A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Recent Advances in Transducers for Intravascular Ultrasound (IVUS) Imaging
2021
Sensors
Peng et al. [103] developed a three-phased synchronous electromagnetic micromotor, which had a dimension of 1.2 mm × 3.7 mm and a maximum rotating speed of 16,500 rpm. ...
doi:10.3390/s21103540
pmid:34069613
pmcid:PMC8160965
fatcat:xoohobhhvnfcdjewxg3qfpse7q
Is link signature dependable for wireless security?
2013
2013 Proceedings IEEE INFOCOM
Link signature, which refers to the unique and reciprocal wireless channel between a pair of transceivers, has gained significant attentions recently due to its effectiveness in signal authentication and shared secret construction for various wireless applications. A fundamental assumption of this technique is that the wireless signals received at two locations separated by more than half a wavelength are essentially uncorrelated. However, it has been shown in literatures that in certain
doi:10.1109/infcom.2013.6566763
dblp:conf/infocom/HeDSN13
fatcat:uflfp7fepfdlffyyuyontdruey
more »
... tances, e.g., when there is poor scattering and/or a strong line-of-sight (LOS) component, this assumption is invalid. In this paper, a Correlation ATtack (CAT) is proposed to demonstrate the potential vulnerability of the link signature based security mechanisms in such circumstances. Based on statistical inference, CAT explicitly exploits the spatial correlations to recover the legitimate link signature from the observations of multiple adversary receivers deployed in vicinity. The effectiveness of CAT is verified both through theoretical analysis and well-known channel correlation modeling. Our findings are corroborated by experiments on USRP platforms and GNURadio.
MAC Design of Uncoordinated FH-Based Collaborative Broadcast
2012
IEEE Wireless Communications Letters
Ning are with NC State University, Raleigh, NC 27695 (email: {huaiyu dai, pning}@ncsu.edu). The work by L. ...
doi:10.1109/wcl.2012.041012.120162
fatcat:qlhxtxh76baqtmkul7xxb3frla
Dynamic Adaptive Anti-Jamming via Controlled Mobility
2014
IEEE Transactions on Wireless Communications
In this work, the mobility of network nodes is explored as a new promising approach for jamming defense. To fulfill it, properly designed node motion that can intelligently adapt to the jammer's action is crucial. In our study, antijamming mobility control is investigated in the context of the single and multiple commodity flow problems, in the presence of one intelligent mobile jammer which can respond to the evasion of legitimate nodes as well. Based on spectral graph theory, two new spectral
doi:10.1109/twc.2014.2320973
fatcat:mrmoytqkinb6bjpumdlvw5gqta
more »
... quantities, single-and multi-weighted Cheeger constants and corresponding eigenvalue variants, are constructed to direct motions of the defender and the attacker in this dynamic adaptive competition. Both analytical and simulation results are presented to justify the effectiveness of the proposed approach.
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
2010
2010 Proceedings IEEE INFOCOM
Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional antijamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming
doi:10.1109/infcom.2010.5462156
dblp:conf/infocom/LiuNDL10
fatcat:pxe4f7gfejggjezfrjkcksruqq
more »
... oadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit "0" is encoded using two different spreading codes, which have low correlation with each other, while bit "1" is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys.
A Byzantine attack defender: The Conditional Frequency Check
2012
2012 IEEE International Symposium on Information Theory Proceedings
Collaborative spectrum sensing is vulnerable to the Byzantine attack. Existing reputation based countermeasures will become incapable when malicious users dominate the network. Also, there is a scarcity of methods that fully explore the Markov property of the spectrum states to restrain sensors' statistical misbehaviors. In this paper, a new malicious user detection method based on two proposed Conditional Frequency Check (CFC) statistics is developed with a Markovian spectrum model. With the
doi:10.1109/isit.2012.6284709
dblp:conf/isit/HeDN12
fatcat:enuupn2efjdh7lw4x5anmh3hye
more »
... sistance of one trusted sensor, the proposed method can achieve high malicious user detection accuracy in the presence of arbitrary percentage of malicious users, and thus significantly improves collaborative spectrum sensing performance.
