Export Citations
Issue Downloads
IUAC: Inaudible Universal Adversarial Attacks Against Smart Speakers
Intelligent voice systems are widely utilized to control smart home applications, which raises significant privacy and security concerns. Recent studies have revealed their vulnerability to adversarial attacks, replay attacks, and so on. However, these ...
Achieving Panoramic View Coverage in Visual Mobile Crowd-Sensing Networks for Emergency Monitoring Applications
Visual Mobile Crowd-Sensing (VMCS) collects photos by leveraging camera embedded in mobile users’ phones. There are two important issues in VMCS: determining whether photos collected by mobile users meet the requirements or not and designing an ...
Single- and Multi-Depot Optimization for UAV-Based IoT Data Collection in Neighborhoods
In this paper, we investigate the problem of deploying the minimum number of Unmanned Aerial Vehicles (UAVs) and determining their flying tours to collect data from all Internet of Things (IoT) sensors. We study this problem in a scenario with ...
Structure-Adaptive and Power-Aware Broadcast Scheduling for Multihop Wireless-Powered IoT Networks
Wireless Power Transfer technology, which can charge IoT devices over the air, has become a promising technology for IoT networks. In wireless-powered IoT networks, broadcasting is a fundamental networking service for disseminating messages to the whole ...
Fedeval: Defending Against Lazybone Attack via Multi-dimension Evaluation in Federated Learning
Federated learning (FL) has become a prominent paradigm for collaborative model training while ensuring data privacy. However, in resource-constrained environments, such as the Internet of Things (IoT), FL faces a distinct challenge from Lazybone ...
Listen to Your Face: A Face Authentication Scheme Based on Acoustic Signals
Face authentication (FA) schemes are widely adopted in smart homes nowadays. However, existing FA systems for smart appliances are commonly camera-based and hence experience performance degradation in poor illumination conditions. Mainstream FA systems ...
TimbreSense: Timbre Abnormality Detection for Bel Canto with Smart Devices
With the rise of mobile devices, bel canto practitioners increasingly utilize smart devices as auxiliary tools for improving their singing skills. However, they frequently encounter timbre abnormalities during practice, which, if left unaddressed, can ...
Wireless Charging Scheduling for Long-term Utility Optimization
Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have investigated the problem of long-term ...
Artificial Intelligence of Things: A Survey
- Shakhrul Iman Siam,
- Hyunho Ahn,
- Li Liu,
- Samiul Alam,
- Hui Shen,
- Zhichao Cao,
- Ness Shroff,
- Bhaskar Krishnamachari,
- Mani Srivastava,
- Mi Zhang
The integration of the Internet of Things (IoT) and modern Artificial Intelligence (AI) has given rise to a new paradigm known as the Artificial Intelligence of Things (AIoT). In this survey, we provide a systematic and comprehensive review of AIoT ...
A Survey on WiFi-based Human Identification: Scenarios, Challenges, and Current Solutions
With the evolution of wireless sensing technology, WiFi-based human identification has demonstrated tremendous potential in human-computer interaction and home security. However, most existing research operates in controlled environments, overlooking the ...