Sciweavers

Share
TCS
2012
8 years 6 months ago
Better short-seed quantum-proof extractors
We construct a strong extractor against quantum storage that works for every min-entropy k, has logarithmic seed length, and outputs Ω(k) bits, provided that the quantum adversa...
Avraham Ben-Aroya, Amnon Ta-Shma
CHI
2011
ACM
9 years 2 months ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...
CORR
2011
Springer
143views Education» more  CORR 2011»
9 years 2 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
TSP
2010
9 years 5 months ago
Independent component analysis by entropy bound minimization
A novel (differential) entropy estimator is introduced where the maximum entropy bound is used to approximate the entropy given the observations, and is computed using a numerical ...
Xi-Lin Li, Tülay Adali
CORR
2010
Springer
96views Education» more  CORR 2010»
9 years 5 months ago
Quantifying Information Leakage in Finite Order Deterministic Programs
Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information...
Ji Zhu, Mudhakar Srivatsa
ICIP
2010
IEEE
9 years 7 months ago
Entropies and cross-entropies of exponential families
Statistical modeling of images plays a crucial role in modern image processing tasks like segmentation, object detection and restoration. Although Gaussian distributions are conve...
Frank Nielsen, Richard Nock
ICDCS
2009
IEEE
9 years 8 months ago
High-Speed Flow Nature Identification
This paper concerns the fundamental problem of identifying the content nature of a flow, namely text, binary, or encrypted, for the first time. We propose Iustitia, a tool for ide...
Amir R. Khakpour, Alex X. Liu
ADMA
2009
Springer
121views Data Mining» more  ADMA 2009»
9 years 8 months ago
Quantitative Comparison of Similarity Measure and Entropy for Fuzzy Sets
Comparison and data analysis to the similarity measures and entropy for fuzzy sets are studied. The distance proportional value between the fuzzy set and the corresponding crisp se...
Hongmei Wang, Sanghyuk Lee, Jaehyung Kim
WBIR
2010
SPRINGER
9 years 8 months ago
Normalized Measures of Mutual Information with General Definitions of Entropy for Multimodal Image Registration
Abstract. Mutual information (MI) was introduced for use in multimodal image registration over a decade ago [1,2,3,4]. The MI between two images is based on their marginal and join...
Nathan D. Cahill
IPPS
2010
IEEE
9 years 8 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
books