|
ROLE
Author only
BOOKMARK & SHARE
|
|
1
October 2016
TrustED '16: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 16, Downloads (12 Months): 155, Downloads (Overall): 155
Full text available:
PDF
Augmented reality is poised to become a dominant computing paradigm over the next decade. With promises of three-dimensional graphics and interactive interfaces, augmented reality experiences will rival the very best science fiction novels. This breakthrough also brings in unique challenges on how users can authenticate one another to share rich ...
Keywords:
device pairing, usability, wireless localization, augmented reality, usable security
2
October 2016
IEEE Journal on Selected Areas in Communications: Volume 34 Issue 10, October 2016
Publisher: IEEE Press
Cooperation has become an essential element in spectrum sharing between the primary and secondary networks. A new trend in cooperation is to allow the primary and secondary networks to cooperate on the node level for data forwarding. This new paradigm allows to pool network resources from both the primary and ...
3
September 2016
IEEE Transactions on Wireless Communications: Volume 15 Issue 9, September 2016
Publisher: IEEE Press
The transparent coexistence (TC) paradigm allows simultaneous activation of the secondary users with the primary users as long as their interference to the primary users can be properly canceled. This paradigm has the potential to offer much more efficient spectrum sharing than the traditional interweave paradigm. In this paper, we ...
4
August 2016
IEEE Transactions on Wireless Communications: Volume 15 Issue 8, August 2016
Publisher: IEEE Press
This paper studies the coexistence of heterogeneous multi-hop networks, which use different physical-layer technologies. We propose a new paradigm, called cooperative interference mitigation (CIM), which exploits recent advancement in interference cancellation (IC), such as technology-independent multiple output. CIM makes it possible for disparate networks to cooperatively mitigate the interference to/from ...
5
July 2016
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 12, Downloads (12 Months): 125, Downloads (Overall): 125
Full text available:
PDF
Physical layer security for wireless communication is broadly considered as a promising approach to protect data confidentiality against eavesdroppers. However, despite its ample theoretical foundation, the transition to practical implementations of physical-layer security still lacks success. A close inspection of proven vulnerable physical-layer security designs reveals that the flaws are ...
Keywords:
cryptanalysis, ciphertext-only attack, information-theoretic security analysis, orthogonal blinding, physical-layer security
6
July 2016
IEEE Transactions on Information Forensics and Security: Volume 11 Issue 7, July 2016
Publisher: IEEE Press
Jamming attack is a serious threat to the wireless communications. Reactive jamming maximizes the attack efficiency by jamming only when the targets are communicating, which can be readily implemented using software-defined radios. In this paper, we explore the use of the multi-input multi-output (MIMO) technology to achieve jamming resilient orthogonal ...
7
January 2016
IEEE Transactions on Mobile Computing: Volume 15 Issue 1, January 2016
Publisher: IEEE Educational Activities Department
Interference alignment (IA) is a powerful technique to handle interference in wireless networks. Since its inception, IA has become a central research theme in the wireless communications community. Due to its intrinsic nature of being a physical layer technique, IA has been mainly studied for point-to-point or single-hop scenario. There ...
8
April 2015
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 81 Issue C, April 2015
Publisher: Elsevier North-Holland, Inc.
Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is gaining popularity in enterprise networks for flexibility in network management service and reduced operational cost. There seems a trend for the two technologies to go hand-in-hand in ...
Keywords:
Graphical model, DDoS mitigation, Software-Defined Networking
9
April 2015
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8, Downloads (12 Months): 92, Downloads (Overall): 298
Full text available:
PDF
With the growing complexity of computing systems, memory based forensic techniques are becoming instrumental in digital investigations. Digital forensic examiners can unravel what happened on a system by acquiring and inspecting in-memory data. Meanwhile, attackers have developed numerous anti-forensic mechanisms to defeat existing memory forensic techniques by manipulation of system ...
Keywords:
memory acquisition, system security, digital forensics, rootkits
10
April 2015
IEEE/ACM Transactions on Networking (TON): Volume 23 Issue 2, April 2015
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 10, Downloads (12 Months): 79, Downloads (Overall): 163
Full text available:
PDF
Wireless energy transfer based on magnetic resonant coupling is a promising technology to replenish energy to a wireless sensor network (WSN). However, charging sensor nodes one at a time poses a serious scalability problem. Recent advances in magnetic resonant coupling show that multiple nodes can be charged at the same ...
Keywords:
wireless energy transfer, Optimization, scalability, wireless sensor network
11
November 2014
WUWNET '14: Proceedings of the International Conference on Underwater Networks & Systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 4, Downloads (12 Months): 17, Downloads (Overall): 111
Full text available:
PDF
A fundamental issue of underwater acoustic (UWA) communications is large propagation delays due to water medium. A new direction to address this issue is to take advantage of large propagation delays rather than enduring them as a disadvantage. Recent advances in time-based interference alignment (IA), or propagation delay (PD)-based IA, ...
