Noise-based cyberattacks generating fake P300 waves in brain–computer interfaces (English)
Free access
- New search for: Martínez Beltrán, Enrique Tomás
- Further information on Martínez Beltrán, Enrique Tomás:
- https://orcid.org/0000-0002-5169-2815
- New search for: Quiles Pérez, Mario
- New search for: López Bernal, Sergio
- New search for: Huertas Celdrán, Alberto
- New search for: Martínez Pérez, Gregorio
- New search for: Martínez Beltrán, Enrique Tomás
- Further information on Martínez Beltrán, Enrique Tomás:
- https://orcid.org/0000-0002-5169-2815
- New search for: Quiles Pérez, Mario
- New search for: López Bernal, Sergio
- New search for: Huertas Celdrán, Alberto
- New search for: Martínez Pérez, Gregorio
In:
Cluster Computing
;
25
, 1
; 33-48
;
2021
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Noise-based cyberattacks generating fake P300 waves in brain–computer interfaces
-
Contributors:Martínez Beltrán, Enrique Tomás ( author ) / Quiles Pérez, Mario ( author ) / López Bernal, Sergio ( author ) / Huertas Celdrán, Alberto ( author ) / Martínez Pérez, Gregorio ( author )
-
Published in:Cluster Computing ; 25, 1 ; 33-48
-
Publisher:
- New search for: Springer US
- New search for: Springer Science + Business Media B.V
-
Place of publication:Dordrecht [u.a.]
-
Publication date:2021
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 54.32$jRechnerkommunikation / 54.50$jProgrammierung: Allgemeines / 54.25$jParallele Datenverarbeitung / 54.50 / 54.32 / 54.25
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.32$jRechnerkommunikation / 54.50$jProgrammierung: Allgemeines / 54.25$jParallele Datenverarbeitung / 54.50 Programmierung: Allgemeines / 54.32 Rechnerkommunikation / 54.25 Parallele Datenverarbeitung -
Source:
Table of contents – Volume 25, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An efficient scheduling algorithm using queuing system to minimize starvation of non-real-time secondary users in Cognitive Radio NetworkSuganthi, N. / Meenakshi, S. et al. | 2018
- 13
-
The optimal privacy strategy of cloud service based on evolutionary gameSun, Pan Jun et al. | 2020
- 33
-
Noise-based cyberattacks generating fake P300 waves in brain–computer interfacesMartínez Beltrán, Enrique Tomás / Quiles Pérez, Mario / López Bernal, Sergio / Huertas Celdrán, Alberto / Martínez Pérez, Gregorio et al. | 2021
- 49
-
A new traffic congestion prediction strategy (TCPS) based on edge computingKishk, Aya M. / Badawy, Mahmoud / Ali, Hesham A. / Saleh, Ahmed I. et al. | 2021
- 77
-
Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval systemMa, Wenkai / Hu, Jinchang / Wang, Yanyan / Wu, Yaohua et al. | 2021
- 91
-
Software architecture for IoT-based health-care systems with cloud/fog service modelHajvali, Masoumeh / Adabi, Sahar / Rezaee, Ali / Hosseinzadeh, Mehdi et al. | 2021
- 119
-
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS techniqueAsghari, Ali / Sohrabi, Mohammad Karim et al. | 2021
- 141
-
Multi-objective Task Scheduling in cloud-fog computing using goal programming approachNajafizadeh, Abbas / Salajegheh, Afshin / Rahmani, Amir Masoud / Sahafi, Amir et al. | 2021
- 167
-
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computingSaidi, Ahmed / Nouali, Omar / Amira, Abdelouahab et al. | 2021
- 187
-
An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environmentsNagar, Jaiprakash / Chaturvedi, Sanjay Kumar / Soh, Sieteng et al. | 2021
- 203
-
A two-stage virtual machine abnormal behavior-based anomaly detection mechanismZhang, Hancui / Zhou, Weida et al. | 2021
- 215
-
Hybrid fragmentation of medical images’ attributes for multidimensional indexingSafaei, Ali Asghar et al. | 2021
- 231
-
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective functionSharrab, Yousef O. / Alsmadi, Izzat / Sarhan, Nabil J. et al. | 2021
- 249
-
Task placement for crowd recognition in edge-cloud based urban intelligent video systemsZhang, Gaofeng / Xu, Benzhu / Liu, Ensheng / Xu, Liqiang / Zheng, Liping et al. | 2021
