New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges
暂无分享,去创建一个
Ramesh Govindan | Saurabh Bagchi | Tarek F. Abdelzaher | Prashant Shenoy | Ran Xu | Pradipta Ghosh | Akanksha Atrey | T. Abdelzaher | R. Govindan | S. Bagchi | Akanksha Atrey | Ran Xu | Pradipta Ghosh | P. Shenoy | Prashant Shenoy
[1] Ramesh Govindan,et al. Olympian: Scheduling GPU Usage in a Deep Neural Network Model Serving System , 2018, Middleware.
[2] Prashant J. Shenoy,et al. Combined heat and privacy: Preventing occupancy detection from smart meters , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[3] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[4] Shuochao Yao,et al. Stardust: A deep learning serving system in IoT: demo abstract , 2019, SenSys.
[5] Russ Housley,et al. Security flaws in 802.11 data link protocols , 2003, CACM.
[6] Aurélien Francillon,et al. What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices , 2018, NDSS.
[7] Atul Prakash,et al. Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? , 2017, IEEE Security & Privacy.
[8] Marcel Großmann,et al. Cloudless Computing - A Vision to Become Reality , 2020, 2020 International Conference on Information Networking (ICOIN).
[9] Kehuan Zhang,et al. Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[10] Ramesh Govindan,et al. Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.
[11] David E. Culler,et al. Lessons from a Sensor Network Expedition , 2004, EWSN.
[12] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[13] B. S. Manjunath,et al. Actor Conditioned Attention Maps for Video Action Detection , 2018, 2020 IEEE Winter Conference on Applications of Computer Vision (WACV).
[14] Junxuan Zhao,et al. Detection and tracking of pedestrians and vehicles using roadside LiDAR sensors , 2019, Transportation Research Part C: Emerging Technologies.
[15] Limin Wang,et al. Temporal Action Detection with Structured Segment Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[16] Arijit Mukherjee,et al. Offloaded Execution of Deep Learning Inference at Edge: Challenges and Insights , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[17] Saurabh Bagchi,et al. Efficient incremental code update for sensor networks , 2011, TOSN.
[18] Marcello Pelillo,et al. Multi-target Tracking in Multiple Non-overlapping Cameras Using Fast-Constrained Dominant Sets , 2019, International Journal of Computer Vision.
[19] Pascal Vasseur,et al. Introduction to Multisensor Data Fusion , 2005, The Industrial Information Technology Handbook.
[20] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[21] Fernando A. Kuipers,et al. SDN and Virtualization Solutions for the Internet of Things: A Survey , 2016, IEEE Access.
[22] Ramesh Govindan,et al. CarMap: Fast 3D Feature Map Updates for Automobiles , 2020, NSDI.
[23] Trent Jaeger,et al. TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone , 2017, MobiSys.
[24] Marcel Großmann,et al. Applicability of Serverless Computing in Fog Computing Environments for IoT Scenarios , 2019, UCC Companion.
[25] Francesco Solera,et al. Tracking Social Groups Within and Across Cameras , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[26] K. C. Gross,et al. A supervisory control loop with Prognostics for human-in-the-loop decision support and control applications , 2017, 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA).
[27] Gene Tsudik,et al. VRASED: A Verified Hardware/Software Co-Design for Remote Attestation , 2019, USENIX Security Symposium.
[28] L. Balzano,et al. Blind Calibration of Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[29] Omair Ahmad Khan,et al. Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead , 2017, ICFNDS.
[30] M. Hadi Amini,et al. Distributed Sensing Using Smart End-User Devices: Pathway to Federated Learning for Autonomous IoT , 2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI).
[31] B. S. Manjunath,et al. Caesar: cross-camera complex activity recognition , 2019, SenSys.
[32] Nick Feamster,et al. User Perceptions of Smart Home IoT Privacy , 2018, Proc. ACM Hum. Comput. Interact..
