https://sites.temple.edu/socialengineering/
What is the Summer Social Engineering Competition (SEC) all about? The SEC allows students to compete in a purely social engineering experience that is grounded in the social sciences. The competition offers a timely and unique platform for students to learn about social engineering in a hands-on, engaging, and ethical manner. The competition has a different theme each year to demonstrate the ...
https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fVLJTsMwEL3zFZHvibN1s9pKpRWiUoGqCRy4INeZtJYcO3hh%2BXucFEQ50Ot43jqeGtqIliycPcodvDowNvhohDSkf5ghpyVR1HBDJG3AEMtIsbjbkDSKSauVVUwJdAa5jKDGgLZcSRSsVzP0MslGKd3nozBO9lmYj7MkHFf7OBxOIM7pOBlOWIaCJ9DGY2bIU3igMQ7W0lgqrR%2FF6SCMJ2GalsmApAOSx88oWPkcXFLbo47WtoZgXPMmstC0AiKoHOZVi32CmgvAncEU76DiGpjFRfGAgsWP16WSxjWgC9BvnMHjbvPLeeJzEfd%2BtGPWaYiYarBQBy5xVwgKtt81XXNZcXm43ND%2BtGTIbVluw%2B1DUaL5tOMhfW4975QvCHer6RSfI6anG997rfVqqwRnn8GN0g21%2F1tJoqSf8Cqs%2B1XipGmB8ZpD5bsRQr0vNVALM%2BT1AeH5SfTvX5pffQE%3D
Login with your AccessNet Username and Password:Username
https://sites.temple.edu/yangyang/files/2024/10/Yang-CV-2024-Chinese.pdf
期刊客座主编 专刊“Application of Geospatial Big Data in Tourism Research” for Applied Spatial Analysis and Policy (SSCI 索引刊物) 专刊“Technological Revolution, Digital Economy and Tourism Economics” for Tourism Economics (SSCI 索引刊物) 专刊合集“Tourism and Coronavirus” for Annals of Tourism Research (SSCI 索引刊物) 专刊“Spatial Economics and Tourism ...
https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fVJbT8IwFH73Vyx937oNplszSBBiJEEhDH3wxdTuDJp07ezFy7%2B3GxrxQV5Pz3c9LQ1tRUdmzh7kFl4dGBt8tEIaMjxMkNOSKGq4IZK2YIhlpJrdrUgaxaTTyiqmBDqBnEdQY0BbriQKlosJek6KcQH5FYT5iGbh%2BDKnYZHFeZhmUBdZVjOW5yh4BG08ZoI8hQca42ApjaXS%2BlGcZmFchKN4l2QkHZEkf0LBwufgktoBdbC2MwTjhreRhbYTEEHtMK877BM0XADuDaZ4CzXXwCyuqjUKZj9e50oa14KuQL9xBg%2Fb1S%2Fnkc9F3PvRjlmnIWKqxULtucR9ISjYfNd0zWXN5f58Qy%2FHJUNud7tNuFlXOzQtex4y5NbTXvmMcL%2BalvgUUR5vfO%2B1louNEpx9BjdKt9T%2BbyWJkmHC67AZVomTpgPGGw6170YI9T7XQC1MkNcHhKdH0b9%2FaXrxBQ%3D%3D
Login with your AccessNet Username and Password:Username
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Paper%206750%20Camera%20Ready%20Version.pdf
FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of Computer ...
https://cis.temple.edu/~yu/research/Icanhearyou-INFOCOM2023.pdf
Abstract—Recent literature advances motion sensors mounted on smartphones and AR/VR headsets to speech eavesdropping due to their sensitivity to subtle vibrations. The popularity of mo-tion sensors in earphones has fueled a rise in their sampling rate, which enables various enhanced features. This paper investigates a new threat of eavesdropping via motion sensors of earphones by developing ...
https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf
A few recent studies take social relationships into consideration for providing DT services [4], [5], [26]. Chukhno et al. [4] focused on the optimal social-aware deployment of DTs in MEC, and provided an eficient solution to minimize the communication delay (i) between ob-jects and their DTs; and (ii) among DTs of friend IoT devices.
https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...
https://cis.temple.edu/~jiewu/research/publications/Publications_2025.html
2025 Publications (Jie Wu) Journal Publications W. Jiang, S. Li, X. Li, K. Li, and J. Wu, " Uncovering Recommendation Serendipity with Objective Data-driven Factor Investigation," accepted to appear in ACM Transactions on Information Systems (TOIS). Z. Yao, L. Lin, F. Xia, and J. Wu, " Load Balancing Heterogeneous Multipath Authentication Routing Selection for Endogenous Software-Defined ...