4 Hits in 4.8 sec

A Survey on Energy Optimization Techniques in UAV-Based Cellular Networks: From Conventional to Machine Learning Approaches [article]

Attai Ibrahim Abubakar, Iftikhar Ahmad, Kenechi G. Omeke, Metin Ozturk, Cihat Ozturk, Ali Makine Abdel-Salam, Michael S. Mollel, Qammer H. Abbasi, Sajjad Hussain, Muhammad Ali Imran
2022 arXiv   pre-print
His research interests include intelligent networking for wireless communication networks, with a focus on energy efficiency, mobility management, and radio resource management in cellular networks.  ...  TYPES OF UAVS UAVs, also known as drones, are of two main categories: fixed-wing and rotary-wing.  ...  In the GA application process, the first step is to define how to encode the solutions represented by chromosomes according to different problems.  ... 
arXiv:2204.07967v1 fatcat:2x7dyojlvjfknibfsliiq4ozw4

XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions [article]

Gautam Srivastava, Rutvij H Jhaveri, Sweta Bhattacharya, Sharnil Pandya, Rajeswari, Praveen Kumar Reddy Maddikunta, Gokul Yenduri, Jon G. Hall, Mamoun Alazab, Thippa Reddy Gadekallu
2022 arXiv   pre-print
Then the use of traditional AI techniques and its associated challenges are discussed which opens its doors towards use of XAI in various applications.  ...  The use of XAI has immense potential in predicting such attacks. The paper provides a brief overview on cybersecurity and the various forms of attack.  ...  Tripwire detected a Smishing campaign disguised as the US Postal Service.  ... 
arXiv:2206.03585v1 fatcat:qe2d33ujdzbapczhefs2whbnwe

Data Analytics-backed Vehicular Crowd-sensing for GPS-less Tracking in Public Transportation [article]

Cem Kaptan, University, My, University, My
In this application, the \textit{GPS} functionality is emulated by using these two soft sensors.  ...  Emulating non-dedicated sensors in a simulation environment enables us to perform large-scale crowd-sensing tasks.  ...  The proposed payment protocol aims to hold following four requirements: (i) adaptation to the real communication scenario, (ii) computation-and communication-wise performance efficient, (iii) fair exchange  ... 
doi:10.20381/ruor-22219 fatcat:ty2qcvktqvcidjzy625jnz7oda

Hardware entangled security primitives: attacks and defenses

Shaza Zeitouni
This thesis consists of two parts: i) an offensive part, where we present our findings based on attacks we conducted on hardware-based security primitives that can be deployed in trust anchors for platform  ...  The client forwards the F P GA ID to the FPGA vendor and gets back two messages.  ...  AdaBoost, Extra Trees, Bagged Decision Trees, XGBoost, Random Forest and RNNs.  ... 
doi:10.26083/tuprints-00021552 fatcat:o4ipw2tpabdyjjmw54n4o3w32e