Technical Program

CSPb.PA: Cyber-Security and Privacy II

Symposium: Cyber-Security and Privacy
Session Type: Poster
Time: Thursday, December 5, 16:00 - 18:00
Location: Poster Area A
 
CSPb.PA.1: SPLICING IMAGE FORGERY DETECTION BASED ON DCT AND LOCAL BINARY PATTERN
         Amani A. Alahmadi; King Saud University
         Muhammad Hussain; King Saud University
         Hatim Aboalsamh; King Saud University
         Ghulam Muhammad; King Saud University
         George Bebis; University of Nevada, Reno
 
CSPb.PA.2: THE BIDIRECTIONAL POLYOMINO PARTITIONED PPUF AS A HARDWARE SECURITY PRIMITIVE
         James B. Wendt; University of California, Los Angeles
         Miodrag Potkonjak; University of California, Los Angeles
 
CSPb.PA.3: MALICIOUS DATA ATTACKS AGAINST DYNAMIC STATE ESTIMATION IN THE PRESENCE OF RANDOM NOISE
         Oliver Kosut; Arizona State University
 
CSPb.PA.4: PRACTICAL IMPROVEMENTS TO BUS-BASED STRATEGIES FOR RELIABLE ANONYMOUS NETWORKING
         Hari Ravi; California Institute of Technology
         Anoosheh Heidarzadeh; California Institute of Technology
         Tracey Ho; California Institute of Technology
 
CSPb.PA.5: HOW TO HIDE THE ELEPHANT– OR THE DONKEY– IN THE ROOM: PRACTICAL PRIVACY AGAINST STATISTICAL INFERENCE FOR LARGE DATA
         Salman Salamatian; École Polytechnique Fédérale de Lausanne
         Amy Zhang; Technicolor
         Flavio du Pin Calmon; Massachusetts Institute of Technology
         Sandilya Bhamidipati; Technicolor
         Nadia Fawaz; Technicolor
         Branislav Kveton; Technicolor
         Pedro Oliveira; Technicolor
         Nina Taft; Technicolor
 
CSPb.PA.6: DEGREES OF FREEDOM OF THE SINGLE ANTENNA GAUSSIAN WIRETAP CHANNEL WITH A HELPER IRRESPECTIVE OF THE NUMBER OF ANTENNAS AT THE EAVESDROPPER
         Mohamed Nafea; The Pennsylvania State University
         Aylin Yener; The Pennsylvania State University
 
CSPb.PA.7: SECRET-KEY GENERATION WITH ARBITRARILY VARYING EAVESDROPPER’S CHANNEL
         Remi Chou; Georgia Institute of Technology
         Matthieu Bloch; Georgia Institute of Technology
 
CSPb.PA.8: GEOMETRY OF PRIVACY AND UTILITY
         Bing-Rong Lin; Penn State University
         Daniel Kifer; Penn State University
 
CSPb.PA.9: VULNERABILITY OF LTE TO HOSTILE INTERFERENCE
         Marc Lichtman; Virginia Polytechnic Institute and State University
         Jeffrey H. Reed; Virginia Polytechnic Institute and State University
         T. Charles Clancy; Virginia Polytechnic Institute and State University
         Mark Norton; Department of Defense