Sorry, you need to enable JavaScript to visit this website.

Information Forensics and Security

Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT

Paper Details

Authors:
Zeki Erkin
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Erkin.pdf

(242 downloads)

Keywords

Subscribe

[1] Zeki Erkin, "Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/579. Accessed: Oct. 19, 2017.
@article{579-16,
url = {http://sigport.org/579},
author = {Zeki Erkin },
publisher = {IEEE SigPort},
title = {Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT},
year = {2016} }
TY - EJOUR
T1 - Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT
AU - Zeki Erkin
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/579
ER -
Zeki Erkin. (2016). Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT. IEEE SigPort. http://sigport.org/579
Zeki Erkin, 2016. Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT. Available at: http://sigport.org/579.
Zeki Erkin. (2016). "Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT." Web.
1. Zeki Erkin. Private Data Aggregation with Groups for Smart Grids in a Dynamic Setting using CRT [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/579

A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence

Paper Details

Authors:
Gwenael Doerr
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:

Document Files

WIFS2015_Doerr.pdf

(250 downloads)

Keywords

Subscribe

[1] Gwenael Doerr, "A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/578. Accessed: Oct. 19, 2017.
@article{578-16,
url = {http://sigport.org/578},
author = {Gwenael Doerr },
publisher = {IEEE SigPort},
title = {A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence},
year = {2016} }
TY - EJOUR
T1 - A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence
AU - Gwenael Doerr
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/578
ER -
Gwenael Doerr. (2016). A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence. IEEE SigPort. http://sigport.org/578
Gwenael Doerr, 2016. A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence. Available at: http://sigport.org/578.
Gwenael Doerr. (2016). "A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence." Web.
1. Gwenael Doerr. A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/578

Forensics of High-Quality JPEG Images with Color Subsampling

Paper Details

Authors:
Matthias Carnein
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Carnein.pdf

(218 downloads)

Keywords

Subscribe

[1] Matthias Carnein, "Forensics of High-Quality JPEG Images with Color Subsampling", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/577. Accessed: Oct. 19, 2017.
@article{577-16,
url = {http://sigport.org/577},
author = {Matthias Carnein },
publisher = {IEEE SigPort},
title = {Forensics of High-Quality JPEG Images with Color Subsampling},
year = {2016} }
TY - EJOUR
T1 - Forensics of High-Quality JPEG Images with Color Subsampling
AU - Matthias Carnein
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/577
ER -
Matthias Carnein. (2016). Forensics of High-Quality JPEG Images with Color Subsampling. IEEE SigPort. http://sigport.org/577
Matthias Carnein, 2016. Forensics of High-Quality JPEG Images with Color Subsampling. Available at: http://sigport.org/577.
Matthias Carnein. (2016). "Forensics of High-Quality JPEG Images with Color Subsampling." Web.
1. Matthias Carnein. Forensics of High-Quality JPEG Images with Color Subsampling [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/577

Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays

Paper Details

Authors:
Binh Nguyen
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_B_Nguyen.pdf

(240 downloads)

Keywords

Subscribe

[1] Binh Nguyen, "Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/576. Accessed: Oct. 19, 2017.
@article{576-16,
url = {http://sigport.org/576},
author = {Binh Nguyen },
publisher = {IEEE SigPort},
title = {Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays},
year = {2016} }
TY - EJOUR
T1 - Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays
AU - Binh Nguyen
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/576
ER -
Binh Nguyen. (2016). Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays. IEEE SigPort. http://sigport.org/576
Binh Nguyen, 2016. Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays. Available at: http://sigport.org/576.
Binh Nguyen. (2016). "Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays." Web.
1. Binh Nguyen. Single Relay Selection for Secure Communication in a Cooperative System with Multiple Full-Duplex DnF Relays [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/576

Towards Resilient Cyber-Physical Control Systems

Paper Details

Authors:
Saman Zounouz
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

Towards Resilient.pdf

(288 downloads)

