IEEE

Results: 22018



#Item
31

2016 IEEE Real-Time Systems Symposium On-Line Event-Driven Scheduling for Electric Vehicle Charging via Park-and-Charge 1

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2017-04-17 03:11:51
    32Computer architecture / Computing / System software / Software bugs / Embedded operating systems / Electrical engineering / Stack buffer overflow / FreeRTOS / Protection ring / Buffer overflow protection / Internet of things / Memory protection

    Poster: EPOXY—Enabling Robust Protection for Bare-metal Systems Abraham A. Clements∗ , Naif Saleh Almakhdhub† , Khaled S. Saab‡ , Prashast Srivastava† , Jinkyu Koo† , Saurabh Bagchi† , Mathias Payer† ∗

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 19:44:12
    33Terms of service / Identity management / Law / Privacy / Internet privacy / Attitude / Social psychology / Medical privacy / Psychology / Behavior

    Poster: Why Privacy is All But Forgotten An Empirical Study of Privacy & Sharing Attitude Kovila P.L. Coopamootoo and Thomas Groß I. I NTRODUCTION Privacy and sharing are believed to share a dynamic and

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 16:46:26
    34Wireless networking / Information theory / Network performance / Robotics / Wireless / Computing / Throughput / Zigbee / Robot / Bandwidth / Self-reconfiguring modular robot / Wi-Fi

    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 64, NO. 12, DECEMBERAdaSharing: Adaptive Data Sharing in Collaborative Robots

    Add to Reading List

    Source URL: wirelesslab.sjtu.edu.cn

    Language: English - Date: 2017-12-01 00:35:36
    35

    2015 IEEE Symposium on Security and Privacy Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs Eli Ben-Sasson§ , Alessandro Chiesa∗ , Matthew Green† , Eran Tromer¶ , Madars Virza‡ ∗ ETH

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:43:13
      36Computing / Information and communications technology / Technology / Networking hardware / Wireless networking / Computer network security / Server appliance / Internet of things / Router / Mirai / Computer network / Computer security

      Paper Title (use style: paper title)

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-12 21:00:14
      37Machine learning / Artificial intelligence / Learning / Cognition / Training /  test /  and validation sets / CIFAR-10 / Artificial neural network / Support vector machine / Deep learning / Overfitting / Geographic information system / Neural architecture search

      Membership Inference Attacks Against Machine Learning Models Reza Shokri Cornell Tech

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:58:56
      38Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

      Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-15 12:53:26
      39Behavior / Statistical classification / Emerging technologies / Behavioural sciences / Abnormal psychology / Abnormality / Deviance / Support vector machine / Artificial intelligence / Technology / Drunk driving in the United States / Normality

      2198 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 16,

      Add to Reading List

      Source URL: wirelesslab.sjtu.edu.cn

      Language: English - Date: 2017-12-01 00:35:40
      40Computer security / Security engineering / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Password / Operating system / Protection ring / Capability-based security

      The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2016-01-15 12:55:59
      UPDATE