Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li May 2021

Towards Secure Deep Neural Networks For Cyber-Physical Systems, Jiangnan Li

Doctoral Dissertations

In recent years, deep neural networks (DNNs) are increasingly investigated in the literature to be employed in cyber-physical systems (CPSs). DNNs own inherent advantages in complex pattern identifying and achieve state-of-the-art performances in many important CPS applications. However, DNN-based systems usually require large datasets for model training, which introduces new data management issues. Meanwhile, research in the computer vision domain demonstrated that the DNNs are highly vulnerable to adversarial examples. Therefore, the security risks of employing DNNs in CPSs applications are of concern.

In this dissertation, we study the security of employing DNNs in CPSs from both the data domain …


Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar Apr 2020

Privacy-Aware Security Applications In The Era Of Internet Of Things, Abbas Acar

FIU Electronic Theses and Dissertations

In this dissertation, we introduce several novel privacy-aware security applications. We split these contributions into three main categories: First, to strengthen the current authentication mechanisms, we designed two novel privacy-aware alternative complementary authentication mechanisms, Continuous Authentication (CA) and Multi-factor Authentication (MFA). Our first system is Wearable-assisted Continuous Authentication (WACA), where we used the sensor data collected from a wrist-worn device to authenticate users continuously. Then, we improved WACA by integrating a noise-tolerant template matching technique called NTT-Sec to make it privacy-aware as the collected data can be sensitive. We also designed a novel, lightweight, Privacy-aware Continuous Authentication (PACA) protocol. PACA …


Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer May 2019

Different Approaches To Blurring Digital Images And Their Effect On Facial Detection, Erich-Matthew Pulfer

Computer Science and Computer Engineering Undergraduate Honors Theses

The purpose of this thesis is to analyze the usage of multiple image blurring techniques and determine their effectiveness in combatting facial detection algorithms. This type of analysis is anticipated to reveal potential flaws in the privacy expected from blurring images or, rather, portions of images. Three different blurring algorithms were designed and implemented: a box blurring method, a Gaussian blurring method, and a differential privacy-based pixilation method. Datasets of images were collected from multiple sources, including the AT&T Database of Faces. Each of these three methods were implemented via their own original method, but, because of how common they …


Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani May 2019

Unicorn Framework: A User-Centric Approach Toward Formal Verification Of Privacy Norms, Rezvan Joshaghani

Boise State University Theses and Dissertations

In the development of complex systems, such as user-centric privacy management systems with multiple components and attributes, it is important to formalize the process and develop mathematical models that can be utilized to automatically make decisions on the information sharing actions of users. While valuable, the current state-of-the-art models are mostly based on enterprise/organizational privacy perspectives and leave the main actor, i.e., the user, uninvolved or with limited ability to control information sharing actions. These approaches cannot be applied to a user-centric environment since user privacy policies are dynamic because they change based on the information sharing context and environment. …


Exploring Photo Privacy Protection On Smartphones, David Darling Dec 2018

Exploring Photo Privacy Protection On Smartphones, David Darling

Computer Science and Computer Engineering Undergraduate Honors Theses

The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence …


How Much Privacy Do We Have Today? A Study Of The Life Of Marc Mezvinsky, Miguel Mares, Salomon Gilles, Brian D. Gobran, Dan Engels Jul 2018

How Much Privacy Do We Have Today? A Study Of The Life Of Marc Mezvinsky, Miguel Mares, Salomon Gilles, Brian D. Gobran, Dan Engels

SMU Data Science Review

In this paper, we present a case study evaluating the level of information available about an individual through public, Internet-accessible sources. Privacy is a basic tenet of democratic society, but technological advances have made access to information and the identification of individuals much easier through Internet-accessible databases and information stores. To determine the potential level of privacy available to an individual in today’s interconnected world, we sought to develop a detailed history of Marc Mezvinsky, a semi-public figure, husband of Chelsea Clinton, and son of two former members of the United States House of Representatives. By utilizing only publicly and …


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu Oct 2016

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …