This paper considers the notion of identifying subsets of critical data instances in data sets. Critical nuggets of information can take the following form during classification tasks: small subsets of data instances that lie very close to the class boundary and are sensitive to small changes in attribute values, such that these small changes result […]
Decentralized, Key-Based Caching And Checking System To Catch Cloned Nodes
In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and […]
SECURE COVERAGE OF LARGE SCALE WIRELESS SENSOR NETWORK
We proposed, in this work, a scalable key management scheme which ensures a good secure coverage of large scale WSN with a low key storage overhead and a good network resiliency.One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes […]
Enhanced Adaptive ACKnowledgment to detect Secure Intrusion in for MANETs
In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. The migration to wireless network from wired network has been a global trend in […]
Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data
Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees. In this paper, we address the problem of private data publishing, where different attributes for the same set of individuals are held by two parties. In […]
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a subset of features, the effectiveness is related […]
A generic framework for constructing encounter-based social Networks
In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality […]
A Report-based payment scheme for Multihop Wireless Networks
We propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store indisputable security tokens called Evidences. The reports contain the alleged charges and rewards without security proofs, e.g., […]
Degraded Document Images Binarization Technique
In this paper, we propose a novel document image binarization technique that addresses these issues by using adaptive image contrast. The adaptive image contrast is a combination of the local image contrast and the local image gradient that is tolerant to text and background variation caused by different types of document degradations. In the proposed […]
IMPROVED COLOR BARCODE WITH INTERFERENCE CANCELLATION
we propose a model-based interference cancellation procedure to overcome interference that is computationally inexpensive and provides a significant performance improvement. Specifically, we exploit this spectral diversity to realize a three-fold increase in the data rate by encoding independent data in the C, M, and Y print colorant channels and decoding the data from the complementary […]