A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mobile Malware Detection using Anomaly Based Machine Learning Classifier Techniques
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In addition, the security of sensitive data is regarded lightly on mobile devices. Based on current approaches, recent malware changes fast and thus become more difficult to detect. ...
In this paper an alternative solution to detect malware using anomaly-based classifier is proposed. ...
Moreover, the rapidly changing element of mobile malware (Droide Kung Fu), by means of a method based on signature, is less efficient in detecting illegal activities. ...
doi:10.35940/ijitee.k1040.09811s219
fatcat:g3g4vntudfakha2iynuf4clcsu
IEEE Access Special Section Editorial: Human-Centered Smart Systems and Technologies
2019
IEEE Access
In the article, ''Positive and Unlabeled Learning for User Behavior Analysis Based on Mobile Internet Traffic Data,'' Yu,et al., reported their work on analyzing user behavior when they are using mobile ...
The scheme is based on a progressively refined Wyner-Ziv coding algorithm for video compression. ...
doi:10.1109/access.2019.2961101
fatcat:ku3ukcrlqrb6jdslsao7exvbju
Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure
2018
Multimedia tools and applications
, health, water, mass gatherings, transport, etc) which is an essential part of our daily life to access different systems, services and applications is a serious issue [4, 5, [7] [8] [9] . ...
However, it is challenging to achieve, as technology is changing at rapid speed and our systems turn into ever more complex. ...
Authors obtain high quality images on a real-world network traffic dataset named 'ISP'. ...
doi:10.1007/s11042-018-6426-2
fatcat:jfuzcmb62fh3vajha3vdttj4km
Perspectives for present and future CDMA-based communications systems
2005
IEEE Communications Magazine
Code-division multiple access (CDMA) and orthogonal frequency-division multiplexing (OFDM) are two of the most promising candidates, as well as hybrid schemes based on both techniques. ...
For example, a CDMA-based system is more vulnerable to power unbalance, so in its case it is better to monitor the received power fluctuation or multiple access interference. ...
doi:10.1109/mcom.2005.1391507
fatcat:ko2l4almjzadpby64r6etzv52u
Instant Handoffs for Wireless Infrastructure Meshed Networks
2008
2008 Australasian Telecommunication Networks and Applications Conference
This work proposes an input data buffering scheme based on a ring buffer for a T-DMB software baseband receiver running on a DSP. ...
Only limited configuration changes are necessary in the access nodes; all routing and tracking is handled by the gateway. ...
doi:10.1109/atnac.2008.4783338
fatcat:5vdigbtf5nfo7ifyeepevnth54
Data Aggregation Techniques for Internet of Things
[article]
2019
arXiv
pre-print
The first approach focuses on energy efficient routing; discusses a clustering protocol based on device to device communication for both stationary and mobile IoT nodes. ...
Finally, the third approach focuses on power loss due to communication overhead and privacy issues for medical IoT devices (IoMT); describes a prediction based data aggregation framework for massive IoMT ...
The values of and are subjected to change based on traffic scenarios. Using eqs. (2.4), (2.7) and (2.8) the
t and n is the total number of nodes. ...
arXiv:1907.11367v1
fatcat:5woiqlher5eszjl3pkbk4c7khm
Analysis and Recognition of Sports Video in Physical Coaching Process Using Particle Swarm Optimization Algorithm
2022
Mobile Information Systems
This paper uses streaming video as the research object and examines the transmission control of sports video using the particle swarm optimization algorithm in detail, based on a comprehensive introduction ...
Finally, using the shot as the unit, find similar video clips in the video database based on the video examples submitted by the user, and return retrieval results based on similarity. ...
Then, based on support vector machine research, a new P2P traffic identification model is proposed, which uses three statistical features to effectively detect P2P video analysis. ...
doi:10.1155/2022/8189690
fatcat:huvz5rwhjzbwldsveurpxrgjnm
Massive MIMO Systems for 5G and Beyond Networks—Overview, Recent Trends, Challenges, and Future Research Direction
2020
Sensors
We discuss all the fundamental challenges related to pilot contamination, channel estimation, precoding, user scheduling, energy efficiency, and signal detection in a massive MIMO system and discuss some ...
Massive MIMO is one of the key enabling technology for next-generation networks, which groups together antennas at both transmitter and the receiver to provide high spectral and energy efficiency using ...
