer-to-Peer Remote Health Monitoring System
- A journey in applying blockchain for cyberphysical systems
- A journey in applying blockchain for cyberphysical systems
- A QoS-aware, Energy-efficient Trajectory Optimization for UAV Base Stations using Q-Learning
- A QoS-aware, Energy-efficient Trajectory Optimization for UAV Base Stations using Q-Learning
- A Relational Network Framework for Interoperability in Distributed Energy Trading
- A Relational Network Framework for Interoperability in Distributed Energy Trading
- A Survey of COVID-19 Contact Tracing Apps
- A Survey of COVID-19 Contact Tracing Apps
- A Technology-driven Overview on Blockchain-based Academic Certificate Handling
- A Technology-driven Overview on Blockchain-based Academic Certificate Handling
- A unified framework for data integrity protection in people-centric smart cities
- A unified framework for data integrity protection in people-centric smart cities
- ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile Crowdsensing
- ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile Crowdsensing
- Adversarial Multi-view Networks for Activity Recognition
- Adversarial Multi-view Networks for Activity Recognition
- Blockchain and Cyberphysical Systems
- Blockchain and Cyberphysical Systems
- Blockchain-based Verifiable Credential Sharing with Selective Disclosure
- Blockchain-based Verifiable Credential Sharing with Selective Disclosure
- Brain2Object: Printing Your Mind from Brain Signals with Spatial Correlation Embedding
- Brain2Object: Printing Your Mind from Brain Signals with Spatial Correlation Embedding
- Context-based Smart Contracts For Appendable-block Blockchains
- Context-based Smart Contracts For Appendable-block Blockchains
- Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals
- Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals
- Energy-aware Demand Selection and Allocation for Real-time IoT Data Trading
- Energy-aware Demand Selection and Allocation for Real-time IoT Data Trading
- Evaluating Emergency Evacuation Events Using Building WiFi Data
- Evaluating Emergency Evacuation Events Using Building WiFi Data
- Exploiting constrained IoT devices in a trustless blockchain-based water management system
- Exploiting constrained IoT devices in a trustless blockchain-based water management system
- HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
- HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
- Identifying highly influential travellers for spreading disease on a public transport system
- Identifying highly influential travellers for spreading disease on a public transport system
- Interoperability and Synchronization Management of Blockchain-Based Decentralized e-Health Systems
- Interoperability and Synchronization Management of Blockchain-Based Decentralized e-Health Systems
- Leveraging lightweight blockchain to establish data integrity for surveillance cameras
- Leveraging lightweight blockchain to establish data integrity for surveillance cameras
- Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings
- Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings
- Passive Activity Classification of Smart Homes through Wireless Packet Sniffing
- Passive Activity Classification of Smart Homes through Wireless Packet Sniffing
- Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT
- Poster Abstract: Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT
- Privacy in targeted advertising: A survey
- Privacy in targeted advertising: A survey
- Protecting Private Attributes in App Based Mobile User Profiling
- Protecting Private Attributes in App Based Mobile User Profiling
- Prototype Similarity Learning for Activity Recognition
- Prototype Similarity Learning for Activity Recognition
- Special Issue on Data Distribution in Industrial and Pervasive Internet
- Special Issue on Data Distribution in Industrial and Pervasive Internet
- Towards a Distributed Defence Mechanism Against IoT-based Bots
- Towards a Distributed Defence Mechanism Against IoT-based Bots
- Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs
- Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs
- Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs
- Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs
- Trust Management in Decentralized IoT Access Control System
- Trust Management in Decentralized IoT Access Control System
- A Trust Architecture for Blockchain in IoT
- A Trust Architecture for Blockchain in IoT
- An Experimental Study for Tracking Crowd in Smart Cities
- An Experimental Study for Tracking Crowd in Smart Cities
- Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
- Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
- CROWD MANAGEMENT
- CROWD MANAGEMENT
- Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
- Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
- Energy Efficient Legitimate Wireless Surveillance of UAV Communications
- Energy Efficient Legitimate Wireless Surveillance of UAV Communications
- Experiences With IoT and AI in a Smart Campus for Optimizing Classroom Usage
- Experiences With IoT and AI in a Smart Campus for Optimizing Classroom Usage
- Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting
- Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting
- Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations
- Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations
- Impact of consensus on appendable-block blockchain for IoT
- Impact of consensus on appendable-block blockchain for IoT
- Improving IoT Data Quality in Mobile Crowd Sensing: A Cross Validation Approach
- Improving IoT Data Quality in Mobile Crowd Sensing: A Cross Validation Approach
- Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
- Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
- LSB: A Lightweight Scalable Blockchain for IoT security and anonymity
- LSB: A Lightweight Scalable Blockchain for IoT security and anonymity
- Measuring and Modeling Car Park Usage: Lessons Learned from a Campus Field-Trial
- Measuring and Modeling Car Park Usage: Lessons Learned from a Campus Field-Trial
- MOF-BC: A memory optimized and flexible blockchain for large scale networks
- MOF-BC: A memory optimized and flexible blockchain for large scale networks
- On the Activity Privacy of Blockchain for IoT
- On the Activity Privacy of Blockchain for IoT
- Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs
- Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs
- Recent Trends in User Authentication - A Survey
- Recent Trends in User Authentication - A Survey
- Recharging of Flying Base Stations using Airborne RF Energy Sources
- Recharging of Flying Base Stations using Airborne RF Energy Sources
- Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs
- Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs
- Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization
- Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization
- Spatio-Temporal Graph Convolutional and Recurrent Networks for Citywide Passenger Demand Prediction
- Spatio-Temporal Graph Convolutional and Recurrent Networks for Citywide Passenger Demand Prediction
- SPB: A Secure Private Blockchain-Based Solution for Distributed Energy Trading
- SPB: A Secure Private Blockchain-Based Solution for Distributed Energy Trading
- STG2Seq: Spatial-Temporal Graph to Sequence Model for Multi-step Passenger Demand Forecasting
- STG2Seq: Spatial-Temporal Graph to Sequence Model for Multi-step Passenger Demand Forecasting
- The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings
- The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings
- The Proposal of a Blockchain-Based Architecture for Transparent Certificate Handling
- The Proposal of a Blockchain-Based Architecture for Transparent Certificate Handling
- TrustChain: Trust Management in Blockchain and IoT supported Supply Chains
- TrustChain: Trust Management in Blockchain and IoT supported Supply Chains
- A Blockchain Based Liability Attribution Framework for Autonomous Vehicles
- A Blockchain Based Liability Attribution Framework for Autonomous Vehicles
- Automatic Device Classification from Network Traffic Streams of Internet of Things
- Automatic Device Classification from Network Traffic Streams of Internet of Things
- B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication
- B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication
- BRRA: A Bid-Revisable Reverse Auction based Framework for Incentive Mechanisms in Mobile Crowdsensing Systems
- BRRA: A Bid-Revisable Reverse Auction based Framework for Incentive Mechanisms in Mobile Crowdsensing Systems
- Converting Your Thoughts to Texts: Enabling Brain Typing via Deep Feature Learning of EEG Signals
- Converting Your Thoughts to Texts: Enabling Brain Typing via Deep Feature Learning of EEG Signals
- Demo Abstract: A Tool to Access and Visualize Classroom Attendance Data from a Smart Campus
- Demo Abstract: A Tool to Access and Visualize Classroom Attendance Data from a Smart Campus
- Dependable IoT using blockchain-based technology
- Dependable IoT using blockchain-based technology
- Enabling Efficient and High Quality Zooming for Online Video Streaming using Edge Computing
- Enabling Efficient and High Quality Zooming for Online Video Streaming using Edge Computing
- Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems
- Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems
- Multi-Agent Systems: A Survey
- Multi-Agent Systems: A Survey
