• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 332
Next 10 →

Worst case attack on quantization based data hiding

by Ning Liu, K. P. Subbalakshmi - in Proceedings of the 8th IEEE International Symposium on Multimedia (ISM , 2006
"... Currently, most quantization based data hiding al-gorithms are built assuming specific distributions of at-tacks, such as additive white Gaussian noise (AWGN), uniform noise, and so on. In this paper, we prove that the worst case additive attack for quantization based data hiding is a 3-δ function. ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Currently, most quantization based data hiding al-gorithms are built assuming specific distributions of at-tacks, such as additive white Gaussian noise (AWGN), uniform noise, and so on. In this paper, we prove that the worst case additive attack for quantization based data hiding is a 3-δ function

WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES

by Teddy Furon, Cesson Sévigné, Luis Pérez-freire
"... This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri an ..."
Abstract - Cited by 15 (6 self) - Add to MetaCart
This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri

Author manuscript, published in "IEEE International Workshop on Information Forensics and Security (2009)" WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES

by T. Furon, L. Pérez-freire , 2010
"... This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri an ..."
Abstract - Add to MetaCart
This article deals with traitor tracing which is also known as active fingerprinting, content serialization, or user forensics. We study the impact of worst case attacks on the well-known Tardos binary probabilistic traitor tracing code, and especially its optimum setups recently advised by Amiri

A Worst-Case Worm

by Nicholas Weaver, Vern Paxson , 2004
"... Worms represent a substantial economic threat to the U.S. computing infrastructure. An important question is how much damage might be caused, as this figure can serve as a guide to evaluating how much to spend on defenses. We construct a parameterized worst-case analysis based on a simple damage mod ..."
Abstract - Cited by 32 (1 self) - Add to MetaCart
model, combined with our understanding of what an attack could accomplish. Although our estimates are at best approximations, we speculate that a plausible worst-case worm could cause $50 billion or more in direct economic damage by attacking widelyused services in Microsoft Windows and carrying a

Worst-case background knowledge for privacy-preserving . . .

by David J. Martin, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, Joseph Y. Halpern - IN ICDE , 2007
"... Recent work has shown the necessity of considering an attacker’s background knowledge when reasoning about privacy in data publishing. However, in practice, the data publisher does not know what background knowledge the attacker possesses. Thus, it is important to consider the worst-case. In this pa ..."
Abstract - Cited by 96 (1 self) - Add to MetaCart
Recent work has shown the necessity of considering an attacker’s background knowledge when reasoning about privacy in data publishing. However, in practice, the data publisher does not know what background knowledge the attacker possesses. Thus, it is important to consider the worst-case

Gaussian Estimation under Attack Uncertainty

by Tara Javidi, Yonatan Kaspi, Himanshu Tyagi
"... Abstract—We consider the estimation of a standard Gaussian random variable under an observation attack where an adversary may add a zero mean Gaussian noise with variance in a bounded, closed interval to an otherwise noiseless observation. A straightforward approach would entail either ignoring the ..."
Abstract - Add to MetaCart
the attack and simply using an optimal estimator under normal operation or taking the worst-case attack into account and using a minimax estimator that minimizes the cost under the worst-case attack. In contrast, we seek to characterize the optimal tradeoff between the MSE under normal operation and the MSE

Worst Case Additive Attack against Quantization-Based Data-Hiding Methods

by J. E. Vila-Forcén , S. Voloshynovskiy , O. Koval , F. Pérez-González , T. Pun , 2005
"... The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantization-based methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known as ..."
Abstract - Cited by 13 (4 self) - Add to MetaCart
The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantization-based methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known

Automated Determination of Worst-case Design Scenarios

by B. Cullimore
"... This paper describes readily available techniques for auto-mating the search for worst-case (e.g., “hot case”, “cold case”) design scenarios using only modest computational resources. These methods not only streamline a repetitive yet crucial task, they usually produce better results. The problems w ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This paper describes readily available techniques for auto-mating the search for worst-case (e.g., “hot case”, “cold case”) design scenarios using only modest computational resources. These methods not only streamline a repetitive yet crucial task, they usually produce better results. The problems

Detection and Performance Analysis of Greedy Individual and Colluding MAC Layer Attackers

by Svetlana Radosavac, John S. Baras
"... Abstract — Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the problem of misbehavior detection at the MAC layer, focusing on the b ..."
Abstract - Add to MetaCart
on the back-off manipulation by colluding selfish nodes. We cast the problem within a minimax robust detection framework, providing a detection rule of optimum performance for the worst-case attack. We analyze the effects of a single optimal attacker with respect to the detection delay and average number

Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids

by Javier Salmeron, Kevin Wood, Ross Baldick
"... Abstract—This paper generalizes Benders decomposition to maximize a nonconcave objective function and uses that decomposition to solve an “electric power grid interdiction problem.” Under one empirically verified assumption, the solution to this bilevel optimization problem identifies a set of compo ..."
Abstract - Cited by 33 (1 self) - Add to MetaCart
of components, limited by cardinality or “interdiction resource, ” whose destruction maximizes economic losses to customers (and can thereby guide defensive measures). The decomposition subproblem typically incorporates a set of dc optimal power-flow models that cover various states of repair after an attack
Next 10 →
Results 1 - 10 of 332
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University