1 code implementation • 10 Apr 2022 • Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo
Cryptocurrencies are no longer just the preferred option for cybercriminal activities on darknets, due to the increasing adoption in mainstream applications.
1 code implementation • 19 May 2021 • Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo
Experimental findings on the testing set show that our scheme preserves image privacy while maintaining the availability of the training set in the deep learning models.
no code implementations • 21 Dec 2020 • Yi Ding, Fuyuan Tan, Zhen Qin, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin
In this paper, a novel deep learning-based key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medical images.
1 code implementation • 19 Oct 2020 • Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
Image forensic plays a crucial role in both criminal investigations (e. g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e. g., defamation).
no code implementations • 23 Sep 2020 • Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Previous works on federated learning have been inadequate in ensuring the privacy of DIs and the availability of the final federated model.
Cryptography and Security
2 code implementations • 14 Aug 2020 • Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo
We devise an efficient mechanism to select host images and watermark images and utilize the improved discrete wavelet transform (DWT) based Patchwork watermarking algorithm with a set of valid hyperparameters to embed digital watermarks from the watermark image dataset into original images for generating image adversarial examples.
no code implementations • WS 2019 • Nayeema Nasrin, Kim-Kwang Raymond Choo, Myung Ko, Anthony Rios
In this paper, we study the impact the number of labeled troll accounts has on detection performance.
no code implementations • 27 Jul 2018 • Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo
The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences.
Cryptography and Security
no code implementations • 26 Jul 2018 • Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo
The issue of increasing volume, variety and velocity of has been an area of concern in cloud forensics.
Cryptography and Security
no code implementations • 22 Jul 2018 • Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac
To date, there is little research on the digital traces in modern radio communication equipment.
Cryptography and Security Computers and Society
no code implementations • 15 Sep 2017 • Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo
Recovering deleted or hidden data is among most important duties of forensics investigators.
Cryptography and Security
no code implementations • 25 Jun 2017 • Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha
This paper then examines how analysis of honeypot data can be used in employee information security awareness and education training.
Cryptography and Security Computers and Society
no code implementations • 18 Jun 2015 • Ben Martini, Quang Do, Kim-Kwang Raymond Choo
Using the evidence collection and analysis methodology for Android devices proposed by Martini, Do and Choo, we examined and analyzed seven popular Android cloud-based apps.
Computers and Society Cryptography and Security