HAR-CO: A comparative analytical review for recognizing conventional human activity in stream data relying on challenges and approaches

MR Keyvanpour, S Mehrmolaei, SV Shojaeddini… - Multimedia Tools and …, 2024 - Springer
The increase in the use of electronic devices and the high rate of data stream production
such as video reveals the importance of analyzing the content of such data. Content analysis …

Marina: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale

M Seufert, K Dietz, N Wehner, S Geißler… - … on Network and …, 2024 - ieeexplore.ieee.org
Network operators require real-time traffic monitoring insights to provide high performance
and security to their customers. It has been shown that artificial intelligence and machine …

Connecting the Dots: Tracing Data Endpoints in IoT Devices

M Jakaria, DY Huang, A Das - Proceedings on Privacy …, 2024 - petsymposium.org
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …

Physical Side-Channel Attacks against Intermittent Devices

MO Ozmen, H Farrukh, ZB Celik - Proceedings on Privacy …, 2024 - petsymposium.org
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …

Connecting Home: Human-Centric Setup Automation in the Augmented Smart Home

M Schenkluhn, MT Knierim, F Kiss… - Proceedings of the CHI …, 2024 - dl.acm.org
Controlling smart homes via vendor-specific apps on smartphones is cumbersome.
Augmented Reality (AR) offers a promising alternative by enabling direct interactions with …

Privacy-preserving pseudonyms for LoRaWAN

S Pélissier, J Aalmoes, AK Mishra, M Cunche… - Proceedings of the 17th …, 2024 - dl.acm.org
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata
exposure, particularly concerning the exploitation of stable device identifiers. For the first …

Smart Home Privacy: A Scoping Review

A Ahmed, V Ungureanu… - … of the 10th …, 2024 - salford-repository.worktribe.com
Privacy concerns in smart home technologies have surged as their adoption becomes
ubiquitous. This scoping review paper undertakes an exhaustive examination of the current …

SoK: Secure Human-centered Wireless Sensing

W Sun, T Chen, N Gong - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
Human-centered wireless sensing (HCWS) aims to understand the fine-grained
environment and activities of a human using the diverse wireless signals around him/her …

A Survey on Consumer IoT Traffic: Security and Privacy

Y Jia, Y Song, Z Liu, Q Tan, F Wang, Y Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
For the past few years, the Consumer Internet of Things (CIoT) has entered public lives.
While CIoT has improved the convenience of people's daily lives, it has also brought new …

Identifying Anomaly in IoT Traffic Flow with Locality Sensitive Hashes

B Charyyev, MH Gunes - IEEE Access, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices introduce new vulnerabilities to the network. These devices
are relatively cheap, have simple design yet they can collect private user data, and be …