Author image not provided
 Andrew Sung

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article8.66
Citation Count511
Publication count59
Publication years1994-2017
Available for download9
Average downloads per article382.78
Downloads (cumulative)3,445
Downloads (12 Months)216
Downloads (6 Weeks)27
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


59 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 59
Result page: 1 2 3

Sort by:

1 published by ACM
May 2017 CF'17: Proceedings of the Computing Frontiers Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 39,   Downloads (Overall): 39

Full text available: PDFPDF
Big Data allied to the Internet of Things nowadays provides a powerful resource that various organizations are increasingly exploiting for applications ranging from decision support, predictive and prescriptive analytics, to knowledge extraction and intelligence discovery. In analytics and data mining processes, it is usually desirable to have as much data ...
Keywords: Critical Sampling Size, Data Mining, Big Data, Sampling Methods

2
July 2015 COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 02
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

With the booming of smart phone and high-speed wireless networks in recent years, applications and data have been shifting from desktop to mobile devices at a vigorous pace. Although mobile computing provides great convenience in daily life, it becomes vulnerable to various types of emerging attacks. User authentication plays an ...
Keywords: multi-touch gestures, biometric, authentication, password, pressure sensiitvity

3
May 2015 MobiMedia '15: Proceedings of the 8th International Conference on Mobile Multimedia Communications
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 12,   Downloads (Overall): 45

Full text available: PDFPDF
Advanced Audio Coding (AAC), a lossy audio compression scheme, standardized by ISO and IEC, which was designed to be the successor of the MP3 format, generally obtains better sound quality than MP3 at similar bit rates. AAC is supported on Advanced Audio Coding (AAC), a standardized lossy compression scheme for ...
Keywords: AAC, forgery detection, same bitrate, audio forensics

4
January 2015 ICPRAM 2015: Proceedings of the International Conference on Pattern Recognition Applications and Methods - Volume 1
Publisher: SCITEPRESS - Science and Technology Publications, Lda
Bibliometrics:
Citation Count: 0

Efficacious data mining methods are critical for knowledge discovery in various applications in the era of big data. Two issues of immediate concern in big data analytic tasks are how to select a critical subset of features and how to select a critical subset of data points for sampling. This ...
Keywords: Knowledge Discovery, Critical Sampling Random Selection., Critical Feature Dimension, Data Mining

5
December 2013 Applied Intelligence: Volume 39 Issue 4, December 2013
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 4

Digital multimedia forensics is an emerging field that has important applications in law enforcement and protection of public safety and national security. In digital imaging, JPEG is the most popular lossy compression standard and JPEG images are ubiquitous. Today's digital techniques make it easy to tamper JPEG images without leaving ...
Keywords: Image complexity, Support vector machine, Hierarchical clustering, JPEG double compression, Smartphone identification, Source, Classification, Image forensics, Marginal density, Neighboring joint density

6
May 2013 Information Sciences: an International Journal: Volume 231, May, 2013
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 3

MP3, one of the most widely used digital audio formats, provides a high compression ratio with faithful quality. The widespread use enables MP3 audio files to become excellent covers to carry hidden information in audio steganography on the Internet. Our research, however, indicates that there are few steganalysis methods proposed ...
Keywords: SVM, MP3, Feature selection, Signal complexity, Steganalysis, Steganography

7
December 2012 ICMLA '12: Proceedings of the 2012 11th International Conference on Machine Learning and Applications - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Proliferation of phishing attacks in recent years has presented an important cyber security research area. Over the years, there has been an increase in the technology, diversity, and sophistication of these attacks in response to increased user awareness and countermeasures. In this paper, we propose a novel scheme to automatically ...
Keywords: web mining, phishing detection, phishing URL, anti-phishing, machine learning

8
June 2012 IEA/AIE'12: Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

As smartphones are being widely used in daily lives, the images captured by smartphones become ubiquitous and may be used for legal purposes. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. In this paper, we propose a method to ...
Keywords: JPEG images, operation, classification, hierarchical clustering, support vector machine, source, image forensics, neighboring joint density, smartphone identification

9
June 2012 IEA/AIE'12: Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

Phishing --- a hotbed of multibillion dollar underground economy --- has become an important cybersecurity problem. The centralized blacklist approach used by most web browsers usually fails to detect zero-day attacks, leaving the ordinary users vulnerable to new phishing schemes; therefore, learning machine based approaches have been implemented for phishing ...
Keywords: feature selection, phishing webpage, anti-phishing, evolutionary algorithms, phishing detection

10 published by ACM
September 2011 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM): Volume 7 Issue 3, August 2011
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 5,   Downloads (12 Months): 25,   Downloads (Overall): 519

Full text available: PDFPDF
This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between ...
Keywords: signal complexity, Audio, SVM, derivative, steganography, Markov, Mel-cepstrum, steganalysis

11 published by ACM
August 2011 ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3,   Downloads (12 Months): 25,   Downloads (Overall): 318

