Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Increasingly, commercial content providers (CPs) offer streaming and IPTV solutions that leverage an underlying peerto-peer (P2P) stream distribution architecture. The use of P2P...
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
—Web-scale image search engines (e.g. Google Image Search, Bing Image Search) mostly rely on surrounding text features. It is difficult for them to interpret users’ search int...
Xiaoou Tang, Ke Liu, Jingyu Cui, Fang Wen, Xiaogan...