This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing...
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attack...
This open access book introduces how to manage important tasks in industrial wireless networks.Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the “early” resources can be utilized for other, more urgent...
This open access book introduces how to manage important tasks in industrial wireless networks.Important tasks must be completed on time and with guar...
This open access book introduces how to manage important tasks in industrial wireless networks.Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the “early” resources can be utilized for other, more urgent...
This open access book introduces how to manage important tasks in industrial wireless networks.Important tasks must be completed on time and with guar...
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform....
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application...
This book provides a comprehensive overview of wireless technologies for industrial network systems. The authors first describe the concept of industrial network systems and their application to industrial automation. They then go on to cover the role of sensing and control in industrial network systems, and the challenge of sensing and control in the industrial wireless environment. Then, the existing techniques for resource efficiency information transmission are introduced and studied. Afterward, the authors introduce sensing and control-oriented transmission for industrial network...
This book provides a comprehensive overview of wireless technologies for industrial network systems. The authors first describe the concept of industr...
This book provides an overview of the Internet of Things Network and Machine Learning and introduces Internet of Things architecture. It designs a new intelligent IoT network architecture and introduces different machine learning approaches to investigate solutions. It discusses how machine learning can help network awareness and achieve network intelligent control. It also dicusses the emerging network techniques that can enable the development of intelligent IoT networks.This book applies several intelligent approaches for efficient resource scheduling in networks. It discusses Mobile Edge...
This book provides an overview of the Internet of Things Network and Machine Learning and introduces Internet of Things architecture. It designs a new...
Relying on unmanned autonomous flight control programs, unmanned aerial vehicles (UAVs) equipped with radio communication devices have been actively developed around the world. Given their low cost, flexible maneuvering and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including environmental monitoring, emergency communications, express distribution, even military surveillance and attacks, for example. Given that a range of standards and protocols used in terrestrial wireless networks are not applicable to UAV networks, and that some...
Relying on unmanned autonomous flight control programs, unmanned aerial vehicles (UAVs) equipped with radio communication devices have been actively d...
With the rapid proliferation of information and communications technology, industrial automation has undergone a sweeping transformation toward intelligent manufacturing. Wireless communication is widely considered to be one of the key technologies enabling intelligent manufacturing. On one hand, deterministic communication with high reliability and low latency is typically required in industrial automation applications. On the other hand, wireless communication in industrial settings is hindered by strictly limited communication resources and many other factors which mainly derive from the...
With the rapid proliferation of information and communications technology, industrial automation has undergone a sweeping transformation toward intell...