Make your home safe: Time-aware unsupervised user behavior anomaly detection in smart homes via loss-guided mask

J Xiao, Z Xu, Q Zou, Q Li, D Zhao, D Fang, R Li… - Proceedings of the 30th …, 2024 - dl.acm.org
Smart homes, powered by the Internet of Things, offer great convenience but also pose
security concerns due to abnormal behaviors, such as improper operations of users and …

I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning

J Xiao, Q Zou, Q Li, D Zhao, K Li, Z Weng, R Li… - Proceedings of the …, 2023 - dl.acm.org
With the booming of smart home market, intelligent Internet of Things (IoT) devices have
been increasingly involved in home life. To improve the user experience of smart homes …

A Survey of Wireless Sensing Security from a Role-Based View: Victim, Weapon, and Shield

R Geng, J Wang, Y Yuan, F Zhan, T Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Wireless sensing technology has become prevalent in healthcare, smart homes, and
autonomous driving due to its non-contact operation, penetration capabilities, and cost …

[引用][C] Smart Home Privacy: A Scoping Review

A Ahmed, V Ungureanu… - … of the 10th …, 2024 - salford-repository.worktribe.com
Privacy concerns in smart home technologies have surged as their adoption becomes
ubiquitous. This scoping review paper undertakes an exhaustive examination of the current …

Mind your indices! Index hijacking attacks on collaborative unpooling autoencoder systems

K Lee, J Yun, J Jin, J Han, JG Ko - Internet of Things, 2025 - Elsevier
Autoencoder model architectures are attractive approaches for implementing intelligent
mobile/IoT sensing applications. This is attributed to their capability of offering efficient …

Themis: A passive-active hybrid framework with in-network intelligence for lightweight failure localization

J Xiao, Q Li, D Zhao, X Zuo, W Tang, Y Jiang - Computer Networks, 2024 - Elsevier
The fast and efficient failure detection and localization is essential for stable network
transmission. Unfortunately, existing schemes suffer from a few drawbacks such as …

PoirIoT: Fingerprinting IoT Devices at Tbps Scale

C Kuzniar, M Neves, V Gurevich… - IEEE/ACM Transactions …, 2024 - ieeexplore.ieee.org
The massive growth in popularity of household IoT devices has brought new capabilities to
our lives while also bringing new challenges to network providers. In particular, large …

Characterizing the Security Facets of IoT Device Setup

H Yang, C Kuzniar, C Jiang, I Nikolaidis… - Proceedings of the 2024 …, 2024 - dl.acm.org
In this work, we characterize the potential information leakage from IoT platforms during their
setup phase. Setup involves an IoT device, its''app'', and a cloud-based service. We assume …

Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask

J Xiao, Z Xu, Q Zou, Q Li, D Zhao, D Fang, R Li… - arXiv preprint arXiv …, 2024 - arxiv.org
Smart homes, powered by the Internet of Things, offer great convenience but also pose
security concerns due to abnormal behaviors, such as improper operations of users and …

SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT

S Halder, A Ghosal, T Newe… - 2023 IEEE Conference on …, 2023 - ieeexplore.ieee.org
A challenging problem in Long Range (LoRa) communications enabled Industrial Internet of
Things (IIoT) is the detection of rogue devices, which attempt to impersonate real devices by …