Search Results - technology+classifications+%3e+3.+computer+science+%3e+cyber+security

3 Results Sort By:
Cellular User Localization System: SMS Side-Channel Timing Analysis Method and Apparatus
User localization through SMS serves as a low-cost, scalable alternative to conventional location tracking Background: User localization is traditionally achieved through GPS, network triangulation, or internet-assisted location sharing. GPS-based tracking depends on device permissions, while network-based methods require extensive infrastructure...
Published: 6/13/2025   |   Inventor(s): Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
Keywords(s): Cellular Networks, Communications, Cyber Security, Machine Learning, Mobile devices, Next-generation Mobile Networks, positioning systems
Category(s): Technology Classifications > 3. Computer Science > Network communications, Technology Classifications > 3. Computer Science > Cyber Security
Privacy-preserving range-free positioning of wireless devices
INV-23036 Background Collaborative positioning can be a useful approach in situations where a person needs to exchange information with nearby users. This can be particularly helpful when using a GNSS receiver in an urban area with limited satellite visibility or when indoors without the necessary technology to determine their location. Collaborative...
Published: 10/15/2024   |   Inventor(s): Guillermo Hernandez, Gerald LaMountain, Pau Closas
Keywords(s): Crowdsourcing, cryptographic engineering, fusion, GNSS, Navigation, positioning systems, Privacy
Category(s): Technology Classifications > 3. Computer Science, Technology Classifications > 3. Computer Science > Cyber Security, Technology Classifications > 3. Computer Science > IoT, Technology Classifications > 3. Computer Science > Network communications
Segmentation Guided Image-to-Image Translation with Adversarial Networks
INV-18073 Background Image-to-image translation is receiving increased attention due to an increasing need to compare and classify images, often mapping images in one domain to another. Existing methods mainly solve this task via a deep generative model and focus on exploring the relationship between different domains. These methods neglect to...
Published: 9/10/2024   |   Inventor(s): Yun Fu, Songyao Jiang
Keywords(s):  
Category(s): Technology Classifications > 3. Computer Science > Software, Technology Classifications > 3. Computer Science > Cyber Security, Technology Classifications > 3. Computer Science > Imaging