Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

CONGRESS: A Hybrid Reputation System for Coping with Rating Subjectivity

Yuan Liu, Jie Zhang, Quanyan Zhu and Xingwei Wang In electronic commerce, buyers and sellers conduct transactions without physical interactions. In reputation systems, the trustworthiness of sellers is achieved by aggregating the ratings shared by other buyers with whom the sellers have ever conducted transactions. However, the ratings provided by buyers for evaluating the same...

Post

PRNU-Based Camera Attribution from Multiple Seam-Carved Images

Samet Taspinar, Manoranjan Mohanty and Nasir Memon Photo Response Non-Uniformity (PRNU) noisebased source attribution is a well known technique to verify the camera of an image or video. Researchers have proposed various countermeasures to prevent PRNU-based source camera attribution. Forced seam-carving is one such recently proposed counter forensics technique. This technique can disable PRNUbased source...

Post

Fake news on agenda at IIT Kanpur's global cyber security competition

The Indian Institute of Technology, Kanpur (IIT-K) is gearing up to host an international-level cyber security competition in collaboration with institutions based in the US, Israel and other countries…This would be the second edition of the world’s biggest student-run cyber security event, Cyber Security Awareness Week (CSAW), which was founded 14 years ago by the...

Post

Trump Hotels Hacked – Again

For the third time in three years, 14 Trump properties have had security breaches exposing customer credit card information. … “It seems very negligent that this could happen a number of times,” Justin Cappos, associate professor of systems and security at New York University, told the Washington Post. “These patterns of oversight are a huge...

Post

A Participant in the Cybersecurity Summer Faculty Program Goes on to Win NSF Career Award

Qiaoyan Yu, an associate professor of electrical and computer engineering at the University of New Hampshire, recently received a prestigious National Science Foundation (NSF) CAREER Award for her development of proactive methods of defending the integrity and security of chips…“While this well-deserved accomplishment is all her own,” Ramesh Karri, a Professor of Electrical and Computer...

Post

Fingerprint to Fly?

…Computers that store personal information about Delta’s customers, including fingerprints, could be hacked. And unlike a stolen password that can be changed, a fingerprint is indelible. … “With a password, you can just change it and move on with your life. You can’t do that with fingerprints,” said Nasir Memon, a professor of computer science...

Post

A First Legislative Step in the IoT Security Battle

Randal Milch, Distinguished Fellow at the Center on Law and Security at NYU School of Law and the NYU Center for Cybersecurity, comments on the Internet of Things (IoT) Cybersecurity Improvements Act of 2017: The bill seeks to use the federal government’s purchasing power to drive much-needed cybersecurity improvements in internet-connected devices. In addition, the...

Post

Large-Scale 3D Chips: Challenges and Solutions for Design Automation, Testing, and Trustworthy Integration

Johann Knechtel, Ozgur Sinanoglu, Ibrahim (Abe) M. Elfadel, Jens Lienig and Cliff C. N. Sze Three-dimensional (3D) integration of electronic chips has been advocated by both industry and academia for many years. It is acknowledged as one of the most promising approaches to meet ever-increasing demands on performance, functionality, and power consumption. Furthermore, 3D integration...