Sciweavers

21 search results - page 2 / 5
» Statistical and Fuzzy Approach for Database Security
Sort
View
RAID
2010
Springer
13 years 9 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
MMM
2012
Springer
294views Multimedia» more  MMM 2012»
12 years 6 months ago
A Fuzzy Rank-Based Late Fusion Method for Image Retrieval
Rank-based fusion is indispensable in multiple search setups in lack of item retrieval scores, such as in meta-search with non-cooperative engines. We introduce a novel, simple, an...
Savvas A. Chatzichristofis, Konstantinos Zagoris, ...
TIFS
2010
173views more  TIFS 2010»
13 years 9 months ago
A hybrid approach for generating secure and discriminating face template
Abstract—Biometric template protection is one of the most important issues in deploying a practical biometric system. To tackle this problem, many algorithms, that do not store t...
Yi C. Feng, Pong C. Yuen, Anil K. Jain
KDD
2004
ACM
209views Data Mining» more  KDD 2004»
14 years 11 months ago
A data mining approach to modeling relationships among categories in image collection
This paper proposes a data mining approach to modeling relationships among categories in image collection. In our approach, with image feature grouping, a visual dictionary is cre...
Ruofei Zhang, Zhongfei (Mark) Zhang, Sandeep Khanz...
AMW
2011
13 years 2 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis