— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
During anesthesia, slow-wave sleep and quiet wakefulness, neuronal membrane potentials collectively switch between de- and hyperpolarized levels, the cortical UP and DOWN states. P...
Aman B. Saleem, Paul Chadderton, John Apergis-Scho...
Abstract--Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about h...
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
Abstract—Due to its large scale and constrained communication radius, a wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet along a sequence...
Jiliang Wang, Yunhao Liu, Mo Li, Wei Dong, Yuan He