A hybrid access control model with dynamic COI for secure localization of satellite and IoT-based vehicles

MU Aftab, Y Munir, A Oluwasanmi, Z Qin, MH Aziz… - IEEE …, 2020 - ieeexplore.ieee.org
Secure localization of vehicles is gaining the attention of researchers from both academia
and industry especially due to the emergence of internet of things (IoT). The modern …

An Edge and Trustworthy AI UAV System With Self-Adaptivity and Hyperspectral Imaging for Air Quality Monitoring

CH Huang, WT Chen, YC Chang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Leveraging the mobility and flexibility of unmanned aerial vehicles (UAVs), the proposed
edge and trustworthy artificial intelligence (AI) UAV system (ETAUS) offers a comprehensive …

Intrinsic random optical features of the electronic packages as physical unclonable functions for internet of things security

Q Li, F Chen, J Kang, P Wang, J Su… - Advanced Photonics …, 2022 - Wiley Online Library
The increasing security threat is a serious challenge to the internet of things (IoT). Hardware‐
based security primitive is an essential and powerful way to protect IoT devices from various …

A survey of trusted computing solutions using FPGAS

PD Rosero-Montalvo, Z István, W Hernandez - IEEE Access, 2023 - ieeexplore.ieee.org
Ensuring the security and privacy of computation and data management in the cloud and
edge is an ever-important requirement. There are several working solutions today for trusted …

A secure data parallel processing based embedded system for internet of things computer vision using field programmable gate array devices

KN Qureshi, S Qayyum, MN Ul Islam… - International Journal of …, 2021 - Wiley Online Library
Technologies and new standards have converted the traditional networks and systems into
new smart cities integrated networks. Different factors are behind to build these new …

P4NIS: Improving network immunity against eavesdrop** with programmable data planes

G Liu, W Quan, N Cheng, N Lu… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Due to improving computational capacity of supercomputers, transmitting encrypted packets
via one single network path is vulnerable to brute-force attacks. The versatile attackers …

PIPC: privacy-and integrity-preserving clustering analysis for load profiling in smart grids

H Yang, S Liang, X Luo, D Tang, H Li… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Generally, power utilities can utilize smart-meter data to extract load patterns through load-
profiling technologies, such as-means clustering. To improve the efficiency of load profiling …

Tunable FPGA bitstream obfuscation with boolean satisfiability attack countermeasure

B Olney, R Karam - ACM Transactions on Design Automation of …, 2020 - dl.acm.org
Field Programmable Gate Arrays (FPGAs) are seeing a surge in usage in many emerging
application domains, where the in-field reconfigurability is an attractive characteristic for …

[HTML][HTML] Lattice-based key private pres with hra security and pcs security

Y Wang, Y Zhao, M Wang - Computer Standards & Interfaces, 2024 - Elsevier
Proxy re-encryption (PRE) schemes, which nicely solve the problem of delegating
decryption rights, enable a semi-trusted proxy to transform a ciphertext encrypted under one …

RETRACTED: Image recognition algorithm for exercise fatigue based on FPGA processor and motion image capture

N Tang - 2021 - Elsevier
RETRACTED: Image recognition algorithm for exercise fatigue based on FPGA processor
and motion image capture - ScienceDirect Skip to main contentSkip to article Elsevier logo …