Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 21, Issue 1January 2025Current Issue
Editor:
  • Wen Hu
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1550-4859
EISSN:1550-4867
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Skip Table Of Content Section
research-article
IUAC: Inaudible Universal Adversarial Attacks Against Smart Speakers
Article No.: 1, Pages 1–20https://doi.org/10.1145/3698238

Intelligent voice systems are widely utilized to control smart home applications, which raises significant privacy and security concerns. Recent studies have revealed their vulnerability to adversarial attacks, replay attacks, and so on. However, these ...

research-article
Achieving Panoramic View Coverage in Visual Mobile Crowd-Sensing Networks for Emergency Monitoring Applications
Article No.: 2, Pages 1–27https://doi.org/10.1145/3701730

Visual Mobile Crowd-Sensing (VMCS) collects photos by leveraging camera embedded in mobile users’ phones. There are two important issues in VMCS: determining whether photos collected by mobile users meet the requirements or not and designing an ...

research-article
Single- and Multi-Depot Optimization for UAV-Based IoT Data Collection in Neighborhoods
Article No.: 3, Pages 1–30https://doi.org/10.1145/3704810

In this paper, we investigate the problem of deploying the minimum number of Unmanned Aerial Vehicles (UAVs) and determining their flying tours to collect data from all Internet of Things (IoT) sensors. We study this problem in a scenario with ...

research-article
Structure-Adaptive and Power-Aware Broadcast Scheduling for Multihop Wireless-Powered IoT Networks
Article No.: 4, Pages 1–32https://doi.org/10.1145/3707461

Wireless Power Transfer technology, which can charge IoT devices over the air, has become a promising technology for IoT networks. In wireless-powered IoT networks, broadcasting is a fundamental networking service for disseminating messages to the whole ...

research-article
Fedeval: Defending Against Lazybone Attack via Multi-dimension Evaluation in Federated Learning
Article No.: 5, Pages 1–23https://doi.org/10.1145/3703631

Federated learning (FL) has become a prominent paradigm for collaborative model training while ensuring data privacy. However, in resource-constrained environments, such as the Internet of Things (IoT), FL faces a distinct challenge from Lazybone ...

research-article
Listen to Your Face: A Face Authentication Scheme Based on Acoustic Signals
Article No.: 6, Pages 1–23https://doi.org/10.1145/3708324

Face authentication (FA) schemes are widely adopted in smart homes nowadays. However, existing FA systems for smart appliances are commonly camera-based and hence experience performance degradation in poor illumination conditions. Mainstream FA systems ...

research-article
TimbreSense: Timbre Abnormality Detection for Bel Canto with Smart Devices
Article No.: 7, Pages 1–20https://doi.org/10.1145/3708545

With the rise of mobile devices, bel canto practitioners increasingly utilize smart devices as auxiliary tools for improving their singing skills. However, they frequently encounter timbre abnormalities during practice, which, if left unaddressed, can ...

research-article
Wireless Charging Scheduling for Long-term Utility Optimization
Article No.: 8, Pages 1–31https://doi.org/10.1145/3708990

Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have investigated the problem of long-term ...

survey
Open Access
Artificial Intelligence of Things: A Survey
Article No.: 9, Pages 1–75https://doi.org/10.1145/3690639

The integration of the Internet of Things (IoT) and modern Artificial Intelligence (AI) has given rise to a new paradigm known as the Artificial Intelligence of Things (AIoT). In this survey, we provide a systematic and comprehensive review of AIoT ...

tutorial
A Survey on WiFi-based Human Identification: Scenarios, Challenges, and Current Solutions
Article No.: 10, Pages 1–32https://doi.org/10.1145/3708323

With the evolution of wireless sensing technology, WiFi-based human identification has demonstrated tremendous potential in human-computer interaction and home security. However, most existing research operates in controlled environments, overlooking the ...

Subjects

Comments