Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
This paper proposes a robust video fingerprinting method based on affine covariant regions. In video fingerprinting, a video clip is identified using short feature vectors ref...
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
Background: DNA copy number alterations are one of the main characteristics of the cancer cell karyotype and can contribute to the complex phenotype of these cells. These alterati...
Jing Huang, Wen Wei, Joyce Chen, Jane Zhang, Guoyi...