Toward Predicting Secure Environments for Wearable Devices
暂无分享,去创建一个
[1] Yan Wang,et al. Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN , 2016, AsiaCCS.
[2] Jason I. Hong,et al. Research Issues for Privacy in a Ubiquitously Connected World , 2014 .
[3] R. F. Olanrewaju,et al. A Secure Authentication Scheme for Bluetooth Connection , 2014, 2014 International Conference on Computer and Communication Engineering.
[4] Joshua Saxe,et al. CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).
[5] Rose F. Gamble,et al. Imposing Security Awareness on Wearables , 2016, 2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS).
[6] Iku Ohama,et al. A machine learning approach for lighting perception analysis via crowdsourcing , 2015, UbiComp/ISWC Adjunct.
[7] Xinwen Fu,et al. How privacy leaks from bluetooth mouse? , 2012, CCS '12.
[8] Md. Sumon Shahriar,et al. Urban Sensing and Smart Home Energy Optimisations: A Machine Learning Approach , 2015, IoT-App@SenSys.
[9] Yee Whye Teh,et al. Bayesian nonparametric crowdsourcing , 2014, J. Mach. Learn. Res..
[10] Nicholas D. Lane,et al. An Early Resource Characterization of Deep Learning on Wearables, Smartphones and Internet-of-Things Devices , 2015, IoT-App@SenSys.
[11] Wolfgang Nejdl,et al. When in Doubt Ask the Crowd: Employing Crowdsourcing for Active Learning , 2014, WIMS '14.
[12] Theodora A. Varvarigou,et al. Heating schedule management approach through decentralized knowledge diffusion in the context of social internet of things , 2015, Panhellenic Conference on Informatics.
[13] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.
[14] Jia Wang,et al. DaDianNao: A Machine-Learning Supercomputer , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.