• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 266
  • 87
  • 22
  • 19
  • 15
  • 6
  • 6
  • 5
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 511
  • 511
  • 182
  • 140
  • 99
  • 87
  • 85
  • 73
  • 70
  • 68
  • 67
  • 65
  • 65
  • 54
  • 53
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

Machine learning-based mobile device in-air signature authentication

Yubo Shao (14210069) 05 December 2022 (has links)
<p>In the last decade, people have been surrounded by mobile devices such as smartphones, smartwatches, laptops, smart TVs, tablets, and IoT devices. As sensitive personal information such as photos, messages, contact information, schedules, and bank accounts are all stored on mobile devices today, the security and protection of such personal information are becoming more and more important. Today’s mobile devices are equipped with a variety of embedded sensors such as accelerometer, gyroscope, magnetometer, camera, GPS sensor, acoustic sensors, etc. that produce raw data on location, motion, and the environment around us. Based on these sensor data, we propose novel in-air signature authentication technologies on both smartphone and smartwatch in this dissertation. In-air signature authentication, as an essential behavioral biometric trait, has been adopted for identity verification and user authorization, as well as the development of deep neural networks, has vastly facilitated this field. This dissertation examines two challenging problems. One problem is how to deploy machine learning techniques to authenticate user in-air signatures in more convenient, intuitive, and secure ways by using smartphone and smartwatch in daily settings. Another problem is how to deal with the limited computational resources on today’s mobile devices which restrict to use machine learning models due to the substantial computational costs introduced by millions of parameters. </p> <p>To address the two above problems separately, we conduct the following research works. 1) The first work AirSign leverages both in-built acoustic and motion sensors on today’s smartphone for user authentication by signing signatures in the air without requiring any special hardware. This system actively transmits inaudible acoustic signals from the earpiece speaker, receives echoes back through both in-built microphones to “illuminate” signature and hand geometry, and authenticates users according to the unique features extracted from echoes and motion sensors. 2) The second work DeepWatchSign leverages in-built motion sensors on today’s smartwatch for user in-air signature authentication. The system adopts LSTM-AutoEncoder to generate negative signature data automatically from the enrolled signatures and authenticates each user by the deep neural network model. 3) We close this dissertation with an l0-based sparse group lasso approach called MobilePrune which can compress the deep learning models for both desktop and mobile platforms. This approach adopts group lasso penalty to enforce sparsity at the group level to benefit General Matrix Multiply (GEMM) and optimize the l0 norm in an exact manner. We observe the substantial reduction of compression ratio and computational costs for deep learning models. This method also achieves less response delay and battery consumption on mobile devices.</p>
302

Secure and efficient federated learning

Li, Xingyu 12 May 2023 (has links) (PDF)
In the past 10 years, the growth of machine learning technology has been significant, largely due to the availability of large datasets for training. However, gathering a sufficient amount of data on a central server can be challenging. Additionally, with the rise of mobile networking and the large amounts of data generated by IoT devices, privacy and security issues have become a concern, resulting in government regulations such as GDPR, HIPAA, CCPA, and ADPPA. Under these circumstances, traditional centralized machine learning methods face a problem in that sensitive data must be kept locally for privacy reasons, making it difficult to achieve the desired learning outcomes. Federated learning (FL) offers a solution to this by allowing for a global shared model to be trained by exchanging locally computed optimums instead of sharing the actual data. Despite its success as a natural solution for IoT machine learning implementation, Federated learning (FL) still faces challenges with regards to security and performance. These include high communication costs between IoT devices and the central server, the potential for sensitive information leakage and reduced model precision due to the aggregation process in the distributed IoT network, and performance concerns caused by the heterogeneity of data and devices in the network. In this dissertation, I present practical and effective techniques with strong theoretical supports to address these challenges. To optimize communication resources, I introduce a new multi-server FL framework called MS-FedAvg. To enhance security, I propose a robust defense algorithm called LoMar. To address data heterogeneity, I present FedLGA, and for device heterogeneity, I propose FedSAM.
303

Personal Context Recognition from Sensors

Zhang, Wanyi 28 April 2022 (has links)
Machine learning has become one of the most emerging topics in a lot of research areas, such as pervasive and ubiquitous computing. Such computing applications always rely on the supervised learning approach to recognize user’s context before a suitable level of services are provided. However, since more and more users are involved in modern applications, the monitored data cannot be guaranteed to be always true due to wrong information. This may cause the mislabeling in machine learning and so affects the prediction. The goal of this Ph.D. thesis is to improve the data quality and solve the mislabeling problem caused by considering non-expert users. To achieve this goal, we propose a novel algorithm, called Skeptical Learning, aiming at interacting with the users and filtering out anomalies when an invalid input is monitored. This algorithm guarantees the machine to use the pre-known knowledge to check the availability of its own prediction as well as the label provided by the users. This thesis clarifies how we design this algorithm and makes three main contributions: (i.) we study the predictability of human behavior through the notion of personal context; (ii.)we design and develop Skeptical Learning as a paradigm to deal with the unreliability of users when providing non-confidential labels that describe their personal context; (iii.) we introduce an MCS platform where we implement Skeptical Learning on top of it to solve unreliable labels issue. Our evaluations have shown that Skeptical Learning could be widely used in pervasive and ubiquitous computing applications to better understand the quality of the data relying on the machine knowledge, and thus prevent mislabeling problem due to non-expert information.
304

