G Wang, X Huang, X Zhang, G Liu… - 2023 IEEE/CIC …, 2023 - ieeexplore.ieee.org
This paper investigates the problem of secure localization where the device vulnerabilities are used to perform adversarial attacks in the Internet of Things. Compared with existing …
K Alluri, S Gopikrishnan - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Secure authentication and accurate localization among Internet of Things (IoT) sensors are pivotal for the functionality and integrity of IoT networks. IoT authentication and localization …
N Waleed, O Kamal, MG Anany… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Nowadays, supermarkets and shopping malls suffer from crowds and long cashier queues. This gives customers a rough shopping experience, and many will reconsider shopping in …
HighlightsQuality-aware data pipelines for Digital TwinsJorge Merino, Nicola Moreti, Manuel Herrera, Philip Woodall, Ajith Parlikad• A classification of the implementation strategies for …