![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps
Mobile apps are embracing facial recognition technology to streamline the identity verification procedure for security-critical activities such as opening online bank accounts. To ensure the security of the sy...
-
Chapter and Conference Paper
PROS-C: Accelerating Random Orthogonal Search for Global Optimization Using Crossover
Pure Random Orthogonal Search (PROS) is a parameterless evolutionary algorithm (EA) that has shown superior performance when compared to many existing EAs on well-known benchmark functions with limited search ...
-
Chapter and Conference Paper
GTEA: Inductive Representation Learning on Temporal Interaction Graphs via Temporal Edge Aggregation
In this paper, we propose the Graph Temporal Edge Aggregation (GTEA) framework for inductive learning on Temporal Interaction Graphs (TIGs). Different from previous works, GTEA models the temporal dynamics of ...
-
Chapter and Conference Paper
An Empirical Study on Mobile Payment Credential Leaks and Their Exploits
Recently, mobile apps increasingly integrate with payment services, enabling the user to pay orders with a third-party payment service provider, namely Cashier. During the payment process, both the app and Cas...
-
Chapter and Conference Paper
Breaking and Fixing Third-Party Payment Service for Mobile Apps
Riding on the widespread user adoption of mobile payment, a growing number of mobile apps have integrated the service from third-party payment service providers or so-called Cashiers. Despite its prevalence an...
-
Chapter and Conference Paper
Revisiting SRPT for Job Scheduling in Computing Clusters
As the scheduling principle of Shortest Remaining...
-
Chapter and Conference Paper
Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols
Although the OAuth2.0 protocol was originally designed to serve the authorization need for websites, mainstream identity providers like Google and Facebook have made significant changes on this protocol to sup...
-
Chapter and Conference Paper
Predicting Retweet Behavior in Online Social Networks Based on Locally Available Information
Behavior prediction in online social networks (OSNs) has attracted lots of attention due to its vast applications. However, most previous work needs global network information to train classifiers. Due to the ...
-
Chapter and Conference Paper
Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration
In this paper, we propose a scheme to solve large dense graph problems under the MapReduce framework. The graph data is organized in terms of blocks and all blocks are assigned to different map workers for par...
-
Article
Open AccessPartial Interference and Its Performance Impact on Wireless Multiple Access Networks
To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon ...
-
Article
Efficient Packet Scheduling Using Channel Adaptive Fair Queueing in Distributed Mobile Computing Systems
In a distributed mobile computing system, an efficient packet scheduling policy is a crucial component to achieve a high utilization of the precious bandwidth resources while satisfying users' QoS (quality of ...
-
Chapter and Conference Paper
An object-oriented class library for scalable parallel heuristic search
In this report, we describe the design and implementation of a Parallel Heuristic Search Class Library, with emphasis on the use of object-oriented programming techniques for distributed applications. Another ...