All Stories

  1. B2PATCH: Designing Adversarial Patches to Manipulate Bounding Box Perception in Vehicular Attacks
  2. Rethinking Prefix-Based Steganography for Enhanced Security and Efficiency
  3. SpotAttack: Covering Spots on Surface to Attack LiDAR-Based Autonomous Driving Systems
  4. A Dependable and Efficient Decentralized Trust Management System Based on Consortium Blockchain for Intelligent Transportation Systems
  5. A Decision Theoretic Framework for Message Prioritization via Machine Learning Algorithm in Vehicular Networks
  6. FL2DP: Privacy-Preserving Federated Learning Via Differential Privacy for Artificial IoT
  7. An Efficient and Privacy-Preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks
  8. Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes
  9. Semi-automatic ladderisation: improving code security through rewriting and dependent types
  10. An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks
  11. Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks
  12. A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
  13. Phantom walkabouts in wireless sensor networks
  14. Towards fake sources for source location privacy in wireless sensor networks with multiple sources
  15. Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks