Exposing the rate information of wireless transmissions enables highly efficient attacks that can severely degrade the performance of a network at very low cost. In this paper, w...
Health effects attributed to air pollution, especially ambient fine particulate matter (PM2.5), become a global issue. The central environment monitoring networks provide limite...
Many data-intensive sensor network applications are potential big-data enabler: they are deployed in challenging environments to collect large volume of data for a long period of ...
Nowadays, it is prohibitive for apps market places, such as Google App Store, to thoroughly verify an app’s resource permission requests to be legitimate or malicious. As a resu...
Bahman Rashidi, Carol J. Fung, Gerrit Bond, Steven...
In cyber-physical systems such as automobiles, measurement data from sensor nodes should be delivered to other consumer nodes such as actuators in a regular fashion. But, in pract...
The backpressure routing policy is known to be a throughput optimal policy that supports any feasible traffic demand in data networks, but may have poor delay performance when pac...
Anurag Rai, Chih-Ping Li, Georgios S. Paschos, Eyt...
We introduce SmartGuide, a light-weighted and efficient approach to localize and recognize a distant unknown building. Our approach relies on shooting only a single photo of a tar...
Xi Xiong, Zheng Yang, Longfei Shangguan, Yun Fei, ...
Delay Tolerant Networks (DTNs) composed of commodity mobile devices have the potential to support communication applications resistant to blocking and censorship, as well as certa...
Yue Liu, David R. Bild, David Adrian, Gulshan Sing...
In crowdsensing, appropriate rewards are always expected to compensate the participants for their consumptions of physical resources and involvements of manual efforts. While con...