[33] Archan Misra,et al. Eugene: Towards Deep Intelligence as a Service , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[34] Eytan Modiano,et al. Network Reliability With Geographically Correlated Failures , 2010, 2010 Proceedings IEEE INFOCOM.
[35] Saurabh Bagchi,et al. RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[36] Lei Chen,et al. Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT , 2019, IEEE Internet of Things Journal.
[37] Mohamed R. Amer,et al. HiRF: Hierarchical Random Field for Collective Activity Recognition in Videos , 2014, ECCV.
[38] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[39] Dafang Zhuang,et al. Advances in Multi-Sensor Data Fusion: Algorithms and Applications , 2009, Sensors.
[40] Shih-Fu Chang,et al. Online Detection of Action Start in Untrimmed, Streaming Videos , 2018, ECCV.
[41] Karim Eldefrawy. SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust , 2012, NDSS 2012.
[42] Maarten Weyn,et al. A Survey of Rigid 3D Pointcloud Registration Algorithms , 2014 .
[43] Max Mühlhäuser,et al. End-2-End privacy architecture for IoT , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[44] Patrick Th. Eugster,et al. Demo abstract: Diagnostic tracing of wireless sensor networks with TinyTracer , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.
[45] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[46] Prashant J. Shenoy,et al. Private Memoirs of IoT Devices: Safeguarding User Privacy in the IoT Era , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[47] Patrick D. McDaniel,et al. Protecting consumer privacy from electric load monitoring , 2011, CCS '11.
[48] Hao Xu,et al. Data Registration with Ground Points for Roadside LiDAR Sensors , 2019, Remote. Sens..
[49] Anit Kumar Sahu,et al. Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.
[50] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[51] Zhuo Chen,et al. Bandwidth-Efficient Live Video Analytics for Drones Via Edge Computing , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).
[52] Deborah Estrin,et al. A Collaborative Approach to In-Place Sensor Calibration , 2003, IPSN.
[53] Saurabh Bagchi,et al. ACES: Automatic Compartments for Embedded Systems , 2018, USENIX Security Symposium.
[54] H Parmar,et al. Adobe's Real Time Messaging Protocol , 2022 .
[55] Paramvir Bahl,et al. VideoEdge: Processing Camera Streams using Hierarchical Clusters , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).
[56] Kirubaraj Ragland,et al. A Survey on Object Detection, Classification and Tracking Methods , 2014 .
[57] Zhu Wang,et al. Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things , 2013, J. Netw. Comput. Appl..
[58] Jorge Sá Silva,et al. A Survey on Human-in-the-Loop Applications Towards an Internet of All , 2015, IEEE Communications Surveys & Tutorials.
[59] Zhongshu Gu,et al. Securing Real-Time Microcontroller Systems through Customized Memory View Switching , 2018, NDSS.
[60] Tarek F. Abdelzaher,et al. FastDeepIoT: Towards Understanding and Optimizing Neural Network Execution Time on Mobile and Embedded Devices , 2018, SenSys.
[61] Flavio D. Garcia,et al. Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.
[62] Geoffrey H. Tison,et al. DeepHeart: Semi-Supervised Sequence Learning for Cardiovascular Risk Prediction , 2018, AAAI.
[63] Silvio Savarese,et al. Social Scene Understanding: End-to-End Multi-person Action Localization and Collective Activity Recognition , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[64] Klaus-Robert Müller,et al. Robust and Communication-Efficient Federated Learning From Non-i.i.d. Data , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[65] George Danezis,et al. Towards ensuring client-side computational integrity , 2011, CCSW '11.
[66] Prem Prakash Jayaraman,et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..
[67] Srinivasan Seshan,et al. Learning Context-Aware Policies from Multiple Smart Homes via Federated Multi-Task Learning , 2020, 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI).
[68] Song-Chun Zhu,et al. Cross-View People Tracking by Scene-Centered Spatio-Temporal Parsing , 2017, AAAI.
[69] Xin Wang,et al. Clipper: A Low-Latency Online Prediction Serving System , 2016, NSDI.