The blind channel estimation method is proposed in References [80, 81] , which are based on subspace properties of the received signal. ...
doi:10.3390/s20102753
pmid:32408531
pmcid:PMC7284607
fatcat:xmyhlmst2bconcwlq5oezoc3zu
Monitoring the Application-Layer DDoS Attacks for Popular Websites
2009
IEEE/ACM Transactions on Networking
Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd. ...
A novel anomaly detector based on hidden semi-Markov model is proposed to describe the dynamics of Access Matrix and to detect the attacks. ...
Lin (Sun Yat-Sen University, China) for his careful reading and valuable suggestions for the improvement of the paper's presentation. ...
doi:10.1109/tnet.2008.925628
fatcat:kmjfwmshdzecdfm4f3zm2gwiiy
Guest Editorial 5G Wireless Communications With High Mobility
2020
IEEE Journal on Selected Areas in Communications
In addition, network topology can change quickly, and switching among base stations (BSs) and/or peer nodes can be more frequent, not forgetting 5G challenges in cross-border mobility [11] . ...
., investigations of the impact of high mobility on wireless system performance is of significant importance, as the time-varying radio channel can still be a major bottleneck to achieving 5G requirements ...
The article "Access Points in the Air: Modeling and Optimization of Fixed-Wing UAV Network" models and evaluates the performance of a fixed-wing UAV network, where UAV access points (APs) provide coverage ...
doi:10.1109/jsac.2020.3005498
fatcat:w2fl5pqq5be7fm5kapbdzs5vza
Implementation of Fog computing for reliable E-health applications
2015
2015 49th Asilomar Conference on Signals, Systems and Computers
In this paper we follow-up on recent massive MTC concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection. ...
Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol. ...
We propose a change-point detection procedure and demonstrate that when the underlying changes exhibit certain low-dimensional structures, and is not too small in magnitude, the change-points can be reliably ...
doi:10.1109/acssc.2015.7421170
dblp:conf/acssc/CraciunescuMMKP15
fatcat:qm6mki5z6bcvrfimkmqjyrxaxm
A Content-Aware Collaborative Accessing Model in Ad Hoc Networks
2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing
Due to the restrictions of adhoc networks and the volume of multimedia data, efficient data accessing schemes are needed for various applications. ...
Keywords-content-based retrieval, collaborative data accessing, ad hoc networks I. ...
In this paper, we introduce a novel semantic-based multimedia-accessing scheme -Extended Summary Schemas Model (ESSM)as the platform for multimedia retrieval. ...
doi:10.4108/icst.collaboratecom.2011.247135
dblp:conf/colcom/YangM11
fatcat:eettbxj74vekbih462sc56rmzq
Detecting Scanners: Empirical Assessment on a 3G Network
2009
International Journal of Network Security
In this work we evaluate experimentally two common algorithms for scanner detection based on extensive analysis of real traffic traces from a live 3G mobile network. ...
The ability to detect active scanners based on passive traffic monitoring is an important prerequisite for taking appropriate countermeasures. ...
Both the detection schemes considered here are based on such basic assumption. ...
dblp:journals/ijnsec/FallettaR09
fatcat:73dowt7rmnct3benwnrtrgehtq
A Survey of Fingerprint-Based Outdoor Localization
2016
IEEE Communications Surveys and Tutorials
A growing number of sensors on smart mobile devices has led to rapid development of various mobile applications using location-based or context-aware services. ...
On the other hand, base station based localization has low accuracy. ...
A travel distance within one period is referred as one step length in the step detection technique. • Step Detection Technique: While the mobile user is walking, the step detection technique keeps sensing ...
doi:10.1109/comst.2015.2448632
fatcat:3hfburiltfg3vfoek7j7nkx7vy
Adaptive transmitter optimization for blind and group-blind multiuser detection
2003
IEEE Transactions on Signal Processing
The linear subspace-based blind and group-blind multiuser detectors recently developed represent a robust and efficient adaptive multiuser detection technique for CDMA systems. ...
In particular, we develop a maximum-eigenvectorbased method of optimizing spreading codes for given channel conditions and a utility-based power control algorithm for CDMA systems with blind or group-blind ...
Section 4 develops a utility-based power control for CDMA with blind or group-blind multiuser detection. ...
doi:10.1109/tsp.2002.808097
fatcat:xsqmtgsbzzd7rj6kr6cfa3pcqy
« Previous
Showing results 1 — 15 out of 1,122 results