Sorry, you need to enable JavaScript to visit this website.

Expanded version of the Guest Editorial
for Special Issue on Signal Processing for Art Investigation
(IEEE Signal Processing Magazine, July 2015)

Include short summaries for each of the 11 articles in the special issue.

Categories:
14 Views

Abstract—While personal data privacy is threatened by online
social networks, researchers are seeking for privacy protection
tools and methods to assist online social network providers
and users. In this paper, we aim to address this problem by
investigating how to quantitatively evaluate the privacy risk, as
a function of people’s awareness of privacy risks as well as
whether their friends can be trusted to protect their personal
data. We present a trust-aware privacy evaluation framework,

Categories:
17 Views

This paper presents a study of the video compression effect on source camera identification based on the Photo-Response Non-Uniformity (PRNU). Specifically, the reliability of different types of frames in a compressed video is first investigated, which shows quantitatively that I-frames are more reliable than P-frames for PRNU estimation. Motivated by this observation, a new mechanism for estimating the reference PRNU and two mechanisms for estimating the test-video PRNU are proposed to achieve higher accuracy with fewer frames used.

Categories:
21 Views

Yuhong Liu (University of Rhode Island), “Security and Applications of Digital Trust and Reputation” (2012), Advisor: Prof. Yan Lindsay Sun

Categories:
38 Views

Cyber Competition has been recognized as an efficient way to facilitate research and education in cyber security Cyber Competition has been recognized as an efficient way to facilitate research and education in cyber security field [1]–[3]. We have discovered that the participants (i.e. players) in cyber competitions can cheat in order to gain a higher rank or collect more prizes. In this work, we use data collected from the CANT competition to analyze such cheating behaviors and propose to build a competition social network to detect cheating behaviors in cyber competitions.

3.pdf

PDF icon 3.pdf (633)
Categories:
21 Views

We offer algorithms and visualization techniques for cyber trust in a Smart Grid system. Cyber trust is evaluated in terms of a mathematical model consisting of availability, detection and false alarm trust values, as well as a model of predictability. We develop a prototype Cyber Situational Awareness Visualization (CyberSAVe) tool to visualize cyber trust. We provide Operational Decision Aids (ODAs) displayed in context with a SCADA management information. We define cyber trust metrics, which are calculated and displayed in real-time in the Metric Assessment System (MAS) of CyberSAVe.

Categories:
119 Views

The security issue of complex networks has drawn significant concerns recently. While pure topological analyzes from a network security perspective provide some effective techniques, their inability to characterize the physical principles requires a more comprehensive model to approximate failure behavior of a complex network in reality. In this paper, based on an extended topological metric, we proposed an approach to examine the vulnerability of a specific type of complex network, i.e., the power system, against cascading failure threats.

Categories:
113 Views

Security issues in complex systems such as power grid, communication network, Internet, among others have attracted wide attention from academic, government and industry. In this paper, we investigate the vulnerabilities of power grid under a topology-based network model in the context of cascading failures caused by physical attacks against substations and transmission lines. In particular, we develop attack strategies from the attackers' points of view, aiming to cause severe damage to the network efficiency, as a way to revealing the vulnerability of the system.

Categories:
9 Views

Pages