[70] Yuan Tian,et al. SmartAuth: User-Centered Authorization for the Internet of Things , 2017, USENIX Security Symposium.
[71] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[72] Gene Tsudik,et al. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust , 2012, NDSS.
[73] Javier Lorca,et al. Quantifying data rate and bandwidth requirements for immersive 5G experience , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[74] Patrick D. McDaniel,et al. Program Analysis of Commodity IoT Applications for Security and Privacy , 2018, ACM Comput. Surv..
[75] Prashant Shenoy,et al. RepEL: A Utility-Preserving Privacy System for IoT-Based Energy Meters , 2020, 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI).
[76] Cees Snoek,et al. Spatial-Aware Object Embeddings for Zero-Shot Localization and Classification of Actions , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[77] Ramesh Govindan,et al. AVR: Augmented Vehicular Reality , 2018, MobiSys.
[78] J. Zico Kolter,et al. REDD : A Public Data Set for Energy Disaggregation Research , 2011 .
[79] Gustavo Alonso,et al. Declarative Support for Sensor Data Cleaning , 2006, Pervasive.
[80] Emiliano De Cristofaro,et al. Knock Knock, Who's There? Membership Inference on Aggregate Location Data , 2017, NDSS.
[81] Jun Zhao,et al. Differentially Private Collaborative Learning for the IoT Edge , 2019, EWSN.
[82] Tony Givargis,et al. FlashBox: a system for logging non-deterministic events in deployed embedded systems , 2009, SAC '09.
[83] Brandon Lucia,et al. Adaptive low-overhead scheduling for periodic and reactive intermittent execution , 2020, PLDI.
[84] Lorrie Faith Cranor,et al. A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.
[85] Bronis R. de Supinski,et al. Automatic fault characterization via abnormality-enhanced classification , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[86] Byung-Gon Chun,et al. PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems , 2018, OSDI.
[87] Saurabh Bagchi,et al. Aveksha: a hardware-software approach for non-intrusive tracing and profiling of wireless embedded systems , 2011, SenSys.
[88] Hui Liu,et al. On-Demand Deep Model Compression for Mobile Devices: A Usage-Driven Model Selection Framework , 2018, MobiSys.
[89] Divesh Srivastava,et al. Integrating Conflicting Data: The Role of Source Dependence , 2009, Proc. VLDB Endow..
[90] Jun Zhao,et al. Mobile Edge Computing, Blockchain and Reputation-based Crowdsourcing IoT Federated Learning: A Secure, Decentralized and Privacy-preserving System , 2019, ArXiv.
[91] Tarek F. Abdelzaher,et al. DeepIoT: Compressing Deep Neural Network Structures for Sensing Systems with a Compressor-Critic Framework , 2017, SenSys.
[92] Qiang Wang,et al. Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.
[93] Giovanni Vigna,et al. HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation , 2020, USENIX Security Symposium.
[94] Haimonti Dutta,et al. NILMTK: an open source toolkit for non-intrusive load monitoring , 2014, e-Energy.
[95] Prashant J. Shenoy,et al. Non-Intrusive Occupancy Monitoring using Smart Meters , 2013, BuildSys@SenSys.
[96] Haryong Song,et al. Robust Vision-Based Relative-Localization Approach Using an RGB-Depth Camera and LiDAR Sensor Fusion , 2016, IEEE Transactions on Industrial Electronics.
[97] S Abirami,et al. Suspicious Human Activity Detection from Surveillance Videos , 2012 .
[98] François Brémond,et al. Globality–Locality-Based Consistent Discriminant Feature Ensemble for Multicamera Tracking , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[99] Yubin Xia,et al. vTZ: Virtualizing ARM TrustZone , 2017, USENIX Security Symposium.
[100] Matthew Hicks,et al. Intermittent Computation without Hardware Support or Programmer Intervention , 2016, OSDI.
