Privacy-preserving content-oriented wireless communication in internet-of-things

K Gai, KKR Choo, M Qiu, L Zhu - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
With mobile devices (eg, Android and iOS devices) and other resource constrained Internet-
connected devices (eg, sensors) becoming the norm in our digitalized society, the capacity …

Fedpacket: A federated learning approach to mobile packet classification

E Bakopoulou, B Tillman… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In order to improve mobile data transparency, various approaches have been proposed to
inspect network traffic generated by mobile devices and detect exposure of personally …

Antmonitor: Network traffic monitoring and real-time prevention of privacy leaks in mobile devices

A Shuba, A Le, M Gjoka, J Varmarken… - Proceedings of the …, 2015 - dl.acm.org
Mobile devices play an essential role in the Internet today, and there is an increasing
interest in using them as a vantage point for network measurement from the edge. At the …

The secure mobile teen: Looking at the secret world of children

M Marchiori - 2017 IEEE 13th International Conference on …, 2017 - ieeexplore.ieee.org
Security and privacy of mobile users is a theme of primary importance, given the widespread
and growing use of connected smartphones, the great amount of personal data that can …

ROPAS: Cross-layer cognitive architecture for mobile UWB networks

C Ghosh, B Xie, DP Agrawal - Journal of Computer Science and …, 2008 - Springer
The allocation of bandwidth to unlicensed users, without significantly increasing the
interference on the existing licensed users, is a challenge for Ultra Wideband (UWB) …

A communication supportable generic model for mobile vpn on android os

F Chunle, H Qinggang, W Bailing… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
Mobile Virtual Private Network (MVPN) technology is already widely used for secure
connections between two endpoints. However, most existing MVPNs are designed as an …

Discovering True Kids Mobile Behavior

M Marchiori - 2018 International Symposium on Networks …, 2018 - ieeexplore.ieee.org
The mobile world has freed individuals from many physical constraint, but has also added
degrees of freedom that might amplify privacy and security problems, especially for a critical …

Evading Tainting Analysis of DroidBox by Using Image Difference Between Screen Capture Images

DB Jeong, MH Lee - IT Convergence and Security 2017: Volume 2, 2018 - Springer
Protecting personal and business data stored in smart phones from information leaking
applications becomes very important. To detect such apps as early as possible, the data …