• Publications
  • Influence
Cooperative wireless multicast: performance analysis and power/location optimization
TLDR
The popularity of multimedia multicast/broadcast applications over wireless networks makes it critical to address the error-prone, heterogeneous and dynamically changing nature of wireless channels. Expand
  • 96
  • 13
  • PDF
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
TLDR
In this paper, we study the collusion resistance of a fingerprinting system employing Gaussian distributed fingerprints and orthogonal modulation and show that the detectors are robust to different collusion attacks. Expand
  • 167
  • 12
  • PDF
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
TLDR
In this paper, we investigate the average collusion attack and several basic nonlinear collusions on independent Gaussian fingerprints and study their effectiveness and the impact on the perceptual quality. Expand
  • 168
  • 12
  • PDF
Network Latency Estimation for Personal Devices: A Matrix Completion Approach
TLDR
We propose a new class of low-rank matrix completion algorithms, which predicts the missing entries in an extracted "network feature matrix" by iteratively minimizing a weighted Schatten- $p$ norm to approximate the rank. Expand
  • 21
  • 4
  • PDF
Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks
TLDR
This paper proposes a game-theoretic framework to model user behavior and designs incentive-based strategies to stimulate user cooperation in peer-to-peer live streaming. Expand
  • 97
  • 3
  • PDF
Digital image source coder forensics via intrinsic fingerprints
TLDR
We investigate and probe the unique intrinsic fingerprint of many popular image source encoders, including transform-based coding (both discrete cosine transform and discrete wavelet transform based), subband coding, differential image coding, and also block processing as the traces of evidence. Expand
  • 86
  • 3
  • PDF
Block Size Forensic Analysis in Digital Images
TLDR
In non-intrusive forensic analysis, we wish to find information and properties about a piece of data without any reference to the original data. Expand
  • 20
  • 3
  • PDF
Pollution-resistant peer-to-peer live streaming using trust management
  • B. Hu, H. V. Zhao
  • Computer Science
  • 16th IEEE International Conference on Image…
  • 7 November 2009
TLDR
This paper proposes a trust management system for P2P live streaming, which can identify polluters and exclude them from further uploading and downloading of data. Expand
  • 10
  • 3
Power Allocation in Multi-User Wireless Relay Networks through Bargaining
TLDR
In this paper, we consider a multi-user single-relay wireless network, where the relay facilitates transmissions of the users' signals to the destination. Expand
  • 44
  • 2
  • PDF
Power Allocation and Pricing in Multiuser Relay Networks Using Stackelberg and Bargaining Games
TLDR
This paper considers a multiuser single-relay wireless network, where the relay gets paid for helping users forward signals, and the users pay to receive the relay service. Expand
  • 46
  • 2
  • PDF