Sciweavers

976 search results - page 25 / 196
» Evaluating Adversarial Partitions
Sort
View
TIFS
2011
253views Education» more  TIFS 2011»
13 years 4 months ago
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification
—Sensor photo-response non-uniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including digital-camera ballistics in which an image is ...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen
ICASSP
2011
IEEE
13 years 1 months ago
Malicious data attack on real-time electricity market
Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Liyan Jia, Robert J. Thomas, Lang Tong
INFOCOM
2007
IEEE
14 years 4 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 10 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
ICDCS
2007
IEEE
14 years 4 months ago
Self-Similar Algorithms for Dynamic Distributed Systems
This paper proposes a methodology for designing a class of algorithms for computing functions in dynamic distributed systems in which communication channels and processes may ceas...
K. Mani Chandy, Michel Charpentier