This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility ...
Abstract. Lattice basis reduction is the problem of finding short vectors in lattices. The security of lattice based cryptosystems is based on the hardness of lattice reduction. Fu...
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
We present a method aimed at monitoring access to interlocks and secured entrance areas, which deploys two views in order to robustly perform intrusion detection and singularizati...
Luigi di Stefano, Federico Tombari, Stefano Mattoc...