IEEE Organizations related to Censorship

Back to Top

No organizations are currently tagged "Censorship"



Conferences related to Censorship

Back to Top

2020 IEEE International Conference on Multimedia and Expo (ICME)

Multimedia technologies, systems and applications for both research and development of communications, circuits and systems, computer, and signal processing communities.

  • 2019 IEEE International Conference on Multimedia and Expo (ICME)

    speech, audio, image, video, text and new sensor signal processingsignal processing for media integration3D imaging, visualization and animationvirtual reality and augmented realitymulti-modal multimedia computing systems and human-machine interactionmultimedia communications and networkingmedia content analysis and searchmultimedia quality assessmentmultimedia security and content protectionmultimedia applications and servicesmultimedia standards and related issues

  • 2018 IEEE International Conference on Multimedia and Expo (ICME)

    The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities. ICME also features an Exposition of multimedia products and prototypes.

  • 2017 IEEE International Conference on Multimedia and Expo (ICME)

    Topics of interest include, but are not limited to: – Speech, audio, image, video, text and new sensor signal processing – Signal processing for media integration – 3D visualization and animation – 3D imaging and 3DTV – Virtual reality and augmented reality – Multi-modal multimedia computing systems and human-machine interaction – Multimedia communications and networking – Media content analysis – Multimedia quality assessment – Multimedia security and content protection – Multimedia databases and digital libraries – Multimedia applications and services – Multimedia standards and related issues

  • 2016 IEEE International Conference on Multimedia and Expo (ICME)

    Topics of interest include, but are not limited to:- Speech, audio, image, video, text and new sensor signal processing- Signal processing for media integration- 3D visualization and animation- 3D imaging and 3DTV- Virtual reality and augmented reality- Multi-modal multimedia computing systems and human-machine interaction- Multimedia communications and networking- Media content analysis- Multimedia quality assessment- Multimedia security and content protection- Multimedia databases and digital libraries- Multimedia applications and services- Multimedia standards and related issues

  • 2015 IEEE International Conference on Multimedia and Expo (ICME)

    With around 1000 submissions and 500 participants each year, the IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2014 IEEE International Conference on Multimedia and Expo (ICME)

    The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications. In 2014, an Exposition of multimedia products, prototypes and animations will be held in conjunction with the conference.Topics of interest include, but are not limited to:

  • 2013 IEEE International Conference on Multimedia and Expo (ICME)

    To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2008 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2007 IEEE International Conference on Multimedia and Expo (ICME)

  • 2006 IEEE International Conference on Multimedia and Expo (ICME)

  • 2005 IEEE International Conference on Multimedia and Expo (ICME)

  • 2004 IEEE International Conference on Multimedia and Expo (ICME)

  • 2003 IEEE International Conference on Multimedia and Expo (ICME)

  • 2002 IEEE International Conference on Multimedia and Expo (ICME)

  • 2001 IEEE International Conference on Multimedia and Expo (ICME)

  • 2000 IEEE International Conference on Multimedia and Expo (ICME)


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2023 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2022 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


IEEE INFOCOM 2020 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.


2018 10th International Conference on Cyber Conflict (CyCon)

Conflict and actors in cyberspaceCyber capabilitiesTechnical challenges, innovations and requirementsInternet of thingsInternational law and normsInternational cooperation

  • 2017 9th International Conference on Cyber Conflict (CyCon)

    International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation

  • 2016 8th International Conference on Cyber Conflict (CyCon)

    In today’s increasingly complex cyberspace we see a variety of actors struggling to gain or maintain their position. The ubiquitous use of information and communication technologies has had a profound influence on how these actors pursue their goals and interests. The 8th International Conference on Cyber Conflict (CyCon 2016) will focus on ‘cyber power’ as one of the core elements of relations between different stakeholders and will discuss how the traditional concept of ‘power’ applies to cyberspace. Both ‘hard’ and ‘soft power’ are being employed to achieve strategic and political goals through technical, legal and economic means. But how can we assess such power? How can we ensure that such power remains in the right hands? How can we ensure or enforce ‘cyber power’ without risking conflict escalation? How can we respond to exercises of this power with the right tools and measures? Is there a way to maintain a balance of power in cyberspace?

  • 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace(CyCon)

    International cooperation and international relations with regards to cyberspace;Technical challenges and requirements;Conflict in cyberspace;Regulations and standards;Virtualisation

  • 2014 6th International Conference on Cyber Conflict (CyCon)

    The International Conference on Cyber Conflict is CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts . The theme of the conference is Active Cyber Defence.

