A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Abstract? A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data.Feature selection involvesidentifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points…
A Framework to Eliminate Backdoors from Response-Computable Authentication Abstract?A Framework to Eliminate Backdoors from Response-Computable AuthenticationResponse-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates a user if the actual user response matches the expected value. Such authentication systems have…
A Methodology for Direct and Indirect Discrimination Prevention in Data Mining Abstract? Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy invasion and potential discrimination. The latter consists of unfairly treating people on the…
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem Abstract? A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
A Privacy-Preserving Framework for Large-ScaleContent-Based Information Retrieval Abstract?We propose a privacy protection framework for large-scale content-based information retrieval. It offers two layers of protection. First, robust hash values are used as queries to prevent revealing original content or features. Second, the client can choose to omit certain bits in a hash value to further increase…
A robust method for data hiding using images Abstract?A robust method for data hiding using images. We propose, in this paper, a novel edge-adaptive data hiding method for authenticating binary host images. Through establishing a dense edge-adaptive grid (EAG) along the object contours, we use a simple binary image to show that EAG more efficiently…
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Abstract? A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Base Paper Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
A secure remote user mutual authentication scheme using smart cards Abstract? Authentication thwarts unauthorised users from accessing resources in insecure network environments. Password authentication based on smart cards is one of the simplest and most ef?cient authentication methods and is commonly deployed to authenticate the legitimacy of remote users. Based on cryptographic techniques, several password…
A Unifying Model and Analysis of P2P VoD Replication and Scheduling Abstract?A Unifying Model and Analysis of P2P VoD Replication and Scheduling. We consider a peer-to-peer (P2P)-assisted video-on-demand (VoD) system where each peer can store a relatively small number of movies to offload the server when these movies are requested. User requests are stochastic…
Aggregated Packet Transmission in Duty-Cycled WSNs: Modeling and Performance Evaluation Abstract– Duty cycling (DC) is a popular technique for energy conservation in wireless sensor networks that allows nodes to wake up and sleep periodically. Typically, a single packet transmission (SPT) occurs per cycle, leading to possibly long delay. With aggregated packet transmission (APT), nodes transmit…
An Access Control Model for Online Social Networks Using User-to-User Relationships Abstract?UUsers and resources in online social networks < Final Year Projects 2016 > OSNs are interconnected via various types of relationships. In particular, user-to-user relationships form the basis of the OSN structure, and play a signi?cant role in specifying and enforcing access control. Individual…
AN OVERVIEW OF DATA HIDING TECHNIQUE:-STEGANOGRAPHY Abstract? AN OVERVIEW OF DATA HIDING TECHNIQUE:-STEGANOGRAPHY. The idea of this paper is to invent a new strategy in Steganography to get the minimum effect in audio which is used to hide data into it. ?Progress always involves risk? Fredrick Wilcox observed that technological progress of computer science and…