Learning k for kNN Classification

S Zhang, X Li, M Zong, X Zhu, D Cheng - ACM Transactions on …, 2017 - dl.acm.org
The K Nearest Neighbor (kNN) method has widely been used in the applications of data
mining and machine learning due to its simple implementation and distinguished …

Jammer localization in multi-hop wireless network: A comprehensive survey

X Wei, Q Wang, T Wang, J Fan - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Various security threats and corresponding countermeasures has been a major concern of
the maintainers of multi-hop wireless networks (MHWNs) in recent years. This is …

Traffic jam probability estimation based on blockchain and deep neural networks

V Hassija, V Gupta, S Garg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The exponential surge in the number of vehicles on the road has aggravated the traffic
congestion problem across the globe. Several attempts have been made over the years to …

United against the enemy: Anti-jamming based on cross-layer cooperation in wireless networks

L Zhang, Z Guan, T Melodia - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
Denial-of-service attacks launched by malicious jammers can pose significant threats to
infrastructure-less wireless networks without a centralized controller. While significant recent …

Deceptive routing games

Q Zhu, A Clark, R Poovendran… - 2012 IEEE 51st IEEE …, 2012 - ieeexplore.ieee.org
The use of a shared medium leaves wireless networks, including mobile ad hoc and sensor
networks, vulnerable to jamming attacks. In this paper, we introduce a jamming defense …

A trigger identification service for defending reactive jammers in WSN

Y Xuan, Y Shen, NP Nguyen… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
During the last decade, Reactive Jamming Attack has emerged as a great security threat to
wireless sensor networks, due to its mass destruction to legitimate sensor communications …

Failure-tolerant and low-latency telecommand in mega-constellations: The redundant multi-path routing

G Zeng, Y Zhan, X Pan - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, in order to provide worldwide broadband Internet access services, many
mega-constellation projects have been proposed. Traditional ground-based and space …

Jamming-resilient multipath routing

H Mustafa, X Zhang, Z Liu, W Xu… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Jamming attacks are especially harmful to the reliability of wireless communication, as they
can effectively disrupt communication between any node pairs. Existing jamming defenses …

Deceptive routing in relay networks

A Clark, Q Zhu, R Poovendran, T Başar - Decision and Game Theory for …, 2012 - Springer
Physical-layer and MAC-layer defense mechanisms against jamming attacks are often
inherently reactive to experienced delay and loss of throughput after being attacked. In this …

Networked TT&C for mega satellite constellations: A security perspective

Y Zhan, G Zeng, X Pan - China Communications, 2022 - ieeexplore.ieee.org
Satellite constellations are promising in enabling the global Internet. However, the
increasing constellation size also complicates tracking, telemetry and command (TT&C) …