Keywords

Additional Categories

Subscribe

[1] Saman Zounouz, "Towards Resilient Cyber-Physical Control Systems", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/557. Accessed: Oct. 19, 2017.
@article{557-15,
url = {http://sigport.org/557},
author = {Saman Zounouz },
publisher = {IEEE SigPort},
title = {Towards Resilient Cyber-Physical Control Systems},
year = {2015} }
TY - EJOUR
T1 - Towards Resilient Cyber-Physical Control Systems
AU - Saman Zounouz
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/557
ER -
Saman Zounouz. (2015). Towards Resilient Cyber-Physical Control Systems. IEEE SigPort. http://sigport.org/557
Saman Zounouz, 2015. Towards Resilient Cyber-Physical Control Systems. Available at: http://sigport.org/557.
Saman Zounouz. (2015). "Towards Resilient Cyber-Physical Control Systems." Web.
1. Saman Zounouz. Towards Resilient Cyber-Physical Control Systems [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/557

Article Summaries - SPM Special Issue on Signal Processing for Art Investigation


Expanded version of the Guest Editorial
for Special Issue on Signal Processing for Art Investigation
(IEEE Signal Processing Magazine, July 2015)

Include short summaries for each of the 11 articles in the special issue.

Paper Details

Authors:
Patrice Abry, Andrew. G. Klein, William A. Sethares, C. Richard Johnson, Jr.
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

ArtForensics_Editorial1507Long.pdf

(474 downloads)

Keywords

Subscribe

[1] Patrice Abry, Andrew. G. Klein, William A. Sethares, C. Richard Johnson, Jr., "Article Summaries - SPM Special Issue on Signal Processing for Art Investigation", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/189. Accessed: Oct. 19, 2017.
@article{189-15,
url = {http://sigport.org/189},
author = {Patrice Abry; Andrew. G. Klein; William A. Sethares; C. Richard Johnson; Jr. },
publisher = {IEEE SigPort},
title = {Article Summaries - SPM Special Issue on Signal Processing for Art Investigation},
year = {2015} }
TY - EJOUR
T1 - Article Summaries - SPM Special Issue on Signal Processing for Art Investigation
AU - Patrice Abry; Andrew. G. Klein; William A. Sethares; C. Richard Johnson; Jr.
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/189
ER -
Patrice Abry, Andrew. G. Klein, William A. Sethares, C. Richard Johnson, Jr.. (2015). Article Summaries - SPM Special Issue on Signal Processing for Art Investigation. IEEE SigPort. http://sigport.org/189
Patrice Abry, Andrew. G. Klein, William A. Sethares, C. Richard Johnson, Jr., 2015. Article Summaries - SPM Special Issue on Signal Processing for Art Investigation. Available at: http://sigport.org/189.
Patrice Abry, Andrew. G. Klein, William A. Sethares, C. Richard Johnson, Jr.. (2015). "Article Summaries - SPM Special Issue on Signal Processing for Art Investigation." Web.
1. Patrice Abry, Andrew. G. Klein, William A. Sethares, C. Richard Johnson, Jr.. Article Summaries - SPM Special Issue on Signal Processing for Art Investigation [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/189

Trust-Aware Privacy Evaluation in Online Social Networks


Abstract—While personal data privacy is threatened by online
social networks, researchers are seeking for privacy protection
tools and methods to assist online social network providers
and users. In this paper, we aim to address this problem by
investigating how to quantitatively evaluate the privacy risk, as
a function of people’s awareness of privacy risks as well as
whether their friends can be trusted to protect their personal
data. We present a trust-aware privacy evaluation framework,

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

ICC2014_Yongbo.pdf

(318 downloads)