Full text available: PDFPDF
The objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--or be undetectable. In image steganography, several information-hiding systems have been ...
Keywords: SIS, steganography, steganalysis, undetectable, JPEG

12
May 2011 ISNN'11: Proceedings of the 8th international conference on Advances in neural networks - Volume Part II
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 9

Digital multimedia forensics is an emerging field that has important applications in law enforcement, the protection of public safety, and notational security. As a popular image compression standard, the JPEG format is widely adopted; however, the tampering of JPEG images can be easily performed without leaving visible clues, and it ...
Keywords: digital forensics, feature mining, quality factor, SVM, forgery, marginal density, DCT, coefficient, double JPEG compression, image complexity, neighboring joint density

13 published by ACM
February 2011 ACM Transactions on Intelligent Systems and Technology (TIST): Volume 2 Issue 2, February 2011
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 2,   Downloads (12 Months): 33,   Downloads (Overall): 644

Full text available: PDFPDF
The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for stealthy communications and other illegal purposes is a serious concern of cyber security. Several steganographic systems that have been developed and made readily available utilize JPEG images as carriers. Due to the popularity of JPEG images on ...
Keywords: neighboring joint density, nuero-fuzzy, JPEG, SVMRFE, SVM, classification, steganography, steganalysis

14 published by ACM
October 2010 MM '10: Proceedings of the 18th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 4,   Downloads (12 Months): 20,   Downloads (Overall): 432

Full text available: PDFPDF
MP3 is the most popular format for audio storage and a de facto standard of digital audio compression for the transfer and playback. The flexibility of compression ratio of MP3 coding enables users to choose their customized configuration in the trade-off between file size and quality. Double MP3 compression often ...
Keywords: pattern classification, SVM, audio, neuron-fuzzy inference system, double mp3 compression, digital forgery

15
May 2010 Information Sciences: an International Journal: Volume 180 Issue 9, May, 2010
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 18

Steganography secretly embeds additional information in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great. To combat the threat posed by steganography, steganalysis aims at the exposure of the stealthy communication. In this paper, a new scheme is proposed for steganalysis of JPEG ...
Keywords: Markov, MSVM-RFE, Steganalysis, Steganography, JPEG, Polynomial fitting, SVM-RFE

16 published by ACM
October 2009 MiFor '09: Proceedings of the First ACM workshop on Multimedia in forensics
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 1,   Downloads (12 Months): 25,   Downloads (Overall): 564

Full text available: PdfPdf
Today's ubiquitous digital media are easily tampered by, e.g., removing or adding objects from or into images without leaving any obvious clues. JPEG is a most widely used standard in digital images and it can be easily doctored. It is therefore necessary to have reliable methods to detect forgery in ...
Keywords: forgery detection, joint density, JPEG, generalized gaussian distribution, image resize, SVM, splicing

17 published by ACM
October 2009 MM '09: Proceedings of the 17th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 4,   Downloads (12 Months): 26,   Downloads (Overall): 470

Full text available: PDFPDF
Detection of information-hiding in JPEG images is actively delivered in steganalysis community due to the fact that JPEG is a widely used compression standard and several steganographic systems have been designed for covert communication in JPEG images. In this paper, we propose a novel method of JPEG steganalysis. Based on ...
Keywords: Markov, steganalysis, image complexity, joint density, JPEG, generalized gaussian distribution, SVM

18 published by ACM
October 2009 MM '09: Proceedings of the 17th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 0,   Downloads (12 Months): 11,   Downloads (Overall): 414

Full text available: PDFPDF
In this paper, we present a novel stream data mining for audio steganalysis, based on second order derivative of audio streams. We extract Mel-cepstrum coefficients and Markov transition features on the second order derivative, a support vector machine is applied to the features for discovery of the existence of covert ...
Keywords: mel-cepstrum, signal complexity, SVM, audio, spectrum, steganography, steganalysis, markov, second order derivative

19
October 2009 International Journal of Knowledge Engineering and Soft Data Paradigms: Volume 1 Issue 3, October 2009
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

Mass spectrometry has become a widely used measurement in proteomics research. High dimensionality of features and small dataset are two major limitations hindering the accuracy of classification in mass spectrum data analysis; consequently, to obtain good results, the issues of feature extraction and feature selection are especially important. The quality ...
Keywords: SVM recursive features, mass spectrometry, SVMRFE, distance metric learning, support vector machines, classification, manifold learning, feature selection, proteomics, recursive feature elimination

20
September 2009 IEEE Transactions on Information Forensics and Security: Volume 4 Issue 3, September 2009
Publisher: IEEE Press
Bibliometrics:
Citation Count: 19

To improve a recently developed mel-cepstrum audio steganalysis method, we present in this paper a method based on Fourier spectrum statistics and mel-cepstrum coefficients, derived from the second-order derivative of the audio signal. Specifically, the statistics of the high-frequency spectrum and the melcepstrum coefficients of the second-order derivative are extracted ...
Keywords: mel-cepstrum, Audio, audio, second-order derivative, spectrum, steganalysis, support vector machine (SVM), wavelet



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us