NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

7 years ago

In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our…

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

7 years ago

In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our…

Malware Propagation in Large-Scale Networks

7 years ago

Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of…

Malware Propagation in Large-Scale Networks

7 years ago

Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of…

LOSSLESS AND REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES WITH PUBLIC KEY CRYPTOGRAPHY

7 years ago

This paper proposes a lossless, a reversible, and a combined data hiding schemes for ciphertext images encrypted by public key…

Joint Beamforming, Power and Channel Allocation in Multi-User and Multi-Channel Underlay MISO Cognitive Radio Networks

7 years ago

In this paper, we consider a joint beamforming, power, and channel allocation in a multi-user and multi-channel underlay multiple input…

GDCLUSTER A GENERAL DECENTRALIZED CLUSTERING ALGORITHM

7 years ago

In many popular applications like peer-to-peer systems, large amounts of data are distributed among multiple sources. Analysis of this data…

GDCLUSTER A GENERAL DECENTRALIZED CLUSTERING ALGORITHM

7 years ago

In many popular applications like peer-to-peer systems, large amounts of data are distributed among multiple sources. Analysis of this data…

Efficient Top-k Retrieval on Massive Data

7 years ago

Top-k query is an important operation to return a set of interesting points in a potentially huge data space. It…

Effective Key Management in Dynamic Wireless Sensor Networks

7 years ago

Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient…

Discovery of Ranking Fraud for Mobile Apps

7 years ago

Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up…

DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS

7 years ago

Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition…

DATA-DRIVEN COMPOSITION FOR SERVICE-ORIENTED SITUATIONAL WEB APPLICATIONS

7 years ago

This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful…

DATA-DRIVEN COMPOSITION FOR SERVICE-ORIENTED SITUATIONAL WEB APPLICATIONS

7 years ago

This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful…

CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR SECURE INTERNET SERVICES

7 years ago

Session management in distributed Internet services is traditionally based on username and password, explicit logouts and mechanisms of user session…

Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

7 years ago

To implement the system to solve the joint problem of packet scheduling and self-localization in an underwater acoustic sensor network…

CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM

7 years ago

We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency,…

BRACER A DISTRIBUTED BROADCAST PROTOCOL IN MULTI-HOP COGNITIVE RADIO AD HOC NETWORKS

7 years ago

Broadcast is an important operation in wireless ad hoc networks where control information is usually propagated as broadcasts for the…

A Methodology for Extracting Standing Human Bodies From Single Images

7 years ago

Segmentation of human bodies in images is a challenging task that can facilitate numerous applications, like scene understanding and activity…

The Pixel 3a joins the Android Enterprise Recommended lineup

7 years ago

Android Enterprise Recommended continues to shape how organizations choose devices for their teams. According to a recent HMD smartphone purchase…