Deception is utilized by a variety of intelligent systems ranging from insects to human beings. It has been argued that the use of deception is an indicator of theory of mind [2] ...
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
This paper investigates the application of the Generalized Likelihood Ratio Test detector to the Global Navigation Satellite System array-based acquisition problem. We consider an...
—Several contention-based Medium Access Control (MAC) protocols have been proposed for the vehicles to gain the radio channels to distribute active safety messages timely, e.g., ...
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...