- Optimal Prizes for All-Pay Contests in Heterogeneous Crowdsourcing
- Optimal Prizes for All-Pay Contests in Heterogeneous Crowdsourcing
- ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains
- ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains
- Realizing a Smart University Campus: Vision, Architecture, and Implementation
- Realizing a Smart University Campus: Vision, Architecture, and Implementation
- Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept
- Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept
- SPB: A Secure Private Blockchain-based Solution for Energy Trading
- SPB: A Secure Private Blockchain-based Solution for Energy Trading
- SpeedyChain: A framework for decoupling data from blockchain for smart cities
- SpeedyChain: A framework for decoupling data from blockchain for smart cities
- Toward Mitigation-as-a-Service in Cooperative Network Defenses
- Toward Mitigation-as-a-Service in Cooperative Network Defenses
- Understanding Crowd Density with A Smartphone Sensing System
- Understanding Crowd Density with A Smartphone Sensing System
- Wi-Access: Second Factor User Authentication leveraging WiFi Signals
- Wi-Access: Second Factor User Authentication leveraging WiFi Signals
- Wi-Sign: Device-free Second Factor User Authentication
- Wi-Sign: Device-free Second Factor User Authentication
- WITS: an IoT-endowed computational framework for activity recognition in personalized smart homes
- WITS: an IoT-endowed computational framework for activity recognition in personalized smart homes
- Applications and Challenges of Wearable Visual Lifeloggers
- Applications and Challenges of Wearable Visual Lifeloggers
- Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
- Blockchain for IoT Security and Privacy: The Case Study of a Smart Home
- BlockChain: A Distributed Solution to Automotive Security and Privacy
- BlockChain: A Distributed Solution to Automotive Security and Privacy
- EGAIM: Enhanced Genetic Algorithm based Incentive Mechanism for Mobile Crowdsensing
- EGAIM: Enhanced Genetic Algorithm based Incentive Mechanism for Mobile Crowdsensing
- Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval
- Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval
- Instrumenting Wireless Sensor Networks - A survey on the metrics that matter
- Instrumenting Wireless Sensor Networks - A survey on the metrics that matter
- LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
- LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
- PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications
- PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications
- Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs
- Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs
- Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems
- Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems
- VeinDeep: Smartphone Unlock using Vein Patterns
- VeinDeep: Smartphone Unlock using Vein Patterns
- Wi-Auth: WiFi based Second Factor User Authentication
- Wi-Auth: WiFi based Second Factor User Authentication
- A Context-based Privacy Preserving Framework for Wearable Visual Lifeloggers
- A Context-based Privacy Preserving Framework for Wearable Visual Lifeloggers
- Blockchain in internet of things: Challenges and Solutions
- Blockchain in internet of things: Challenges and Solutions
- Comprehensive Mobile Bandwidth Traces from Vehicular Networks
- Comprehensive Mobile Bandwidth Traces from Vehicular Networks
- Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs
- Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs
- Energy Harvesting Wearables Can Tell Which Train Route You Have Taken
- Energy Harvesting Wearables Can Tell Which Train Route You Have Taken
- Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles
- Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles
- Human Identification Using WiFi Signal
- Human Identification Using WiFi Signal
- Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay Contests
- Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay Contests
- Message dissemination in vehicular networks
- Message dissemination in vehicular networks
- On the Importance of Link Characterization for Aerial Wireless Sensor Networks
- On the Importance of Link Characterization for Aerial Wireless Sensor Networks
- Platform zero: a step closer to ubiquitous computing
- Platform zero: a step closer to ubiquitous computing
- QuickFind: Fast and Contact-free Object Detection Using a Depth Sensor
- QuickFind: Fast and Contact-free Object Detection Using a Depth Sensor
- Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna
- Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna
- SenseFlow: An Experimental Study for Tracking People
