Challenges, design and analysis of a large-scale p2p-vod system

Y Huang, TZJ Fu, DM Chiu, JCS Lui… - ACM SIGCOMM computer …, 2008 - dl.acm.org
P2P file downloading and streaming have already become very popular Internet
applications. These systems dramatically reduce the server loading, and provide a platform …

Security and privacy issues in P2P streaming systems: A survey

G Gheorghe, R Lo Cigno, A Montresor - Peer-to-Peer Networking and …, 2011 - Springer
Abstract Streaming applications over Peer-To-Peer (P2P) systems have gained an
enormous popularity. Success always implies increased concerns about security, protection …

IPTV over P2P streaming networks: the mesh-pull approach

X Hei, Y Liu, KW Ross - IEEE communications magazine, 2008 - ieeexplore.ieee.org
IPTV, an emerging Internet application, would revolutionize the entertainment and media
industries; however, IPTV also has the potential to overwhelm the Internet backbone and …

Accounting and accountability in content distribution architectures: a survey

DÓ Coileáin, D O'mahony - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Many content distribution architectures offer desirable elements that lead to less bandwidth
usage, reduced network congestion, higher content availability, and reduced costs …

Backdoor attacks in peer-to-peer federated learning

G Syros, G Yar, S Boboila, C Nita-Rotaru… - arxiv preprint arxiv …, 2023 - arxiv.org
Most machine learning applications rely on centralized learning processes, opening up the
risk of exposure of their training datasets. While federated learning (FL) mitigates to some …

Sensing-enabled channels for hard-to-detect command and control of mobile devices

R Hasan, N Saxena, T Haleviz, S Zawoad… - Proceedings of the 8th …, 2013 - dl.acm.org
The proliferation of mobile computing devices has enabled immense opportunities for
everyday users. At the same time, however, this has opened up new, and perhaps more …

Combining popularity and locality to enhance in-network caching performance and mitigate pollution attacks in content-centric networking

G Zhang, J Liu, X Chnag, Z Chen - IEEE Access, 2017 - ieeexplore.ieee.org
Content-centric networking (CCN) aims to improve network reliability, scalability, and
security by changing the way that information is organized and retrieved in the current …

TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding

C Cheng, T Jiang, Q Zhang - IEEE Journal on Selected Areas …, 2013 - ieeexplore.ieee.org
Recently, the peer-to-peer (P2P) live streaming system has benefited from the advent of
network coding. However, it was demonstrated that malicious nodes could significantly …

OpenSky report 2018: Assessing the integrity of crowdsourced mode S and ADS-B data

M Schäfer, M Strohmeicr, M Smith… - 2018 IEEE/AIAA 37th …, 2018 - ieeexplore.ieee.org
Air traffic tracking platforms such as the OpenSky Network use crowdsourcing to track air
traffic world wide. While crowdsourcing allows for unprecedented coverage, it comes with …

Byzantine fault tolerance of regenerating codes

F Oggier, A Datta - … IEEE International Conference on Peer-to …, 2011 - ieeexplore.ieee.org
Recent years have witnessed a slew of coding techniques custom designed for networked
storage systems. Network coding inspired regenerating codes are the most prolifically …