Single Image Super-Resolution Based on Gradient Profile Sharpness

ABSTRACT In this paper, a novel image superresolution algorithm is proposed based on GPS (Gradient Profile Sharpness). GPS is […]

Read More →

REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION

ABSTRACT: In today’s era, there is a great deal added to real-time remote sensing Big Data than it seems […]

Read More →

RANK-BASED SIMILARITY SEARCH REDUCING THE DIMENSIONAL DEPENDENCE

ABSTRACT: This paper introduces a data structure for k-NN search, the Rank Cover Tree (RCT), whose pruning tests rely […]

Read More →

PSMPA: PATIENT SELF-CONTROLLABLE AND MULTI-LEVEL PRIVACY-PRESERVING COOPERATIVE AUTHENTICATION IN DISTRIBUTED M-HEALTHCARE CLOUD COMPUTING SYSTEM

ABSTRACT: The Distributed m-healthcare cloud computing system considerably facilitates secure and efficient patient treatment for medical consultation by sharing […]

Read More →

PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE

ABSTRACT: Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown […]

Read More →

PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKSCATTER

 ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture […]

Read More →

PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD

ABSTRACT: With data storage and sharing services in the cloud, users can easily modify and share data as a […]

Read More →

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that […]

Read More →

Malware Propagation in Large-Scale Networks

Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding […]

Read More →

LOSSLESS AND REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES WITH PUBLIC KEY CRYPTOGRAPHY

This paper proposes a lossless, a reversible, and a combined data hiding schemes for ciphertext images encrypted by public […]

Read More →