Analyzing deep learning for time-series data through adversarial lens in mobile and IoT applications

T Belkhouja, JR Doppa - IEEE Transactions on Computer-Aided …, 2020 - ieeexplore.ieee.org
Predictive analytics using the time-series data collected from various types of sensors is a
fundamental task that enables diverse mobile and Internet of Things applications including …

High rate robust codes with low implementation complexity

H Rabii, Y Neumeier, O Keren - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Robust codes C (n, k) q are nonlinear q-ary codes of dimension k and length n≤ 2k. Robust
codes can detect any error with nonzero probability; hence, they can effectively detect fault …

Evaluation of IoT self-healing mechanisms using fault-injection in message brokers

M Duarte, JP Dias, HS Ferreira, A Restivo - Proceedings of the 4th …, 2022 - dl.acm.org
The widespread use of Internet-of-Things (IoT) across different application domains leads to
an increased concern regarding their dependability, especially as the number of potentially …

MQTT Chaos Engineering for Self-Healing IoT Systems

MP Duarte - 2021 - search.proquest.com
Abstract The Internet-of-Things (IoT) has shown substantial growth throughout the years,
especially due to advancements in connectivity, computing power, and device affordability …

New Directions in Robust Time-Series Machine Learning: Theory, Algorithms, and Applications

T Belkhouja - 2024 - search.proquest.com
Despite the rapid progress in research on the robustness of deep neural networks (DNNs)
for images and text, there is little principled work for the time-series domain. Since timeseries …

Compact sub-Vt optical sensor for the detection of fault injection in hardware security applications

D Zooker, A Fish, O Keren… - 2019 10th IFIP …, 2019 - ieeexplore.ieee.org
Optical fault injection attacks can be used to induce errors into cryptographic circuits during
sensitive calculations in order to reveal the secret information inside the system. In high-end …

Protecting Multi-Level Memories From Jamming Using Q-ary Expurgated Robust Codes

Y Neumeier, O Keren - IEEE Transactions on Dependable and …, 2021 - ieeexplore.ieee.org
Robust codes can effectively detect jamming in q-ary memories for q= 2 t. When q is not a
power of two, a binary information word has to be converted into a q-ary word prior to the …