Enabling accurate and automated identification of wireless devices is critical for ensuring secure and authenticated data communication in large-scale networks such as IoT networks. In the aim of devising practical identification techniques that are immune to spoofing, hardware-driven RF fingerprinting using deep neural networks, which leverages the inevitable presence of...
Shape transformation is a technique for gradually changing one geometric shape to another. A recent approach presents the use of thin-plate radial basis functions as opposed to traditional "blobby sphere" implicit functions. Without the explicit evaluation of he energy function, this approach combined the two traditional steps into one by...
Internet of Things (IoT) is an integral part of application domains such as smart-home, digital healthcare, smart grid systems and vehicular networks. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, digital signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and...
Variation in cheese quality due to geographic location is important to cheese producers, consumers, and retailers on a global level. Understanding the impacts of geographic location of cheese plants may be useful to businesses for marketing, cost reduction, and quality improvement. Many aspects of variation due to geography have been...
The recent increase in the number of wireless devices has been driven by the growing markets of smart homes and the Internet of Things (IoT). Consequently, current research has focused on efficient utilization of the radio frequency (RF) spectrum to accommodate such an increase in wireless bandwidth. Alternatively, latest free-space...
Structure Query Language (SQL) is widely used to access data stored in relational database systems. Although a powerful and flexible language, SQL can also be complex and hard to learn. For most new SQL users, it's easy to write SQL statement by following SQL grammar and syntax rules, but it's...
The rapid population growth in large urban cities has led to an unprecedented increase in both the number and the diversity of wireless devices and applications with varying quality of service requirements in terms of latency and data rates. LinkNYC is an example of an urban communication network infrastructure, which...
Deep learning is now being utilized widely in applications where sensitive data is being used for model training, for example, in health care. In this scenario, any data leakage will cause privacy concerns to whose data records are used to train the model. An attacker can actively cause privacy leakage...