Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (18)
- Wright State University (17)
- Embry-Riddle Aeronautical University (14)
- Selected Works (4)
- University of Arkansas, Fayetteville (4)
-
- University of Massachusetts Amherst (4)
- City University of New York (CUNY) (3)
- Florida International University (3)
- California Polytechnic State University, San Luis Obispo (2)
- San Jose State University (2)
- University of New Mexico (2)
- Air Force Institute of Technology (1)
- Binghamton University (1)
- Cedarville University (1)
- Chapman University (1)
- Georgia Southern University (1)
- Munster Technological University (1)
- Purdue University (1)
- Sacred Heart University (1)
- The University of Akron (1)
- University of Kentucky (1)
- University of Pennsylvania Carey Law School (1)
- Keyword
-
- Internet of Things (4)
- Cloud computing (3)
- IoT (3)
- Machine Learning (3)
- Parallel computation (3)
-
- Analytical models (2)
- Area-universal networks (2)
- Cloud Computing (2)
- Cybersecurity (2)
- Delays (2)
- Fat-trees (2)
- Interconnection networks (2)
- Randomized routing (2)
- Security (2)
- Smart Home (2)
- 1.2 COMPUTER AND INFORMATION SCIENCE (1)
- 3D graphics (1)
- 5G Mobile Network CRAN MEC cache management (1)
- Acceleration (1)
- Accessing secured wireless networks (1)
- Alice (1)
- Anonymity networks (1)
- Anonymization (1)
- Anonymous messaging (1)
- Antidepressants (1)
- Apple (1)
- Architecture (1)
- Area attraction (1)
- Area-universality (1)
- Artificial intelligence; Mapping; Matrix algebra; Network architecture; Stochastic systems (1)
- Publication
-
- Kno.e.sis Publications (17)
- Research Collection School Of Computing and Information Systems (14)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Dissertations and Theses Collection (Open Access) (4)
- Doctoral Dissertations (4)
-
- Ronald Greenberg (4)
- FIU Electronic Theses and Dissertations (3)
- Graduate Theses and Dissertations (3)
- Computer Science ETDs (2)
- Computer Science and Software Engineering (2)
- Master's Projects (2)
- All Faculty Scholarship (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electronic Theses and Dissertations (1)
- Graduate Dissertations and Theses (1)
- Journal of Digital Forensics, Security and Law (1)
- Masters (1)
- Publications and Research (1)
- School of Computer Science & Engineering Faculty Publications (1)
- Student Scholar Symposium Abstracts and Posters (1)
- Student Theses (1)
- The Research and Scholarship Symposium (2013-2019) (1)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (1)
- Theses and Dissertations (1)
- Theses and Dissertations--Computer Science (1)
- Williams Honors College, Honors Research Projects (1)
- Publication Type
Articles 1 - 30 of 84
Full-Text Articles in Physical Sciences and Mathematics
Management And Security Of Iot Systems Using Microservices, Tharun Theja Kammara
Management And Security Of Iot Systems Using Microservices, Tharun Theja Kammara
Master's Projects
Devices that assist the user with some task or help them to make an informed decision are called smart devices. A network of such devices connected to internet are collectively called as Internet of Things (IoT). The applications of IoT are expanding exponentially and are becoming a part of our day to day lives. The rise of IoT led to new security and management issues. In this project, we propose a solution for some major problems faced by the IoT devices, including the problem of complexity due to heterogeneous platforms and the lack of IoT device monitoring for security and …
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
All Faculty Scholarship
Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …
Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa
Tcp Server And Client: Bookstore Enquiry, Fawaz Bukhowa
Student Scholar Symposium Abstracts and Posters
An application called "Bookstore Enquiry", and it is implemented in Java using TCP client-server program. It contains two programs; one program is called "Server" and another one is called "Client". In this application, the 'server' maintains information about books and for each book it stores information like 'BookId', 'BookName', 'BookEdition', 'AvailableStock', 'UnitPrice', 'Discount'. This application works in such a way that, the server runs indefinitely and waits for client requests. The Client will accept the BookId & BookName from console and send it to server. If the server finds any books that matches with sent details, then it shows "BOOK …
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez
Adaptive Parallelism For Coupled, Multithreaded Message-Passing Programs, Samuel K. Gutiérrez
Computer Science ETDs
Hybrid parallel programming models that combine message passing (MP) and shared- memory multithreading (MT) are becoming more popular, especially with applications requiring higher degrees of parallelism and scalability. Consequently, coupled parallel programs, those built via the integration of independently developed and optimized software libraries linked into a single application, increasingly comprise message-passing libraries with differing preferred degrees of threading, resulting in thread-level heterogeneity. Retroactively matching threading levels between independently developed and maintained libraries is difficult, and the challenge is exacerbated because contemporary middleware services provide only static scheduling policies over entire program executions, necessitating suboptimal, over-subscribed or under-subscribed, configurations. In …
Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai
Automatic Performance Optimization On Heterogeneous Computer Systems Using Manycore Coprocessors, Chenggang Lai
Graduate Theses and Dissertations
Emerging computer architectures and advanced computing technologies, such as Intel’s Many Integrated Core (MIC) Architecture and graphics processing units (GPU), provide a promising solution to employ parallelism for achieving high performance, scalability and low power consumption. As a result, accelerators have become a crucial part in developing supercomputers. Accelerators usually equip with different types of cores and memory. It will compel application developers to reach challenging performance goals. The added complexity has led to the development of task-based runtime systems, which allow complex computations to be expressed as task graphs, and rely on scheduling algorithms to perform load balancing between …
Reinforcement Learning For Collective Multi-Agent Decision Making, Duc Thien Nguyen
Reinforcement Learning For Collective Multi-Agent Decision Making, Duc Thien Nguyen
Dissertations and Theses Collection (Open Access)
In this thesis, we study reinforcement learning algorithms to collectively optimize decentralized policy in a large population of autonomous agents. We notice one of the main bottlenecks in large multi-agent system is the size of the joint trajectory of agents which quickly increases with the number of participating agents. Furthermore, the noiseof actions concurrently executed by different agents in a large system makes it difficult for each agent to estimate the value of its own actions, which is well-known as the multi-agent credit assignment problem. We propose a compact representation for multi-agent systems using the aggregate counts to address …
Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie
Modeling Movement Decisions In Networks: A Discrete Choice Model Approach, Larry Lin Junjie
Dissertations and Theses Collection (Open Access)
In this dissertation, we address the subject of modeling and simulation of agents and their movement decision in a network environment. We emphasize the development of high quality agent-based simulation models as a prerequisite before utilization of the model as an evaluation tool for various recommender systems and policies. To achieve this, we propose a methodological framework for development of agent-based models, combining approaches such as discrete choice models and data-driven modeling.