Dynamic adaptive anti-jamming via controlled mobility
2013
2013 IEEE Conference on Communications and Network Security (CNS)
In this work, the mobility of network nodes is explored as a new promising approach for jamming defense. To fulfill it, properly designed node motion that can intelligently adapt to the jammer's action is crucial. In our study, antijamming mobility control is investigated in the context of the single and multiple commodity flow problems, in the presence of one intelligent mobile jammer which can respond to the evasion of legitimate nodes as well. Based on spectral graph theory, two new spectral
doi:10.1109/cns.2013.6682686
dblp:conf/cns/HeDN13
fatcat:frzcyo2cwrg7zhvzbe24kbclke
more »
... quantities, single-and multi-weighted Cheeger constants and corresponding eigenvalue variants, are constructed to direct motions of the defender and the attacker in this dynamic adaptive competition. Both analytical and simulation results are presented to justify the effectiveness of the proposed approach.
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty
2014
2015 IEEE Global Communications Conference (GLOBECOM)
Intrusion detection systems (IDSs) assume increasingly importance in past decades as information systems become ubiquitous. Despite the abundance of intrusion detection algorithms developed so far, there is still no single detection algorithm or procedure that can catch all possible intrusions; also, simultaneously running all these algorithms may not be feasible for practical IDSs due to resource limitation. For these reasons, effective IDS configuration becomes crucial for real-time intrusion
doi:10.1109/glocom.2014.7417158
dblp:conf/globecom/HeDND15
fatcat:3zlfniwxqjcwnnytuwqgtu6aqe
more »
... detection. However, the uncertainty in the intruder's type and the (often unknown) dynamics involved with the target system pose challenges to IDS configuration. Considering these challenges, the IDS configuration problem is formulated as an incomplete information stochastic game in this work, and a new algorithm, Bayesian Nash-Q learning, that combines conventional reinforcement learning with a Bayesian type identification procedure is proposed. Numerical results show that the proposed algorithm can identify the intruder's type with high fidelity and provide effective configuration.
Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty
2015
2015 IEEE Global Communications Conference (GLOBECOM)
Intrusion detection systems (IDSs) assume increasingly importance in past decades as information systems become ubiquitous. Despite the abundance of intrusion detection algorithms developed so far, there is still no single detection algorithm or procedure that can catch all possible intrusions; also, simultaneously running all these algorithms may not be feasible for practical IDSs due to resource limitation. For these reasons, effective IDS configuration becomes crucial for real-time intrusion
doi:10.1109/glocom.2015.7417158
fatcat:cp2fc4naobg43ew3f56gjpogfe
more »
... detection. However, the uncertainty in the intruder's type and the (often unknown) dynamics involved with the target system pose challenges to IDS configuration. Considering these challenges, the IDS configuration problem is formulated as an incomplete information stochastic game in this work, and a new algorithm, Bayesian Nash-Q learning, that combines conventional reinforcement learning with a Bayesian type identification procedure is proposed. Numerical results show that the proposed algorithm can identify the intruder's type with high fidelity and provide effective configuration.
A Mimo Receiver SOC for CDMA Applications
2006
2006 IEEE International SOC Conference
In this paper, we present a Systems-on-Chip (SoC) design for the 3G Code Division Multiple Access (CDMA) receiver using the multiple-input multiple-output (MIMO) technique. Our chip integrates the entire digital signal processing part of the receiver. Furthermore, the proposed design can be reconfigured in real-time to handle different modulation schemes based on the signal-to-noise ratio, resulting in the highly efficient use of spectrum and energy. Designed using a 0.18 m standard cell
doi:10.1109/socc.2006.283897
dblp:conf/socc/ChenYPZDL06
fatcat:lo5ajm3ugfaktixwgnbih4stia
more »
... , our chip has a core area of 20 mm ¾ and achieves a maximal throughput of 5 Mbps in simulation with 610 mW power dissipation.
