PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE

ABSTRACT: Statistics from security firms, research institutions and government organizations show that the numbers of data-leak instances have grown […]

Read More →

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES

 ABSTRACT: With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, […]

Read More →

Developing NFC Applications with Android

Developing NFC Applications with Android NFC applications can be developed in the three NFC operating modes: – in the […]

Read More →

PREDICTING ASTHMA-RELATED EMERGENCY DEPARTMENT VISITS USING BIG DATA

ABSTRACT: Asthma is one of the most prevalent and costly chronic conditions in the United States which cannot be […]

Read More →

PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD COMPUTING

ABSTRACT: An initiative data prefetching scheme on the storage servers in distributed file systems for cloud computing. In this […]

Read More →

PASSIVE IP TRACEBACK: DISCLOSING THE LOCATIONS OF IP SPOOFERS FROM PATH BACKSCATTER

ABSTRACT: It is long known attackers may use forged source IP address to conceal their real locations. To capture […]

Read More →

Optimal Configuration of Network Coding in Ad Hoc Networks

Abstract:  Analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration […]

Read More →

ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS

ABSTRACT: MapReduce job, we consider to aggregate data with the same keys before sending them to remote reduce tasks. […]

Read More →

Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care

Abstract Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community […]

Read More →

NEIGHBOR SIMILARITY TRUST AGAINST SYBIL ATTACK IN P2P E-COMMERCE

ABSTRACT: In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact […]

Read More →