The discrete choice model is widely used in the field of transportation, with a distinct utility function (e.g., demand or revenue-driven). Through discrete choice models, the movement decision …
Authorized Function Homomorphic Signature, Qingwen Guo, Qiong Huang, Guomin Yang
Authorized Function Homomorphic Signature, Qingwen Guo, Qiong Huang, Guomin Yang
Research Collection School Of Computing and Information Systems
Homomorphic signature (HS) is a novel primitive that allows an agency to carry out arbitrary (polynomial time) computation f on the signed data (m) over right arrow and accordingly gain a signature sigma(h) for the computation result f ((m) over right arrow) with respect to f on behalf of the data owner (DO). However, since DO lacks control of the agency's behavior, receivers would believe that DO did authenticate the computation result even if the agency misbehaves and applies a function that the DO does not want. To address the problem above, in this paper we introduce a new primitive …
Righting Web Development, John Vilk
Righting Web Development, John Vilk
Doctoral Dissertations
The web browser is the most important application runtime today, encompassing all types of applications on practically every Internet-connected device. Browsers power complete office suites, media players, games, and augmented and virtual reality experiences, and they integrate with cameras, microphones, GPSes, and other sensors available on computing devices. Many apparently native mobile and desktop applications are secretly hybrid apps that contain a mix of native and browser code. History has shown that when new devices, sensors, and experiences appear on the market, the browser will evolve to support them. Despite the browser's importance, developing web applications is exceedingly difficult. Web …
System Support For Managing Risk In Cloud Computing Platforms, Supreeth Shastri
System Support For Managing Risk In Cloud Computing Platforms, Supreeth Shastri
Doctoral Dissertations
Cloud platforms sell computing to applications for a price. However, by precisely defining and controlling the service-level characteristics of cloud servers, they expose applications to a number of implicit risks throughout the application’s lifecycle. For example, user’s request for a server may be denied, leading to rejection risk; an allocated resource may be withdrawn, resulting in revocation risk; an acquired cloud server’s price may rise relative to others, causing price risk; a cloud server’s performance may vary due to external factors, triggering valuation risk. Though these risks are implicit, the costs they bear on the applications are not. While some …
Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen
Hybrid Black-Box Solar Analytics And Their Privacy Implications, Dong Chen
Doctoral Dissertations
The aggregate solar capacity in the U.S. is rising rapidly due to continuing decreases in the cost of solar modules. For example, the installed cost per Watt (W) for residential photovoltaics (PVs) decreased by 6X from 2009 to 2018 (from $8/W to $1.2/W), resulting in the installed aggregate solar capacity increasing 128X from 2009 to 2018 (from 435 megawatts to 55.9 gigawatts). This increasing solar capacity is imposing operational challenges on utilities in balancing electricity's real-time supply and demand, as solar generation is more stochastic and less predictable than aggregate demand. To address this problem, both academia and utilities have …
Dynamic Hierarchical Cache Management For Cloud Ran And Multi- Access Edge Computing In 5g Networks, Deepika Pathinga Rajendiran
Dynamic Hierarchical Cache Management For Cloud Ran And Multi- Access Edge Computing In 5g Networks, Deepika Pathinga Rajendiran
Master's Projects
Cloud Radio Access Networks (CRAN) and Multi-Access Edge Computing (MEC) are two of the many emerging technologies that are proposed for 5G mobile networks. CRAN provides scalability, flexibility, and better resource utilization to support the dramatic increase of Internet of Things (IoT) and mobile devices. MEC aims to provide low latency, high bandwidth and real- time access to radio networks. Cloud architecture is built on top of traditional Radio Access Networks (RAN) to bring the idea of CRAN and in MEC, cloud computing services are brought near users to improve the user’s experiences. A cache is added in both CRAN …
Building Iot Based Applications For Smart Cities: How Can Ontology Catalogs Help?, Amelia Gyrard, Antoine Zimmermann, Amit P. Sheth
Building Iot Based Applications For Smart Cities: How Can Ontology Catalogs Help?, Amelia Gyrard, Antoine Zimmermann, Amit P. Sheth
Kno.e.sis Publications