Research of Interindividual Differences in Physiological Response under Hot-Dry and Warm-Wet Climates
2016
Sustainability
Author Contributions: Shilei Lu conceived the research and designed the experiments; Linwei Sun wrote and improved the paper; Huaiyu Peng and Liran Ji performed the experiments; Huaiyu Peng and Linwei ...
doi:10.3390/su8090850
fatcat:noxdxfavenglvjfubanxhcnplu
Jamming-Resistant Collaborative Broadcast in Wireless Networks, Part II: Multihop Networks
2011
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
We propose in [1] a collaborative broadcast scheme for wireless networks, which applies the Uncoordinated Frequency Hopping (UFH) technique to counteract jamming and exploits node cooperation to enhance broadcast efficiency. In this scheme, some nodes that already obtain the broadcast message are selected to relay the message to other nodes. In this paper, we extend the study to the generalized multihop network scenarios, and provide solutions for important related issues, such as the relay
doi:10.1109/glocom.2011.6133541
dblp:conf/globecom/XiaoDN11
fatcat:amlbwbntffh3tbrqii44agix7i
more »
... selection, multiple access control, relay channel selection and packet scheduling. We also study the spatial and frequency (channel) diversity provided by the collaborative broadcast. Simulation results show that the collaborative broadcast achieves low broadcast delay, with low energy consumption and small computational overhead in multihop networks.
Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping
2012
IEEE Transactions on Information Forensics and Security
Email: {huaiyu dai,pning}@ncsu.edu. ...
doi:10.1109/tifs.2011.2165948
fatcat:7hl7ligsy5g2pl7chwrkvuf5c4
Occipital condyle-c1 complex screw for fixation of basilar invagination patients with atlas assimilation
2015
Turkish Neurosurgery
Early OC fixation techniques using cable fixation had a high rate of failure. For this reason, they were supplanted with rigid posterior fixation systems involving plates and screws or rods and screws because these have higher rates of fusion and provide better biomechanical stability (1,4,6, 8, 13, 19, 20) . However, there is still no currently available system that is totally satisfactory. For the OC fixation systems, most of the limitations involve the cephalad part of the construct (24),
doi:10.5137/1019-5149.jtn.10551-14.5
pmid:27438621
fatcat:xnkswnuc3naz3e6smvtm3dtgma
more »
... ause instrumentation can often not be easily attached to the occiput. To date, various plate constructs have been developed that use multiple fixation points to adjust for differences in the thickness of the lateral occipital bone and of AIm: To investigate whether C1-occipital condyle complex (CC complex) screws can be safely and rapidly placed without guidance in basilar invagination patients with atlas assimilation. mATERIAl and mEThODS: The occipital-cervical (OC) junction was fixed posteriorly in 8 basilar invagination patients with atlas assimilation using polyaxial titanium screws inserted unicortically into the CC complex and C2 pedicles and subsequent fixation to a 3-mm rod. Anatomic landmarks were used during the drilling. The screw angles and lengths of the CC complex were analyzed. RESUlTS: The width, length, and height values of the left-side CC complex were 7.96±2.23, 16.06±2.73, and 13.76±2.06 mm; those of the right-side CC complex were 7.84±1.38, 16.66±2.58, and 12.81±2.62 mm. The CC complex entry point was at the central point of posterior surface of the CC complex. The angle used for medialization was 10-15°, which was also the maximal superior screw angulation in the sagittal plane. The screw length required for unicortical purchase was 16-22 mm. The screw was not misplaced or poorly positioned, and no neurovascular complications associated with screw insertion were detected. CONClUSION: In patients with atlas assimilation, CC complex screws can be placed safely. The CC complex screws can be safely inserted assisted by microscope without image guidance.
Improving learning and adaptation in security games by exploiting information asymmetry
2015
2015 IEEE Conference on Computer Communications (INFOCOM)
With the advancement of modern technologies, the security battle between a legitimate system (LS) and an adversary is becoming increasingly sophisticated, involving complex interactions in unknown dynamic environments. Stochastic game (SG), together with multi-agent reinforcement learning (MARL), offers a systematic framework for the study of information warfare in current and emerging cyber-physical systems. In practical security games, each player usually has only incomplete information about
doi:10.1109/infocom.2015.7218560
dblp:conf/infocom/HeDN15
fatcat:wgu4e4jgvjaq7dtp3nye64nbmq
more »
... the opponent, which induces information asymmetry. This work exploits information asymmetry from a new angle, considering how to exploit local information unknown to the opponent to the player's advantage. Two new MARL algorithms, termed minimax-PDS and WoLF-PDS, are proposed, which enable the LS to learn and adapt faster in dynamic environments by exploiting its private local information. The proposed algorithms are provably convergent and rational, respectively. Also, numerical results are presented to show their effectiveness through two concrete anti-jamming examples.
« Previous
Showing results 1 — 15 out of 193 results