Authorship Attribution for Social Media Forensics
- Anderson Rocha,
- Walter J. Scheirer,
- Christopher W. Forstall,
- Thiago Cavalcante,
- Antonio Theophilo,
- Bingyu Shen,
- Ariadne R. B. Carvalho,
- Efstathios Stamatatos
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi hotspots, and distributed networks like Tor has drastically complicated the task of identifying users of social media during forensic investigations. In some cases, the ...
Effective and Efficient Global Context Verification for Image Copy Detection
To detect illegal copies of copyrighted images, recent copy detection methods mostly rely on the bag-of-visual-words (BOW) model, in which local features are quantized into visual words for image matching. However, both the limited discriminability of ...
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques
The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy against reverse engineering is hardware obfuscation. In this paper, we investigate physical obfuscation techniques, which perform ...
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage ...
Flicker Forensics for Camcorder Piracy
Camcorder piracy refers to the process of using a camcorder to record a screen that displays copyrighted content. In contrast to the previous works that aimed at detecting the occurrence of camcorder piracy, this paper conducts an in-depth study of the ...
Distributed Segment-Based Anomaly Detection With Kullback–Leibler Divergence in Wireless Sensor Networks
In this paper, we focus on detecting a special type of anomaly in wireless sensor network (WSN), which appears simultaneously in a collection of neighboring nodes and lasts for a significant period of time. Existing point-based techniques, in this ...
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
The goal of this paper is to propose an accurate method for estimating quantization steps from an image that has been previously JPEG-compressed and stored in lossless format. The method is based on the combination of the quantization effect and the ...
Cognitive-Biometric Recognition From Language Usage: A Feasibility Study
We propose a novel cognitive biometrics modality based on written language-usage of an individual. This is a feasibility study using the Internet-scale blogs, with tens of thousands of authors to create a cognitive fingerprint for an individual. ...
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
Twitter trends, a timely updated set of top terms in Twitter, have the ability to affect the public agenda of the community and have attracted much attention. Unfortunately, in the wrong hands, Twitter trends can also be abused to mislead people. In ...
Optimal Generation of Iris Codes for Iris Recognition
The calculation of binary iris codes from feature values (e.g., the result of Gabor transform) is a key step in iris recognition systems. Traditional binarization method based on the sign of feature values has achieved very promising performance. ...
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning
Privacy-preserving distributed machine learning becomes increasingly important due to the recent rapid growth of data. This paper focuses on a class of regularized empirical risk minimization machine learning problems, and develops two methods to ...
Identity Deception Prevention Using Common Contribution Network Data
Identity deception in social media applications has negatively impacted online communities and it is likely to increase as the social media user population grows. The ease of generating new accounts on social media has exacerbated the issue. Many ...
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks
Recent studies on sequential attack schemes revealed new smart grid vulnerability that can be exploited by attacks on the network topology. Traditional power systems contingency analysis needs to be expanded to handle the complex risk of cyber-physical ...
Probabilistically Robust SWIPT for Secrecy MISOME Systems
This paper considers simultaneous wireless information and power transfer in a multiple-input single-output downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver, multiple multi-antenna eavesdroppers (Eves),...
Secret-Key Generation Using Compound Sources and One-Way Public Communication
In the classical secret-key generation model, common randomness is generated by two terminals based on the observation of correlated components of a common source, while keeping it secret from a non-legitimate observer. It is assumed that the statistics ...