Sorry, you need to enable JavaScript to visit this website.

Information Forensics and Security

Trust-Aware Privacy Evaluation in Online Social Networks


Abstract—While personal data privacy is threatened by online
social networks, researchers are seeking for privacy protection
tools and methods to assist online social network providers
and users. In this paper, we aim to address this problem by
investigating how to quantitatively evaluate the privacy risk, as
a function of people’s awareness of privacy risks as well as
whether their friends can be trusted to protect their personal
data. We present a trust-aware privacy evaluation framework,

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

ICC2014_Yongbo.pdf

(398 downloads)

Keywords

Subscribe

[1] , "Trust-Aware Privacy Evaluation in Online Social Networks", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/101. Accessed: May. 27, 2018.
@article{101-14,
url = {http://sigport.org/101},
author = { },
publisher = {IEEE SigPort},
title = {Trust-Aware Privacy Evaluation in Online Social Networks},
year = {2014} }
TY - EJOUR
T1 - Trust-Aware Privacy Evaluation in Online Social Networks
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/101
ER -
. (2014). Trust-Aware Privacy Evaluation in Online Social Networks. IEEE SigPort. http://sigport.org/101
, 2014. Trust-Aware Privacy Evaluation in Online Social Networks. Available at: http://sigport.org/101.
. (2014). "Trust-Aware Privacy Evaluation in Online Social Networks." Web.
1. . Trust-Aware Privacy Evaluation in Online Social Networks [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/101

Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video


This paper presents a study of the video compression effect on source camera identification based on the Photo-Response Non-Uniformity (PRNU). Specifically, the reliability of different types of frames in a compressed video is first investigated, which shows quantitatively that I-frames are more reliable than P-frames for PRNU estimation. Motivated by this observation, a new mechanism for estimating the reference PRNU and two mechanisms for estimating the test-video PRNU are proposed to achieve higher accuracy with fewer frames used.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

ChuangSuWu2011_ICIP_CameraIdentification.pdf

(413 downloads)

Keywords

Subscribe

[1] , "Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/40. Accessed: May. 27, 2018.
@article{40-14,
url = {http://sigport.org/40},
author = { },
publisher = {IEEE SigPort},
title = {Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video},
year = {2014} }
TY - EJOUR
T1 - Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/40
ER -
. (2014). Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video. IEEE SigPort. http://sigport.org/40
, 2014. Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video. Available at: http://sigport.org/40.
. (2014). "Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video." Web.
1. . Exploring Compression Effects for Improved Source Camera Identification Using Strongly Compressed Video [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/40

Security and Applications of Digital Trust and Reputation (Thesis)


Yuhong Liu (University of Rhode Island), “Security and Applications of Digital Trust and Reputation” (2012), Advisor: Prof. Yan Lindsay Sun

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

1. Yuhong Thesis_part 2.pdf

(328 downloads)

Keywords

Subscribe

[1] , "Security and Applications of Digital Trust and Reputation (Thesis)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/19. Accessed: May. 27, 2018.
@article{19-14,
url = {http://sigport.org/19},
author = { },
publisher = {IEEE SigPort},
title = {Security and Applications of Digital Trust and Reputation (Thesis)},
year = {2014} }
TY - EJOUR
T1 - Security and Applications of Digital Trust and Reputation (Thesis)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/19
ER -
. (2014). Security and Applications of Digital Trust and Reputation (Thesis). IEEE SigPort. http://sigport.org/19
, 2014. Security and Applications of Digital Trust and Reputation (Thesis). Available at: http://sigport.org/19.
. (2014). "Security and Applications of Digital Trust and Reputation (Thesis)." Web.
1. . Security and Applications of Digital Trust and Reputation (Thesis) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/19

Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)


Cyber Competition has been recognized as an efficient way to facilitate research and education in cyber security Cyber Competition has been recognized as an efficient way to facilitate research and education in cyber security field [1]–[3]. We have discovered that the participants (i.e. players) in cyber competitions can cheat in order to gain a higher rank or collect more prizes. In this work, we use data collected from the CANT competition to analyze such cheating behaviors and propose to build a competition social network to detect cheating behaviors in cyber competitions.

3.pdf

PDF icon 3.pdf (518 downloads)

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

3.pdf

(518 downloads)

Keywords

Subscribe

[1] , "Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/18. Accessed: May. 27, 2018.
@article{18-14,
url = {http://sigport.org/18},
author = { },
publisher = {IEEE SigPort},
title = {Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)},
year = {2014} }
TY - EJOUR
T1 - Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/18
ER -
. (2014). Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft). IEEE SigPort. http://sigport.org/18
, 2014. Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft). Available at: http://sigport.org/18.
. (2014). "Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft)." Web.
1. . Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network (Poster, Draft) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/18

CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation)


We offer algorithms and visualization techniques for cyber trust in a Smart Grid system. Cyber trust is evaluated in terms of a mathematical model consisting of availability, detection and false alarm trust values, as well as a model of predictability. We develop a prototype Cyber Situational Awareness Visualization (CyberSAVe) tool to visualize cyber trust. We provide Operational Decision Aids (ODAs) displayed in context with a SCADA management information. We define cyber trust metrics, which are calculated and displayed in real-time in the Metric Assessment System (MAS) of CyberSAVe.

out.pdf

PDF icon out.pdf (455 downloads)

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

out.pdf

(455 downloads)

Keywords

Subscribe

[1] , "CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/15. Accessed: May. 27, 2018.
@article{15-14,
url = {http://sigport.org/15},
author = { },
publisher = {IEEE SigPort},
title = {CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation)},
year = {2014} }
TY - EJOUR
T1 - CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/15
ER -
. (2014). CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation). IEEE SigPort. http://sigport.org/15
, 2014. CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation). Available at: http://sigport.org/15.
. (2014). "CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation)." Web.
1. . CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems (Demo, Presentation) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/15

Integrated Security Analysis on Cascading Failure in Complex Networks (Poster)


The security issue of complex networks has drawn significant concerns recently. While pure topological analyzes from a network security perspective provide some effective techniques, their inability to characterize the physical principles requires a more comprehensive model to approximate failure behavior of a complex network in reality. In this paper, based on an extended topological metric, we proposed an approach to examine the vulnerability of a specific type of complex network, i.e., the power system, against cascading failure threats.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

Jun_URI_SecSymp12_Extended Betweenness.pdf

(404 downloads)

Keywords

Subscribe

[1] , "Integrated Security Analysis on Cascading Failure in Complex Networks (Poster)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/10. Accessed: May. 27, 2018.
@article{10-14,
url = {http://sigport.org/10},
author = { },
publisher = {IEEE SigPort},
title = {Integrated Security Analysis on Cascading Failure in Complex Networks (Poster)},
year = {2014} }
TY - EJOUR
T1 - Integrated Security Analysis on Cascading Failure in Complex Networks (Poster)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/10
ER -
. (2014). Integrated Security Analysis on Cascading Failure in Complex Networks (Poster). IEEE SigPort. http://sigport.org/10
, 2014. Integrated Security Analysis on Cascading Failure in Complex Networks (Poster). Available at: http://sigport.org/10.
. (2014). "Integrated Security Analysis on Cascading Failure in Complex Networks (Poster)." Web.
1. . Integrated Security Analysis on Cascading Failure in Complex Networks (Poster) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/10

Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)


Security issues in complex systems such as power grid, communication network, Internet, among others have attracted wide attention from academic, government and industry. In this paper, we investigate the vulnerabilities of power grid under a topology-based network model in the context of cascading failures caused by physical attacks against substations and transmission lines. In particular, we develop attack strategies from the attackers' points of view, aiming to cause severe damage to the network efficiency, as a way to revealing the vulnerability of the system.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

LDV_AttackStrategy_Poster.pdf

(388 downloads)

LDV_AttackStrategy_Poster.pdf

(232 downloads)

Keywords

Subscribe

[1] , "Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/9. Accessed: May. 27, 2018.
@article{9-14,
url = {http://sigport.org/9},
author = { },
publisher = {IEEE SigPort},
title = {Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)},
year = {2014} }
TY - EJOUR
T1 - Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/9
ER -
. (2014). Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster). IEEE SigPort. http://sigport.org/9
, 2014. Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster). Available at: http://sigport.org/9.
. (2014). "Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster)." Web.
1. . Load Distribution Vector Based Attack Strategies against Power Grid Systems (Poster) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/9

Security of Online Reputation Systems: Evolution of Attacks and Defenses


The Internet has created vast opportunities to interact with strangers. The interactions can be fun, informative, and even profitable [1]. However, there is also risk involved. Will an eBay seller ship the product in time? Is the advice from a self-proclaimed expert on Epinion.com trustworthy? Does a product from Amazon.com have high quality as described?

