In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our…
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of…
This paper proposes a lossless, a reversible, and a combined data hiding schemes for ciphertext images encrypted by public key…
In this paper, we consider a joint beamforming, power, and channel allocation in a multi-user and multi-channel underlay multiple input…
In many popular applications like peer-to-peer systems, large amounts of data are distributed among multiple sources. Analysis of this data…
Top-k query is an important operation to return a set of interesting points in a potentially huge data space. It…
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…
Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up…
Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition…
This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful…
Session management in distributed Internet services is traditionally based on username and password, explicit logouts and mechanisms of user session…
To implement the system to solve the joint problem of packet scheduling and self-localization in an underwater acoustic sensor network…
We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency,…
Broadcast is an important operation in wireless ad hoc networks where control information is usually propagated as broadcasts for the…
Segmentation of human bodies in images is a challenging task that can facilitate numerous applications, like scene understanding and activity…