Showing 20,401 - 20,420 results of 29,875 for search '"communication"', query time: 0.12s Refine Results
  1. 20401

    DroidBet:event-driven automatic detection of network behaviors for Android applications by Song-jie WEI, Gao-xiang WU, Na LUO, Zhao-wei SHI, Zi-yang ZHOU

    Published 2017-05-01
    “…The most Android applications connect to Internet to communicate with the outside world.Applications’ network-related activities were reflected and described with network traffic.By analyzing and modeling network traffic of Android applications,network behaviors of Android applications could be subsequently characterized.Therefore,DroidBet:an event-driven network behavior automatic detection system was presented,to test and evaluate Android applications automatically.Firstly,a scenario simulation event library was built to simulate the events that applications may be executed in the process,so as to trigger the network behavior of the application as much as possible.Then,the test sequence based on the state transition analysis method was automatically generated,and the network behavior was dynamically collected during the application testing process.Finally,the machine learning method was used to learn and train the collected network behavior,and the network behavior model based on BP neural network was generated to detect the behavior of the unknown Android application.The experimental results show that DroidBet can effectively trigger and extract the network behavior of the application,which has the advantages of high accuracy and low resource cost.…”
    Get full text
    Article
  2. 20402
  3. 20403
  4. 20404

    Survey on data heterogeneity problems and personalization based solutions of federated learning in Internet of vehicles by LIU Miao, LIN Wanru, WANG Qin, GUI Guan

    Published 2024-10-01
    “…Finally, the challenges encountered by PFL in IoV were outlined, along with the future research prospection related to advanced technologies on wireless communications.…”
    Get full text
    Article
  5. 20405
  6. 20406
  7. 20407
  8. 20408
  9. 20409
  10. 20410
  11. 20411
  12. 20412

    Bus cache-based location privacy protection scheme in the Internet of vehicles by Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG

    Published 2021-07-01
    “…To solve the problem of real location leakage when vehicles use location-based service (LBS) on the Internet of vehicles, a location privacy protection scheme based on bus cache was proposed.Firstly, a point of interest (POI) pool was obtained from the LBS provider based on its route information.Then the data in the POI pool was selected form a POI list while driving.Finally, the POI list was broadcast to surrounding private vehicles.After the private vehicle received the broadcast data, it verified the identity of the bus and then stored the POI list in the vehicle’s local cache.When a private vehicle needed to query POI information, it would first retrieve it in the local cache, and if the cache was missed, it would send a query request to the LBS provider using the k-anonymity method.The simulation experiment results show that the proposed scheme can reduce the possibility of leakage of the real location of the private vehicle by reducing the number of communications between the private vehicle and the LBSP, thereby effectively improving the privacy protection level of the private vehicle.…”
    Get full text
    Article
  13. 20413
  14. 20414
  15. 20415
  16. 20416
  17. 20417
  18. 20418

    Research on end hopping and spreading for active cyber defense by Leyi SHI, Hongbin GUO, Xiao WEN, Jianlan LI, Yuwen CUI, Mengfei MA, Hui SUN

    Published 2019-05-01
    “…Inspired by the spread spectrum technology for communications,the concept of end spreading was proposed to represent a piece of information of the data transmission with a sequence of multiple end information,of which each piece of end information was irrelevant to the information it conveys.Thus the covert data transmission can be performed.Further,an active cyber defense model of end information hopping and spreading was presented,in which the hopping strategy was separated from the synchronization strategy.The synchronization was accomplished by means of end information spreading for synchronous authentication of both parties,which can solve the high-speed hopping synchronization problem with high concealment requirements.The mode of generation,transmission and authentication of the spreading sequence,and the data migration strategy in the end hopping and spreading model were described in detail,and the security performance and synchronization performance were analyzed and verified experimentally.Theoretical analysis and experimental results show that the cyber defense model of end information hopping and spreading has improved the availability and confidentiality of network services under high-speed hopping and has good anti-attack performance,which is of great significance for the proactive defense application of high intensity confrontation.…”
    Get full text
    Article
  19. 20419
  20. 20420