- 263
-
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart gridDarzi, Saleh / Akhbari, Bahareh / Khodaiemehr, Hassan et al. | 2021
- 279
-
Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disastersLoor, Fernando / Manriquez, Manuel / Gil-Costa, Veronica / Marin, Mauricio et al. | 2021
- 303
-
A fuzzy approach for optimal placement of IoT applications in fog-cloud computingTavousi, Farhad / Azizi, Sadoon / Ghaderzadeh, Abdulbaghi et al. | 2021
- 321
-
Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systemsFathalla, Ahmed / Li, Kenli / Salah, Ahmad et al. | 2021
- 337
-
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving propertyJi, Yanyan / Shao, Bilin / Chang, Jinyong / Bian, Genqing et al. | 2021
- 351
-
A new clustering-based routing method in the mobile internet of things using a krill herd algorithmSadrishojaei, Mahyar / Navimipour, Nima Jafari / Reshadi, Midia / Hosseinzadeh, Mehdi et al. | 2021
- 363
-
Privacy-preserving content-based image retrieval in edge environmentYan, Yuejing / Xu, Yanyan / Zhang, Yiran / Wang, Zhiheng / Rao, Zheheng et al. | 2021
- 383
-
An in-depth and systematic literature review on the blockchain-based approaches for cloud computingGong, Jianhu / Navimipour, Nima Jafari et al. | 2021
- 401
-
Replication management in peer-to-peer cloud storage systemsMajed, Ali / Raji, Fatemeh / Miri, Ali et al. | 2021
- 417
-
Minimizing delay in content-centric networks using heuristics-based in-network cachingKumar, Sumit / Tiwari, Rajeev / Kozlov, Sergei / Rodrigues, Joel J. P. C. et al. | 2021
- 433
-
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applicationsHan, KyungHyun / Lee, Wai-Kong / Hwang, Seong Oun et al. | 2021
- 451
-
Blockchain-assisted authentication and key agreement scheme for fog-based smart gridTomar, Ashish / Tripathi, Sachin et al. | 2021
- 469
-
Indoor objects detection system implementation using multi-graphic processing unitsAfif, Mouna / Ayachi, Riadh / Atri, Mohamed et al. | 2021
- 485
-
Efficient cloud service ranking based on uncertain user requirementsNejat, Mohammad Hossein / Motameni, Homayun / Vahdat-Nejad, Hamed / Barzegar, Behnam et al. | 2021
- 503
-
Evaluation of adversarial machine learning tools for securing AI systemsAsha, S. / Vinod, P. et al. | 2021
- 523
-
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN modelAlshmrany, Sami et al. | 2021
- 537
-
Blockchain-enabled real-time SLA monitoring for cloud-hosted servicesKhan, Kashif Mehboob / Arshad, Junaid / Iqbal, Waheed / Abdullah, Sidrah / Zaib, Hassan et al. | 2021
- 561
-
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systemsWang, Wu / Harrou, Fouzi / Bouyeddou, Benamar / Senouci, Sidi-Mohammed / Sun, Ying et al. | 2021
- 579
-
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and costBelgacem, Ali / Beghdad-Bey, Kadda et al. | 2021
- 597
-
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUsKim, Sejin / Kim, Yoonhee et al. | 2021
- 619
-
Cost-aware job scheduling for cloud instances using deep reinforcement learningCheng, Feng / Huang, Yifeng / Tanpure, Bhavana / Sawalani, Pawan / Cheng, Long / Liu, Cong et al. | 2021
- 633
-
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computingChoi, Seongbong / Lee, Hyung Tae et al. | 2021
- 647
-
A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN)Iqbal, Shahid Md. Asif / Hoque, Mohammed Moshiul et al. | 2021
- 675
-
Energy efficiency in cloud computing data center: a survey on hardware technologiesKatal, Avita / Dahiya, Susheela / Choudhury, Tanupriya et al. | 2021
- 707
-
A secure lossless recovery for medical images based on image encoding and data self-embeddingGao, Hang / Gao, Tiegang et al. | 2021
- 727
-
Research on sports training model based on intelligent data aggregation processing in internet of thingsDan, Juan / Zheng, Yanjun / Hu, Jianping et al. | 2021