Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mekala, R.
- Detection and Localization of Multiple Spoofing Attackers and Revoking them in Wireless Networks
Abstract Views :227 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science & Engineering, K. S. Rangasamy College of Technology, Tamilnadu, IN
1 Department of Computer Science & Engineering, K. S. Rangasamy College of Technology, Tamilnadu, IN
Source
Wireless Communication, Vol 6, No 1 (2014), Pagination: 1-6Abstract
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. The project is proposed to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. It is proposed to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data are available, the project explores using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. The localization results use a representative set of algorithms that provide strong evidence of high accuracy of localizing multiple adversaries. In addition, a fast and effective mobile replica node detection scheme is proposed using the Sequential Probability Ratio Test. evaluated our techniques through two testbedsusing both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real officebuildings.Keywords
Wireless Network Security, Spoofing Attack, Attack Detection, Localization.- Ensuring Trustworthy File Sharing in Decentralized Peer to Peer Networking
Abstract Views :259 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science in The Oxford College of Science, Bangalore, Karnataka, IN
2 Oxford College of Science at Department of Computer Science, Bangalore, Karnataka, IN
3 Department of Information Technology in PSG College of Technology, Coimbatore, TamilNadu, IN
4 Sasurie Academy of Engineering, Coimbatore, IN
1 Department of Computer Science in The Oxford College of Science, Bangalore, Karnataka, IN
2 Oxford College of Science at Department of Computer Science, Bangalore, Karnataka, IN
3 Department of Information Technology in PSG College of Technology, Coimbatore, TamilNadu, IN
4 Sasurie Academy of Engineering, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 1, No 3 (2009), Pagination: 119-123Abstract
The openness of P2P network gives a perfect situation for attackers to spread malicious content in the network. In this paper we investigate the design of a secured Information-Sharing Incentive Scheme (ISIS) for decentralized peer-to-peer network (P2P) to ensure trustworthy file sharing. The dynamically growing ISIS increases the efficiency of a P2P network by means of minimal malicious peers and malicious files by establishing trust among good peers as well as identifying and isolating the malicious peers. The ISIS is robust, predictive and invariant under varying network conditions and peer resource constraints.
Keywords
Free Riders, Malicious Peers, P2P Network, Reputation System.- Image Spam Detection Through Server-Client Filtering by Tracing the Source IP of the Spammer
Abstract Views :234 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science and Engineering, K.S. Rangasamy College of Technology, Tamilnadu, IN
1 Department of Computer Science and Engineering, K.S. Rangasamy College of Technology, Tamilnadu, IN
Source
Digital Image Processing, Vol 4, No 7 (2012), Pagination: 349-353Abstract
Image spam is a type of e-mail spam that embeds spam text content into graphical images to bypass traditional text based e-mail spam filters. To effectively detect image spam, it is desirable to leverage image content analysis technologies. A solution to determine spam images is to embed both server-side filtering and client-side detection. On the server-side, spectral clustering algorithm is used and in the client-side detection, active learning principle is used. By using spectral clustering algorithm on the server side, it will cluster the spam images and filter the attack activities of spammers and fast trace back the spam source. By using active learning on client-side filtering, the learner guides the users to label as few images as possible while maximizing the classification accuracy. The server-side filtering identifies large image clusters as suspicious spam sources and filtering method is performed to identify the real sources and block them from beginning.Keywords
Image Spam, Active Learning, Spectral Clustering, Spam Filtering and Image Recognition.- Image and Video Anomaly Detection Using AI Based Deepanomaly Detectors
Abstract Views :172 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science, Vels Institute of Science, Technology and Advanced Studies, IN
2 Department of Electronics and Communication, Nitte Meenakshi Institute of Technology, IN
3 Department of Mechanical Engineering, Pravara Rural Engineering College, IN
4 Department of Information Technology, M. Kumarasamy College of Engineering, IN
5 Department of Computer Science and Information Technology, Jazan University,, SA
1 Department of Computer Science, Vels Institute of Science, Technology and Advanced Studies, IN
2 Department of Electronics and Communication, Nitte Meenakshi Institute of Technology, IN
3 Department of Mechanical Engineering, Pravara Rural Engineering College, IN
4 Department of Information Technology, M. Kumarasamy College of Engineering, IN
5 Department of Computer Science and Information Technology, Jazan University,, SA
Source
ICTACT Journal on Image and Video Processing, Vol 14, No 2 (2023), Pagination: 3161-3167Abstract
In computer vision and anomaly detection, this research delves into the application of AI-based Deep Anomaly Detectors for the identification of anomalies in images and videos. The escalating growth of digital content necessitates robust and efficient methods for anomaly detection to ensure the integrity and security of visual data. As the volume of visual data continues to surge, conventional anomaly detection methods fall short in addressing the complexities inherent in images and videos. Traditional anomaly detection methods often struggle with the nuanced patterns and variations present in images and videos. The need for a more sophisticated and adaptive approach becomes imperative to identify anomalies accurately amidst the vast and diverse landscape of visual data. This study addresses this gap by leveraging the power of artificial intelligence, specifically Deep Anomaly Detectors, to enhance the accuracy and speed of anomaly detection in visual content. This research aims to bridge this gap by proposing a novel methodology that combines deep learning techniques with anomaly detection to achieve superior results in identifying anomalies in visual content. The proposed methodology involves the utilization of state-of-the-art deep learning architectures, training on a diverse dataset of images and videos to capture intricate patterns associated with anomalies. The model is then fine-tuned to enhance its sensitivity to deviations from normal visual patterns, ensuring a robust anomaly detection system. The results showcase a significant improvement in anomaly detection accuracy compared to traditional methods. The AI-based Deep Anomaly Detector exhibits a high level of sensitivity and specificity, effectively distinguishing anomalies in real-world scenarios, thus validating the efficacy of the proposed method.Keywords
Anomaly Detection, Deep Learning, Image Analysis, Computer Vision, Video ProcessingReferences
- Y. Chang, H. Sui and J. Yuan, “Video Anomaly Detection with Spatio-Temporal Dissociation”, Pattern Recognition, Vol. 122, pp. 1-13, 2022.
- Y. Hao, X. Wang and X. Gao, “Spatiotemporal Consistency-Enhanced Network for Video Anomaly Detection”, Pattern Recognition, Vol. 121, pp. 1-12, 2022.
- A. Berroukham and I. Boulfrifi, “Deep Learning-Based Methods for Anomaly Detection in Video Surveillance: A Review”, Bulletin of Electrical Engineering and Informatics, Vol. 12, No. 1, pp. 314-327, 2023.
- Y. Liu, J. Liu, J. Lin, M. Zhao and L. Song, “Appearance-Motion United Auto-Encoder Framework for Video Anomaly Detection”, IEEE Transactions on Circuits and Systems II: Express Briefs, Vol. 69, No. 5, pp. 2498-2502, 2022.
- Y. Liu, J. Liu, J. Lin, M. Zhao and L. Song, “Amp-Net: Appearance-Motion Prototype Network Assisted Automatic Video Anomaly Detection System”, IEEE Transactions on Industrial Informatics, Vol. 87, No. 2, pp. 1-13, 2023.
- T. Ganokratanaa and N. Sebe, “Video Anomaly Detection using Deep Residual-Spatiotemporal Translation Network”, Pattern Recognition Letters, Vol. 155, pp. 143-150, 2022.
- G. Wang, Y. Wang, J. Qin, D. Zhang and D. Huang, “Video Anomaly Detection by Solving Decoupled Spatio-Temporal Jigsaw Puzzles”, Proceedings of European Conference on Computer Vision, pp. 494-511, 2022.
- W. Liu, S. Shan and X. Chen, “Diversity-Measurable Anomaly Detection”, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 12147-12156, 2023.
- R. Raja and D.K. Saini, “Analysis of Anomaly Detection in Surveillance Video: Recent Trends and Future Vision”, Multimedia Tools and Applications, Vol. 82, No. 8, pp. 12635-12651, 2023.
- J. Fioresi and M. Shah, “Ted-Spad: Temporal Distinctiveness for Self-Supervised Privacy-Preservation for Video Anomaly Detection”, Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 13598-13609, 2023.
- Q. Zhang, G. Feng and H. Wu, “Surveillance Video Anomaly Detection via Non-Local U-Net Frame Prediction”, Multimedia Tools and Applications, Vol. 81, No. 19, pp. 27073-27088, 2022.
- D.R. Patrikar and M.R. Parate, “Anomaly Detection using Edge Computing in Video Surveillance System”, International Journal of Multimedia Information Retrieval, Vol. 11, No. 2, pp. 85-110, 2022.
- A. Barbalau, J. Dueholm, B. Ramachandra and M. Shah, “SSMTL++: Revisiting Self-Supervised Multi-Task Learning for Video Anomaly Detection”, Computer Vision and Image Understanding, Vol. 229, pp. 1-16, 2023.
- W. Wang, F. Chang and C. Liu, “Mutuality-Oriented Reconstruction and Prediction Hybrid Network for Video Anomaly Detection”, Signal, Image and Video Processing, Vol. 16, No. 7, pp. 1747-1754, 2022.