Security

This dataset used in the research paper "JamShield: A Machine Learning Detection System for Over-the-Air Jamming Attacks." The research was conducted by Ioannis Panitsas, Yagmur Yigit, Leandros Tassiulas, Leandros Maglaras, and Berk Canberk from Yale University and Edinburgh Napier University.

For any inquiries, please contact Ioannis Panitsas at ioannis.panitsas@yale.edu.

 

Categories:
137 Views

To provide a standardized approach for testing and benchmarking secure evaluation of transformer-based models, we developed the iDASH24 Homomorphic Encryption track dataset. This dataset is centered on protein sequence classification as the benchmark task. It includes a neural network model with a transformer architecture and a sample dataset, both used to build and evaluate secure evaluation strategies.

Categories:
124 Views

"Recent advancements in deep learning and generative models have significantly enhanced text-to-image (T2I) synthesis, allowing for the creation of highly realistic images based on textual inputs. While this progress has expanded the creative and practical applications of AI, it also presents new challenges in distinguishing between authentic and AI-generated images. This challenge raises serious concerns in areas such as security, privacy, and digital forensics.

Categories:
173 Views

This data reflects the prevalence and adoption of smart devices. The experimental setup to generate the IDSIoT2024 dataset is based on an IoT network configuration consisting of seven smart devices, each contributing to a diverse representation of IoT devices. These include a smartwatch, smartphone, surveillance camera, smart vacuum and mop robot, laptop, smart TV, and smart light. Among these, the laptop serves a dual purpose within the network.

Categories:
1235 Views

The security of systems with limited resources is essential for deployment and cannot be compromised by other performance metrics such as throughput. Physically Unclonable Functions (PUFs) present a promising, cost-effective solution for various security applications, including IC counterfeiting and lightweight authentication. PUFs, as security blocks, exploit physical variations to extract intrinsic responses based on applied challenges, with Challenge-Response Pairs (CRPs) uniquely defining each device.

Categories:
297 Views

The e-commerce market heavily relies on e-coupons, and their digital nature presents challenges in establishing a secure e-coupon infrastructure, which incurs maintenance costs. To address this, we explore using public blockchains for the e-coupon system, providing a highly reliable decentralized infrastructure with no maintenance costs. Storing coupon information on a blockchain ensures tamper resistance and protection against double redemption. However, using public blockchains shifts gas cost responsibility to users, potentially impacting user experience if not managed carefully.

Categories:
162 Views

The enhanced dataset is a sophisticated collection of simulated data points, meticulously designed to emulate real-world data as collected from wearable Internet of Things (IoT) devices. This dataset is tailored for applications in safety monitoring, particularly for women, and is ideal for developing machine learning models for distress or danger detection.

Categories:
1657 Views

5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices.

Categories:
3427 Views

This data set corresponds to Table II:UNIFORMITY OF TC-PUF DESIGN of manuscript titled "A Lightweight and Secure Physical Unclonable Function Design on FPGA".  The provided data is for FPGA board No. 1 to 15. Board no. 1 to 14  represent uniformity of 40X40 TC-PUF response implemented on Artix-7 FPGA, and board no. 15  represent uniformity of 20X40 TC-PUF response implemented on Zynq Z-7010 FPGA. It is observed that nearly all the TC-PUF implemented on individual FPGAs have a slight bias towards ‘0’.

Categories:
20 Views

Smart homes contain programmable electronic devices (mostly IoT) that enable home automation. People who live in smart homes benefit from interconnected devices by controlling them either remotely or manually/autonomously. However, high interconnectivity comes with an increased attack surface, making the smart home an attractive target for adversaries. NCC Group and the Global Cyber Alliance recorded over 12,000 attacks to log into smart home devices maliciously. Recent statistics show that over 200 million smart homes can be subjected to these attacks.

Categories:
3025 Views

Pages