The Internet of Things (IoT) plays an ever-increasing role in enabling smart city applications. An ontology-based semantic approach can help improve interoperability between a variety of IoT-generated as well as complementary data needed to drive these applications. While multiple ontology catalogs exist, using them for IoT and smart city applications require significant amount of work. In this paper, we demonstrate how can ontology catalogs be more effectively used to design and develop smart city applications? We consider four ontology catalogs that are relevant for IoT and smart cities: 1) READY4SmartCities; 2) linked open vocabulary (LOV); 3) OpenSensingCity (OSC); and 4) …
Using Electronic Health Records To Characterize Prescription Patterns: Focus On Antidepressants In Nonpsychiatric Outpatient Settings, Joseph J. Deferio, Tomer T. Levin, Judith Cukor, Samprit Banerjee, Rozan Abdulrahman, Amit P. Sheth, Neel Mehta, Jyotishman Pathak
Using Electronic Health Records To Characterize Prescription Patterns: Focus On Antidepressants In Nonpsychiatric Outpatient Settings, Joseph J. Deferio, Tomer T. Levin, Judith Cukor, Samprit Banerjee, Rozan Abdulrahman, Amit P. Sheth, Neel Mehta, Jyotishman Pathak
Kno.e.sis Publications
Objective
To characterize nonpsychiatric prescription patterns of antidepressants according to drug labels and evidence assessments (on-label, evidence-based, and off-label) using structured outpatient electronic health record (EHR) data. Methods
A retrospective analysis was conducted using deidentified EHR data from an outpatient practice at a New York City-based academic medical center. Structured “medication–diagnosis” pairs for antidepressants from 35 325 patients between January 2010 and December 2015 were compared to the latest drug product labels and evidence assessments. Results
Of 140 929 antidepressant prescriptions prescribed by primary care providers (PCPs) and nonpsychiatry specialists, 69% were characterized as “on-label/evidence-based uses.” Depression diagnoses were associated …
Poster: Privacy-Preserving Boosting With Random Linear Classifiers, Sagar Sharma, Keke Chen
Poster: Privacy-Preserving Boosting With Random Linear Classifiers, Sagar Sharma, Keke Chen
Kno.e.sis Publications
We propose SecureBoost, a privacy-preserving predictive modeling framework, that allows service providers (SPs) to build powerful boosting models over encrypted or randomly masked user submit- ted data. SecureBoost uses random linear classifiers (RLCs) as the base classifiers. A Cryptographic Service Provider (CSP) manages keys and assists the SP’s processing to reduce the complexity of the protocol constructions. The SP learns only the base models (i.e., RLCs) and the CSP learns only the weights of the base models and a limited leakage function. This separated parameter holding avoids any party from abusing the final model or conducting model-based attacks. We evaluate …
Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao
Simknn: A Scalable Method For In-Memory Knn Search Over Moving Objects In Road Networks, Bin Cao, Chenyu Hou, Suifei Li, Jing Fan, Jianwei Yin, Baihua Zheng, Jie Bao
Research Collection School Of Computing and Information Systems
Nowadays, many location-based applications require the ability of querying k-nearest neighbors over a very large scale of5 moving objects in road networks, e.g., taxi-calling and ride-sharing services. Traditional grid index with equal-sized cells can not adapt6 to the skewed distribution of moving objects in real scenarios. Thus, to obtain the fast querying response time, the grid needs to be split7 into more smaller cells which introduces the side-effect of higher memory cost, i.e., maintaining such a large volume of cells requires a8 much larger memory space at the server side. In this paper, we present SIMkNN, a scalable and in-memory …
Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller
Predict The Failure Of Hydraulic Pumps By Different Machine Learning Algorithms, Yifei Zhou, Monika Ivantysynova, Nathan Keller
The Summer Undergraduate Research Fellowship (SURF) Symposium
Pump failure is a general concerned problem in the hydraulic field. Once happening, it will cause a huge property loss and even the life loss. The common methods to prevent the occurrence of pump failure is by preventative maintenance and breakdown maintenance, however, both of them have significant drawbacks. This research focuses on the axial piston pump and provides a new solution by the prognostic of pump failure using the classification of machine learning. Different kinds of sensors (temperature, acceleration and etc.) were installed into a good condition pump and three different kinds of damaged pumps to measure 10 of …
Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner
Building Test Anonymity Networks In A Cybersecurity Lab Environment, John Schriner
Student Theses
This paper explores current methods for creating test anonymity networks in a laboratory environment for the purpose of improving these networks while protecting user privacy. We first consider how each of these networks is research-driven and interested in helping researchers to conduct their research ethically. We then look to the software currently available for researchers to set up in their labs. Lastly we explore ways in which digital forensics and cybersecurity students could get involved with these projects and look at several class exercises that help students to understand particular attacks on these networks and ways they can help to …
Creating Real-Time Dynamic Knowledge Graphs, Swati Padhee, Sarasi Lalithsena, Amit P. Sheth
Creating Real-Time Dynamic Knowledge Graphs, Swati Padhee, Sarasi Lalithsena, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
Experiences & Challenges With Server-Side Wifi Indoor Localization Using Existing Infrastructure, Dheryta Jaisinghani, Rajesh Krishna Balan, Vinayak Naik, Archan Misra, Youngki Lee
Experiences & Challenges With Server-Side Wifi Indoor Localization Using Existing Infrastructure, Dheryta Jaisinghani, Rajesh Krishna Balan, Vinayak Naik, Archan Misra, Youngki Lee
Research Collection School Of Computing and Information Systems
Real-world deployments of WiFi-based indoor localization in large public venues are few and far between as most state-of-the-art solutions require either client or infrastructure-side changes. Hence, even though high location accuracy is possible with these solutions, they are not practical due to cost and/or client adoption reasons. Majority of the public venues use commercial controller-managed WLAN solutions, that neither allow client changes nor infrastructure changes. In fact, for such venues we have observed highly heterogeneous devices with very low adoption rates for client-side apps. In this paper, we present our experiences in deploying a scalable location system for such venues. …
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside Wifi Networks, Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside Wifi Networks, Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng
Research Collection School Of Computing and Information Systems
Live video programmes can bring in better travel experience for subway passengers and earn abundant advertisement revenue for subway operators. However, because the train-trackside channels for video dissemination are easily accessible to anyone, the video traffic are vulnerable to attacks which may cause deadly tragedies. This paper presents a situation-aware authenticated video broadcasting scheme in the railway network which consists of train, on-board sensor, trackside GSM-R (Global System for Mobile Communications-Railway) device, WiFi AP (Access Point), and train control center. Specifically, the scheme has four modules: (1) a train uses its on-board sensors to obtain its speed, location, and RSSI …
Probabilistic Guided Exploration For Reinforcement Learning In Self-Organizing Neural Networks, Peng Wang, Weigui Jair Zhou, Di Wang, Ah-Hwee Tan
Probabilistic Guided Exploration For Reinforcement Learning In Self-Organizing Neural Networks, Peng Wang, Weigui Jair Zhou, Di Wang, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Exploration is essential in reinforcement learning, which expands the search space of potential solutions to a given problem for performance evaluations. Specifically, carefully designed exploration strategy may help the agent learn faster by taking the advantage of what it has learned previously. However, many reinforcement learning mechanisms still adopt simple exploration strategies, which select actions in a pure random manner among all the feasible actions. In this paper, we propose novel mechanisms to improve the existing knowledgebased exploration strategy based on a probabilistic guided approach to select actions. We conduct extensive experiments in a Minefield navigation simulator and the results …
A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt
A Simplified Secure Programming Platform For Internet Of Things Devices, Halim Burak Yesilyurt
FIU Electronic Theses and Dissertations
The emerging Internet of Things (IoT) revolution has introduced many useful applications that are utilized in our daily lives. Users can program these devices in order to develop their own IoT applications; however, the platforms and languages that are used during development are abounding, complicated, and time-consuming. The software solution provided in this thesis, PROVIZ+, is a secure sensor application development software suite that helps users create sophisticated and secure IoT applications with little software and hardware experience. Moreover, a simple and efficient domain-specific programming language, namely Panther language, was designed for IoT application development to unify existing programming languages. …
Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar
Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar
Computer Science and Software Engineering
This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.
