Uncategorized

Using Semantic Similarity in Crawling-based Web Application Testing (IEEE 2017).

Using Semantic Similarity in Crawling-based Web Application Testing (IEEE 2017).

ABSTRACT: To automatically test web applications, crawlingbased techniques are usually adopted to mine the behavior models, explore the state spaces or detect the violated invariants of the applications. However, their broad use is limited by the required manual configurations for input value selection, GUI state comparison and clickable detection. In existing crawlers, the configurations are […]

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback (IEEE 2017).

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback (IEEE 2017).

ABSTRACT: Getting back to previously viewed web pages is a common yet uneasy task for users due to the large volume of personally accessed information on the web. This paper leverages human’s natural recall process of using episodic and semantic memory cues to facilitate recall, and presents a personal web revisitation technique called WebPagePrev through […]

Multiple Instance Learning for Behavioral Coding (IEEE 2017).

Multiple Instance Learning for Behavioral Coding (IEEE 2017).

ABSTRACT: We propose a computational methodology for automatically estimating human behavioral patterns using the multiple instance learning (MIL) paradigm. We describe the incremental diverse density algorithm, a particular formulation of multiple instance learning, and discuss its suitability for behavioral coding. We use a rich multi-modal corpus comprised of chronically distressed married couples having problem-solving discussions […]

Compact Hash Codes for Efficient Visual Descriptors Retrieval in Large Scale Databases (IEEE 2017).

Compact Hash Codes for Efficient Visual Descriptors Retrieval in Large Scale Databases (IEEE 2017).

ABSTRACT: In this paper we present an efficient method for visual descriptors retrieval based on compact hash codes computed using a multiple k-means assignment. The method has been applied to the problem of approximate nearest neighbor (ANN) search of local and global visual content descriptors, and it has been tested on different datasets: three large […]

Real-Time Distributed Control of Battery Energy Storage Systems for Security Constrained DC-OPF Security (IEEE 2017).

Real-Time Distributed Control of Battery Energy Storage Systems for Security Constrained DC-OPF Security (IEEE 2017).

ABSTRACT: The introduction of fast-response battery energy storage system (BESS) provides a number of advantages to address the new challenges of smart grids, including improving the reliability and security of the power grids. This paper proposes a real-time distributed control algorithm to the corrective security-constrained DC optimal power flow problem for transmission network. The objective […]

On the Security of a Class of Diffusion Mechanisms for Image Encryption Risk (IEEE 2017).

On the Security of a Class of Diffusion Mechanisms for Image Encryption Risk (IEEE 2017).

ABSTRACT: The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required […]

Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures (IEEE 2017).

Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures (IEEE 2017).

ABSTRACT: In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks (CRN s) that protect secondary users’ (SU s) location privacy while allowing them to learn spectrum availability in their vicinity. Our schemes harness probabilistic set membership data structures to exploit the structured nature of spectrum databases (DBs) and SU […]

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud (IEEE2017).

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud (IEEE2017).

ABATRACT: Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication, which is crucial for eliminating duplicate copies of identical […]

Efficient Public Verification of Data Integrity for Cloud Storage Systems from IndistinguishabilityObfuscation Public Cloud (IEEE 2017).

Efficient Public Verification of Data Integrity for Cloud Storage Systems from IndistinguishabilityObfuscation Public Cloud (IEEE 2017).

ABSTRACT: Cloud storage services allow users to outsource their data to cloud servers to save local data storage costs. However, unlike using local storage devices, users do not physically manage the data stored on cloud servers; therefore, the data integrity of the outsourced data has become an issue. Many public verification schemes have been proposed […]

Minimum-Cost Cloud Storage Service across Multiple Cloud Providers (IEEE 2017)

Minimum-Cost Cloud Storage Service across Multiple Cloud Providers (IEEE 2017)

ABSTRACT: Many Cloud Service Providers (CSPs) provide data storage services with datacenters distributed worldwide. These datacenters provide different Get/Put latencies and unit prices for resource utilization and reservation. Thus, when selecting different CSPs’ datacenters, cloud customers of globally distributed applications (e.g., online social networks) face two challenges: i) how to allocate data to worldwide datacenters […]