1,122 Hits in 7.9 sec

Mobile Malware Detection using Anomaly Based Machine Learning Classifier Techniques

In addition, the security of sensitive data is regarded lightly on mobile devices. Based on current approaches, recent malware changes fast and thus become more difficult to detect.  ...  In this paper an alternative solution to detect malware using anomaly-based classifier is proposed.  ...  Moreover, the rapidly changing element of mobile malware (Droide Kung Fu), by means of a method based on signature, is less efficient in detecting illegal activities.  ... 
doi:10.35940/ijitee.k1040.09811s219 fatcat:g3g4vntudfakha2iynuf4clcsu

IEEE Access Special Section Editorial: Human-Centered Smart Systems and Technologies

Wenbing Zhao, Yonghong Peng, Kun Hua, Peng Shi, Hongqiao Wang
2019 IEEE Access  
In the article, ''Positive and Unlabeled Learning for User Behavior Analysis Based on Mobile Internet Traffic Data,'' Yu,et al., reported their work on analyzing user behavior when they are using mobile  ...  The scheme is based on a progressively refined Wyner-Ziv coding algorithm for video compression.  ... 
doi:10.1109/access.2019.2961101 fatcat:ku3ukcrlqrb6jdslsao7exvbju

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure

B. B. Gupta, Shingo Yamaguchi, Zhiyong Zhang, Konstantinos E. Psannis
2018 Multimedia tools and applications  
, health, water, mass gatherings, transport, etc) which is an essential part of our daily life to access different systems, services and applications is a serious issue [4, 5, [7] [8] [9] .  ...  However, it is challenging to achieve, as technology is changing at rapid speed and our systems turn into ever more complex.  ...  Authors obtain high quality images on a real-world network traffic dataset named 'ISP'.  ... 
doi:10.1007/s11042-018-6426-2 fatcat:jfuzcmb62fh3vajha3vdttj4km

Perspectives for present and future CDMA-based communications systems

R. Fantacci, F. Chiti, D. Marabissi, G. Mennuti, S. Morosi, D. Tarchi
2005 IEEE Communications Magazine  
Code-division multiple access (CDMA) and orthogonal frequency-division multiplexing (OFDM) are two of the most promising candidates, as well as hybrid schemes based on both techniques.  ...  For example, a CDMA-based system is more vulnerable to power unbalance, so in its case it is better to monitor the received power fluctuation or multiple access interference.  ... 
doi:10.1109/mcom.2005.1391507 fatcat:ko2l4almjzadpby64r6etzv52u

Instant Handoffs for Wireless Infrastructure Meshed Networks

Alexander A. Kist
2008 2008 Australasian Telecommunication Networks and Applications Conference  
This work proposes an input data buffering scheme based on a ring buffer for a T-DMB software baseband receiver running on a DSP.  ...  Only limited configuration changes are necessary in the access nodes; all routing and tracking is handled by the gateway.  ... 
doi:10.1109/atnac.2008.4783338 fatcat:5vdigbtf5nfo7ifyeepevnth54

Data Aggregation Techniques for Internet of Things [article]

Sunny Sanyal
2019 arXiv   pre-print
The first approach focuses on energy efficient routing; discusses a clustering protocol based on device to device communication for both stationary and mobile IoT nodes.  ...  Finally, the third approach focuses on power loss due to communication overhead and privacy issues for medical IoT devices (IoMT); describes a prediction based data aggregation framework for massive IoMT  ...  The values of  and  are subjected to change based on traffic scenarios. Using eqs. (2.4), (2.7) and (2.8) the t and n is the total number of nodes.  ... 
arXiv:1907.11367v1 fatcat:5woiqlher5eszjl3pkbk4c7khm

Analysis and Recognition of Sports Video in Physical Coaching Process Using Particle Swarm Optimization Algorithm

Wujun Xiang, Tongguang Ni
2022 Mobile Information Systems  
This paper uses streaming video as the research object and examines the transmission control of sports video using the particle swarm optimization algorithm in detail, based on a comprehensive introduction  ...  Finally, using the shot as the unit, find similar video clips in the video database based on the video examples submitted by the user, and return retrieval results based on similarity.  ...  Then, based on support vector machine research, a new P2P traffic identification model is proposed, which uses three statistical features to effectively detect P2P video analysis.  ... 
doi:10.1155/2022/8189690 fatcat:huvz5rwhjzbwldsveurpxrgjnm

Massive MIMO Systems for 5G and Beyond Networks—Overview, Recent Trends, Challenges, and Future Research Direction

Robin Chataut, Robert Akl
2020 Sensors  
We discuss all the fundamental challenges related to pilot contamination, channel estimation, precoding, user scheduling, energy efficiency, and signal detection in a massive MIMO system and discuss some  ...  Massive MIMO is one of the key enabling technology for next-generation networks, which groups together antennas at both transmitter and the receiver to provide high spectral and energy efficiency using  ...  The blind channel estimation method is proposed in References [80, 81] , which are based on subspace properties of the received signal.  ... 
doi:10.3390/s20102753 pmid:32408531 pmcid:PMC7284607 fatcat:xmyhlmst2bconcwlq5oezoc3zu

