ABSTRACT: In today’s era, there is a great deal added to real-time remote sensing Big Data than it seems at…
ABSTRACT: This paper introduces a data structure for k-NN search, the Rank Cover Tree (RCT), whose pruning tests rely solely…
ABSTRACT: The Distributed m-healthcare cloud computing system considerably facilitates secure and efficient patient treatment for medical consultation by sharing personal…
ABSTRACT: Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown rapidly…
ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture the…
ABSTRACT: With data storage and sharing services in the cloud, users can easily modify and share data as a group.…
In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our…
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of…
This paper proposes a lossless, a reversible, and a combined data hiding schemes for ciphertext images encrypted by public key…
In this paper, we consider a joint beamforming, power, and channel allocation in a multi-user and multi-channel underlay multiple input…
In many popular applications like peer-to-peer systems, large amounts of data are distributed among multiple sources. Analysis of this data…
Top-k query is an important operation to return a set of interesting points in a potentially huge data space. It…
Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…
Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up…
Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition…