Sciweavers

988 search results - page 29 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICDE
2005
IEEE
183views Database» more  ICDE 2005»
15 years 3 months ago
Protection of Location Privacy using Dummies for Location-based Services
Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because position data obtained by such devices incl...
Hidetoshi Kido, Yutaka Yanagisawa, Tetsuji Satoh
97
Voted
GLOBECOM
2007
IEEE
15 years 4 months ago
A Technique to Enhance Localization in the Presence of NLOS Errors
— In a wireless network (WN), the wireless devices generally localize themselves with the help of anchors that are pre-deployed in the network. Some of the techniques commonly us...
Satyajayant Misra, Weiyi Zhang, Guoliang Xue
87
Voted
TDSC
2010
191views more  TDSC 2010»
14 years 8 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
PR
2008
140views more  PR 2008»
14 years 9 months ago
An incremental node embedding technique for error correcting output codes
The error correcting output codes (ECOC) technique is a useful way to extend any binary classifier to the multiclass case. The design of an ECOC matrix usually considers an a prio...
Oriol Pujol, Sergio Escalera, Petia Radeva
92
Voted
CCS
2010
ACM
14 years 10 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...