scispace - formally typeset
Search or ask a question
Institution

Georgia Institute of Technology

EducationAtlanta, Georgia, United States
About: Georgia Institute of Technology is a education organization based out in Atlanta, Georgia, United States. It is known for research contribution in the topics: Population & Computer science. The organization has 45387 authors who have published 119086 publications receiving 4651220 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This letter presents a regression-based speech enhancement framework using deep neural networks (DNNs) with a multiple-layer deep architecture that tends to achieve significant improvements in terms of various objective quality measures.
Abstract: This letter presents a regression-based speech enhancement framework using deep neural networks (DNNs) with a multiple-layer deep architecture. In the DNN learning process, a large training set ensures a powerful modeling capability to estimate the complicated nonlinear mapping from observed noisy speech to desired clean signals. Acoustic context was found to improve the continuity of speech to be separated from the background noises successfully without the annoying musical artifact commonly observed in conventional speech enhancement algorithms. A series of pilot experiments were conducted under multi-condition training with more than 100 hours of simulated speech data, resulting in a good generalization capability even in mismatched testing conditions. When compared with the logarithmic minimum mean square error approach, the proposed DNN-based algorithm tends to achieve significant improvements in terms of various objective quality measures. Furthermore, in a subjective preference evaluation with 10 listeners, 76.35% of the subjects were found to prefer DNN-based enhanced speech to that obtained with other conventional technique.

860 citations

Proceedings Article
01 Jan 2008
TL;DR: This paper proposes an approach that uses network-based anomaly detection to identify botnet C&C channels in a local area network without any prior knowledge of signatures or C &C server addresses, and shows that BotSniffer can detect real-world botnets with high accuracy and has a very low false positive rate.
Abstract: Botnets are now recognized as one of the most serious security threats. In contrast to previous malware, botnets have the characteristic of a command and control (C&C) channel. Botnets also often use existing common protocols, e.g., IRC, HTTP, and in protocol-conforming manners. This makes the detection of botnet C&C a challenging problem. In this paper, we propose an approach that uses network-based anomaly detection to identify botnet C&C channels in a local area network without any prior knowledge of signatures or C&C server addresses. This detection approach can identify both the C&C servers and infected hosts in the network. Our approach is based on the observation that, because of the pre-programmed activities related to C&C, bots within the same botnet will likely demonstrate spatial-temporal correlation and similarity. For example, they engage in coordinated communication, propagation, and attack and fraudulent activities. Our prototype system, BotSniffer, can capture this spatial-temporal correlation in network traffic and utilize statistical algorithms to detect botnets with theoretical bounds on the false positive and false negative rates. We evaluated BotSniffer using many real-world network traces. The results show that BotSniffer can detect real-world botnets with high accuracy and has a very low false positive rate.

859 citations

Journal ArticleDOI
TL;DR: This paper systematically outline the optimization challenges that arise when developing technology to support ride-sharing and survey the related operations research models in the academic literature.

858 citations

Book ChapterDOI
16 Apr 2009
TL;DR: The notion of order-preserving symmetric encryption (OPE) was introduced by Agrawal et al. as mentioned in this paper, who showed that a straightforward relaxation of standard security notions for encryption such as indistinguishability against chosen-plaintext attack (IND-CPA) is unachievable by a practical OPE scheme.
Abstract: We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database community by Agrawal et al. (SIGMOD '04) for allowing efficient range queries on encrypted data. Interestingly, we first show that a straightforward relaxation of standard security notions for encryption such as indistinguishability against chosen-plaintext attack (IND-CPA) is unachievable by a practical OPE scheme. Instead, we propose a security notion in the spirit of pseudorandom functions (PRFs) and related primitives asking that an OPE scheme look "as-random-as-possible" subject to the order-preserving constraint. We then design an efficient OPE scheme and prove its security under our notion based on pseudorandomness of an underlying blockcipher. Our construction is based on a natural relation we uncover between a random order-preserving function and the hypergeometric probability distribution. In particular, it makes black-box use of an efficient sampling algorithm for the latter.

858 citations

Book
01 Jan 1973
TL;DR: In this paper, experimental and theoretical aspects of the mobility and diffusion of ions in gases are studied in detail, including ion-ion interaction, boundary condition and ion and electron behavior, and the problems of the diffusion coefficients and the afterglow techniques.
Abstract: Experimental and theoretical aspects of the mobility and diffusion of ions in gases are studied in detail. Some of the subjects discussed include ion-ion interaction, boundary condition and ion and electron behavior. Also discussed in separate chapters are the problems of the diffusion coefficients and the afterglow techniques. Finally, a special chapter studies the kinetic theory of diffusion and mobility, stressing the low-, medium- and high-field theory.

858 citations


Authors

Showing all 45752 results

NameH-indexPapersCitations
Zhong Lin Wang2452529259003
Younan Xia216943175757
Paul M. Thompson1832271146736
Hyun-Chul Kim1764076183227
Jiawei Han1681233143427
John H. Seinfeld165921114911
David J. Mooney15669594172
Richard E. Smalley153494111117
Vivek Sharma1503030136228
James M. Tiedje150688102287
Philip S. Yu1481914107374
Kevin Murphy146728120475
Gordon T. Richards144613110666
Yi Yang143245692268
Joseph T. Hupp14173182647
Network Information
Related Institutions (5)
Carnegie Mellon University
104.3K papers, 5.9M citations

96% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

96% related

University of Maryland, College Park
155.9K papers, 7.2M citations

95% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

95% related

Purdue University
163.5K papers, 5.7M citations

94% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023163
2022704
20216,327
20206,636
20196,645
20186,011