Security

The Costas condition on a permutation matrix, expressed as row indices as elements of a vector c, can be expressed as A*c=b, where b is a vector of integers in which no element is zero.  A particular formulation of the matrix A allows a singular value decomposition in which the eigenvalues are squared integers and the eigenvalues may be scaled to vectors with all integer elements.  This is a database of the Costas constraint matrices A, the scaled eigenvectors, and the squared eigenvalues for orders 3 through 100.

85 views
  • Image Processing
  • Last Updated On: 
    Wed, 05/20/2020 - 03:05

    The supplementary files of our submitted TIFS paper: "CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images".

    22 views
  • Image Processing
  • Last Updated On: 
    Sat, 05/09/2020 - 05:13

    This Dataset contains "Pristine" and "Distorted" videos recorded in different places. The 

    distortions with which the videos were recorded are: "Focus", "Exposure" and "Focus + Exposure". 

    Those three with low (1), medium (2) and high (3) levels, forming a total of 10 conditions 

    (including Pristine videos). In addition, distorted videos were exported in three different 

    qualities according to the H.264 compression format used in the DIGIFORT software, which were: 

    High Quality (HQ, H.264 at 100%), Medium Quality (MQ, H.264 at 75%) and Low Quality 

    123 views
  • Computer Vision
  • Last Updated On: 
    Thu, 05/07/2020 - 19:27

    Truth discovery techniques, which can obtain accurate aggregation results based on the weighted sensory data of users, are widely adopted in industrial sensing systems. However, there are some privacy matters that cannot be ignored in truth discovery process. While most of the existing privacy preserving truth discovery methods focus on the privacy of sensory data, they may neglect to protect the privacy of another equally important information, the tagged location information.

    70 views
  • Cloud Computing
  • Last Updated On: 
    Thu, 04/30/2020 - 10:36

     

    Intending to cover the existing gap regarding behavioral datasets modelling interactions of users with individual a multiple devices in Smart Office to later authenticate them continuously, we publish the following collection of datasets, which has been generated after having five users interacting for 60 days with their personal computer and mobile devices. Below you can find a brief description of each dataset.

     

    61 views
  • Artificial Intelligence
  • Last Updated On: 
    Fri, 04/17/2020 - 19:38

    While social media has been proved as an exceptionally useful tool to interact with other people and massively and quickly spread helpful information, its great potential has been ill-intentionally leveraged as well to distort political elections and manipulate constituents. In the paper at hand, we analyzed the presence and behavior of social bots on Twitter in the context of the November 2019 Spanish general election.

    264 views
  • Machine Learning
  • Last Updated On: 
    Wed, 04/15/2020 - 04:01

    Cyber-Physical Production Systems (CPPS) are the key enabling for industrial businesses and economic growth. The introduction of the Internet of Things (IoT) in industrial processes represents a new Internet revolution, mostly known as 4th Industrial Revolution, towards the Smart Manufacturing concept. Despite the huge interest from the industry side to innovate their production systems, in order to increase revenues at lower costs, the IoT concept is still immature and fuzzy, which increases security related risks in industrial systems.

    262 views
  • IoT
  • Last Updated On: 
    Wed, 05/06/2020 - 11:13

    A simple dataset that gives the processing cost (in cycles) for verifying multiple messages signed with ECDSA and implicitly certified public keys. It considers two implicit certification models: ECQV and SIMPL. 

     

    This dataset is used in article "Schnorr-based implicit certification: improving the security and efficiency of vehicular communications", submitted to IEEE Transactions on Computers. Namely, it is used as basis for building that article's Figure 2.

    72 views
  • IoT
  • Last Updated On: 
    Mon, 03/16/2020 - 21:06

    Hardware-in-the-loop simulation of MAVLink UAV. Simulation environment follows standard jMAVSim setup (https://dev.px4.io/v1.9.0/en/simulation/hitl.html#jmavsimgazebo-hitl-environment). Attacks are conducted against the UAV via serial connection. An autonomous survey flight is conducted over the University (~20min flight time). Full flight plan is located in the dataset package as "OTU-Survey.plan". 

    277 views
  • Machine Learning
  • Last Updated On: 
    Mon, 03/30/2020 - 16:05

    Data of an attack example in Bit-Level DFA of SM4

    47 views
  • Security
  • Last Updated On: 
    Tue, 01/21/2020 - 00:28

    Pages