Search Results for author: Kim-Kwang Raymond Choo

Found 13 papers, 4 papers with code

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis

1 code implementation10 Apr 2022 Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo

Cryptocurrencies are no longer just the preferred option for cybercriminal activities on darknets, due to the increasing adoption in mainstream applications.

A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning

1 code implementation19 May 2021 Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo

Experimental findings on the testing set show that our scheme preserves image privacy while maintaining the availability of the training set in the deep learning models.

Data Augmentation Image Classification +1

DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption

no code implementations21 Dec 2020 Yi Ding, Fuyuan Tan, Zhen Qin, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin

In this paper, a novel deep learning-based key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medical images.

A Survey of Machine Learning Techniques in Adversarial Image Forensics

1 code implementation19 Oct 2020 Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo

Image forensic plays a crucial role in both criminal investigations (e. g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e. g., defamation).

BIG-bench Machine Learning Image Forensics

Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud

no code implementations23 Sep 2020 Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng

Previous works on federated learning have been inadequate in ensuring the privacy of DIs and the availability of the final federated model.

Cryptography and Security

Generating Image Adversarial Examples by Embedding Digital Watermarks

2 code implementations14 Aug 2020 Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo

We devise an efficient mechanism to select host images and watermark images and utilize the improved discrete wavelet transform (DWT) based Patchwork watermarking algorithm with a set of valid hyperparameters to embed digital watermarks from the watermark image dataset into original images for generating image adversarial examples.

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study

no code implementations27 Jul 2018 Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo

The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences.

Cryptography and Security

CloudMe Forensics: A Case of Big-Data Investigation

no code implementations26 Jul 2018 Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo

The issue of increasing volume, variety and velocity of has been an area of concern in cloud forensics.

Cryptography and Security

Digital forensic investigation of two-way radio communication equipment and services

no code implementations22 Jul 2018 Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac

To date, there is little research on the digital traces in modern radio communication equipment.

Cryptography and Security Computers and Society

Performance of Android Forensics Data Recovery Tools

no code implementations15 Sep 2017 Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo

Recovering deleted or hidden data is among most important duties of forensics investigators.

Cryptography and Security

Honeypots for employee information security awareness and education training: A conceptual EASY training model

no code implementations25 Jun 2017 Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha

This paper then examines how analysis of honeypot data can be used in employee information security awareness and education training.

Cryptography and Security Computers and Society

Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps

no code implementations18 Jun 2015 Ben Martini, Quang Do, Kim-Kwang Raymond Choo

Using the evidence collection and analysis methodology for Android devices proposed by Martini, Do and Choo, we examined and analyzed seven popular Android cloud-based apps.

Computers and Society Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.