Results 51 to 60 of about 1,051 (211)

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Caught Between Privacy and Surveillance: Explaining the Long‐Term Stagnation of Data Protection Regulation in Liberal Democracies

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article pursues two objectives. First, it aims to trace the genealogy of data protection regulation in major liberal democracies. To do so, it examines the evolution of this regulation in the United States, France, and Germany, among others, and relies on the policy actors' triangle framework.
Nicolas Bocquet
wiley   +1 more source

UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits

open access: yesHigh-Confidence Computing, 2023
The widely used devices (e.g. smartphones, recorders) equipped with microphones have posed a severe threat to confidential conversations. In this paper, we design an inaudible anti-eavesdropping method: UltraJam, to reduce the risk of unwanted and secret
Zhicheng Han   +3 more
doaj   +1 more source

Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

open access: yes, 2013
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's ...
Shen, Weiming   +2 more
core   +1 more source

Phoneme-Based Proactive Anti-Eavesdropping With Controlled Recording Privilege

open access: yesIEEE Transactions on Dependable and Secure Computing
Comment: 14 pages, 28 figures; submitted to IEEE ...
Peng Huang   +7 more
openaire   +2 more sources

Fugitive Junctures: Life‐Seeking, Route‐Finding and the Mobile Ensemble at Kenya's Borders

open access: yesTransactions of the Institute of British Geographers, EarlyView.
Short Abstract Fugitivity has become an important conceptual frame to understand the illegalised mobilities of contemporary migrants in conjunction with enslaved people's historical lines of flight as spatial praxes to seize their own freedom. Thinking from Kenya, and drawing on research with migrants, border officials, activists, police and smugglers,
Hanno Brankamp
wiley   +1 more source

A Software Defined Networking-Oriented Security Scheme for Vehicle Networks

open access: yesIEEE Access, 2018
In the intelligent transportation system (ITS), vehicle networks (VNs) can well solve the network related problems. However, as VNs are expected to have a wide range of applications in future services, security challenges are widely recognized ...
Rong Geng, Xiaojie Wang, Jun Liu
doaj   +1 more source

An Anti-Eavesdropping Strategy for Precoding-Aided Spatial Modulation With Rough CSI of Eve [PDF]

open access: yes, 2019
In this paper, an anti-eavesdropping strategy is proposed for secure precoding-aided spatial modulation networks, under the assumption that the rough channel state information of eavesdropper can be obtained at the transmitter.
Lin, Yan   +4 more
core   +1 more source

The impact of urbanisation on social behaviour: a comprehensive review

open access: yesBiological Reviews, Volume 101, Issue 2, Page 1003-1035, April 2026.
ABSTRACT Urbanisation is a key driver of global environmental change and presents animals with novel stressors and challenges. It can fundamentally influence social behaviour and has the potential to reshape within‐ and between‐species social interactions. Given the role of social behaviour in reproductive fitness and survival, understanding how social
Avery L. Maune   +2 more
wiley   +1 more source

Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems

open access: yesApplied Sciences
The precoder obtained using the traditional singular value decomposition (SVD) method for legitimate user’s channel, while achieving the highest spectral efficiency for the legitimate user, cannot defend against eavesdropping attacks, thus posing a ...
Boqing Chen, Lijun Yang, Meng Wu
doaj   +1 more source

Home - About - Disclaimer - Privacy