A study on the characteristics of douyin short videos and implications for edge caching

Z Chen, Q He, Z Mao, HM Chung… - Proceedings of the ACM …, 2019 - dl.acm.org
Douyin, internationally known as TikTok, has become one of the most successful short-video
platforms. To maintain its popularity, Douyin has to provide better Quality of Experience …

Understanding fileless attacks on linux-based iot devices with honeycloud

F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu… - Proceedings of the 17th …, 2019 - dl.acm.org
With the wide adoption, Linux-based IoT devices have emerged as one primary target of
today's cyber attacks. Traditional malware-based attacks can quickly spread across these …

Recent developments in near field communication: A study

P Chandrasekar, A Dutta - Wireless Personal Communications, 2021 - Springer
Near field communication, development in radio frequency detection has put its foot in
today's life of individuals through sophisticated mobile phones. NFC technology has become …

A mechanics and electromagnetic scaling law for highly stretchable radio frequency electronics

Z Zhao, R Avila, D Bai, D **a, E She, Y Huang… - Journal of the …, 2024 - Elsevier
Many classes of flexible and stretchable bio-integrated electronic systems rely on
mechanically sensitive electromagnetic components, such as various forms of antennas for …

Detection and localization of image tampering in digital images with fused features

M Ahmad, F Khursheed - Concurrency and Computation …, 2022 - Wiley Online Library
In digital forensics, image tamper detection and localization have attracted increased
attention in recent days, where the standard methods have limited description ability and …

An innovative near-field communication security based on the chaos generated by memristive circuits adopted as symmetrical key

CS Kuka, Y Hu, Q Xu, M Alkahtani - IEEE Access, 2020 - ieeexplore.ieee.org
The new technology solutions are playing an important role in the hardware security. One of
the latest techniques is the use of the Memristor as an encryption element. In this paper, it …

You foot the bill! Attacking NFC with passive relays

Y Sun, S Kumar, S He, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Imagine when you line up in a store, the person in front of you can make you pay her bill by
using a passive wearable device that forces a scan of your credit card or mobile phones …

NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator

J Liu, H Li, M Sun, H Wang, H Wen, Z Li… - 2024 IEEE Symposium …, 2024 - computer.org
Abstract Near Field Communication (NFC) has been widely used for rapid data exchange
between electronic devices over a very short distance. In this paper, we reveal a new …

Traffic Safety Enforcement and Document Verification System

D Chandra, A Khan, A Dubey… - 2023 14th …, 2023 - ieeexplore.ieee.org
With the continued evolvement of lifestyle, vehicles have become an important part of
human lives. As a result, the number of vehicles that take to the road are increasing at an …

[PDF][PDF] Mobile Payment Transaction Model with Robust Security in the NFC-HCE Ecosystem with Secure Elements on Smartphones

LN Harnaningrum, A Ashari, AE Putra - International Journal of …, 2022 - academia.edu
The Near Field Communication embedded (NFC-embedded) smartphone consists of two
ecosystems, namely Near Field Communication Subscriber Identity Module Secure Element …