Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Bitalign: Bit Alignment for Bluetooth Backscatter Communication
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 10Pages 10191–10201https://doi.org/10.1109/TMC.2024.3374815In the past decade, backscatter communications have drawn significant attention as they are an ultra-low-power solution to transmit IoT sensor data, including video and audio. However, most of the state-of-the-art backscatter systems that are fully ...
- research-articleSeptember 2024
A Robustness-Enhanced Reconstruction Based on Discontinuity Feedback Factor for High-Order Finite Volume Scheme
Journal of Scientific Computing (JSCI), Volume 101, Issue 1https://doi.org/10.1007/s10915-024-02655-6AbstractIn this paper, a robustness-enhanced reconstruction for the high-order finite volume scheme is constructed on the 2-D structured mesh, and both the high-order gas-kinetic scheme and the Lax-Friedrichs flux solver are considered to verify the ...
- research-articleApril 2024
USIR-Net: sand-dust image restoration based on unsupervised learning
Machine Vision and Applications (MVAA), Volume 35, Issue 3https://doi.org/10.1007/s00138-024-01528-0AbstractIn sand-dust weather, the influence of sand-dust particles on imaging equipment often results in images with color deviation, blurring, and low contrast, among other issues. These problems making many traditional image restoration methods unable ...
- research-articleJanuary 2024
PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-Pulling
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 5015–5029https://doi.org/10.1109/TIFS.2024.3389570This paper presents a novel radio frequency fingerprint (RFF) enhancement strategy by exploiting the physical unclonable function (PUF) to tune the RF hardware impairments in a unique and secure manner, which is exemplified by taking power amplifiers (PAs)...
- research-articleSeptember 2022
Three‐state time‐modulated array‐enabled directional modulation for secure orthogonal frequency‐division multiplexing wireless transmission
AbstractRecent works have shown that by using time‐modulated arrays (TMAs), directional modulation (DM) physical‐layer secured transmitters for orthogonal frequency‐division multiplexing (OFDM) wireless data transfer can be constructed. In this paper, ...
-
- research-articleJuly 2022
Strategyproof mechanisms for 2-facility location games with minimax envy
Journal of Combinatorial Optimization (SPJCO), Volume 43, Issue 5Pages 1628–1644https://doi.org/10.1007/s10878-021-00711-7AbstractWe study a fairness-based model for 2-facility location games on the real line where the social objective is to minimize the maximum envy over all agents. All the agents seek to minimize their personal costs, and the envy between any two of them ...
- research-articleJune 2022
Covert non-orthogonal multiple access communication assisted by multi-antenna jamming
AbstractAs the Internet of Things (IoT) becomes increasingly popular, the amount of information transmitted through the IoT network has increased significantly. Therefore, the privacy and security problem of the transmitted information has ...
- doctoral_thesisJanuary 2021
Automating Log-Based Software Debugging on Distributed Server Stacks
AbstractDebugging is one of the oldest yet hardest problems in the computer engineering field. People have been spending billions of dollars each year fighting with software bugs, yet debugging is still a highly inefficient process that requires a lot of ...
- doctoral_thesisJanuary 2021
Replication and Workload Management for In-Memory OLTP Databases
AbstractOnline transaction processing (OLTP) databases are a critical component of modern computing infrastructure services. As a result, they must be highly available, and they must process requests efficiently for a wide range of workloads. Databases ...
- doctoral_thesisJanuary 2021
Automatic Failure Diagnosis for Distributed Systems
AbstractDistributed software systems have become the backbone of Internet services. Failures in pro-duction distributed systems have severe consequences. A 63-minute outage of Amazon in 2018 caused a 100-million loss in revenue. Therefore, diagnosing such ...
- research-articleJanuary 2021
Outage Performance of Full-Duplex Relay Networks Powered by RF Power Station in Ubiquitous Electric Internet of Things
This paper investigates a full-duplex relay network assisted by radio frequency (RF) power station in ubiquitous electric Internet of Things (UEIoT), where a wireless sensor on high voltage transmission line collects electric data and then transmits data ...
- research-articleJanuary 2021
Physical Layer Secrecy Analysis of Multihop Hybrid Satellite-Terrestrial Relay Networks with Jamming
This paper explores the secrecy analysis of a multihop hybrid satellite-terrestrial relay network (HSTRN) with jamming, where one satellite source is aimed at communicating with destination users via multihop decode-and-forward (DF) terrestrial relays, in ...
- review-articleJanuary 2021
Application Status and Prospects of 5G Technology in Distribution Automation Systems
With the continuous development of 5G (5th generation mobile networks) communication technology, increasing attention has been paid to the integration of 5G technology and vertical industry. Based on the consideration of power security, the large-scale ...
- research-articleFebruary 2021
Wireless‐powered CR‐IoT with ambient backscattering: a new transmission mode
IET Communications (CMU2), Volume 14, Issue 22Pages 4069–4074https://doi.org/10.1049/iet-com.2019.1343In this study, a new hybrid secondary transmitter (ST) mode is proposed for cognitive radio Internet of Things (CR‐IoT) networks with energy harvesting (EH) and ambient backscatter (AmBack) communication capabilities. The authors firstly describe the ...
- ArticleAugust 2020
Strategyproof Mechanisms for 2-Facility Location Games with Minimax Envy
Algorithmic Aspects in Information and ManagementPages 260–272https://doi.org/10.1007/978-3-030-57602-8_24AbstractWe study a fairness-based model for 2-facility location games on the real line where the social objective is to minimize the maximum envy over all agents. All the agents seek to minimize their personal costs, and the envy between any two of them ...
- ArticleAugust 2020
Multiple Facility Location Games with Envy Ratio
Algorithmic Aspects in Information and ManagementPages 248–259https://doi.org/10.1007/978-3-030-57602-8_23AbstractWe study deterministic mechanism design without money for k-facility location games with envy ratio on a real line segment, where a set of strategic agents report their locations and a social planner locates k facilities for minimizing the envy ...
- research-articleApril 2018
Performance analysis of physical layer security over k‐μ shadowed fading channels
In this study, the secrecy performance of the classic Wyner's wiretap model over k‐μ shadowed fading channels is studied. More specifically, the authors derive two analytical expressions for the lower bound of secure outage probability at high signal‐to‐...
- research-articleNovember 2015
The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children
COSN '15: Proceedings of the 2015 ACM on Conference on Online Social NetworksPages 71–81https://doi.org/10.1145/2817946.2817957Data brokers have traditionally collected data from businesses, government records, and other publicly available offline sources. While each data source may provide only a few elements about a person's activities, data brokers combine these elements to ...
- research-articleNovember 2014
Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery
SPSM '14: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile DevicesPages 75–80https://doi.org/10.1145/2666620.2666625The rise of smart phone usage has led to an increase in the number of applications that make use of the users' locations. One popular class of such applications is location-based social discovery (LBSD), which enables users to discover others nearby and ...
- ArticleMarch 2014
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?
PAM 2014: Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362Pages 235–246https://doi.org/10.1007/978-3-319-04918-2_23We examine third-party Online Social Network (OSN) applications for two major OSNs: Facebook and RenRen. These third-party applications typically gather, from the OSN, user personal information. We develop a measurement platform to study the interaction ...