Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure.
Bin YuanMaogen YangZheng XuQunjinming ChenZhanxiang SongZhen LiDeqing ZouHai JinPublished in: IEEE Trans. Dependable Secur. Comput. (2024)
Keyphrases
- data sets
- training data
- synthetic data
- data collection
- data quality
- database
- raw data
- data acquisition
- image data
- data points
- data structure
- data analysis
- data sources
- management system
- knowledge discovery
- data mining techniques
- data processing
- end users
- access control
- computer systems
- high dimensional data
- sensor networks
- sensor data
- information sharing
- wireless sensor networks
- original data