This paper proposed a new multivariate correlation analysis (MCA) based detection system to protect online services against Denial of Service (DoS) attacks. It is powered by the triangle-area based MCA technique and the anomaly-based detection technique. The detection process consists of three major steps: Basic Feature generation for network traffic records, multivariate correlation analysis, and […]
Locx A Novel Approach to Achieving User Privacy in LBS
In this paper, we propose LocX (Location to index mapping, a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications. we can partition location data based on users’ social groups, and then perform transformations on the location coordinates before storing them on untrusted servers. A user knows the transformation keys […]
Secure Deduplication Systems – An Hybrid Approach
In this paper, aiming at efficiently solving the problem of deduplication with differential privileges in cloud computing, we consider a hybrid cloud architecture consisting of a public cloud and a private cloud. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud. A new […]
Foveated Video Quality Metric based on Wavelet Distortion Visibility
In this paper we propose an FR attention driven foveated video quality (AFViQ) metric. A perceptual based foveal imaging model consisting of an improved video attention model and an advanced fixation prediction approach by simulating the essential functionality of eye movement; ii) an accurate video quality metric by integrating the foveal imaging model into wavelet-based […]
Location-Privacy Preserving Mechanism for LBS
In this paper we propose a novel location-privacy preserving mechanism for Location based services. To take advantage of the high effectiveness of hiding user queries from the server, which minimizes the exposed information about the users’ location to the server; we propose a mechanism in which a user can hide in the mobile crowd while […]
Interpreting the Public Sentiment Variations on Twitter
This paper presented a study on the implementation of fault-tolerant network interfaces for NoCs. A fault-free network interface assumes a particular relevance in the design of a reliable multiprocessor system-on chip (MPSoC). In this paper, we focus on an NI providing basic communication services. Presented fault models and fault-tolerant techniques can be, however, extended to […]
A New Compression Algorithm for Fingerprint Image
This paper proposed a fingerprint compression based on sparse representation. The proposed method has the ability by updating the dictionary. The specific process is as follows: construct a base matrix whose columns represent features of the fingerprint images, referring the matrix dictionary whose columns are called atoms; for a given whole fingerprint, divide it into […]
KEPTE Key Pre-distribution Based Tag Encoding Scheme
This paper presents mathematical relations in linear network coding and proposes a key pre-distribution-based tag encoding (KEPTE) scheme to detect polluted data packets. This paper also quantitatively gave the security analysis of KEPTE and compared its performance and overhead with other schemes. The main advantages of KEPTE can be summarized as: 1) It is computationally […]
Design and Implementation of a Technique for a Capacitive Touch Screen
This paper presented the design and implementation of a technique to transmit information through a capacitive touch screen. The key idea is to exploit the pervasive capacitive touch screen and touchpad input devices as receivers for an identification code transmitted by hardware identification token. While the token can take many forms, we consider here an […]
OME -A New Paradigm for GUI Testing
In this paper we develop a new paradigm for GUI testing, called Observe-Model-Exercise (OME*). We make use of a new context-aware mapping that maintains information about the event sequences that were used to reach model elements. We simultaneously extract new GUI model elements—events and follows relationships—during test execution. We develop a unique signature for each […]