Compact Video Fingerprinting via Structural Graphical Models / Mu Li, Vishal Monga
Quantitative Intellectual Property Protection Using Physical-Level Characterization / Sheng Wei, Ani Nahapetian, Miodrag Potkonjak
SmokeGrenade: an efficient key generation protocol with artificial interference / Dajjiang Chen, et al.
Audio Recording Location Identification Using Acoustic Environment Signature / Hong Zhao, Hafiz Malik
Secure Degrees of Freedom of MIMO X-Channels with Output Feedback and Delayed CSIT / Abdellatif Zaidi, et al.
Characterizing Honeypot-Captured Cyber Attacks: statistical framework and case study / Zhenxin Zhan, Maochao Xu, Shouhuai Xu
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems / Kan Yang,, et al.
Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks / Xi Zhang, Xiangyun Zhou, Matthew R. McKay
A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks / Mohammad Reza Faghani, Uyen Tran Nguyen
Acoustic Environment Identification and Its Applications to Audio Forensics / Hafiz Malik
etc.