Keywords

Subscribe

[1] , "Trust-Aware Privacy Evaluation in Online Social Networks", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/101. Accessed: Oct. 19, 2017.
@article{101-14,
url = {http://sigport.org/101},
author = { },
publisher = {IEEE SigPort},
title = {Trust-Aware Privacy Evaluation in Online Social Networks},
year = {2014} }
TY - EJOUR
T1 - Trust-Aware Privacy Evaluation in Online Social Networks
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/101
ER -
. (2014). Trust-Aware Privacy Evaluation in Online Social Networks. IEEE SigPort. http://sigport.org/101
, 2014. Trust-Aware Privacy Evaluation in Online Social Networks. Available at: http://sigport.org/101.
. (2014). "Trust-Aware Privacy Evaluation in Online Social Networks." Web.
1. . Trust-Aware Privacy Evaluation in Online Social Networks [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/101

Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video


This paper presents a study of the video compression effect on source camera identification based on the Photo-Response Non-Uniformity (PRNU). Specifically, the reliability of different types of frames in a compressed video is first investigated, which shows quantitatively that I-frames are more reliable than P-frames for PRNU estimation. Motivated by this observation, a new mechanism for estimating the reference PRNU and two mechanisms for estimating the test-video PRNU are proposed to achieve higher accuracy with fewer frames used.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

ChuangSuWu2011_ICIP_CameraIdentification.pdf

(337 downloads)

Keywords

Subscribe

[1] , "Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/40. Accessed: Oct. 19, 2017.
@article{40-14,
url = {http://sigport.org/40},
author = { },
publisher = {IEEE SigPort},
title = {Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video},
year = {2014} }
TY - EJOUR
T1 - Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/40
ER -
. (2014). Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video. IEEE SigPort. http://sigport.org/40
, 2014. Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video. Available at: http://sigport.org/40.
. (2014). "Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video." Web.
1. . Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/40

Security and Applications of Digital Trust and Reputation (Thesis)


Yuhong Liu (University of Rhode Island), “Security and Applications of Digital Trust and Reputation” (2012), Advisor: Prof. Yan Lindsay Sun

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

1. Yuhong Thesis_part 2.pdf

(268 downloads)

Keywords

Subscribe

[1] , "Security and Applications of Digital Trust and Reputation (Thesis)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/19. Accessed: Oct. 19, 2017.
@article{19-14,
url = {http://sigport.org/19},
author = { },
publisher = {IEEE SigPort},
title = {Security and Applications of Digital Trust and Reputation (Thesis)},
year = {2014} }
TY - EJOUR
T1 - Security and Applications of Digital Trust and Reputation (Thesis)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/19
ER -
. (2014). Security and Applications of Digital Trust and Reputation (Thesis). IEEE SigPort. http://sigport.org/19
, 2014. Security and Applications of Digital Trust and Reputation (Thesis). Available at: http://sigport.org/19.
. (2014). "Security and Applications of Digital Trust and Reputation (Thesis)." Web.
1. . Security and Applications of Digital Trust and Reputation (Thesis) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/19

Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)


Cyber Competition has been recognized as an efficient way to facilitate research and education in cyber security Cyber Competition has been recognized as an efficient way to facilitate research and education in cyber security field [1]–[3]. We have discovered that the participants (i.e. players) in cyber competitions can cheat in order to gain a higher rank or collect more prizes. In this work, we use data collected from the CANT competition to analyze such cheating behaviors and propose to build a competition social network to detect cheating behaviors in cyber competitions.

3.pdf

PDF icon 3.pdf (364 downloads)

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

3.pdf

(364 downloads)

Keywords

Subscribe

[1] , "Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/18. Accessed: Oct. 19, 2017.
@article{18-14,
url = {http://sigport.org/18},
author = { },
publisher = {IEEE SigPort},
title = {Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)},
year = {2014} }
TY - EJOUR
T1 - Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/18
ER -
. (2014). Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft). IEEE SigPort. http://sigport.org/18
, 2014. Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft). Available at: http://sigport.org/18.
. (2014). "Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)." Web.
1. . Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/18

Pages