Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
                                            Some full text articles may not yet be available without a charge during the embargo (administrative interval).
                                        
                                        
                                        
                                            
                                                
                                             What is a DOI Number?
                                        
                                    
                                
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
- 
            Free, publicly-accessible full text available July 14, 2026
- 
            An increasing number of location-based service providers are taking the advantage of cloud computing by outsourcing their Point of Interest (POI) datasets and query services to third-party cloud service providers (CSPs), which answer various location-based queries from users on their behalf. A critical security challenge is to ensure the integrity and completeness of any query result returned by CSPs. As an important type of queries, a location-based skyline query (LBSQ) asks for the POIs not dominated by any other POI with respect to a given query position, i.e., no POI is both closer to the query position and more preferable with respect to a given numeric attribute. While there have been several recent attempts on authenticating outsourced LBSQ, none of them support the shortest path distance that is preferable to the Euclidian distance in metropolitan areas. In this paper, we tackle this open challenge by introducing AuthSkySP, a novel scheme for authenticating outsourced LBSQ under the shortest path distance, which allows the user to verify the integrity and completeness of any LBSQ result returned by an untrusted CSP. We confirm the effectiveness and efficiency of our proposed solution via detailed experimental studies using both real and synthetic datasets.more » « less
- 
            IoT devices fundamentally lack built-in security mechanisms to protect themselves from security attacks. Existing works on improving IoT security mostly focus on detecting anomalous behaviors of IoT devices. However, these existing anomaly detection schemes may trigger an overwhelmingly large number of false alerts, rendering them unusable in detecting compromised IoT devices. In this paper we develop an effective and efficient framework, named CUMAD, to detect compromised IoT devices. Instead of directly relying on individual anomalous events, CUMAD aims to accumulate sufficient evidence in detecting compromised IoT devices, by integrating an autoencoder-based anomaly detection subsystem with a sequential probability ratio test (SPRT)-based sequential hypothesis testing subsystem. CUMAD can effectively reduce the number of false alerts in detecting compromised IoT devices, and moreover, it can detect compromised IoT devices quickly. Our evaluation studies based on the public-domain N-BaIoT dataset show that CUMAD can on average reduce the false positive rate from about 3.57% using only the autoencoder-based anomaly detection scheme to about 0.5%; in addition, CUMAD can detect compromised IoT devices quickly, with less than 5 observations on average.more » « less
- 
            He, J.; Palpanas, T.; Wang, W. (Ed.)IoT devices fundamentally lack built-in security mechanisms to protect themselves from security attacks. Existing works on improving IoT security mostly focus on detecting anomalous behaviors of IoT devices. However, these existing anomaly detection schemes may trigger an overwhelmingly large number of false alerts, rendering them unusable in detecting compromised IoT devices. In this paper we develop an effective and efficient framework, named CUMAD, to detect compromised IoT devices. Instead of directly relying on individual anomalous events, CUMAD aims to accumulate sufficient evidence in detecting compromised IoT devices, by integrating an autoencoder-based anomaly detection subsystem with a sequential probability ratio test (SPRT)-based sequential hypothesis testing subsystem. CUMAD can effectively reduce the number of false alerts in detecting compromised IoT devices, and moreover, it can detect compromised IoT devices quickly. Our evaluation studies based on the public-domain N-BaIoT dataset show that CUMAD can on average reduce the false positive rate from about 3.57% using only the autoencoder-based anomaly detection scheme to about 0.5%; in addition, CUMAD can detect compromised IoT devices quickly, with less than 5 observations on average.more » « less
- 
            We present a comprehensive photometric and spectroscopic study of the Type IIP supernova (SN) 2018is. TheVband luminosity and the expansion velocity at 50 days post-explosion are −15.1 ± 0.2 mag (corrected for AV= 1.34 mag) and 1400 km s−1, classifying it as a low-luminosity SN II. The recombination phase in theVband is shorter, lasting around 110 days, and exhibits a steeper decline (1.0 mag per 100 days) compared to most other low-luminosity SNe II. Additionally, the optical and near-infrared spectra display hydrogen emission lines that are strikingly narrow, even for this class. The Fe IIand Sc IIline velocities are at the lower end of the typical range for low-luminosity SNe II. Semi-analytical modelling of the bolometric light curve suggests an ejecta mass of ∼8 M⊙, corresponding to a pre-supernova mass of ∼9.5 M⊙, and an explosion energy of ∼0.40 × 1051erg. Hydrodynamical modelling further indicates that the progenitor had a zero-age main sequence mass of 9 M⊙, coupled with a low explosion energy of 0.19 × 1051erg. The nebular spectrum reveals weak [O I]λλ6300,6364 lines, consistent with a moderate-mass progenitor, while features typical of Fe core-collapse events, such as He I, [C I], and Fe I, are indiscernible. However, the redder colours and low ratio of Ni to Fe abundance do not support an electron-capture scenario either. As a low-luminosity SN II with an atypically steep decline during the photospheric phase and remarkably narrow emission lines, SN 2018is contributes to the diversity observed within this population.more » « lessFree, publicly-accessible full text available February 1, 2026
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
 
                                     Full Text Available
                                                Full Text Available