Monitoring the Application-Layer DDoS Attacks for Popular Websites

Yi Xie, Shun-Zheng Yu
2009 IEEE/ACM Transactions on Networking  
Focusing on the detection for such new DDoS attacks, a scheme based on document popularity is introduced. An Access Matrix is defined to capture the spatial-temporal patterns of a normal flash crowd.  ...  A novel anomaly detector based on hidden semi-Markov model is proposed to describe the dynamics of Access Matrix and to detect the attacks.  ...  Lin (Sun Yat-Sen University, China) for his careful reading and valuable suggestions for the improvement of the paper's presentation.  ... 
doi:10.1109/tnet.2008.925628 fatcat:kmjfwmshdzecdfm4f3zm2gwiiy

Guest Editorial 5G Wireless Communications With High Mobility

Ruisi He, Fan Bai, Guoqiang Mao, Jerome Harri, Pekka Kyosti
2020 IEEE Journal on Selected Areas in Communications  
In addition, network topology can change quickly, and switching among base stations (BSs) and/or peer nodes can be more frequent, not forgetting 5G challenges in cross-border mobility [11] .  ...  ., investigations of the impact of high mobility on wireless system performance is of significant importance, as the time-varying radio channel can still be a major bottleneck to achieving 5G requirements  ...  The article "Access Points in the Air: Modeling and Optimization of Fixed-Wing UAV Network" models and evaluates the performance of a fixed-wing UAV network, where UAV access points (APs) provide coverage  ... 
doi:10.1109/jsac.2020.3005498 fatcat:w2fl5pqq5be7fm5kapbdzs5vza

Implementation of Fog computing for reliable E-health applications

Razvan Craciunescu, Albena Mihovska, Mihail Mihaylov, Sofoklis Kyriazakos, Ramjee Prasad, Simona Halunga
2015 2015 49th Asilomar Conference on Signals, Systems and Computers  
In this paper we follow-up on recent massive MTC concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection.  ...  Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol.  ...  We propose a change-point detection procedure and demonstrate that when the underlying changes exhibit certain low-dimensional structures, and is not too small in magnitude, the change-points can be reliably  ... 
doi:10.1109/acssc.2015.7421170 dblp:conf/acssc/CraciunescuMMKP15 fatcat:qm6mki5z6bcvrfimkmqjyrxaxm

A Content-Aware Collaborative Accessing Model in Ad Hoc Networks

Bo Yang, Manohar Mareboyana
2011 Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Due to the restrictions of adhoc networks and the volume of multimedia data, efficient data accessing schemes are needed for various applications.  ...  Keywords-content-based retrieval, collaborative data accessing, ad hoc networks I.  ...  In this paper, we introduce a novel semantic-based multimedia-accessing scheme -Extended Summary Schemas Model (ESSM)as the platform for multimedia retrieval.  ... 
doi:10.4108/icst.collaboratecom.2011.247135 dblp:conf/colcom/YangM11 fatcat:eettbxj74vekbih462sc56rmzq

Detecting Scanners: Empirical Assessment on a 3G Network

Vincenzo Falletta, Fabio Ricciato
2009 International Journal of Network Security  
In this work we evaluate experimentally two common algorithms for scanner detection based on extensive analysis of real traffic traces from a live 3G mobile network.  ...  The ability to detect active scanners based on passive traffic monitoring is an important prerequisite for taking appropriate countermeasures.  ...  Both the detection schemes considered here are based on such basic assumption.  ... 
dblp:journals/ijnsec/FallettaR09 fatcat:73dowt7rmnct3benwnrtrgehtq

A Survey of Fingerprint-Based Outdoor Localization

Quoc Duy Vo, Pradipta De
2016 IEEE Communications Surveys and Tutorials  
A growing number of sensors on smart mobile devices has led to rapid development of various mobile applications using location-based or context-aware services.  ...  On the other hand, base station based localization has low accuracy.  ...  A travel distance within one period is referred as one step length in the step detection technique. • Step Detection Technique: While the mobile user is walking, the step detection technique keeps sensing  ... 
doi:10.1109/comst.2015.2448632 fatcat:3hfburiltfg3vfoek7j7nkx7vy

Adaptive transmitter optimization for blind and group-blind multiuser detection

D. Reynolds, Xiaodong Wang
2003 IEEE Transactions on Signal Processing  
The linear subspace-based blind and group-blind multiuser detectors recently developed represent a robust and efficient adaptive multiuser detection technique for CDMA systems.  ...  In particular, we develop a maximum-eigenvectorbased method of optimizing spreading codes for given channel conditions and a utility-based power control algorithm for CDMA systems with blind or group-blind  ...  Section 4 develops a utility-based power control for CDMA with blind or group-blind multiuser detection.  ... 
doi:10.1109/tsp.2002.808097 fatcat:xsqmtgsbzzd7rj6kr6cfa3pcqy
« Previous Showing results 1 — 15 out of 1,122 results