Android Device

Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption

Attribute-based encryption (ABE) provides a mechanism for complex access control over encrypted data. However in most ABE systems, the ciphertext size and the decryption overhead, which grow with the complexity of the access policy, are becoming critical barriers in applications running on resource-limited devices. Outsourcing decryption of ABE ciphertexts to a powerful third party is [...]

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

This work proposes a novel reversible image data hiding (RIDH) scheme over encrypted domain. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image patches, allowing [...]

Context-driven, Prescription-Based Personal Activity Classification: Methodology, Architecture, and End-to-End Implementation

Enabling accurate and low-cost classification of a range of motion activities is of significant importance for wireless health through body worn inertial sensors and smartphones, due to the need by healthcare and fitness professonals to monitor exercises for quality and compliance. This paper proposes a novel contextual multi-armed bandits approach for large-scale activity classification. The [...]

Context-based Access Control Systems for Mobile Devices

The smart space is an aggregation of devices, which can share their resources (information and services) and operate in coalitions. This nature of smart space enables of appearance of cyber conflicts between different smart space devices (or participants) which can have different goals and situation understanding but common information space for trusted cyber relationships. Therefore, [...]

Collaborative Policy Administration in Online Social Networks

Collaborative Policy Administration is one of the efficient methods of policy administration in order to protect sensitive data loss. In Collaborative Policy Administration, a policy administrator can refer to other similar policies to set up their own policies to protect privacy and other sensitive information. In this work an Improved Collaborative Policy Administration is proposed [...]

A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks

Video streaming is gaining popularity among mobile users. The latest mobile devices, such as smart phones and tablets, are equipped with multiple wireless network interfaces. How to efficiently and cost-effectively utilize multiple links to improve video streaming quality needs investigation. In order to maintain high video streaming quality while reducing the wireless service cost, in [...]

Catch Me if You Can: Evaluating Android Anti-malware against Transformation Attacks

Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware [...]

Automatic user state recognition for hand gesture based low-cost television control system

 ABSTRACT                                  An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems [...]

Automatic Moving Object Extraction Through a Real-World Variable-Bandwidth Network for Traffic Monitoring Systems

  ABSTRACT  Using a stochastic approach, this paper explores and models the basic stochastic characteristics of freeway traffic behavior under a wide range of traffic conditions during peak Periods and then applies the models to short-term traffic speed prediction. The speed transition probabilities are estimated from real-world 30-s speed data over a six-year period at [...]

Adaptive Sparse Representations for Video Anomaly Detection

 ABSTRACT               Video anomaly detection can be used in the transportation domain to identify unusual patterns such as traffic violations, accidents, unsafe driver behavior, street crime, and other suspicious activities. A common class of approaches relies on object tracking and trajectory analysis. Very recently, sparse reconstruction techniques have been employed in video anomaly detection. [...]