By Topic

IEEE Transactions on Knowledge and Data Engineering

Issue 8 • Date Aug. 2008

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction: Special Section on Intelligence and Security Informatics

    Publication Year: 2008, Page(s):1009 - 1012
    Request permission for commercial reuse | PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Protection of Database Security via Collaborative Inference Detection

    Publication Year: 2008, Page(s):1013 - 1027
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4713 KB) | HTML iconHTML

    Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation detection system to protect sensitive data content. Based on data dependency, database schema and semantic knowledge, we constructed a semantic inference model (SIM) that represents the possible inference channels from any... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems

    Publication Year: 2008, Page(s):1028 - 1033
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1059 KB) | HTML iconHTML

    We address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. We consider threats from malicious adversaries that can deviate from the designated protocol and change their input databases. We classify malicious adversaries into two widely existing subclasses, namely weakly and strongly malicious adversaries, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Remote Data Possession Checking in Critical Information Infrastructures

    Publication Year: 2008, Page(s):1034 - 1038
    Cited by:  Papers (69)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of crucial importance. Remote data possession checking protocols permit to check that a remote server can access an uncorrupted file in such a way that the verifier does not need to know beforehand the entire file t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering and Explaining Abnormal Nodes in Semantic Graphs

    Publication Year: 2008, Page(s):1039 - 1052
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2744 KB) | HTML iconHTML

    An important problem in the area of homeland security is to identify suspicious entities in large datasets. Although there are methods from knowledge discovery and data mining (KDD) focusing on finding anomalies in numerical datasets, there has been little work aimed at discovering suspicious instances in large and complex semantic graphs whose nodes are richly connected with many different types ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Impact-Targeted Activity Patterns in Imbalanced Data

    Publication Year: 2008, Page(s):1053 - 1066
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3087 KB) | HTML iconHTML

    Impact-targeted activities are rare but lead to significant impact on the society, e.g., isolated terrorism activities may lead to a disastrous event threatening national security. Similar issues can also be seen in many other areas. Therefore, it is important to identify such particular activities before they lead to significant impact to the world. However, it is challenging to mine impact-targe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Word Substitutions in Text

    Publication Year: 2008, Page(s):1067 - 1076
    Cited by:  Papers (5)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1741 KB) | HTML iconHTML

    Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example in intelligence and counterterrorism settings. One obvious defense is to replace words that might attract attention to a message with other, more innocuous, words. For example, the sentence the attack will be tomorrow" might be altered to the complex will be tomorrow", since 'c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Statistical Language Modeling Approach to Online Deception Detection

    Publication Year: 2008, Page(s):1077 - 1081
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (715 KB) | HTML iconHTML

    Online deception is disrupting our daily life, organizational process, and even national security. Existing approaches to online deception detection follow a traditional paradigm by using a set of cues as antecedents for deception detection, which may be hindered by ineffective cue identification. Motivated by the strength of statistical language models (SLMs) in capturing the dependency of words ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor-Based Abnormal Human-Activity Detection

    Publication Year: 2008, Page(s):1082 - 1090
    Cited by:  Papers (71)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1186 KB) | HTML iconHTML

    With the availability of affordable sensors and sensor networks, sensor-based human activity recognition has attracted much attention in artificial intelligence and ubiquitous computing. In this paper, we present a novel two-phase approach for detecting abnormal activities based on wireless sensors attached to a human body. Detecting abnormal activities is a particular important task in security m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric Authentication for Border Control Applications

    Publication Year: 2008, Page(s):1091 - 1096
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    We propose an authentication methodology that combines multimodal biometrics and cryptographic mechanisms for border control applications. We accommodate faces and fingerprints without a mandatory requirement of (tamper-resistant) smart-card-level devices on e-passports for easier deployment. It is even allowable to imprint (publicly readable) bar codes on the passports. Additionally, we present a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Thin-Plate Spline Calibration Model For Fingerprint Sensor Interoperability

    Publication Year: 2008, Page(s):1097 - 1110
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6563 KB) | HTML iconHTML

    Biometric sensor interoperability refers to the ability of a system to compensate for the variability introduced in the biometric data of an individual due to the deployment of different sensors. Poor intersensor performance has been reported in different biometric domains including fingerprint, face, iris, and speech. In the context of fingerprint technology, variations are observed in the acquir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inference of Security Hazards from Event Composition Based on Incomplete or Uncertain Information

    Publication Year: 2008, Page(s):1111 - 1114
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    In many security-related contexts, a quick recognition of security hazards is required. Such recognition is challenging, since available information sources are often insufficient to infer the occurrence of hazards with certainty. This requires that the recognition of security hazard is carried out using inference based on patterns of occurrences distributed over space and time. The two main exist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contraflow Transportation Network Reconfiguration for Evacuation Route Planning

    Publication Year: 2008, Page(s):1115 - 1129
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2991 KB) | HTML iconHTML

    Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration, i.e., ideal direction for each edge, to minimize evacuation time. Contraflow is considered a potential remedy to reduce congestion during evacuations in the context of homeland security and natural disasters (e.g., hurricanes). This problem is computationally ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Bandwidth-Efficient Data Broadcast

    Publication Year: 2008, Page(s):1130 - 1144
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1904 KB) | HTML iconHTML

    In this paper, we leverage network coding to reduce the bandwidth consumption for data broadcast. We use the concept of mixing in a different way from the traditional network coding. Traditional network coding mixes all data items together. However, we mix each data item from only some data items according to the queried and stored data of receivers. Therefore, each receiver in our approach is req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ring Signature with Weak Linkability and Its Applications

    Publication Year: 2008, Page(s):1145 - 1148
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    We suggest a linkable ring signature scheme providing strong anonymity and weak linkability. We show that our linkable ring signature scheme can be used to construct a selectively linkable ring signature scheme, an efficient convertible (verifiable) ring signature scheme, and an efficient deductible ring signature scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 180,000 Computing Articles in the IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2008, Page(s): 1149
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Build Your Career in Computing [advertisement]

    Publication Year: 2008, Page(s): 1150
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Join the IEEE Computer Society today! [advertisement]

    Publication Year: 2008, Page(s): 1151
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Subscribe to IEEE Intelligent Systems [advertisement]

    Publication Year: 2008, Page(s): 1152
    Request permission for commercial reuse | PDF file iconPDF (1888 KB)
    Freely Available from IEEE
  • TKDE Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Knowledge and Data Engineering (TKDE) informs researchers, developers, managers, strategic planners, users, and others interested in state-of-the-art and state-of-the-practice activities in the knowledge and data engineering area.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jian Pei
Simon Fraser University

Associate Editor-in-Chief
Xuemin Lin
University of New South Wales

Associate Editor-in-Chief
Lei Chen
Hong Kong University of Science and Technology