Sciweavers

172 search results - page 24 / 35
» Exploiting the Analogy Between Traces and Signal Processing
Sort
View
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
13 years 9 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
DSN
2009
IEEE
14 years 2 months ago
Spam detection in voice-over-IP calls through semi-supervised clustering
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that t...
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsamee...
ICASSP
2010
IEEE
13 years 7 months ago
An estimation method for the relative phase parameters of complex wavelet coefficients in noise
This paper proposes a method to estimate the parameters of the relative phase probability density function (RP pdf) of the complex coefficients when the image is corrupted by add...
Yothin Rakvongthai, Soontorn Oraintara
ICASSP
2010
IEEE
13 years 6 months ago
Speech/Non-Speech Detection in Meetings from Automatically Extracted low Resolution Visual Features
In this paper we address the problem of estimating who is speaking from automatically extracted low resolution visual cues in group meetings. Traditionally, the task of speech/non...
Hayley Hung, Sileye O. Ba
ICASSP
2011
IEEE
12 years 11 months ago
Automatic target classification in SAR images using MPCA
Multilinear analysis provides a powerful mathematical framework for analyzing synthetic aperture radar (SAR) images resulting from the interaction of multiple factors like sky lum...
Tristan Porges, Gérard Favier