Security and Privacy in Large-Scale RFID Systems

Sakai, Kazuya January 2013 (has links)
No description available.
305

Mobile Crowd Instrumentation: Design of Surface Solar Irradiance Instrument

Singh, Abhishek 26 April 2017 (has links)
No description available.
306

Computational Offloading for Sequentially Staged Tasks: A Dynamic Approach Demonstrated on Aerial Imagery Analysis

Veltri, Joshua 02 February 2018 (has links)
No description available.
307

iPACE-V1: A PORTAABLE ADAPTIVE COMPUTING ENGINE

KHAN, JAWAD BASIT 11 October 2002 (has links)
No description available.
308

<b>USER-CENTERED DATA ACCESS CONTROL TECHNIQUES FOR SECURE AND PRIVACY-AWARE MOBILE SYSTEMS</b>

Reham Mohamed Sa Aburas (18857674) 25 June 2024 (has links)
<p dir="ltr">The pervasive integration of mobile devices in today’s modern world, e.g., smartphones, IoT, and mixed-reality devices, has transformed various domains, enhancing user experiences, yet raising concerns about data security and privacy. Despite the implementation of various measures, such as permissions, to protect user privacy-sensitive data, vulnerabilities persist. These vulnerabilities pose significant threats to user privacy, including the risk of side-channel attacks targeting low-permission sensors. Additionally, the introduction of new permissions, such as the App Tracking Transparency framework in iOS, seeks to enhance user transparency and control over data sharing practices. However, these framework designs are accompanied by ambiguous developer guidelines, rendering them susceptible to deceptive patterns. These patterns can influence user perceptions and decisions, undermining the intended purpose of these permissions. Moreover, the emergence of new mobile technologies, e.g., mixed-reality devices, presents novel challenges in ensuring secure data sharing among multiple users in collaborative environments, while preserving usability.</p><p dir="ltr">In this dissertation, I focus on developing user-centered methods for enhancing the security and privacy of mobile system, navigating through the complexities of unsolicited data access strategies and exploring innovative approaches to secure device authentication and data sharing methodologies.</p><p dir="ltr">To achieve this, first, I introduce my work on the iStelan system, a three-stage side-channel attack. This method exploits the low-permission magnetometer sensor in smartphones to infer user sensitive touch data and application usage patterns. Through an extensive user study, I demonstrate the resilience of iStelan across different scenarios, surpassing the constraints and limitations of prior research efforts.</p><p dir="ltr">Second, I present my analysis and study on the App Tracking Transparency permission in iOS. Specifically, my work focuses on analyzing and detecting the dark patterns employed by app developers in the permission alerts to obtain user consent. I demonstrate my findings on the dark patterns observed in permission alerts on a large-scale of apps collected from Apple’s store, using both static and dynamic analysis methods. Additionally, I discuss the application of a between-subject user study to evaluate users’ perceptions and understanding when exposed to different alert patterns.</p><p dir="ltr">Lastly, I introduce StareToPair, a group pairing system that leverages multi-modal sensing technologies in mixed-reality devices to enable secure data sharing in collaborative settings. StareToPair employs a sophisticated threat model capable of addressing various real-world scenarios, all while ensuring high levels of scalability and usability.</p><p dir="ltr">Through rigorous investigation, theoretical analysis and user studies, my research endeavors enhance the field of security and privacy for mobile systems. The insights gained from these studies offer valuable guidance for future developments in mobile systems, ultimately contributing to the design of user-centered secure and privacy-aware mobile ecosystems.</p>
309

An architecture for network centric operations in unconventional crisis: lessons learnt from Singapore's SARS experience

Tay, Chee Bin, Mui, Whye Kee 12 1900 (has links)
Approved for public release, distribution is unlimited / Singapore and many parts of Asia were hit with Severe Acute Respiratory Syndrome (SARS) in March 2003. The spread of SARS lead to a rapidly deteriorating and chaotic situation. Because SARS was a new infection, there was no prior knowledge that could be referenced to tackle such a complex, unknown and rapidly changing problem. Fortunately, through sound measures coupled with good leadership, quick action and inter-agency cooperation, the situation was quickly brought under control. This thesis uses the SARS incident as a case study to identify a set of network centric warfare methodologies and technologies that can be leveraged to facilitate the understanding and management of complex and rapidly changing situations. The same set of methodologies and technologies can also be selectively reused and extended to handle other situations in asymmetric and unconventional warfare. / Office of Force Transformation, DoD US Future Systems Directorate, MINDEF Singapore. / Lieutenant, Republic of Singapore Army / Civilian, Defence Science and Technology Agency, Singapore
310

Free roaming: A system for ubiquitous computing

Liu, Huanjin 01 January 2006 (has links)
Based on the Umbilical Cord system, this project enriches the Ubiquitous Computing system with a Free Roaming system. This Free Roaming consists of a distributed authentication system, a data caching system and a communication system between them. It allows user to roam within this system and access his data everywhere. Together with the Umbilical Cord system, a Ubiquitous Computing system is functionally completed as a prototype, and is ready to be deployed into the Internet.

Page generated in 0.0301 seconds