- SenseFlow: An Experimental Study for Tracking People
- Towards Policy Enforcement Point as a Service (PEPS)
- Towards Policy Enforcement Point as a Service (PEPS)
- WiFi-ID: Human Identification using WiFi signal
- WiFi-ID: Human Identification using WiFi signal
- A Socially-Aware Incentive Scheme for Social Participatory Sensing
- A Socially-Aware Incentive Scheme for Social Participatory Sensing
- Crowdsourcing with Tullock Contests: A New Perspective
- Crowdsourcing with Tullock Contests: A New Perspective
- Empirical Evaluation of MDP-based DASH Player
- Empirical Evaluation of MDP-based DASH Player
- EPLA: Energy-balancing Packets Scheduling for Airborne Relaying Networks
- EPLA: Energy-balancing Packets Scheduling for Airborne Relaying Networks
- From MANET to people-centric networking: Milestones and open research challenges
- From MANET to people-centric networking: Milestones and open research challenges
- Lightweight Clustering of Spatio-Temporal Data in Resource Constrained Mobile Sensing
- Lightweight Clustering of Spatio-Temporal Data in Resource Constrained Mobile Sensing
- Predicting the Region of Interest for Dynamic Foveated Streaming
- Predicting the Region of Interest for Dynamic Foveated Streaming
- RFT: Identifying Suitable Neighbors for Concurrent Transmissions in Point-to-Point Communications
- RFT: Identifying Suitable Neighbors for Concurrent Transmissions in Point-to-Point Communications
- Sparse Representation Based Acoustic Rangefinders: From Sensor Platforms to Mobile Devices
- Sparse Representation Based Acoustic Rangefinders: From Sensor Platforms to Mobile Devices
- Trust-based privacy-aware participant selection in social participatory sensing
- Trust-based privacy-aware participant selection in social participatory sensing
- A Reputation Framework for Social Participatory Sensing Systems
- A Reputation Framework for Social Participatory Sensing Systems
- Characterising User Targeting For In-App Mobile Ads
- Characterising User Targeting For In-App Mobile Ads
- Creating Personal Bandwidth Maps using Opportunistic Throughput Measurements
- Creating Personal Bandwidth Maps using Opportunistic Throughput Measurements
- On the need for a reputation system in mobile phone based sensing
- On the need for a reputation system in mobile phone based sensing
- Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing
- Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing
- Randomised Multipath Routing for Secure Data Collection
- Randomised Multipath Routing for Secure Data Collection
- Reliable Positioning with Hybrid Antenna Model for Aerial Wireless Sensor and Actor Networks
- Reliable Positioning with Hybrid Antenna Model for Aerial Wireless Sensor and Actor Networks
- SEW-ing a Simple Endorsement Web to Incentivize Trustworthy Participatory Sensing
- SEW-ing a Simple Endorsement Web to Incentivize Trustworthy Participatory Sensing
- Trajectory Approximation for Resource Constrained Mobile Sensor Networks
- Trajectory Approximation for Resource Constrained Mobile Sensor Networks
- TrustMeter: A Trust Assessment Scheme for Collaborative Privacy Mechanisms in Participatory Sensing Applications
- TrustMeter: A Trust Assessment Scheme for Collaborative Privacy Mechanisms in Participatory Sensing Applications
- κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks
- κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks
- A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing
- A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing
- Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
- Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
- HUBCODE: hub-based forwarding using network coding in delay tolerant networks
- HUBCODE: hub-based forwarding using network coding in delay tolerant networks
- IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications
- IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications
- Performance analysis of geography-limited broadcasting in multihop wireless networks
- Performance analysis of geography-limited broadcasting in multihop wireless networks
- Providing Trustworthy Contributions via a Reputation Framework in Social Participatory Sensing Systems
- Providing Trustworthy Contributions via a Reputation Framework in Social Participatory Sensing Systems
- Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks
- Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks
- Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)
- Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)
- A Privacy-Preserving Reputation System for Participatory Sensing
- A Privacy-Preserving Reputation System for Participatory Sensing
- Improving QoS in High-Speed Mobility Using Bandwidth Maps
