Security

Smart Home Automation (SHA) has significantly improved homes’ convenience, comfort, security, and safety. It has gained widespread use due to its intelligent monitoring and quick response capabilities. The current state of SHA enables effective monitoring and motion detection. However, false notifications remain a significant challenge, as they can cause unnecessary alarms in intrusion detection systems. To address this, we propose an intelligent model for a smart home security system that uses computer vision techniques to detect trespasser movement near the boundary wall.

Categories:
87 Views

This dataset used in the research paper "JamShield: A Machine Learning Detection System for Over-the-Air Jamming Attacks." The research was conducted by Ioannis Panitsas, Yagmur Yigit, Leandros Tassiulas, Leandros Maglaras, and Berk Canberk from Yale University and Edinburgh Napier University.

For any inquiries, please contact Ioannis Panitsas at ioannis.panitsas@yale.edu.

 

Categories:
249 Views

To provide a standardized approach for testing and benchmarking secure evaluation of transformer-based models, we developed the iDASH24 Homomorphic Encryption track dataset. This dataset is centered on protein sequence classification as the benchmark task. It includes a neural network model with a transformer architecture and a sample dataset, both used to build and evaluate secure evaluation strategies.

Categories:
176 Views

"Recent advancements in deep learning and generative models have significantly enhanced text-to-image (T2I) synthesis, allowing for the creation of highly realistic images based on textual inputs. While this progress has expanded the creative and practical applications of AI, it also presents new challenges in distinguishing between authentic and AI-generated images. This challenge raises serious concerns in areas such as security, privacy, and digital forensics.

Categories:
493 Views

In the evolving landscape of 5G network, network slicing has been considered as a key technology for the realization of multiple virtual networks running on a shared physical infrastructure, each designed to fulfill a specific service or application. However, with such networks, the dynamic and real-time allocation of these resources remains a prime concern, particularly with respect to highly variable conditions of traffic.

Categories:
70 Views

This data reflects the prevalence and adoption of smart devices. The experimental setup to generate the IDSIoT2024 dataset is based on an IoT network configuration consisting of seven smart devices, each contributing to a diverse representation of IoT devices. These include a smartwatch, smartphone, surveillance camera, smart vacuum and mop robot, laptop, smart TV, and smart light. Among these, the laptop serves a dual purpose within the network.

Categories:
1643 Views

The security of systems with limited resources is essential for deployment and cannot be compromised by other performance metrics such as throughput. Physically Unclonable Functions (PUFs) present a promising, cost-effective solution for various security applications, including IC counterfeiting and lightweight authentication. PUFs, as security blocks, exploit physical variations to extract intrinsic responses based on applied challenges, with Challenge-Response Pairs (CRPs) uniquely defining each device.

Categories:
363 Views

The e-commerce market heavily relies on e-coupons, and their digital nature presents challenges in establishing a secure e-coupon infrastructure, which incurs maintenance costs. To address this, we explore using public blockchains for the e-coupon system, providing a highly reliable decentralized infrastructure with no maintenance costs. Storing coupon information on a blockchain ensures tamper resistance and protection against double redemption. However, using public blockchains shifts gas cost responsibility to users, potentially impacting user experience if not managed carefully.

Categories:
173 Views

The enhanced dataset is a sophisticated collection of simulated data points, meticulously designed to emulate real-world data as collected from wearable Internet of Things (IoT) devices. This dataset is tailored for applications in safety monitoring, particularly for women, and is ideal for developing machine learning models for distress or danger detection.

Categories:
1913 Views

5G Network slicing is one of the key enabling technologies that offer dedicated logical resources to different applications on the same physical network. However, a Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack can severely damage the performance and functionality of network slices. Furthermore, recent DoS/DDoS attack detection techniques are based on the available data sets which are collected from simulated 5G networks rather than from 5G network slices.

Categories:
4362 Views

Pages