Hawkes processes for events in social media
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …
processes, for modeling discrete, inter-dependent events over continuous time. We start by …
Deep learning for video classification and captioning
Today's digital contents are inherently multimedia: text, audio, image, video, and so on.
Video, in particular, has become a new way of communication between Internet users with …
Video, in particular, has become a new way of communication between Internet users with …
Side channel attacks on smart home systems: A short overview
MAN Abrishamchi, AH Abdullah… - IECON 2017-43rd …, 2017 - ieeexplore.ieee.org
This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in
the smart home. Smart homes are enabled by the latest developments in sensors …
the smart home. Smart homes are enabled by the latest developments in sensors …
Phonotactic reconstruction of encrypted voip conversations: Hookt on fon-iks
In this work, we unveil new privacy threats against Voice-over-IP (VoIP) communications.
Although prior work has shown that the interaction of variable bit-rate codecs and length …
Although prior work has shown that the interaction of variable bit-rate codecs and length …
Fingerprinting encrypted voice traffic on smart speakers with deep learning
This paper investigates the privacy leakage of smart speakers under an encrypted traffic
analysis attack, referred to as voice command fingerprinting. In this attack, an adversary can …
analysis attack, referred to as voice command fingerprinting. In this attack, an adversary can …
Structure of pauses in speech in the context of speaker verification and classification of speech type
Statistics of pauses appearing in Polish as a potential source of biometry information for
automatic speaker recognition were described. The usage of three main types of acoustic …
automatic speaker recognition were described. The usage of three main types of acoustic …
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side
As the mainstream encrypted protocols adopt TCP protocol to ensure lossless data
transmissions, the privacy of encrypted TCP traffic becomes a significant focus for …
transmissions, the privacy of encrypted TCP traffic becomes a significant focus for …
Social-sensed multimedia computing
P Cui - Frontiers of Multimedia Research, 2017 - dl.acm.org
Multimedia computing technology, as one of the most effective and pervasive technologies
in modern society, plays irreplaceable roles in bridging user needs with vast amounts of …
in modern society, plays irreplaceable roles in bridging user needs with vast amounts of …
An open system for 3D data acquisition from multiple sensor
This paper describes a work in progress on a multisensor system for 3D data acquisition.
The system core structure is a 3D-range scan based on the well known active triangulation …
The system core structure is a 3D-range scan based on the well known active triangulation …
PPTP: Privacy-preserving traffic padding in web-based applications
Web-based applications are gaining popularity as they require less client-side resources,
and are easier to deliver and maintain. On the other hand, web applications also pose new …
and are easier to deliver and maintain. On the other hand, web applications also pose new …