Essays about: "noder"
Showing result 36 - 40 of 243 essays containing the word noder.
-
36. 6G RF Waveform with AI for Human Presence Detection in Indoor Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Wireless communication equipment is widely available and the number of transmitters and receivers keeps increasing. In addition to communications, wireless nodes can be used for sensing. READ MORE
-
37. An unsupervised method for Graph Representation Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Internet services, such as online shopping and chat apps, have been spreading significantly in recent years, generating substantial amounts of data. These data are precious for machine learning and consist of connections between different entities, such as users and items. READ MORE
-
38. Privacy leaks from deep linear networks : Information leak via shared gradients in federated learning systems
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The field of Artificial Intelligence (AI) has always faced two major challenges. The first is that data is kept scattered and cannot be collected for more efficiently use. The second is that data privacy and security need to be continuously strengthened. READ MORE
-
39. Secure and Privacy-Preserving Decentralized Wi-Fi Aware Service Discovery Architecture
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In modern Mobile Ad hoc Networks (MANETs), service discovery is a major component for mobile devices to exchange data and find available services. However, service discovery architectures developed and adopted by the industry either are not appropriate for MANETs or cannot provide security and privacy protection to clients. READ MORE
-
40. BGPcredit : A Blockchain-based System for Securing BGP
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE