Sciweavers

162 search results - page 17 / 33
» Deconvolving Protected Signals
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...
ICASSP
2011
IEEE
12 years 11 months ago
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
A rechargeable battery may be used to partially protect the privacy of information contained in a household’s electrical load profile. We represent the system as a finite stat...
David P. Varodayan, Ashish Khisti
ICNC
2005
Springer
14 years 28 days ago
A Natural Language Watermarking Based on Chinese Syntax
Abstract. A novel text watermarking algorithm is presented. It combines natural language watermarking and Chinese syntax based on BP neural networks. Since the watermarking signals...
Yuling Liu, Xingming Sun, Yong Wu
PCM
2004
Springer
116views Multimedia» more  PCM 2004»
14 years 23 days ago
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present pape...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
IAJIT
2008
117views more  IAJIT 2008»
13 years 7 months ago
IP Over WDM Network Control: Network Addressing and Restoration
: There are some common network control issues in IP over WDM(IP/ WDM) which includes network addressing, neighborhood discovery, routing behavior, connection setup and tear down, ...
Refat Kibria, Syed Farhan Reza