Results 51 to 60 of about 1,051 (211)
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
ABSTRACT This article pursues two objectives. First, it aims to trace the genealogy of data protection regulation in major liberal democracies. To do so, it examines the evolution of this regulation in the United States, France, and Germany, among others, and relies on the policy actors' triangle framework.
Nicolas Bocquet
wiley +1 more source
UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits
The widely used devices (e.g. smartphones, recorders) equipped with microphones have posed a severe threat to confidential conversations. In this paper, we design an inaudible anti-eavesdropping method: UltraJam, to reduce the risk of unwanted and secret
Zhicheng Han +3 more
doaj +1 more source
Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming +2 more
core +1 more source
Phoneme-Based Proactive Anti-Eavesdropping With Controlled Recording Privilege
Comment: 14 pages, 28 figures; submitted to IEEE ...
Peng Huang +7 more
openaire +2 more sources
Fugitive Junctures: Life‐Seeking, Route‐Finding and the Mobile Ensemble at Kenya's Borders
Short Abstract Fugitivity has become an important conceptual frame to understand the illegalised mobilities of contemporary migrants in conjunction with enslaved people's historical lines of flight as spatial praxes to seize their own freedom. Thinking from Kenya, and drawing on research with migrants, border officials, activists, police and smugglers,
Hanno Brankamp
wiley +1 more source
A Software Defined Networking-Oriented Security Scheme for Vehicle Networks
In the intelligent transportation system (ITS), vehicle networks (VNs) can well solve the network related problems. However, as VNs are expected to have a wide range of applications in future services, security challenges are widely recognized ...
Rong Geng, Xiaojie Wang, Jun Liu
doaj +1 more source
An Anti-Eavesdropping Strategy for Precoding-Aided Spatial Modulation With Rough CSI of Eve [PDF]
In this paper, an anti-eavesdropping strategy is proposed for secure precoding-aided spatial modulation networks, under the assumption that the rough channel state information of eavesdropper can be obtained at the transmitter.
Lin, Yan +4 more
core +1 more source
The impact of urbanisation on social behaviour: a comprehensive review
ABSTRACT Urbanisation is a key driver of global environmental change and presents animals with novel stressors and challenges. It can fundamentally influence social behaviour and has the potential to reshape within‐ and between‐species social interactions. Given the role of social behaviour in reproductive fitness and survival, understanding how social
Avery L. Maune +2 more
wiley +1 more source
The precoder obtained using the traditional singular value decomposition (SVD) method for legitimate user’s channel, while achieving the highest spectral efficiency for the legitimate user, cannot defend against eavesdropping attacks, thus posing a ...
Boqing Chen, Lijun Yang, Meng Wu
doaj +1 more source

