The increasing population has led to a disruption of health status due to the waste management system. Waste management in the form of smart cities has created a kind of concern and is an activity that can provide env...
详细信息
In-network data aggregation is one of the most important issues for achieving energy-efficiency in wireless sensor networks since sensor nodes in the surrounding region of an event may generate redundant sensed data. ...
详细信息
Customer classification and prioritization are commonly utilized in applications to provide queue preferential service. Their fairness aspects, which are inherent to any preferential system and highly important to cus...
详细信息
In cognitive radio (CR) systems, secondary users (SUs) have to detect channel periodically during their data transmission to decide whether the channel is idle in order to avoid unacceptable interferences to primary u...
详细信息
Recognition of wobbling and nutating cone-shaped targets is a major challenge in space target recognition area. In this paper, we develop a signal model of multiple scattering centers on the wobbling and nutating cone...
详细信息
The security of Federated Learning(FL)/Distributed Machine Learning(DML)is gravely threatened by data poisoning attacks,which destroy the usability of the model by contaminating training samples,so such attacks are ca...
详细信息
The security of Federated Learning(FL)/Distributed Machine Learning(DML)is gravely threatened by data poisoning attacks,which destroy the usability of the model by contaminating training samples,so such attacks are called causative availability indiscriminate *** the problem that existing data sanitization methods are hard to apply to real-time applications due to their tedious process and heavy computations,we propose a new supervised batch detection method for poison,which can fleetly sanitize the training dataset before the local model *** design a training dataset generation method that helps to enhance accuracy and uses data complexity features to train a detection model,which will be used in an efficient batch hierarchical detection *** model stockpiles knowledge about poison,which can be expanded by retraining to adapt to new *** neither attack-specific nor scenario-specific,our method is applicable to FL/DML or other online or offline scenarios.
The design of distributed, wireless, and embedded system is a tedious and error-prone process. Experiences from previous real-world wireless sensor network (WSN) deployments strongly indicate that it is vital to follo...
详细信息
The design of distributed, wireless, and embedded system is a tedious and error-prone process. Experiences from previous real-world wireless sensor network (WSN) deployments strongly indicate that it is vital to follow a systematic design approach to satisfy all design requirements including robustness and reliability. Such a design methodology needs to include an end-to-end testing methodology. The proposed framework for WSN testing allows to apply distributed unit testing concepts in the development process. The tool flow decreases test time and allows for monitoring the correctness of the implementation throughout the development process.
This paper describes the design and implementation of a high-reliability and low-power status monitoring protocol, e.g. for wireless alarm systems. The dual design approach followed consists of an in-depth device char...
详细信息
This paper describes the design and implementation of a high-reliability and low-power status monitoring protocol, e.g. for wireless alarm systems. The dual design approach followed consists of an in-depth device characterization with subsequent algorithm development. This allows to understand and leverage the correct design and implementation of the most critical components of the algorithms. The high-reliability status monitoring protocol operates based on monitoring windows with synchronous notification, subsequent acknowledgement rounds and periods of reduced activity, at regular intervals. This leads to deterministic and thus highly reliable operation of the status monitoring protocol implementation on the Tmote Sky platform.
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio...
详细信息
Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro...
详细信息
暂无评论