Confidentiality-preserving rank-ordered search A Swaminathan, Y Mao, GM Su, H Gou, AL Varna, S He, M Wu, DW Oard Proceedings of the 2007 ACM workshop on Storage security and survivability, 7-12, 2007 | 284 | 2007 |
Enabling search over encrypted multimedia databases W Lu, A Swaminathan, AL Varna, M Wu Media Forensics and Security 7254, 404-414, 2009 | 250 | 2009 |
Secure image retrieval through feature protection W Lu, AL Varna, A Swaminathan, M Wu 2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009 | 186 | 2009 |
“Seeing” ENF: power-signature-based timestamp for digital multimedia via optical sensing and signal processing R Garg, AL Varna, A Hajj-Ahmad, M Wu IEEE Transactions on Information Forensics and Security 8 (9), 1417-1432, 2013 | 127 | 2013 |
Confidentiality-preserving image search: A comparative study between homomorphic encryption and distance-preserving randomization W Lu, AL Varna, M Wu IEEE Access 2, 125-141, 2014 | 121 | 2014 |
An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks R Garg, AL Varna, M Wu IEEE transactions on information forensics and security 7 (2), 717-730, 2012 | 103 | 2012 |
" Seeing" ENF: natural time stamp for digital video via optical sensing and signal processing R Garg, AL Varna, M Wu Proceedings of the 19th ACM international conference on Multimedia, 23-32, 2011 | 84 | 2011 |
Secure video processing: Problems and challenges W Lu, A Varna, M Wu 2011 IEEE International Conference on Acoustics, Speech and Signal …, 2011 | 73 | 2011 |
Security analysis for privacy preserving search of multimedia W Lu, AL Varna, M Wu 2010 IEEE International Conference on Image Processing, 2093-2096, 2010 | 73 | 2010 |
System and method for confidentiality-preserving rank-ordered search A Swaminathan, Y Mao, GM Su, H Gou, AL Varna, S He, M Wu, DW Oard US Patent App. 12/608,724, 2010 | 60 | 2010 |
Forensic hash for multimedia information W Lu, AL Varna, M Wu Media Forensics and Security II 7541, 349-358, 2010 | 55 | 2010 |
Modeling and analysis of electric network frequency signal for timestamp verification R Garg, AL Varna, M Wu 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 49 | 2012 |
EM and power SCA-resilient AES-256 through> 350× current-domain signature attenuation and local lower metal routing D Das, J Danial, A Golder, N Modak, S Maity, B Chatterjee, DH Seo, ... IEEE Journal of Solid-State Circuits 56 (1), 136-150, 2020 | 47 | 2020 |
27.3 EM and power SCA-resilient AES-256 in 65nm cmos through> 350× current-domain signature attenuation D Das, J Danial, A Golder, N Modak, S Maity, B Chatterjee, D Seo, ... 2020 IEEE International Solid-State Circuits Conference-(ISSCC), 424-426, 2020 | 46 | 2020 |
A decision theoretic framework for analyzing binary hash-based content identification systems AL Varna, A Swaminathan, M Wu Proceedings of the 8th ACM workshop on Digital rights management, 67-76, 2008 | 43 | 2008 |
Modeling and analysis of correlated binary fingerprints for content identification AL Varna, M Wu IEEE Transactions on Information Forensics and Security 6 (3), 1146-1159, 2011 | 37 | 2011 |
Gradient descent approach for secure localization in resource constrained wireless sensor networks R Garg, AL Varna, M Wu 2010 IEEE International Conference on Acoustics, Speech and Signal …, 2010 | 31 | 2010 |
Data hiding in hard-copy text documents robust to print, scan and photocopy operations AL Varna, S Rane, A Vetro 2009 IEEE International Conference on Acoustics, Speech and Signal …, 2009 | 26 | 2009 |
Fingerprinting compressed multimedia signals AL Varna, S He, A Swaminathan, M Wu IEEE Transactions on Information Forensics and Security 4 (3), 330-345, 2009 | 21 | 2009 |
Modeling and analysis of content identification AL Varna, M Wu 2009 IEEE International Conference on Multimedia and Expo, 1528-1531, 2009 | 18 | 2009 |