Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2022
A Retina-LGN-V1 Structure-like Spiking Neuron Network for Image Feature Extraction
ICVIP '21: Proceedings of the 2021 5th International Conference on Video and Image ProcessingPages 134–141https://doi.org/10.1145/3511176.3511197SNNs have achieved great attention in recent years as they contain neurons more like those in the brain and use spikes to encode and transmit information efficiently among neurons with lower energy consumption. A Retina-LGN-V1 structure-like spiking ...
- research-articleJuly 2021
Precise Scheduling of Mixed-Criticality Tasks on Varying-Speed Multiprocessors
RTNS '21: Proceedings of the 29th International Conference on Real-Time Networks and SystemsPages 134–143https://doi.org/10.1145/3453417.3453428In conventional real-time systems analysis, each system parameter is specified by a single estimate, which must pessimistically cover the worst case. Mixed-criticality (MC) design has been proposed to mitigate such pessimism by providing a single system ...
- research-articleJuly 2020
A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications
Journal of Computer Science and Technology (JCST), Volume 35, Issue 4Pages 825–842https://doi.org/10.1007/s11390-020-0260-5AbstractThe Automatic Dependent Surveillance-Broadcast (ADS-B) protocol is being adopted for use in unmanned aerial vehicles (UAVs) as the primary source of information for emerging multi-UAV collision avoidance algorithms. The lack of security features ...
- articleJanuary 2016
Collaborative task execution with originator data security for weak devices
International Journal of Sensor Networks (IJSNET), Volume 21, Issue 2Pages 67–81https://doi.org/10.1504/IJSNET.2016.078175This paper presents a secure framework for dispatching and completing tasks in a network of weak embedded devices, such as sensors. The framework allows a device to dispatch tasks to other remote devices so that the remote devices can utilise their idle ...
- ArticleDecember 2015
Using the Greenup, Powerup, and Speedup metrics to evaluate software energy efficiency
IGSC '15: Proceedings of the 2015 Sixth International Green and Sustainable Computing Conference (IGSC)Pages 1–8https://doi.org/10.1109/IGCC.2015.7393699With recognizing power as a first-class citizen in the HPC community and the growth of software running on battery-driven devices, the need to evaluate software design based on the combined effects of energy and performance has become eminent. Despite ...
-
- ArticleSeptember 2014
Energy and Power Characterization of Parallel Programs Running on Intel Xeon Phi
ICPPW '14: Proceedings of the 2014 43rd International Conference on Parallel Processing WorkshopsPages 265–272https://doi.org/10.1109/ICPPW.2014.43Intel's Xeon Phi coprocessor has successfully proved its capability by being used in Tianhe-2 and Stampede, two of the top ten most powerful supercomputers today. It is almost certain that the popularity of Xeon Phi in heterogeneous computing will grow ...
- ArticleJune 2014
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing
WASA 2014: Proceedings of the 9th International Conference on Wireless Algorithms, Systems, and Applications - Volume 8491Pages 660–671https://doi.org/10.1007/978-3-319-07782-6_59Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. However, their increased capabilities over traditional radios introduce a new dimension of security threats. Cooperative Spectrum Sensing (CSS) has ...
- ArticleOctober 2013
Originator Data Security for Collaborative Task Execution among Weak Devices
MASS '13: Proceedings of the 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor SystemsPages 421–422https://doi.org/10.1109/MASS.2013.24This paper presents a secure framework for dispatching and completing tasks in a network of weak embedded devices, such as sensors. The framework allows a device to dispatch tasks to other remote devices while ensuring that the secure data of the ...
- ArticleOctober 2013
Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs
MASS '13: Proceedings of the 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor SystemsPages 342–350https://doi.org/10.1109/MASS.2013.23Systems employing mobile devices (e.g., sensors, smart phones, robots) are emerging with growing capabilities in performing a wide variety of tasks. Due to their abundance and wide deployments, they are posed to play a dominant role in providing a rich ...