Augmented Personalized Health: Using Semantically Integrated Multimodal Data For Patient Empowered Health Management Strategies, Amit P. Sheth, Hong Y. Yip, Utkarshani Jaimini, Dipesh Kadariya, Vaikunth Sridharan, R. Venkataramanan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra
Augmented Personalized Health: Using Semantically Integrated Multimodal Data For Patient Empowered Health Management Strategies, Amit P. Sheth, Hong Y. Yip, Utkarshani Jaimini, Dipesh Kadariya, Vaikunth Sridharan, R. Venkataramanan, Tanvi Banerjee, Krishnaprasad Thirunarayan, Maninder Kalra
Kno.e.sis Publications
Healthcare as we know it is in the process of going through a massive change from:
1. Episodic to continuous
2. Disease-focused to wellness and quality of life focused
3. Clinic-centric to anywhere a patient is
4. Clinician controlled to patient empowered
5. Being driven by limited data to 360-degree, multimodal personal-public-population physical-cyber-social big data-driven URL: https://mhealth.md2k.org/2018-tech-showcase-home
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Computer Science and Software Engineering
Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all …
Crrn: Multi-Scale Guided Concurrent Reflection Removal Network, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot
Crrn: Multi-Scale Guided Concurrent Reflection Removal Network, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot
Research Collection School Of Computing and Information Systems
Removing the undesired reflections from images taken through the glass is of broad application to various computer vision tasks. Non-learning based methods utilize different handcrafted priors such as the separable sparse gradients caused by different levels of blurs, which often fail due to their limited description capability to the properties of real-world reflections. In this paper, we propose the Concurrent Reflection Removal Network (CRRN) to tackle this problem in a unified framework. Our proposed network integrates image appearance information and multi-scale gradient information with human perception inspired loss function, and is trained on a new dataset with 3250 reflection images …
Music Popularity, Diffusion And Recommendation In Social Networks: A Fusion Analytics Approach, Jing Ren
Music Popularity, Diffusion And Recommendation In Social Networks: A Fusion Analytics Approach, Jing Ren
Dissertations and Theses Collection (Open Access)
Streaming music and social networks offer an easy way for people to gain access to a massive amount of music, but there are also challenges for the music industry to design for promotion strategies via the new channels. My dissertation employs a fusion of machine-based methods and explanatory empiricism to explore music popularity, diffusion, and promotion in the social network context.
Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang
Survey Of Randomization Defenses On Cloud Computing, Jianming Fu, Yan Lin, Xiuwen Liu, Xu Zhang
Research Collection School Of Computing and Information Systems
Cloud computing has changed the processing mode on resources of individuals and industries by providing computing and storage services to users. However, existing defenses on cloud, such as virtual machine monitoring and integrity detection, cannot counter against attacks result from the homogeneity and vulnerability of services effectively. In this paper, we have investigated the threats on cloud computing platform from the perspective of cloud service, service interface and network interface, such as code reuse attack, side channel attack and SQL injection. Code reuse attack chains code snippets (gadgets) located in binaries to bypass Data Execution Prevention (DEP). Side channel attack …
Region-Aware Reflection Removal With Unified Content And Gradient Priors, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Wen Gao, Alex C. Kot
Region-Aware Reflection Removal With Unified Content And Gradient Priors, Renjie Wan, Boxin Shi, Ling-Yu Duan, Ah-Hwee Tan, Wen Gao, Alex C. Kot
Research Collection School Of Computing and Information Systems
Removing the undesired reflections in images taken through the glass is of broad application to various image processing and computer vision tasks. Existing single image-based solutions heavily rely on scene priors such as separable sparse gradients caused by different levels of blur, and they are fragile when such priors are not observed. In this paper, we notice that strong reflections usually dominant a limited region in the whole image, and propose a region-aware reflection removal approach by automatically detecting and heterogeneously processing regions with and without reflections. We integrate content and gradient priors to jointly achieve missing contents restoration, as …