The full version of the paper is available at http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6153140&tag=1

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

4. Security of Online Reputation.pdf

(388 downloads)

Keywords

Subscribe

[1] , "Security of Online Reputation Systems: Evolution of Attacks and Defenses", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/7. Accessed: May. 27, 2018.
@article{7-14,
url = {http://sigport.org/7},
author = { },
publisher = {IEEE SigPort},
title = {Security of Online Reputation Systems: Evolution of Attacks and Defenses},
year = {2014} }
TY - EJOUR
T1 - Security of Online Reputation Systems: Evolution of Attacks and Defenses
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/7
ER -
. (2014). Security of Online Reputation Systems: Evolution of Attacks and Defenses. IEEE SigPort. http://sigport.org/7
, 2014. Security of Online Reputation Systems: Evolution of Attacks and Defenses. Available at: http://sigport.org/7.
. (2014). "Security of Online Reputation Systems: Evolution of Attacks and Defenses." Web.
1. . Security of Online Reputation Systems: Evolution of Attacks and Defenses [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/7

The Sequential Attack against Power Grid Networks (Slides)


The vulnerability analysis is vital for safely running power grids. The simultaneous attack, which applies multiple failures simultaneously, does not consider the time domain in applying failures, and is limited to find unknown vulnerabilities of power grid networks. In this paper, we discover a new attack scenario, called the sequential attack, in which the failures of multiple network components (i.e., links/nodes) occur at different time. The sequence of such failures can be carefully arranged by attackers in order to maximize attack performances.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

SequentialAttack_Slides_ICC.pdf

(439 downloads)

Keywords

Subscribe

[1] , "The Sequential Attack against Power Grid Networks (Slides)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/5. Accessed: May. 27, 2018.
@article{5-14,
url = {http://sigport.org/5},
author = { },
publisher = {IEEE SigPort},
title = {The Sequential Attack against Power Grid Networks (Slides)},
year = {2014} }
TY - EJOUR
T1 - The Sequential Attack against Power Grid Networks (Slides)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/5
ER -
. (2014). The Sequential Attack against Power Grid Networks (Slides). IEEE SigPort. http://sigport.org/5
, 2014. The Sequential Attack against Power Grid Networks (Slides). Available at: http://sigport.org/5.
. (2014). "The Sequential Attack against Power Grid Networks (Slides)." Web.
1. . The Sequential Attack against Power Grid Networks (Slides) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/5

Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)


In the study of power grid security, the cascading failure analysis in multi-contingency scenarios has been a challenge due to its topological complexity and computational cost. Both network analyses and load ranking methods have their own limitations. In this paper, based on self-organizing map (SOM), we propose an integrated approach combining spatial feature (distance)-based clustering with electrical characteristics (load) to assess the vulnerability and cascading effect of multiple component sets in the power grid.

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:

Document Files

Jun_URI_SecSymp13_SOM_Time.pdf

(385 downloads)

Keywords

Subscribe

[1] , "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)", IEEE SigPort, 2014. [Online]. Available: http://sigport.org/3. Accessed: May. 27, 2018.
@article{3-14,
url = {http://sigport.org/3},
author = { },
publisher = {IEEE SigPort},
title = {Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)},
year = {2014} }
TY - EJOUR
T1 - Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)
AU -
PY - 2014
PB - IEEE SigPort
UR - http://sigport.org/3
ER -
. (2014). Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster). IEEE SigPort. http://sigport.org/3
, 2014. Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster). Available at: http://sigport.org/3.
. (2014). "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster)." Web.
1. . Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map (Poster) [Internet]. IEEE SigPort; 2014. Available from : http://sigport.org/3

Pages