Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Spectral Representation of Two-Sided Signals from and Applications to Signal Processing
Problems of Information Transmission (PRIT), Volume 60, Issue 2Pages 113–126https://doi.org/10.1134/S0032946024020030AbstractWe study spectral representation as well as predictability and recoverability problems for nonvanishing discrete-time signals from , i.e., for bounded discrete-time signals, including signals that do not vanish at . We extend the notions of ...
- research-articleNovember 2023
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 341–355https://doi.org/10.1145/3576915.3616665Ransomware has evolved from an economic nuisance to a national security threat nowadays, which poses a significant risk to users. To address this problem, we propose RansomTag, a tag-based approach against crypto ransomware with fine-grained data ...
- short-paperApril 2023
Improving Application Artifact Inference Using Matched Sector Adjacency Weighting
IWSPA '23: Proceedings of the 9th ACM International Workshop on Security and Privacy AnalyticsPages 95–100https://doi.org/10.1145/3579987.3586573Digital forensics investigators may need to infer the past presence of an application which was uninstalled prior to device seizure or media imaging. Some existing approaches use a catalog of fixed data block hashes to scan for evidence of a previously ...
- invited-talkJanuary 2023
Data Sanitization on eMMCs
ASPDAC '23: Proceedings of the 28th Asia and South Pacific Design Automation ConferencePages 455–460https://doi.org/10.1145/3566097.3568349Data sanitization of modern digital devices is an important issue given that electronic wastes are being recycled and repurposed. The embedded Multi Media Card (eMMC), one of the NAND flash memory-based commodity devices, is one of the popularly recycled ...
- posterNovember 2022
Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3335–3337https://doi.org/10.1145/3548606.3563538Ransomware is increasingly prevalent in recent years. To defend against ransomware in computing devices using flash memory as external storage, existing designs extract the entire raw flash memory data to restore the external storage to a good state. ...
-
- research-articleDecember 2022
An Effective Data Recovery Approach for Distributed Storage based on Interference Alignment
CSSE '22: Proceedings of the 5th International Conference on Computer Science and Software EngineeringPages 11–16https://doi.org/10.1145/3569966.3569971Node breakdown is very common in distributed storage systems, which will result in data loss or damage. Regenerating codes can reduce the network bandwidth cost by broken data recovery. Interference Alignment (IA) code is a type of regenerating code ...
- short-paperJanuary 2022
Community detection in feature-rich networks to meet K-means
ASONAM '21: Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 138–142https://doi.org/10.1145/3487351.3488356We derive two extensions of the celebrated K-means algorithm as a tool for community detection in feature-rich networks. We define a data-recovery criterion additively combining conventional least-squares criteria for approximation of the network link ...
- research-articleOctober 2021
On Data Compression and Recovery for Sequences Using Constraints on the Spectrum Range
Problems of Information Transmission (PRIT), Volume 57, Issue 4Pages 368–372https://doi.org/10.1134/S0032946021040062AbstractWe investigate the possibility of data recovery for finite sequences with constraints on their spectrum defined by a special discretization of the spectrum range. These sequences are dense in the space of all sequences. We show that uniqueness ...
- research-articleNovember 2021
A data recovery method for community detection in feature-rich networks
ASONAM '20: Proceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 99–104https://doi.org/10.1109/ASONAM49781.2020.9381321The problem of community detection in a network with features at its nodes takes into account both the graph structure and node features. The goal is to find relatively dense groups of interconnected entities sharing some features in common. We apply ...
- research-articleJanuary 2020
Improving activity recognition for multiple-node wireless sensor network system based on compressed sensing
International Journal of Sensor Networks (IJSNET), Volume 34, Issue 3Pages 162–171https://doi.org/10.1504/ijsnet.2020.111235The paper proposes a wireless sensor network activity recognition system based on compressed sensing (CS) for data compression-transmission-recovery (CTR-WSN) in the case of data loss, where effective use of transmission resources, real-time performance, ...
- research-articleJanuary 2020
Testing a file carving tool using realistic datasets generated with openness by a user level file system
International Journal of Data Analysis Techniques and Strategies (IJDATS), Volume 12, Issue 2Pages 155–171https://doi.org/10.1504/ijdats.2020.106639During the development phase of a file carver, it is inappropriate to use a used hard disk as an input medium due to the fact that the file system does not provide openness regarding file fragmentation and location of data on the disk. In this paper, we ...
- research-articleDecember 2019
Determining Data Distribution for Large Disk Enclosures with 3-D Data Templates
ACM Transactions on Storage (TOS), Volume 15, Issue 4Article No.: 27, Pages 1–38https://doi.org/10.1145/3342858Conventional RAID solutions with fixed layouts partition large disk enclosures so that each RAID group uses its own disks exclusively. This achieves good performance isolation across underlying disk groups, at the cost of disk under-utilization and slow ...
- research-articleSeptember 2018
Location Privacy-Preserving Data Recovery for Mobile Crowdsensing
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 2, Issue 3Article No.: 151, Pages 1–23https://doi.org/10.1145/3264961Data recovery techniques such as compressive sensing are commonly used in mobile crowdsensing (MCS) applications to infer the information of unsensed regions based on data from nearby participants. However, the participants' locations are exposed when ...
- research-articleOctober 2017
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 2231–2244https://doi.org/10.1145/3133956.3134035Encryption ransomware is a malicious software that stealthily encrypts user files and demands a ransom to provide access to these files. Several prior studies have developed systems to detect ransomware by monitoring the activities that typically occur ...
- research-articleOctober 2017
OFDM for payload communications of UAS: channel estimation and ICI mitigation
IET Communications (CMU2), Volume 11, Issue 15Pages 2350–2356https://doi.org/10.1049/iet-com.2017.0358For real‐time transmission of high‐bandwidth sensor data from an unmanned aircraft vehicle (UAV) to the ground station (GS) in an unmanned aircraft system, a high‐speed payload communication system is essential. While orthogonal frequency‐division ...
- short-paperSeptember 2017
Sustainable automated data recovery: a research roadmap
SERF 2017: Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital ForensicsPages 6–9https://doi.org/10.1145/3121252.3121254Digital devices contain increasingly more data and applications. This means more data to handle and a larger amount of different types of traces to recover and consider in digital forensic investigations. Both present a challenge to data recovery ...
- research-articleApril 2017
DaRe: Data Recovery through Application Layer Coding for LoRaWAN
IoTDI '17: Proceedings of the Second International Conference on Internet-of-Things Design and ImplementationPages 97–108https://doi.org/10.1145/3054977.3054978Internet of Things (IoT) solutions are increasingly being deployed for smart applications. To provide good communication for the increasing number of smart applications, there is a need for low cost and long range Low Power Wide Area Network (LPWAN) ...
- research-articleJanuary 2017
PAPR reduction scheme: wavelet packet‐based PTS with embedded side information data scheme
Partial transmit sequence (PTS) is an effective scheme to reduce high peak‐to‐average power ratio (PAPR) for multicarrier modulation (MCM) signal transmission systems. This approach produces side information (SI) data as a result of the MCM signal ...
- articleApril 2016
An enhanced security framework for reliable Android operating system
Security and Communication Networks (SACN), Volume 9, Issue 6Pages 528–534https://doi.org/10.1002/sec.908The number of applications loaded with malware is rapidly increasing in Android operating system OS. These malwares spread through the official Android market "Play Store", unofficial "black market", and private web pages. Once the malware activates, ...
- research-articleOctober 2016
Riemannian Optimization for High-Dimensional Tensor Completion
SIAM Journal on Scientific Computing (SISC), Volume 38, Issue 5Pages S461–S484https://doi.org/10.1137/15M1010506Tensor completion aims to reconstruct a high-dimensional data set where the vast majority of entries is missing. The assumption of low-rank structure in the underlying original data allows us to cast the completion problem into an optimization problem ...