  • 2013 5th International Conference on Cyber Conflict (CyCon)

    Technical, strategic and legal implications of using automaticmethods to manage cyber conflicts. Conceptual Framework of Cyber ConflictsConcepts for using automatic methods in cyber conflictActors in cyber conflictAutomation of Tactical, Operational and Strategic Procedures in Cyber ConflictsCase Studies, Experiments and SystemsCyber Conflict ModelsReasoning and Attribution in Cyber Conflict targeting and Cyber Attack Impact Assessment

  • 2012 4th International Conference on Cyber Conflict (CYCON)

    The 4th International Conference on Cyber Conflict 2012 (CYCON 2012) will provide a multi-disciplinary forum for scholars, researchers, analysts and practitioners to discuss issues related to cyber conflict and warfare. The conference aspires to advance scientific knowledge and understanding and to support the development of related policies, models and systems.

  • 2011 3rd International Conference on Cyber Conflict (ICCC)

    The International Conference on Cyber Conflict is the CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts (see http://www.ccdcoe.org/ICCC). In 2011 the conference will focus on combination of defensive and offensive aspects of Cyber Forces and will combine different views on cyber defence and operations in the current and envisaged threat environments. This shall not be limited to military perspective. Legal, strategic and tec


2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)

IPSN (part of CPSWEEK) brings together researchers from academia, industry, and government to present and discuss recent advances in both theoretical and experimental research. Its scope includes signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless communications, collaborative objects and the Internet of Things, machine learning, mobile and social sensing, and embedded systems design. Of special interest are contributions at the confluence of multiple of these areas.

  • 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)

    The International Conference on Information Processing in Sensor Networks (IPSN) is a leading, single-track, annual forum on research in networked sensing and control, broadly defined. IPSN brings together researchers from academia, industry, and government to present and discuss recent advances in both theoretical and experimental research. Its scope includes signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless communications, collaborative objects and the internet of things, machine learning, mobile and social sensing, and embedded systems design. Of special interest are contributions at the confluence of a multiple of these areas. The conference features two interleaving tracks, the Information Processing (IP) track, and the Sensor Platforms, Tools and Design Methods (SPOTS) track. We also encourage submissions on innovative applications of sensor network to real world problems.

  • 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)

    The International Conference on Information Processing in Sensor Networks (IPSN) is a leading, single-track, annual forum on research in networked sensing and control, broadly defined. IPSN brings together researchers from academia, industry, and government to present and discuss recent advances in both theoretical and experimental research. Its scope includes signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless communications, collaborative objects and the internet of things, machine learning, mobile and social sensing, and embedded systems design. Of special interest are contributions at the confluence of a multiple of these areas. The conference features two interleaving tracks, the Information Processing (IP) track, and the Sensor Platforms, Tools and Design Methods (SPOTS) track. We also encourage submissions on innovative applications of sensor network to real world problems.

  • 2015 14th ACM/IEEE Conference on Information Processingin Sensor Networks (IPSN)

    The International Conference on Information Processing in Sensor Networks (IPSN) is a leading, single-track, annual forum on research in networked sensing and control, broadly defined. IPSN brings together researchers from academia, industry, and government to present and discuss recent advances in both theoretical and experimental research. Its scope includes signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless communications, collaborative objects and the internet of things, machine learning, mobile and social sensing, and embedded systems design. Of special interest are contributions at the confluence of a multiple of these areas. The conference features two interleaving tracks, the Information Processing (IP) track, and the Sensor Platforms, Tools and Design Methods (SPOTS) track. We also encourage submissions on innovative applications of sensor network to real world problems.

  • 2014 13th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)

    The International Conference on Information Processing in Sensor Networks (IPSN) is a leading, single-track, annual forum on research in networked sensing and control, broadly defined. IPSN brings together researchers from academia, industry, and government to present and discuss recent advances in both theoretical and experimental research. Its scope includes signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless communications, collaborative objects and the internet of things, machine learning, mobile and social sensing, and embedded systems design. Of special interest are contributions at the confluence of a multiple of these areas. The conference features two interleaving tracks, the Information Processing (IP) track, and the Sensor Platforms, Tools and Design Methods (SPOTS) track. We also encourage submissions on innovative applications of sensor network to real world problems.

  • 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)

    The conference features two interleaved tracks, the Information Processing (IP) track, and the Sensor Platforms, Tools and Design Methods (SPOTS) track.

  • 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN)

    IPSN includes signal and image processing, information and coding theory, databases and information management, distributed algorithms, networks and protocols, wireless communications, collaborative objects and the Internet of Things, machine learning, and embedded systems design.