- Improving QoS in High-Speed Mobility Using Bandwidth Maps
- On the characterisation of vehicular mobility in a large-scale public transport network
- On the characterisation of vehicular mobility in a large-scale public transport network
- On the Use of Location Window in Geo-Intelligent HTTP Adaptive Video Streaming
- On the Use of Location Window in Geo-Intelligent HTTP Adaptive Video Streaming
- Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna
- Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna
- A pragmatic approach to area coverage in hybrid wireless sensor networks
- A pragmatic approach to area coverage in hybrid wireless sensor networks
- A survey on privacy in mobile participatory sensing applications
- A survey on privacy in mobile participatory sensing applications
- Empirical Evaluation of HTTP Adaptive Streaming under Vehicular Mobility
- Empirical Evaluation of HTTP Adaptive Streaming under Vehicular Mobility
- Link Characterization for Aerial Wireless Sensor Networks
- Link Characterization for Aerial Wireless Sensor Networks
- Mobile Broadband Performance Measured from High-Speed Regional Trains
- Mobile Broadband Performance Measured from High-Speed Regional Trains
- Multipath Fading Effect on Spatial Packet Loss Correlation in Wireless Networks
- Multipath Fading Effect on Spatial Packet Loss Correlation in Wireless Networks
- A Bayesian Routing Framework for Delay Tolerant Networks
- A Bayesian Routing Framework for Delay Tolerant Networks
- Are You Contributing Trustworthy Data? The Case for a Reputation System in Participatory Sensing
- Are You Contributing Trustworthy Data? The Case for a Reputation System in Participatory Sensing
- Characterization of a Large-scale Delay Tolerant Network
- Characterization of a Large-scale Delay Tolerant Network
- Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks
- Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks
- Ear-Phone: An End-to-End Participatory Urban Noise Mapping System
- Ear-Phone: An End-to-End Participatory Urban Noise Mapping System
- Mitigating the Effect of Interference in Wireless Sensor Networks
- Mitigating the Effect of Interference in Wireless Sensor Networks
- Preserving privacy in participatory sensing systems
- Preserving privacy in participatory sensing systems
- Quality Improvement of Mobile Video Using Geo-intelligent Rate Adaptation
- Quality Improvement of Mobile Video Using Geo-intelligent Rate Adaptation
- Attacks and Security Mechanisms
- Attacks and Security Mechanisms
- Cluster-based Channel Assignment in Multi-radio Multi-channel Wireless Mesh Networks
- Cluster-based Channel Assignment in Multi-radio Multi-channel Wireless Mesh Networks
- HUBCODE: Message Forwarding using Hub-based Network Coding in Delay Tolerant Networks
- HUBCODE: Message Forwarding using Hub-based Network Coding in Delay Tolerant Networks
- Towards Privacy-Sensitive Participatory Sensing
- Towards Privacy-Sensitive Participatory Sensing
- Performance Evaluation of a Wireless Sensor Network Based Tracking System
- Performance Evaluation of a Wireless Sensor Network Based Tracking System
- Analysis of resource reservation aggregation in on-board networks
- Analysis of resource reservation aggregation in on-board networks
- Design, analysis, and implementation of a novel low complexity scheduler for joint resource allocation
- Design, analysis, and implementation of a novel low complexity scheduler for joint resource allocation
- Design, analysis, and implementation of a novel multiple resource scheduler
- Design, analysis, and implementation of a novel multiple resource scheduler
- Distance-based local geocasting in multi-hop wireless networks
- Distance-based local geocasting in multi-hop wireless networks
- Ensuring area coverage in hybrid wireless sensor networks
- Ensuring area coverage in hybrid wireless sensor networks
- Securing channel assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
- Securing channel assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
- Topology control and channel assignment in multi-radio multi-channel wireless mesh networks
- Topology control and channel assignment in multi-radio multi-channel wireless mesh networks
- Adaptive Position Update in Geographic Routing
- Adaptive Position Update in Geographic Routing
- Efficient boundary estimation for practical deployment of mobile sensors in hybrid sensor networks
- Efficient boundary estimation for practical deployment of mobile sensors in hybrid sensor networks
- QoS driven parallelization of resources to reduce file download delay
- QoS driven parallelization of resources to reduce file download delay
- Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks
- Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks