Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Authorship Attribution for Social Media Forensics

The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi hotspots, and distributed networks like Tor has drastically complicated the task of identifying users of social media during forensic investigations. In some cases, the ...

research-article
A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite

The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution ...

research-article
Effective and Efficient Global Context Verification for Image Copy Detection

To detect illegal copies of copyrighted images, recent copy detection methods mostly rely on the bag-of-visual-words (BOW) model, in which local features are quantized into visual words for image matching. However, both the limited discriminability of ...

research-article
Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device and Logic-Level Techniques

The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy against reverse engineering is hardware obfuscation. In this paper, we investigate physical obfuscation techniques, which perform ...

research-article
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage ...

research-article
Flicker Forensics for Camcorder Piracy

Camcorder piracy refers to the process of using a camcorder to record a screen that displays copyrighted content. In contrast to the previous works that aimed at detecting the occurrence of camcorder piracy, this paper conducts an in-depth study of the ...

research-article
Distributed Segment-Based Anomaly Detection With Kullback–Leibler Divergence in Wireless Sensor Networks

In this paper, we focus on detecting a special type of anomaly in wireless sensor network (WSN), which appears simultaneously in a collection of neighboring nodes and lasts for a significant period of time. Existing point-based techniques, in this ...

research-article
An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration

Over the Internet, digital signature has been an indispensable approach to securing e-commerce and other online transactions requiring authentication. Concerning the computing costs of signature generation and verification, it has become a more and more ...

research-article
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics

The goal of this paper is to propose an accurate method for estimating quantization steps from an image that has been previously JPEG-compressed and stored in lossless format. The method is based on the combination of the quantization effect and the ...

research-article
Cognitive-Biometric Recognition From Language Usage: A Feasibility Study

We propose a novel cognitive biometrics modality based on written language-usage of an individual. This is a feasibility study using the Internet-scale blogs, with tens of thousands of authors to create a cognitive fingerprint for an individual. ...

research-article
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

Twitter trends, a timely updated set of top terms in Twitter, have the ability to affect the public agenda of the community and have attracted much attention. Unfortunately, in the wrong hands, Twitter trends can also be abused to mislead people. In ...

research-article
Optimal Generation of Iris Codes for Iris Recognition

The calculation of binary iris codes from feature values (e.g., the result of Gabor transform) is a key step in iris recognition systems. Traditional binarization method based on the sign of feature values has achieved very promising performance. ...

research-article
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning

Privacy-preserving distributed machine learning becomes increasingly important due to the recent rapid growth of data. This paper focuses on a class of regularized empirical risk minimization machine learning problems, and develops two methods to ...

research-article
Identity Deception Prevention Using Common Contribution Network Data

Identity deception in social media applications has negatively impacted online communities and it is likely to increase as the social media user population grows. The ease of generating new accounts on social media has exacerbated the issue. Many ...

research-article
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks

Recent studies on sequential attack schemes revealed new smart grid vulnerability that can be exploited by attacks on the network topology. Traditional power systems contingency analysis needs to be expanded to handle the complex risk of cyber-physical ...

research-article
Probabilistically Robust SWIPT for Secrecy MISOME Systems

This paper considers simultaneous wireless information and power transfer in a multiple-input single-output downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver, multiple multi-antenna eavesdroppers (Eves),...

research-article
Secret-Key Generation Using Compound Sources and One-Way Public Communication

In the classical secret-key generation model, common randomness is generated by two terminals based on the observation of correlated components of a common source, while keeping it secret from a non-legitimate observer. It is assumed that the statistics ...

research-article
Bargaining Over the Fair Trade-Off Between Secrecy and Throughput in OFDM Communications

The problem of ensuring the secrecy of a communication while simultaneously maintaining sufficient throughput is a fundamental challenge facing secret communication. One of the challenges for such problems is that the optimal solution for one of ...

Comments