  • 2011 10th International Conference on Information Processing in Sensor Networks (IPSN)

    The International Conference on Information Processing in Sensor Networks (IPSN) is a leading, single-track, annual forum on sensor network research. IPSN brings together researchers from academia, industry, and government to present and discuss recent advances in both theoretical and experimental research.

  • 2010 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)

    The International Conference on Information Processing in Sensor Networks (IPSN) is a leading, single-track, annual forum on sensor network research. IPSN brings together researchers from academia, industry, and government to present and discuss recent advances in both theoretical and experimental research.

  • 2009 8th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)

    The International Conference on Information Processing in Sensor Networks (IPSN) is a leading, single-track, annual forum that brings together researchers from academia, industry, and government to present and discuss recent advances in sensor network research and applications. The conference covers both theoretical and experimental research, as it pertains to sensor networks, in a broad range of disciplines including signal and image processing, information and coding theory, databases and information mana

  • 2008 7th International Conference on Information Processing in Sensor Networks (IPSN)

    IPSN is the leading conference including research in wireless sensor network technology including theory, algorithms, software systems, and sensor network hardware.

  • 2007 6th International Symposium on Information Processing in Sensor Networks (IPSN)

  • 2006 5th International Symposium on Information Processing in Sensor Networks (IPSN)

  • 2005 4th International Symposium on Information Processing in Sensor Networks (IPSN)

  • 2004 3rd International Workshop on Information Processing in Sensor Networks (IPSN)


More Conferences

Periodicals related to Censorship

Back to Top

No periodicals are currently tagged "Censorship"



Xplore Articles related to Censorship

Back to Top

PlayCloud: A Platform to Experiment with Coding Techniques for Storage in the Cloud

2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), 2016

Cloud based storage services are increasingly popular for storing private and enterprise data. Differentiating themselves over a large range of features, storage providers can catter to the needs of any customer. But among the needs they must satisfy, safety from data loss or data corruption is the most important one. While data corruption stemming from faulty hardware or software is ...


Twelve Reminders about FRPAA

Knowledge Unbound: Selected Writings on Open Access, 2002--2011, None

None


Convergence Rate of Survival Function Estimator for Randomly Right-Censored Data

2018 XIV International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE), 2018

In the paper, we consider nonparametric estimators of survival functions (Kaplan-Meier and Nelson-Altshuler) for right-censored data. Also, we consider simulated results of convergence rate under various distributions of failure time. The simulation was carried out by the Monte-Carlo method.


Bayesian Estimation for the Birnbaum-Saunders distribution in the presence of censored data

IEEE Latin America Transactions, 2015

The use of Birnbaum-Saunders distribution can be a good alternative for analyzing data lifetime of equipment. In this work two different prior distributions are used in the estimation of the parameters of the Birnbaum- Saunders distribution under the Bayesian approach and with the presence of type I and II censored data. Assuming a priori dependence between parameters, an alternative prior ...


Design of a dynamic rules firewall to block avoidance internet censorship systems based on proxy

2016 IEEE XXIII International Congress on Electronics, Electrical Engineering and Computing (INTERCON), 2016

Within the policies of an organization could find the not to allow users to access sites on the Internet for entertainment or social networks, as in the case of production organizations and educational therefore a firewall that is used implemented certain rules based on the policies of the organization, blocks access to certain defined sites while you let others. However ...


More Xplore Articles

Educational Resources on Censorship

Back to Top

IEEE-USA E-Books

  • PlayCloud: A Platform to Experiment with Coding Techniques for Storage in the Cloud

    Cloud based storage services are increasingly popular for storing private and enterprise data. Differentiating themselves over a large range of features, storage providers can catter to the needs of any customer. But among the needs they must satisfy, safety from data loss or data corruption is the most important one. While data corruption stemming from faulty hardware or software is usually covered by those services, it is not the case when the erasure is due to malicious activities from the storage provider itself. Therefore the need for anti-tampering countermeasures needs to be addressed for the customer to feel comfortable enough to use the service. In the context of the SafeCloud project, our goal is to provide an extensible platform to implement and evaluate censorship resistant storage systems for long term storage. By combining classical techniques such as erasure coding and data dispersion with more novel ones like data block entanglement, we aim at giving good anti- tampering guarantees for cloud based storage services. In this paper, we will present some of the work that has been done so far to reach this objective, results and future developments.

  • Twelve Reminders about FRPAA

    None

  • Convergence Rate of Survival Function Estimator for Randomly Right-Censored Data

    In the paper, we consider nonparametric estimators of survival functions (Kaplan-Meier and Nelson-Altshuler) for right-censored data. Also, we consider simulated results of convergence rate under various distributions of failure time. The simulation was carried out by the Monte-Carlo method.

