Hawkes processes for events in social media

MA Rizoiu, Y Lee, S Mishra, L **e - Frontiers of multimedia research, 2017 - dl.acm.org
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …

Deep learning for video classification and captioning

Z Wu, T Yao, Y Fu, YG Jiang - Frontiers of multimedia research, 2017 - dl.acm.org
Today's digital contents are inherently multimedia: text, audio, image, video, and so on.
Video, in particular, has become a new way of communication between Internet users with …

Side channel attacks on smart home systems: A short overview

MAN Abrishamchi, AH Abdullah… - IECON 2017-43rd …, 2017 - ieeexplore.ieee.org
This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in
the smart home. Smart homes are enabled by the latest developments in sensors …

Phonotactic reconstruction of encrypted voip conversations: Hookt on fon-iks

AM White, AR Matthews, KZ Snow… - 2011 IEEE Symposium …, 2011 - ieeexplore.ieee.org
In this work, we unveil new privacy threats against Voice-over-IP (VoIP) communications.
Although prior work has shown that the interaction of variable bit-rate codecs and length …

Fingerprinting encrypted voice traffic on smart speakers with deep learning

C Wang, S Kennedy, H Li, K Hudson, G Atluri… - Proceedings of the 13th …, 2020 - dl.acm.org
This paper investigates the privacy leakage of smart speakers under an encrypted traffic
analysis attack, referred to as voice command fingerprinting. In this attack, an adversary can …

Structure of pauses in speech in the context of speaker verification and classification of speech type

M Igras-Cybulska, B Ziółko, P Żelasko… - EURASIP Journal on …, 2016 - Springer
Statistics of pauses appearing in Polish as a potential source of biometry information for
automatic speaker recognition were described. The usage of three main types of acoustic …

Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side

R **e, J Cao, Y Zhu, Y Zhang, Y He… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
As the mainstream encrypted protocols adopt TCP protocol to ensure lossless data
transmissions, the privacy of encrypted TCP traffic becomes a significant focus for …

Social-sensed multimedia computing

P Cui - Frontiers of Multimedia Research, 2017 - dl.acm.org
Multimedia computing technology, as one of the most effective and pervasive technologies
in modern society, plays irreplaceable roles in bridging user needs with vast amounts of …

An open system for 3D data acquisition from multiple sensor

F Isgro, F Odone, A Verri - Seventh International Workshop on …, 2005 - ieeexplore.ieee.org
This paper describes a work in progress on a multisensor system for 3D data acquisition.
The system core structure is a 3D-range scan based on the well known active triangulation …

PPTP: Privacy-preserving traffic padding in web-based applications

WM Liu, L Wang, P Cheng, K Ren… - … on Dependable and …, 2014 - ieeexplore.ieee.org
Web-based applications are gaining popularity as they require less client-side resources,
and are easier to deliver and maintain. On the other hand, web applications also pose new …