- ArticleJune 2012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks
TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and CommunicationsPages 793–800https://doi.org/10.1109/TrustCom.2012.108Intrusion monitoring is an indispensable security measure for multi-channel wireless mesh networks. This paper studies how to use mesh routers to monitor a network while supporting regular traffic. This paper shows that the traffic aware monitoring (TRAM)...
- articleJuly 2011
Self-Healing Control Flow Protection in Sensor Applications
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 8, Issue 4Pages 602–616https://doi.org/10.1109/TDSC.2011.15Since sensors do not have a sophisticated hardware architecture or an operating system to manage code for safety, attacks injecting code to exploit memory-related vulnerabilities can present threats to sensor applications. In a sensor's simple memory ...
- articleJune 2011
Fast mobility control protocols with sink location protection in wireless sensor networks
International Journal of Internet Protocol Technology (IJIPT), Volume 6, Issue 1/2Pages 3–17https://doi.org/10.1504/IJIPT.2011.040610In this paper, we propose several novel fast converging mobility control protocols to achieve optimal deployment for streaming data flows in wireless sensor networks (WSNs). We also identify a unique sink privacy issue in mobility control protocols and ...
- articleJanuary 2011
A study of self-propagating mal-packets in sensor networks: Attacks and defenses
Computers and Security (CSEC), Volume 30, Issue 1Pages 13–27https://doi.org/10.1016/j.cose.2010.10.002Since sensor applications are implemented in embedded computer systems, cyber attacks that compromise regular computer systems via exploiting memory-related vulnerabilities present similar threats to sensor networks. However, the paper shows that memory ...
- research-articleApril 2010
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++
SpringSim '10: Proceedings of the 2010 Spring Simulation MulticonferenceArticle No.: 101, Pages 1–8https://doi.org/10.1145/1878537.1878643In wireless networks, devices can be equipped with multiple interfaces to utilize multiple channels and increase the aggregated network throughput. Various channel assignment protocols have been developed to better utilize multiple channels and ...
- research-articleMarch 2010
Efficient code diversification for network reprogramming in sensor networks
WiSec '10: Proceedings of the third ACM conference on Wireless network securityPages 145–150https://doi.org/10.1145/1741866.1741890As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network. To increase the survivability of a sensor network, code diversification ...
- bookJanuary 2010
Security in Emerging Wireless Communication and Networking Systems: First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, ... and Telecommunications Engineering)
This book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. ...
- ArticleOctober 2009
Sink-Anonymity Mobility Control in Wireless Sensor Networks
WIMOB '09: Proceedings of the 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and CommunicationsPages 36–41https://doi.org/10.1109/WiMob.2009.16As the technology of mobile sensors advances, mobilitycontrol becomes a viable option that can be utilized to minimize energy consumption in wireless sensor networks (WSNs). A mobility control protocol re-deploys mobile sensors to optimal positions to ...
- ArticleAugust 2009
An Attack-Resilient Channel Assignment MAC Protocol
NBIS '09: Proceedings of the 2009 International Conference on Network-Based Information SystemsPages 246–253https://doi.org/10.1109/NBiS.2009.42Although multi-channel wireless protocols are becoming predominant, security mechanisms of channel assignment are far from sufficient to protect the channel usage. In this paper, we discuss radio jamming attacks, ripple effect attacks and false ...
- research-articleJuly 2009
KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 6, Issue 3Pages 188–201https://doi.org/10.1109/TDSC.2008.12Wireless broadcast is an effective approach for disseminating data to a number of users. To provide secure access to data in wireless broadcast services, symmetric-key-based encryption is used to ensure that only users who own the valid keys can decrypt ...
- research-articleMarch 2009
Self-healing control flow protection in sensor applications
WiSec '09: Proceedings of the second ACM conference on Wireless network securityPages 213–224https://doi.org/10.1145/1514274.1514305Since sensors do not have a sophisticated hardware architecture or an operating system to manage code for safety, attacks injecting code to exploit memory-related vulnerabilities can present threats to sensor applications. In a sensor's simple memory ...