  • Bayesian Estimation for the Birnbaum-Saunders distribution in the presence of censored data

    The use of Birnbaum-Saunders distribution can be a good alternative for analyzing data lifetime of equipment. In this work two different prior distributions are used in the estimation of the parameters of the Birnbaum- Saunders distribution under the Bayesian approach and with the presence of type I and II censored data. Assuming a priori dependence between parameters, an alternative prior distribution based on copula functions is proposed. Thus, a study to determine whether the priors lead to the same inference a posteriori is of great practical interest. Two examples are presented to illustrate the proposed methodology and investigated the performance of prior distributions. The Bayesian analysis is performed based on Monte Carlo Markov Chain (MCMC) to generate samples from the posterior distribution.

  • Design of a dynamic rules firewall to block avoidance internet censorship systems based on proxy

    Within the policies of an organization could find the not to allow users to access sites on the Internet for entertainment or social networks, as in the case of production organizations and educational therefore a firewall that is used implemented certain rules based on the policies of the organization, blocks access to certain defined sites while you let others. However as has not been implemented rules to block proxies of Avoidance Internet Censorship Systems, the user can access them easily proxies. The addresses of these proxies change very frequently, so it is almost impossible to block them all, and eventually they appear more. The proposed solution is to create a firewall that uses dynamic rules, these rules creates dynamic firewall itself. A test of each address to a destination is made and if it finds that the destination is a proxy of one of these systems evasion; the firewall creates a new rule and automatically implemented. In this way the user will lose access to the proxy avoidance.

  • A Public Key Based EDNS Privacy Tunnel for DNS

    DNS privacy concerns are rising. DNS queries are sent in plain text by default, attackers can perform massive surveillance of unencrypted DNS traffic. Recursive resolvers know about the query domain name and the client IP address, which allows for fingerprinting of individual users. In order to mitigate privacy leaks in DNS, in this paper we propose a public key based EDNS Privacy Tunnel (EPT) padding option for DNS. EPT takes advantage of the public key encryption to hide the query domain name from recursive resolvers, reduce the client IP address leakage to authoritative servers, and defense against censorship and lying recursive resolvers.

  • Utterance Censorship of Online Reinforcement Learning Chatbot

    Researchers have applied online deep reinforcement learning in order to enhance the open-domain conversational skills of chatbots. These chatbots have the ability to learn conversations from real users but in practical applications, some users may take advantage of the chatbot's online learning ability to generate offensive responses. In this paper, we introduce an utterance censorship system to check whether the chatbot's utterance is appropriate. If the speech is inappropriate, the censor will block it and give a negative reward to "punish" the chatbot. The censorship system is based on a character-level bidirectional LSTM model, and the chatbot receiving the reward from the censorship system "forgets" the learned offensive utterances. Experimental results show that our proposed architecture enables online learning chatbots to self-purify and that character-level LSTM is more appropriate for the utterance censorship task compared with classical word- level LSTM model.

  • Distributing Distributed Revision Control Systems

    Current revision control systems are commonly used in a distributed fashion but rely on centralized stores and low-latency communication. In this work we evaluate how they would fare in fully distributed high latency networks such as delay tolerant networks (DTNs). We show that current revision control systems impose significant costs under these conditions even in moderately- sized networks. By simplifying/improving the merging process, these costs can be reduced. We also show that speeding up or slowing down communication can reduce the costs significantly.

  • SWEET: Serving the Web by Exploiting Email Tunnels

    Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today's advanced censorship technologies. In this paper, we propose Serving the Web by Exploiting Email Tunnels (SWEET), a highly available censorship-resistant infrastructure. SWEET works by encapsulating a censored user's traffic inside email messages that are carried over public email services like Gmail and Yahoo Mail. As the operation of SWEET is not bound to any specific email provider, we argue that a censor will need to block email communications all together in order to disrupt SWEET, which is unlikely as email constitutes an important part of today's Internet. Through experiments with a prototype of our system, we find that SWEET's performance is sufficient for Web browsing. In particular, regular Websites are downloaded within couple of seconds.

  • Network Traffic Obfuscation and Automated Internet Censorship

    Internet censors seek ways to identify and block internet access to information they deem objectionable. Increasingly, censors deploy advanced networking tools such as deep-packet inspection (DPI) to identify such connections. In response, activists and academic researchers have developed and deployed network traffic obfuscation mechanisms. These apply specialized cryptographic tools to attempt to hide from DPI the true nature and content of connections. This survey offers an overview of network traffic obfuscation and its role in circumventing Internet censorship.



Standards related to Censorship

Back to Top

No standards are currently tagged "Censorship"


Jobs related to Censorship

Back to Top