Using ResNet transfer deep learning methods in person identification according to physical actions

Ş Kiliç, I Askerzade, Y Kaya - IEEE Access, 2020 - ieeexplore.ieee.org
Today, biometric technologies are one of the areas of information security which are
increasingly used in all areas required by human security. The subjects such as person …

Detection and mitigation of localized attacks in a widely deployed P2P network

T Cholez, I Chrisment, O Festor, G Doyen - Peer-to-Peer Networking and …, 2013 - Springer
Several large scale P2P networks operating on the Internet are based on a Distributed Hash
Table. These networks offer valuable services, but they all suffer from a critical issue …

Mitigating eclipse attacks in peer-to-peer networks

D Germanus, S Roos, T Strufe… - 2014 IEEE conference on …, 2014 - ieeexplore.ieee.org
Peer-to-Peer (P2P) protocols usage is proliferating for a variety of applications including
time-and safety-critical ones. While the distributed design of P2P provides inherent fault …

Capturing connectivity graphs of a large-scale p2p overlay network

H Salah, T Strufe - 2013 IEEE 33rd International Conference …, 2013 - ieeexplore.ieee.org
Measuring accurate graph snapshots of peer-to-peer (P2P) overlay networks is essential to
understand these systems. Furthermore, the captured graph snapshots can be used, among …

Bitmon: A tool for automated monitoring of the bittorrent dht

K Junemann, P Andelfinger, J Dinger… - 2010 IEEE Tenth …, 2010 - ieeexplore.ieee.org
The distributed hash table (DHT) formed by BitTorrent has become very popular as a basis
for various kinds of services. Services based on this DHT often assume certain …

Making eclipse attacks computationally infeasible in large-scale DHTs

R Zhang, J Zhang, Y Chen, N Qin… - 30th IEEE …, 2011 - ieeexplore.ieee.org
The security aspect of Distributed Hash Tables (DHT-s), the principal model for structured
P2P networks, has received considerable attention from research community, and the …

Toward an accurate snapshot of dht networks

J Yu, P Xiao, Z Li, Y Zhou - IEEE communications letters, 2010 - ieeexplore.ieee.org
DHTs have been widely used in designing various applications, especially P2P file sharing
systems. It is crucial but difficult to get an accurate snapshot of a DHT network, since such …

Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT

J Yu, L Lu, P Xiao, Z Li, Y Zhou - Computer Communications, 2011 - Elsevier
Lookup is crucial to locate peers and resources in structured P2P networks. In this paper, we
measure and analyze the traffic characteristics of lookup in Kad, which is a widely used DHT …

A first approach to detect suspicious peers in the kad p2p network

T Cholez, C Henard, I Chrisment… - 2011 Conference on …, 2011 - ieeexplore.ieee.org
Several large scale P2P networks are based on a distributed hash table. They all suffer from
a critical issue allowing malicious nodes to be inserted in specific places on the DHT for …

[引用][C] 基于BP 神经网络的维吾尔联机手写字符识别

任宏宇, 袁保社, 田园 - 微电子学与计算机, 2010 - 《 微电子学与计算机》 编辑部