Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Defogger: A Visual Analysis Approach for Data Exploration of Sensitive Data Protected by Differential Privacy
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 31, Issue 1Pages 448–458https://doi.org/10.1109/TVCG.2024.3456304Differential privacy ensures the security of individual privacy but poses challenges to data exploration processes because the limited privacy budget incapacitates the flexibility of exploration and the noisy feedback of data requests leads to confusing ...
- research-articleJanuary 2025
PhenoFlow: A Human-LLM Driven Visual Analytics System for Exploring Large and Complex Stroke Datasets
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 31, Issue 1Pages 470–480https://doi.org/10.1109/TVCG.2024.3456215Acute stroke demands prompt diagnosis and treatment to achieve optimal patient outcomes. However, the intricate and irregular nature of clinical data associated with acute stroke, particularly blood pressure (BP) measurements, presents substantial ...
- research-articleJanuary 2025
AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 31, Issue 1Pages 492–502https://doi.org/10.1109/TVCG.2024.3456150Large Language Models (LLMs) are powerful but also raise significant security concerns, particularly regarding the harm they can cause, such as generating fake news that manipulates public opinion on social media and providing responses to unethical ...
- research-articleNovember 2024
Analysis and Design of Efficient Authentication Techniques for Password Entry with the Qwerty Keyboard for VR Environments
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 30, Issue 11Pages 7075–7085https://doi.org/10.1109/TVCG.2024.3456195Authentication in digital security relies heavily on text-based passwords, even with other available methods like biometrics and graphical passwords. While virtual reality (VR) keyboards are typically invisible to onlookers, the presence of inconspicuous ...
- research-articleDecember 2022
Three-Dimensional Mesh Steganography and Steganalysis: A Review
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 28, Issue 12Pages 5006–5025https://doi.org/10.1109/TVCG.2021.3075136Three-dimensional (3-D) meshes are commonly used to represent virtual surfaces and volumes. Over the past decade, 3-D meshes have emerged in industrial, medical, and entertainment applications, being of large practical significance for 3-D mesh ...
-
- research-articleDecember 2022
Inspecting the Running Process of Horizontal Federated Learning via Visual Analytics
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 28, Issue 12Pages 4085–4100https://doi.org/10.1109/TVCG.2021.3074010As a decentralized training approach, horizontal federated learning (HFL) enables distributed clients to collaboratively learn a machine learning model while keeping personal/private information on local devices. Despite the enhanced performance and ...
- research-articleSeptember 2021
Dataless Sharing of Interactive Visualization
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 27, Issue 9Pages 3656–3669https://doi.org/10.1109/TVCG.2020.2984708Interactive visualization has become a powerful insight-revealing medium. However, the close dependency of interactive visualization on its data inhibits its shareability. Users have to choose between the two extremes of (i) sharing non-interactive ...
- research-articleJuly 2021
Analyzing the Noise Robustness of Deep Neural Networks
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 27, Issue 7Pages 3289–3304https://doi.org/10.1109/TVCG.2020.2969185Adversarial examples, generated by adding small but intentionally imperceptible perturbations to normal examples, can mislead deep neural networks (DNNs) to make incorrect predictions. Although much work has been done on both adversarial attack and ...
- research-articleJanuary 2019
Situ: Identifying and Explaining Suspicious Behavior in Networks
- John R. Goodall,
- Eric D. Ragan,
- Chad A. Steed,
- Joel W. Reed,
- G. David Richardson,
- Kelly M.T. Huffer,
- Robert A. Bridges,
- Jason A. Laska
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 25, Issue 1Pages 204–214https://doi.org/10.1109/TVCG.2018.2865029Despite the best efforts of cyber security analysts, networked computing assets are routinely compromised, resulting in the loss of intellectual property, the disclosure of state secrets, and major financial damages. Anomaly detection methods are ...
- research-articleJanuary 2019
Vulnus: Visual Vulnerability Analysis for Network Security
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 25, Issue 1Pages 183–192https://doi.org/10.1109/TVCG.2018.2865028Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely to follow. However, ...
- research-articleJanuary 2019
GraphProtector: A Visual Interface for Employing and Assessing Multiple Privacy Preserving Graph Algorithms
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 25, Issue 1Pages 193–203https://doi.org/10.1109/TVCG.2018.2865021Analyzing social networks reveals the relationships between individuals and groups in the data. However, such analysis can also lead to privacy exposure (whether intentionally or inadvertently): leaking the real-world identity of ostensibly anonymous ...