HAR-CO: A comparative analytical review for recognizing conventional human activity in stream data relying on challenges and approaches

MR Keyvanpour, S Mehrmolaei, SV Shojaeddini… - Multimedia Tools and …, 2024 - Springer
The increase in the use of electronic devices and the high rate of data stream production
such as video reveals the importance of analyzing the content of such data. Content analysis …

Marina: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale

M Seufert, K Dietz, N Wehner, S Geißler… - … on Network and …, 2024 - ieeexplore.ieee.org
Network operators require real-time traffic monitoring insights to provide high performance
and security to their customers. It has been shown that artificial intelligence and machine …

The SA4P Framework: Sensing and Actuation as a Privilege

P De Vaere, F Stöger, A Perrig, G Tsudik - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Popular consumer Internet of Things (IoT) devices provide increasingly diverse sensing and
actuation capabilities. Despite their benefits, such devices prompt numerous security …

Connecting Home: Human-Centric Setup Automation in the Augmented Smart Home

M Schenkluhn, MT Knierim, F Kiss… - Proceedings of the CHI …, 2024 - dl.acm.org
Controlling smart homes via vendor-specific apps on smartphones is cumbersome.
Augmented Reality (AR) offers a promising alternative by enabling direct interactions with …

Physical Side-Channel Attacks against Intermittent Devices

MO Ozmen, H Farrukh, ZB Celik - Proceedings on Privacy …, 2024 - petsymposium.org
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …

Connecting the Dots: Tracing Data Endpoints in IoT Devices

M Jakaria, DY Huang, A Das - Proceedings on Privacy …, 2024 - petsymposium.org
Smart home devices are constantly exchanging data with a variety of remote endpoints. This
data encompasses diverse information, from device operation and status to sensitive user …

Privacy-preserving pseudonyms for LoRaWAN

S Pélissier, J Aalmoes, AK Mishra, M Cunche… - Proceedings of the 17th …, 2024 - dl.acm.org
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata
exposure, particularly concerning the exploitation of stable device identifiers. For the first …

Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side

R Xie, J Cao, Y Zhu, Y Zhang, Y He… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
As the mainstream encrypted protocols adopt TCP protocol to ensure lossless data
transmissions, the privacy of encrypted TCP traffic becomes a significant focus for …

POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?

A Agrawal, RR Maiti - Proceedings of the 19th ACM Asia Conference on …, 2024 - dl.acm.org
IoT device provisioning is the process of setting up headless IoT devices with their
companion mobile apps. IoT vendors and manufacturers have the flexibility of different …

Smart Home Privacy: A Scoping Review

A Ahmed, V Ungureanu… - … of the 10th …, 2024 - salford-repository.worktribe.com
Privacy concerns in smart home technologies have surged as their adoption becomes
ubiquitous. This scoping review paper undertakes an exhaustive examination of the current …