Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition based on Hierarchical MRFs

Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition based on Hierarchical MRFs

ABSTRACT Markov Random Fields (MRFs) are a popular tool in many computer vision problems and faithfully model a broad range of local dependencies. However, rooted in the Hammersley-Clifford theorem, they face serious difficulties in enforcing the global coherence of the solutions without using too high order cliques that reduce the computational effectiveness of the inference […]

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud (IEEE2017).

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud (IEEE2017).

ABATRACT: Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication, which is crucial for eliminating duplicate copies of identical […]

Efficient Public Verification of Data Integrity for Cloud Storage Systems from IndistinguishabilityObfuscation Public Cloud (IEEE 2017).

Efficient Public Verification of Data Integrity for Cloud Storage Systems from IndistinguishabilityObfuscation Public Cloud (IEEE 2017).

ABSTRACT: Cloud storage services allow users to outsource their data to cloud servers to save local data storage costs. However, unlike using local storage devices, users do not physically manage the data stored on cloud servers; therefore, the data integrity of the outsourced data has become an issue. Many public verification schemes have been proposed […]

Minimum-Cost Cloud Storage Service across Multiple Cloud Providers (IEEE 2017)

Minimum-Cost Cloud Storage Service across Multiple Cloud Providers (IEEE 2017)

ABSTRACT: Many Cloud Service Providers (CSPs) provide data storage services with datacenters distributed worldwide. These datacenters provide different Get/Put latencies and unit prices for resource utilization and reservation. Thus, when selecting different CSPs’ datacenters, cloud customers of globally distributed applications (e.g., online social networks) face two challenges: i) how to allocate data to worldwide datacenters […]

CRCMD&R: Cluster and Reputation basedCooperative Malicious Node Detection & Removal Scheme in MANETs

CRCMD&R: Cluster and Reputation basedCooperative Malicious Node Detection & Removal Scheme in MANETs

ABSTRACT While mobile ad hoc networks have become a mature & globally adopted technology due to its wide range of applications. Such environment has some basic differences in comparison to wired networks. Due to these little differences the MANETs are more prone to interception and manipulation. This further opens possibilities of insecure routing. For the […]

Resilience of DoS Attacks in DesigningAnonymous User Authentication Protocol forWireless Sensor Networks

Resilience of DoS Attacks in DesigningAnonymous User Authentication Protocol forWireless Sensor Networks

ABSTRACT Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that employ sensors to check environmental or physical conditions. These autonomous instruments or nodes blend with routers or gateway to make several WSN-based real-time applications. In many critical applications, an external user can directly access the real-time data from sensor node. In this context, before […]

A Game-theoretic Approach toFake-Acknowledgment Attack on Cyber-PhysicalSystems

A Game-theoretic Approach toFake-Acknowledgment Attack on Cyber-PhysicalSystems

ABSTRACT A class of malicious attacks against remote state estimation in Cyber-Physical Systems is considered. A sensor adopts an acknowledgement (ACK)-based online power schedule to improve the remote state estimation performance under limited resources. To launch malicious attacks, the attacker can modify the ACKs from the remote estimator and convey fake information to the sensor, […]

Human-Powered Data Cleaning for Probabilistic Reachability Queries on Uncertain Graphs

Human-Powered Data Cleaning for Probabilistic Reachability Queries on Uncertain Graphs

ABSTRACT Uncertain graph models are widely used in real-world applications such as knowledge graphs and social networks. To capture the uncertainty, each edge in an uncertain graph is associated with an existential probability that signifies the likelihood of the existence of the edge. One notable issue of querying uncertain graphs is that the results are […]

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

ABSTRACT Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of outsourcing data is moving large-scale datasets, including large-scale spatial datasets, to public clouds. Meanwhile, due to the concern […]

Decentralized Configuration of Embedded Web Services for Smart Home Applications Detection

Decentralized Configuration of Embedded Web Services for Smart Home Applications Detection

ABSTRACT Web Services can be used as a communication structure for embedded devices. Out of numerous Web Service specifications there is a subset (Profile) to implement Web Services on resource constrained devices, called Devices Pro- file for Web Services (DPWS). The resulting service oriented architecture enables the user to discover new devices, e.g., in the […]