The ever-increasing number of Internet-of-Thing devices requires the development of edge-computing platforms to address the associated demand for big data processing at low power consumption while minimizing cloud com...
详细信息
This paper presents a comprehensive dataset of LoRaWAN technology path loss measurements collected in an indoor office environment, focusing on quantifying the effects of environmental factors on signal propagation. U...
详细信息
With the emphasis on healthcare, early childhood education, and fitness, noninvasive measurement and recognition methods have received more attention. Pressure sensing has been extensively studied because of its advan...
详细信息
With the exponential growth in information related applications and the continuous increase in voice over IP (VoIP) applications, the carriers are expanding their networks to provide improved services to their end use...
详细信息
The growing concerns over mitigating climate change effects resulted in power system planning and generation expansion strategies that aim in increasing penetration of intermittent renewable energy sources (RES) to fu...
详细信息
The arithmetic of computing multiple scalar multiplications in an elliptic curve group then adding them together is called multi-scalar multiplication (MSM). MSM over fixed points dominates the time consumption in the...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
As more and more data is produced,finding a secure and efficient data access structure has become a major research *** centralized systems used by medical institutions for the management and transfer of Electronic Med...
详细信息
As more and more data is produced,finding a secure and efficient data access structure has become a major research *** centralized systems used by medical institutions for the management and transfer of Electronic Medical Records(EMRs)can be vulnerable to security and privacy threats,often lack interoperability,and give patients limited or no access to their own *** this paper,we first propose a privilege-based data access structure and incorporates it into an attribute-based encryption mechanism to handle the management and sharing of big data *** proposed privilege-based data access structure makes managing healthcare records using mobile healthcare devices efficient and feasible for large numbers of *** then propose a novel distributed multilevel EMR(d-EMR)management scheme,which uses blockchain to address security concerns and enables selective sharing of medical records among staff members that belong to different levels of a hierarchical *** deploy smart contracts on Ethereum blockchain and utilize a distributed storage system to alleviate the dependence on the record-generating institutions to manage and share patient *** preserve privacy of patient records,our smart contract is designed to allow patients to verify attributes prior to granting access *** provide extensive security,privacy,and evaluation analyses to show that our proposed scheme is both efficient and practical.
Fault currents emanating from inverter-based resources(IBRs)are controlled to follow specific references to support the power grid during ***,these fault currents differ from the typical fault currents fed by synchron...
详细信息
Fault currents emanating from inverter-based resources(IBRs)are controlled to follow specific references to support the power grid during ***,these fault currents differ from the typical fault currents fed by synchronous generators,resulting in an improper operation of conventional phase selection methods(PSMs).In this paper,the relative angles between sequence voltages measured at the relay location are determined analytically in two stages:(1)a short-circuit analysis is performed at the fault location to determine the relative angles between sequence voltages;and(2)an analysis of the impact of transmission line on the phase difference between the sequence voltages of relay and fault is conducted for different IBR ***,new PSM zones based on relative angles between sequence voltages are devised to facilitate accurate PSM regardless of the fault currents,resistances,or locations of *** time-domain simulations confirm the accuracy of the proposed PSM with different fault locations,resistances,types,and currents.
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series tec...
详细信息
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series technologies of power semiconductor devices will be difficult to be applied since with uneven voltage sharing ***,this paper proposes a novel cascade method of multi-SiC JFETs based on modules *** method consists of two parts:one is a single-gate driver cascaded SiC JFETs topology which is used to form the module,the other one is an active clamp control strategy which ensures that each module is protected from overvoltage when modules are *** proposed cascade method can effectively suppress voltage overshoot of cascading power devices in the switching *** on the proposed cascade method,a 5kV/63A SSCB prototype is ***,an experiment is conducted based on the designed *** results validate the effectiveness of the proposed cascaded method for SSCB.
暂无评论