Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
In content-based image retrieval (CBIR), relevant images are identified based on their similarities to query images. Most CBIR algorithms are hindered by the semantic gap between ...
Luo Si, Rong Jin, Steven C. H. Hoi, Michael R. Lyu
The development of many complex simulation applications requires collaborative effort from researchers with different domain knowledge and expertise, possibly at different locatio...
Georgios K. Theodoropoulos, Yi Zhang, Dan Chen, Ro...
The development of many complex simulation applications requires collaborative effort from researchers with different domain knowledge and expertise, possibly at different locatio...
Dan Chen, Georgios K. Theodoropoulos, Stephen John...
The past few years have seen an explosive growth in scientific and regulatory documents related to the patent system. Relevant information is siloed into many heterogeneous and di...
Siddharth Taduri, Gloria T. Lau, Kincho H. Law, Ha...