Sciweavers

978 search results - page 46 / 196
» Knowledge, Probability, and Adversaries
Sort
View
TRUST
2010
Springer
15 years 2 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
NETWORKING
2007
14 years 11 months ago
Reinforcement Learning-Based Load Shared Sequential Routing
We consider event dependent routing algorithms for on-line explicit source routing in MPLS networks. The proposed methods are based on load shared sequential routing in which load ...
Fariba Heidari, Shie Mannor, Lorne Mason
CVPR
2012
IEEE
13 years 7 days ago
Large-scale knowledge transfer for object localization in ImageNet
ImageNet is a large-scale database of object classes with millions of images. Unfortunately only a small fraction of them is manually annotated with bounding-boxes. This prevents ...
Matthieu Guillaumin, Vittorio Ferrari
WISEC
2009
ACM
15 years 4 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
INFOCOM
2007
IEEE
15 years 4 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen