-
1
-
-
21644443485
-
Measurement, modeling and analysis of a peer-to-peer file-sharing workload
-
Oct
-
G.P. Gummadi, R.J. Dunn, S. Saroiu, S.D. Gribble, H.M. Levy, and J. Zahorjan, "Measurement, modeling and analysis of a peer-to-peer file-sharing workload," in Proc. 19th ACM Symp. Operating Systems Principles (SOSP-19), Oct. 2003, pp. 314-329.
-
(2003)
Proc. 19th ACM Symp. Operating Systems Principles (SOSP-19)
, pp. 314-329
-
-
Gummadi, G.P.1
Dunn, R.J.2
Saroiu, S.3
Gribble, S.D.4
Levy, H.M.5
Zahorjan, J.6
-
2
-
-
25844529486
-
Pollution in P2P file sharing systems
-
Mar
-
J. Liang, R. Kumar, Y. Xi, and K.W. Ross, "Pollution in P2P file sharing systems," IEEE InfoCom, vol. 2, pp. 1174-1185, Mar. 2005.
-
(2005)
IEEE InfoCom
, vol.2
, pp. 1174-1185
-
-
Liang, J.1
Kumar, R.2
Xi, Y.3
Ross, K.W.4
-
3
-
-
34247629703
-
On peer-to-peer multimedia content access and distribution
-
July
-
Z. Liu, H. Yu, D. Kundur, and M. Merabti, "On peer-to-peer multimedia content access and distribution," in Proc. IEEE Int. Conf. Multimedia and Expo, July 2006, pp. 557-560.
-
(2006)
Proc. IEEE Int. Conf. Multimedia and Expo
, pp. 557-560
-
-
Liu, Z.1
Yu, H.2
Kundur, D.3
Merabti, M.4
-
4
-
-
77951157906
-
A survey and comparison of Peer-to-Peer overlay network schemes
-
Mar
-
E. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, "A survey and comparison of Peer-to-Peer overlay network schemes," IEEE Commun. Surveys Tutorial, vol. 7, no. 2, pp. 72-93, Mar. 2004.
-
(2004)
IEEE Commun. Surveys Tutorial
, vol.7
, Issue.2
, pp. 72-93
-
-
Lua, E.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
6
-
-
84915735481
-
A game theoretic framework for incentives in P2P systems
-
Sept
-
C. Buragohain, D. Agrawal, and S. Sur, "A game theoretic framework for incentives in P2P systems," in Proc. 3rd Int. Conf. Peer-to-Peer Computing, Sept. 2003, pp. 48-56.
-
(2003)
Proc. 3rd Int. Conf. Peer-to-Peer Computing
, pp. 48-56
-
-
Buragohain, C.1
Agrawal, D.2
Sur, S.3
-
7
-
-
0004260006
-
-
3rd ed. New York: Academic
-
G. Owen, Game Theory, 3rd ed. New York: Academic, 1995.
-
(1995)
Game Theory
-
-
Owen, G.1
-
10
-
-
0012839687
-
-
1st ed. Englewood Cliffs, NJ: Prentice-Hall
-
Y. Wang, J. Ostermann, and Y. Zhang, Video Processing and Communications, 1st ed. Englewood Cliffs, NJ: Prentice-Hall, 2001.
-
(2001)
Video Processing and Communications
-
-
Wang, Y.1
Ostermann, J.2
Zhang, Y.3
-
11
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
Mar
-
M. Wu, W. Trappe, Z.J. Wang, and K.J.R. Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Mag., vol. 21, no. 2, pp. 15-27, Mar. 2004.
-
(2004)
IEEE Signal Processing Mag
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.J.3
Liu, K.J.R.4
-
12
-
-
83455204761
-
Multimedia Fingerprinting Forensics for Traitor Tracing
-
New York: Hindawi
-
K.J.R. Liu, W. Trappe, Z.J. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting Forensics for Traitor Tracing, (EURASIP Book Series on Signal Processing and Communications). New York: Hindawi, 2005.
-
(2005)
EURASIP Book Series on Signal Processing and Communications
-
-
Liu, K.J.R.1
Trappe, W.2
Wang, Z.J.3
Wu, M.4
Zhao, H.5
-
13
-
-
85032783063
-
Movie 'screener' suspect charged, Chicago man violated Hollywood studios copyright,
-
Online, Available
-
"Movie 'screener' suspect charged, Chicago man violated Hollywood studios copyright," MSNBC News, [Online]. Available: http:// www.msnbc.msn.com/id/4037016
-
MSNBC News
-
-
-
14
-
-
0032634857
-
Multimedia watermarking techniques
-
July
-
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
17
-
-
0032072279
-
Image adaptive watermarking using visual models
-
May
-
C. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE J. Select Areas Commun., vol. 16, no. 4, pp. 525-540, May 1998.
-
(1998)
IEEE J. Select Areas Commun
, vol.16
, Issue.4
, pp. 525-540
-
-
Podilchuk, C.1
Zeng, W.2
-
18
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec
-
I. Cox, J. Killian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Killian, J.2
Leighton, F.3
Shamoon, T.4
-
19
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
Proc. Advances in Cryptology, EuroCrypto '99
-
F. Ergun, J. Killian, and R. Kumar, "A note on the limits of collusion-resistant watermarks," in Proc. Advances in Cryptology - EuroCrypto '99, (Lecture Notes in Computer Science, vol. 1592), 2001, pp. 140-149.
-
(2001)
Lecture Notes in Computer Science
, vol.1592
, pp. 140-149
-
-
Ergun, F.1
Killian, J.2
Kumar, R.3
-
20
-
-
0037796443
-
-
Dept. Comput. Sci, Princeton Univ, Princeton, NJ, Tech. Rep. TR-585-98
-
J. Killian, T. Leighton, L.R. Matheson, T.G. Shamoon, R. Tajan, and F. Zane, "Resistance of digital watermarks to collusive attacks," Dept. Comput. Sci., Princeton Univ., Princeton, NJ, Tech. Rep. TR-585-98, 1998.
-
(1998)
Resistance of digital watermarks to collusive attacks
-
-
Killian, J.1
Leighton, T.2
Matheson, L.R.3
Shamoon, T.G.4
Tajan, R.5
Zane, F.6
-
23
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
-
May
-
H. Zhao, M. Wu, Z.J. Wang, and K.J.R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting," IEEE Trans. Image Processing, vol. 14, no. 5, pp. 646-661, May 2005.
-
(2005)
IEEE Trans. Image Processing
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
24
-
-
33646802307
-
Bounded gaussian fingerprints and the gradient collusion attack
-
Mar
-
D. Kirovski and M.K. Mihcak, "Bounded gaussian fingerprints and the gradient collusion attack," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 2, pp. 1037-1040, Mar. 2005.
-
(2005)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, vol.2
, pp. 1037-1040
-
-
Kirovski, D.1
Mihcak, M.K.2
-
25
-
-
20444373301
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
-
June
-
Z.J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image Processing, vol. 14, no. 6, pp. 804-821, June 2005.
-
(2005)
IEEE Trans. Image Processing
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.J.R.5
-
26
-
-
84944317710
-
Efficient watermark detection and collusion security
-
Lecture of Notes in Computer Science, Feb
-
F. Zane, "Efficient watermark detection and collusion security," in Proc. of Financial Cryptography, (Lecture of Notes in Computer Science, vol. 1962). Feb. 2000, pp. 21-32.
-
(2000)
Proc. of Financial Cryptography
, vol.1962
, pp. 21-32
-
-
Zane, F.1
-
28
-
-
33744722091
-
Joint coding and embedding techniques for multimedia fingerprinting
-
June
-
S. He and M. Wu, "Joint coding and embedding techniques for multimedia fingerprinting," IEEE Trans. Inform. Forensics and Security, vol. 1, no. 2, pp. 231-247, June 2006.
-
(2006)
IEEE Trans. Inform. Forensics and Security
, vol.1
, Issue.2
, pp. 231-247
-
-
He, S.1
Wu, M.2
-
29
-
-
0000676728
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
Oct
-
J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure fingerprints for digital images," SPIE J. Electron. Imaging, vol. 9, no. 4, pp. 456-467, Oct. 2000.
-
(2000)
SPIE J. Electron. Imaging
, vol.9
, Issue.4
, pp. 456-467
-
-
Dittmann, J.1
Schmitt, P.2
Saar, E.3
Schwenk, J.4
Ueberberg, J.5
-
30
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Apr
-
W. Trappe, M. Wu, Z. Wang, and K.J.R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.3
Liu, K.J.R.4
-
31
-
-
11844303521
-
-
Z.J. Wang, M. Wu, W. Trappe, and K.J.R. Liu, Group-oriented fingerprinting for multimedia forensics, EURASIP J. Appl. Signal Processing, Special Issue on Multimedia Security and Rights Management 2004, no. 14, pp. 2142-2162, Nov. 2004.
-
Z.J. Wang, M. Wu, W. Trappe, and K.J.R. Liu, "Group-oriented fingerprinting for multimedia forensics," EURASIP J. Appl. Signal Processing, Special Issue on Multimedia Security and Rights Management vol. 2004, no. 14, pp. 2142-2162, Nov. 2004.
-
-
-
-
32
-
-
34547534744
-
Collusion-resistant fingerprinting for compressed multimedia signals
-
Apr
-
A. Varna, S. He, A. Swaminathan, M. Wu, H. Lu, and Z. Lu, "Collusion-resistant fingerprinting for compressed multimedia signals," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), vol. 2, Apr. 2007, pp. II 165-168.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP)
, vol.2
-
-
Varna, A.1
He, S.2
Swaminathan, A.3
Wu, M.4
Lu, H.5
Lu, Z.6
-
33
-
-
33748105251
-
Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness
-
Sept
-
H. Zhao and K.J.R. Liu, "Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness," IEEE Trans. Inform. Forensics and Security, vol. 1, no. 3, pp. 311-329, Sept. 2006.
-
(2006)
IEEE Trans. Inform. Forensics and Security
, vol.1
, Issue.3
, pp. 311-329
-
-
Zhao, H.1
Liu, K.J.R.2
-
34
-
-
48149092288
-
Multi-user collusion behavior forensics: Game-theoretic formulation of fairness dynamics
-
Sept
-
W.S. Lin, H.V. Zhao, and K.J.R. Liu, "Multi-user collusion behavior forensics: Game-theoretic formulation of fairness dynamics," in Proc. IEEE Int. Conf. Image Processing, vol. 6, Sept. 2007, pp. 109-112.
-
(2007)
Proc. IEEE Int. Conf. Image Processing
, vol.6
, pp. 109-112
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
35
-
-
13144275283
-
Statistical invisibility for collusionresistant digital video watermarking
-
Feb
-
K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusionresistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.1
, pp. 43-51
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
36
-
-
0038104797
-
Blind pattern matching attack on watermarking systems
-
D. Kiroski and F.A.P. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1045-1053, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.4
, pp. 1045-1053
-
-
Kiroski, D.1
Petitcolas, F.A.P.2
-
38
-
-
33845615855
-
Traitor-within-traitor behavior forensics: Strategy and risk minimization
-
Dec
-
H.V. Zhao and K.J.R. Liu, "Traitor-within-traitor behavior forensics: Strategy and risk minimization," IEEE Trans. Inform. Forensics and Security, vol. 1, no. 4, pp. 440-456, Dec. 2006.
-
(2006)
IEEE Trans. Inform. Forensics and Security
, vol.1
, Issue.4
, pp. 440-456
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
39
-
-
1542285823
-
Lucas-Kanade 20 years on: A unifying framework
-
Mar
-
S. Baker, R. Gross, I. Matthews, and T. Ishikawa, "Lucas-Kanade 20 years on: A unifying framework," Int. J. Comput. Vis., vol. 56, no. 3, pp. 221-255, Mar. 2004.
-
(2004)
Int. J. Comput. Vis
, vol.56
, Issue.3
, pp. 221-255
-
-
Baker, S.1
Gross, R.2
Matthews, I.3
Ishikawa, T.4
-
40
-
-
61449153511
-
Selfish colluder detection and identification in traitors within traitors
-
Oct
-
H.V. Zhao and K.J.R. Liu, "Selfish colluder detection and identification in traitors within traitors," in Proc. IEEE Int. Conf. Image Processing, Oct. 2006, pp. 2289-2292.
-
(2006)
Proc. IEEE Int. Conf. Image Processing
, pp. 2289-2292
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
41
-
-
34547537601
-
Autonomous identification of selfish colluders in traitor-within-traitor behavior forensics
-
Apr
-
H.V. Zhao and K.J.R. Liu, "Autonomous identification of selfish colluders in traitor-within-traitor behavior forensics," IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 2, pp. 149-152, Apr. 2007.
-
(2007)
IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, vol.2
, pp. 149-152
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
42
-
-
78649832925
-
Scalable multimedia fingerprinting forensics with side information
-
Oct
-
W.S. Lin, H.V. Zhao, and K.J.R. Liu, "Scalable multimedia fingerprinting forensics with side information," in Proc. IEEE Int. Conf. Image Processing, Oct. 2006, pp. 2293-2296.
-
(2006)
Proc. IEEE Int. Conf. Image Processing
, pp. 2293-2296
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
-
45
-
-
34547526339
-
A game theoretic framework for colluder-detector behavior forensics
-
Apr
-
W.S. Lin, H.V. Zhao, and K.J.R. Liu, "A game theoretic framework for colluder-detector behavior forensics," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Apr. 2007, vol. 2, pp. 721-724.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing
, vol.2
, pp. 721-724
-
-
Lin, W.S.1
Zhao, H.V.2
Liu, K.J.R.3
|