Communications

Full Duplex Sensor array
- Categories:
Our Signing in the Wild dataset consists of various videos harvested from YouTube containing people signing in various sign languages and doing so in diverse settings, environments, under complex signer and camera motion, and even group signing. This dataset is intended to be used for sign language detection.
- Categories:
This dataset was generated on a small-scale process automation scenario using MODBUS/TCP equipment, for research on the application of ML techniques to cybersecurity in Industrial Control Systems. The testbed emulates a CPS process controlled by a SCADA system using the MODBUS/TCP protocol. It consists of a liquid pump simulated by an electric motor controlled by a variable frequency drive (allowing for multiple rotor speeds), which in its turn controlled by a Programmable Logic Controller (PLC).
- Categories:

Device identification using network traffic analysis is being researched for IoT and non-IoT devices against cyber-attacks. The idea is to define a device specific unique fingerprint by analyzing the solely inter-arrival time (IAT) of packets as feature to identify a device. Deep learning is used on IAT signature for device fingerprinting of 58 non-IoT devices. We observed maximum recall and accuracy of 97.9% and 97.7% to identify device. A comparitive research GTID found using defined IAT signature that models of device identification are better than device type identification.
- Categories:

None
- Categories:
Design of novel RF front-end hardware architectures and their associated measurement algorithms.
Research objectives, includes:
RO1: Novel architecture based upon Adaptive Wavelet Band-pass Sampling (AWBS) of RF Analog-to-Information Conversion (AIC).
RO2: Integration of AWBS for increasing the wideband sensing capabilities of real-time spectrum analyzers by using AICs.
RO3: Propose online calibration methods and algorithms for front-end hardware non-idealities compensation.
- Categories:

This dataset is related to the paper "A distributed Front-end Edge node assessment method by using a learning-to-rank method"
Normal
0
false
false
false
EN-US
JA
AR-SA
- Categories:

Radio frequency identification (RFID) provides a simple and effective solution to the passive indoor localization. The conventional wisdom about RFID localization is utilizing reference tags. It performs well in tag or single passive target localization. However, in the passive multiple target scenario, reference tag based localization suffers from some limitations, including the array aperture, mutual coupling of reference tags, and coherent superimposition of target signals.
- Categories:

The dataset contains a set of voip flows (with different codecs) captured in fixed/fixed and fixed/mobile LTE-A enviroment.
- Categories: