Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJuly 2023
Attacking Pre-trained Recommendation
SIGIR '23: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 1811–1815https://doi.org/10.1145/3539618.3591949Recently, a series of pioneer studies have shown the potency of pre-trained models in sequential recommendation, illuminating the path of building an omniscient unified pre-trained recommendation model for different downstream recommendation tasks. ...
- research-articleDecember 2017
RT-SANE: Real Time Security Aware Scheduling on the Network Edge
UCC '17: Proceedings of the10th International Conference on Utility and Cloud ComputingPages 131–140https://doi.org/10.1145/3147213.3147216Edge computing extends a traditional cloud data centre model often by using a micro data centre (mdc) at the network edge for computation and storage. As these edge devices are in proximity to users, this results in improved application response times ...
- abstractOctober 2016
Arm-Hidden Private Area on an Interactive Tabletop System
SUI '16: Proceedings of the 2016 Symposium on Spatial User InteractionPage 197https://doi.org/10.1145/2983310.2989194Tabletop systems are used primarily in meetings or other activities wherein information is shared. However, when confidential input is needed, for example when entering a password, privacy becomes an issue. In this study, we use the shadowed area nearby ...
- research-articleSeptember 2016
Security Requirements Embedded in MS Programs in Information Sciences and Technologies
SIGITE '16: Proceedings of the 17th Annual Conference on Information Technology EducationPages 77–82https://doi.org/10.1145/2978192.2978235This paper reviews and assesses the current coverage of security topics in the master's programs and proposes the best method for educating students in an Information Sciences and Technologies curriculum at Rochester Institute of Technology. We start by ...
- short-paperJune 2016
Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code
SACMAT '16: Proceedings of the 21st ACM on Symposium on Access Control Models and TechnologiesPages 73–80https://doi.org/10.1145/2914642.2914661Privilege Escalation is a common and serious type of security attack. Although experience shows that many applications are vulnerable to such attacks, attackers rarely succeed upon first trial. Their initial probing attempts often fail before a ...
-
- research-articleApril 2013
Flights in my hands: coherence concerns in designing Strip'TIC, a tangible space for air traffic controllers
CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsPages 2175–2184https://doi.org/10.1145/2470654.2481300We reflect upon the design of a paper-based tangible interactive space to support air traffic control. We have observed, studied, prototyped and discussed with controllers a new mixed interaction system based on Anoto, video projection, and tracking. ...
- research-articleAugust 2012
Distributed Privacy-Preserving Access Control in Sensor Networks
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 23, Issue 8Pages 1427–1438https://doi.org/10.1109/TPDS.2011.299The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On ...
- research-articleJuly 2012
A Look-Ahead Approach to Secure Multiparty Protocols
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 24, Issue 7Pages 1170–1185https://doi.org/10.1109/TKDE.2011.44Secure multiparty protocols have been proposed to enable noncolluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly in computation and ...
- articleJune 2012
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
IEEE Transactions on Mobile Computing (ITMV), Volume 11, Issue 6Pages 983–994https://doi.org/10.1109/TMC.2011.120Cellular text messaging services are increasingly being relied upon to disseminate critical information during emergencies. Accordingly, a wide range of organizations including colleges and universities now partner with third-party providers that ...
- research-articleMarch 2012
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 9, Issue 2Pages 184–197https://doi.org/10.1109/TDSC.2011.58The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the ...
- research-articleOctober 2011
Runtime Administration of an RBAC Profile for XACML
IEEE Transactions on Services Computing (ITSC), Volume 4, Issue 4Pages 286–299https://doi.org/10.1109/TSC.2010.27The eXtensible Access Control Markup Language (XACML) is the de facto language to specify access control policies for web services. XACML has an RBAC profile (XACML-RBAC) to support role-based access control policies. We extend this profile with an ...
- articleOctober 2011
An Effective Memory Optimization for Virtual Machine-Based Systems
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 22, Issue 10Pages 1705–1713https://doi.org/10.1109/TPDS.2011.37Utilizing the popular virtualization technology (VT), users can benefit from server consolidation on high-end systems and flexible programming interfaces on low-end systems. In these virtualization environments, the intensive memory multiplexing for I/O ...
- articleJune 2011
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
IEEE Transactions on Mobile Computing (ITMV), Volume 10, Issue 6Pages 767–782https://doi.org/10.1109/TMC.2010.213Due to the unattended nature of wireless sensor networks, an adversary can capture and compromise sensor nodes, make replicas of them, and then mount a variety of attacks with these replicas. These replica node attacks are dangerous because they allow ...
- research-articleMay 2011
Flexible Robust Group Key Agreement
A robust group key agreement protocol (GKA) allows a set of players to establish a shared secret key, regardless of network/node failures. Current constant-round GKA protocols are either efficient and nonrobust or robust but not efficient; assuming a ...
- research-articleDecember 2010
Strong-Incentive, High-Throughput Channel Assignment for Noncooperative Wireless Networks
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 21, Issue 12Pages 1808–1821https://doi.org/10.1109/TPDS.2010.71Channel assignment is a very important topic in wireless networks. In this paper, we study FDMA channel assignment in a noncooperative wireless network, where devices are selfish. Existing work on this problem has considered Nash Equilibrium (NE), which ...
- research-articleDecember 2010
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 22, Issue 12Pages 1766–1780https://doi.org/10.1109/TKDE.2009.214With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the ...
- research-articleNovember 2010
A Secure Decentralized Erasure Code for Distributed Networked Storage
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 21, Issue 11Pages 1586–1594https://doi.org/10.1109/TPDS.2010.27Distributed networked storage systems provide the storage service on the Internet. We address the privacy issue of the distributed networked storage system. It is desired that data stored in the system remain private even if all storage servers in the ...
- research-articleJune 2010
Cross-Domain Data Sharing in Distributed Electronic Health Record Systems
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 21, Issue 6Pages 754–764https://doi.org/10.1109/TPDS.2009.124Cross-organization or cross-domain cooperation takes place from time to time in Electronic Health Record (EHR) system for necessary and high-quality patient treatment. Cautious design of delegation mechanism must be in place as a building block of cross-...
- research-articleJune 2010
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
IEEE Transactions on Mobile Computing (ITMV), Volume 9, Issue 6Pages 810–823https://doi.org/10.1109/TMC.2010.20Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significant research efforts in this direction, some fundamental questions still ...
- research-articleNovember 2009
An Invisible Localization Attack to Internet Threat Monitors
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 20, Issue 11Pages 1611–1625https://doi.org/10.1109/TPDS.2008.255Internet threat monitoring (ITM) systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If ...