Keywords:
Underwater communication, interference alignment, multi-hop network, large propagation delay
12
September 2013
IEEE Transactions on Mobile Computing: Volume 12 Issue 9, September 2013
Publisher: IEEE Educational Activities Department
Network throughput and energy consumption are two important performance metrics for a multihop wireless network. Current state-of-the-art research is limited to either maximizing throughput under some energy constraint or minimizing energy consumption while satisfying some throughput requirement. Although many of these prior efforts were able to offer some optimal solutions, ...
Keywords:
Bicriteria optimization, multihop wireless networks, throughput, energy
13
July 2013
MobiHoc '13: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 9, Downloads (12 Months): 41, Downloads (Overall): 330
Full text available:
PDF
Wireless power transfer is a promising technology to fundamentally address energy problems in a wireless sensor network. To make such a technology work effectively, a vehicle is needed to carry a charger to travel inside the network. On the other hand, it has been well recognized that a mobile base ...
Keywords:
mobile base station, nonlinear programming, wireless power transfer, modeling and optimization, wireless sensor network
14
May 2013
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 14, Downloads (12 Months): 156, Downloads (Overall): 1,092
Full text available:
PDF
With the increasing popularity of cloud computing, huge amount of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryption helps protecting user data confidentiality, it leaves the well-functioning yet practically-efficient secure search functions over encrypted data a challenging problem. In this paper, we ...
Keywords:
privacy-preserving search, multi-keyword search, similarity-based ranking, cloud computing
15
December 2012
IEEE/ACM Transactions on Networking (TON): Volume 20 Issue 6, December 2012
Publisher: IEEE Press
Bibliometrics:
Citation Count: 25
Downloads (6 Weeks): 3, Downloads (12 Months): 97, Downloads (Overall): 514
Full text available:
PDF
Wireless sensor networks are constrained by limited battery energy. Thus, finite network lifetime is widely regarded as a fundamental performance bottleneck. Recent breakthrough in the area of wireless power transfer offers the potential of removing this performance bottleneck, i.e., allowing a sensor network to remain operational forever. In this paper, ...
Keywords:
wireless sensor network (WSN), optimization, lifetime, wireless power transfer
16
July 2012
IEEE Transactions on Mobile Computing: Volume 11 Issue 7, July 2012
Publisher: IEEE Educational Activities Department
A major benefit of employing network coding (NC) in cooperative communications (CCs) is its ability to reduce time-slot overhead. Such approach is called network-coded CC (or NC-CC). Most of the existing works have mainly focused on exploiting this benefit without considering its potential adverse effect. In this paper, we show ...
Keywords:
Cooperative communications, network coding, network coding noise.
17
November 2011
IEEE Transactions on Mobile Computing: Volume 10 Issue 11, November 2011
Publisher: IEEE Educational Activities Department
Cognitive radio (CR) and multiple-input multiple-output (MIMO) are two independent physical layer technologies that have made significant impact on wireless networking. CR operates on the channel/band level to exploit white space across spectrum dimension while MIMO operates within the same channel to improve spectral efficiency within the same band. In ...
Keywords:
Cognitive radio networks, MIMO, multihop ad hoc network, optimization, throughput.
18
July 2011
IEEE Transactions on Mobile Computing: Volume 10 Issue 7, July 2011
Publisher: IEEE Educational Activities Department
Cognitive radio networks (CRNs) have the potential to utilize spectrum efficiently and are positioned to be the core technology for the next-generation multihop wireless networks. An important problem for such networks is its capacity. We study this problem for CRNs in the SINR (signal-to-interference-and-noise-ratio) model, which is considered to be ...
Keywords:
Theory, multihop cognitive radio network, nonlinear optimization, SINR model, cross-layer, capacity.
19
June 2011
IEEE/ACM Transactions on Networking (TON): Volume 19 Issue 3, June 2011
Publisher: IEEE Press
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 3, Downloads (12 Months): 27, Downloads (Overall): 376
Full text available:
PDF
Recently, cooperative communications, in the form of having each node equipped with a single antenna and exploit spatial diversity via some relay node's antenna, is shown to be a promising approach to increase data rates in wireless networks. Under this communication paradigm, the choice of a relay node (among a ...
Keywords:
relay node assignment, cooperative communications, optimization, achievable rate, ad hoc network
20
February 2008
IEEE Transactions on Wireless Communications: Volume 7 Issue 2, February 2008
Publisher: IEEE Press
Maximizing the total mutual information of multiuser multiple-input multiple-output (MIMO) systems with interference is a challenging problem. In this paper, we consider the power control problem of finding the maximum sum of mutual information for a multiuser network with mutually interfered MIMO links. We propose a new and powerful global ...
|
|