[101] Anuj Srivastava,et al. Action Recognition Using Rate-Invariant Analysis of Skeletal Shape Trajectories , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[102] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[103] Ju Ren,et al. Distilling at the Edge: A Local Differential Privacy Obfuscation Framework for IoT Data Analytics , 2018, IEEE Communications Magazine.
[104] Philipp Sommer,et al. Minerva: distributed tracing and debugging in wireless sensor networks , 2013, SenSys '13.
[105] Paramvir Bahl,et al. Live Video Analytics at Scale with Approximation and Delay-Tolerance , 2017, NSDI.
[106] Patrick Th. Eugster,et al. Prius: generic hybrid trace compression for wireless sensor networks , 2012, SenSys '12.
[107] Joan Serrat,et al. Management and orchestration challenges in network functions virtualization , 2016, IEEE Communications Magazine.
[108] Yi-Mao Hsiao,et al. H.264 video transmissions over wireless networks: Challenges and solutions , 2011, Comput. Commun..
[109] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[110] Takeo Kato,et al. An obstacle detection method by fusion of radar and motion stereo , 2002, SICE 2003 Annual Conference (IEEE Cat. No.03TH8734).
[111] Ahmad-Reza Sadeghi,et al. SeED: secure non-interactive attestation for embedded devices , 2017, WISEC.
[112] user surfaces,et al. Data Execution Prevention , 2011 .
[113] Kaiqi Huang,et al. An Equalized Global Graph Model-Based Approach for Multicamera Object Tracking , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[114] Luca Bruno,et al. AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.
[115] Aakanksha Chowdhery,et al. Reinventing Video Streaming for Distributed Vision Analytics , 2018, HotCloud.
[116] Mehdi Bennis,et al. Toward Interconnected Virtual Reality: Opportunities, Challenges, and Enablers , 2016, IEEE Communications Magazine.
[117] Hyoseung Kim,et al. Energy scheduling for task execution on intermittently-powered devices , 2020, SIGBED Rev..
[118] Yan Zhang,et al. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[119] Omar Alrawi,et al. SoK: Security Evaluation of Home-Based IoT Deployments , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[120] Patrick Th. Eugster,et al. TARDIS: software-only system-level record and replay in wireless sensor networks , 2015, IPSN '15.
[121] Gianpaolo Francesco Trotta,et al. Computer vision and deep learning techniques for pedestrian detection and tracking: A survey , 2018, Neurocomputing.
[122] Yuan Qi,et al. Minimizing private data disclosures in the smart grid , 2012, CCS '12.
[123] David Brumley,et al. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware , 2016, NDSS.
[124] Carlo Tomasi,et al. Features for Multi-target Multi-camera Tracking and Re-identification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[125] Saurabh Bagchi,et al. Protecting Bare-Metal Embedded Systems with Privilege Overlays , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[126] Xiaohua Tong,et al. A Linear Feature-Based Approach for the Registration of Unmanned Aerial Vehicle Remotely-Sensed Images and Airborne LiDAR Data , 2016, Remote. Sens..
[127] Brandon Lucia,et al. Adaptive Dynamic Checkpointing for Safe Efficient Intermittent Computing , 2018, OSDI.
[128] T. Wark,et al. Real-time Image Streaming over a Low-Bandwidth Wireless Camera Network , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[129] A. Habib,et al. Photogrammetric and Lidar Data Registration Using Linear Features , 2005 .
[130] N. Truong,et al. A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .
[131] Mikko Majanen,et al. Use Cases and Communications Architecture for 5G-Enabled Road Safety Services , 2018, 2018 European Conference on Networks and Communications (EuCNC).
[132] Beijia Zhang,et al. Localizing Ground Penetrating RADAR: A Step Toward Robust Autonomous Ground Vehicle Localization , 2016, J. Field Robotics.
[133] Brandon Lucia,et al. Alpaca: intermittent execution without checkpoints , 2017, Proc. ACM Program. Lang..
[134] Yuguang Fang,et al. EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.