Conveners
Technologies for Future Internet
- Rodica Siminiuc (Technical University of Moldova)
In 1984, Ken Thompson presented “Reflections on trusting trust” as part of his Turing Award lecture, demonstrating a theoretical attack, where a backdoored compiler would inject malicious code into compiled programs as well as propagate the backdoor to future versions of itself during self-compilation. The lecture demonstrated one of the darkest scenarios for supply-chain attacks, although its...
In this work, we investigate the influence of video bitrate on the inference accuracy of YOLO models for human detection from unmanned aerial vehicles (UAVs). The study targets detection across both infrared (IR) and visible light spectrums, evaluating the model's robustness under varying compression levels. We explore bitrates ranging from 1 to 20 Mbps to assess the trade-off between...
The rise of academic dishonesty through exam
cheating has created more advanced and complex plagiarism
detection systems. These systems are proprietary; they come
with financial, hardware, privacy, and cloud requirements that
can’t be covered by all educational institutions. An open-source
real-time video plagiarism detection system focused on suspicious
gaze direction and cheating...
In the current educational and professional landscape, one’s academic achievements are paramount to career advancement and opportunities. The key to successfully navigating these scenarios is the ability to provide easily verifiable proof of qualifications. The educational system faces significant challenges regarding the issuance and management of certifications. The process is relying on...
After the age of 60, most people begin to experience a decline in their cognitive skills. Eldie is a platform dedicated to slowing down mental deterioration among seniors. Studies show the effectiveness of games in training the brain in multiple aspects, such as: memory, attention and problem solving skills. By combining the scientifically-researched games with analysis of daily activities,...
The Elliptic Curve Digital Signature Algorithm (ECDSA) is pivotal for securing digital information across various applications. This paper investigates ECDSA's security by focusing on two generic attack methodologies: brute-force and Baby-Step Giant-Step (BSGS). We evaluate their theoretical effectiveness and practical implications by analyzing existing research and known vulnerabilities. Our...
The push for healthcare digitalization is growing, with increasing demands for security, data processing and streamlined applications. In the broader context, the technology can not only be used in a clinical setting, but also in emergency medicine – specifically the emergency vehicle fleet management. The main contribution of the work is to provide a reliable, secure and intelligent platform...