A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion
2017
Transactions on Data Privacy
The proposed method satisfies the requirements of k-anonymity; in particular we use a variant of the k-anonymity privacy model, namely probabilistic k-anonymity, by incorporating constraints on cluster ...
In this paper we propose a new scheme for disclosure limitation, based on the idea of local synthesis of data. Our approach is predicated on model-based clustering. ...
Specifically, we will use a variant of the k-anonymity criterion, called probabilistic k-anonymity (Soria-Comas and Definition 1 (Probabilistic k-anonymity). ...
pmid:31555393
pmcid:PMC6760907
fatcat:35uxhrzbuvdfdajplsa5yzkgyu
Hybrid Fuzzy Auto-Regressive Integrated Moving Average (FARIMAH) Model for Forecasting the Foreign Exchange Markets
2013
International Journal of Computational Intelligence Systems
In this paper, a new hybrid model of FARIMA models is proposed by combining with probabilistic neural classifiers, called FARIMAH, in order to yield a more general and more accurate model than FARIMA models ...
the traditional ARIMA models; especially data limitation, and yield more accurate results. ...
Acknowledgements The authors wish to express their gratitude to anonymous reviewers, Dr. G. A. Raissi ardali, and Dr. A. ...
doi:10.1080/18756891.2013.809937
fatcat:ox2hkptwhzek5j53dkwn234lxm
Using Hybrid and Diversity-Based Adaptive Ensemble Method for Binary Classification
2018
International Journal of Intelligence Science
The proposed method is a non-linear combination of base models and the application of adaptive selection of the most suitable model for each data instance. ...
Ensemble method, an important machine learning technique uses multiple single models to construct a hybrid model. A hybrid model generally performs better compared to a single individual model. ...
of an anonymous person
relationship
string
The role of an anonymous person in a family
race
string
The race of an anonymous person
In the case of RBP, Logistic Regression and Random Forests ...
doi:10.4236/ijis.2018.83003
fatcat:tw67ulhz4zaezjolmq4saodcqy
Mixed Sum-Product Networks: A Deep Architecture for Hybrid Domains
2018
PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE
Users spend significant amounts of time in identifying the parametric form of the random variables (Gaussian, Poisson, Logit, etc.) involved and learning the mixed models. ...
While all kinds of mixed data---from personal data, over panel and scientific data, to public and commercial data---are collected and stored, building probabilistic graphical models for these hybrid domains ...
Acknowledgements: The authors would like to thank the anonymous reviewer for the valuable feedback. ...
doi:10.1609/aaai.v32i1.11731
fatcat:xaoqqpiseverfp2f3ncm76itpa
Improving the Performance of Various Privacy Preserving Databases using Hybrid Geometric Data Perturbation Classification Model
2020
International Journal of Advanced Computer Science and Applications
In this work, a new data transformation approach, hybrid geometrical perturbation approach and hybrid boosting classifier are proposed in order to enhance the overall efficiency of the model on the privacy ...
In order to improve the privacy, accuracy and runtime of the traditional privacy preserving models, a hybrid perturbation based privacy preserving classification model is proposed on the multiple databases ...
In this proposed classification model, a novel random tree and non-linear kernel function based multiclass SVM approach. ...
doi:10.14569/ijacsa.2020.0111034
fatcat:ckipn7ikhvhrtc35rggyhe5yvi
Plaintext-Checkable Encryption
[chapter]
2012
Lecture Notes in Computer Science
We provide efficient generic random-oracle constructions for PCE based on any probabilistic or deterministic encryption scheme; we also give a practical construction in the standard model. ...
Deterministic/probabilistic encryption, unlinkability, group signature with VLR and backward unlinkability. ...
Generic Constructions for PCE in the ROM We show how to obtain secure PCE schemes using a secure probabilistic or deterministic encryption scheme with security proofs in the random-oracle model. ...
doi:10.1007/978-3-642-27954-6_21
fatcat:ur4pmqah2fb57hmg2cfzs2vly4
Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks
2021
IEEE Transactions on Network Science and Engineering
A time-evolving analysis approach is developed by formulating multi-objective optimization problems corresponding to the linear and nonlinear models. ...
and link prediction, to community detection, from mitigation and restoration in response to cascading node failures, to network anonymization, to new models and applications in finance network, and communication ...
doi:10.1109/tnse.2021.3073824
fatcat:vdd4jtbiefa6pee3bhfzonhp4q
A new methodological development for solving linear bilevel integer programming problems in hybrid fuzzy environment
2016
New Trends in Mathematical Sciences
In the proposed approach a new chance constrained programming methodology is developed from the view point of managing those probabilistic constraints in a hybrid fuzzy environment. ...
This paper deals with fuzzy goal programming approach to solve fuzzy linear bilevel integer programming problems with fuzzy probabilistic constraints following Pareto distribution and Frechet distribution ...
The authors are thankful to the anonymous reviewers for the constructive comments and suggestions in improving the quality of the article. ...
doi:10.20852/ntmsci.2016217828
fatcat:osulor22pvecndjqlbxeaorpry
Anonymous attribute-based encryption supporting efficient decryption test
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
However, in existing anonymous ABE work, a user knows whether the attributes and the policy match or not only after repeating decryption attempts. ...
As a result, this direct decryption method in anonymous ABE will suffer a severe efficiency drawback. ...
C is a random element in GT regardless of the random coin, while the rest of the challenge ciphertext are generated in a normal way. ...
doi:10.1145/2484313.2484381
dblp:conf/ccs/ZhangCLWL13
fatcat:4alxqaddcjeahodjhhzg2ar4zm
Engineering constraint solvers for automatic analysis of probabilistic hybrid automata
2010
The Journal of Logic and Algebraic Programming
In this article, we recall different approaches to the constraint-based, symbolic analysis of hybrid discrete-continuous systems and combine them to a technology able to address hybrid systems exhibiting ...
Generalizing SMT-based bounded model-checking of hybrid automata [5, 31] , stochastic SMT including ODEs permits the direct analysis of probabilistic bounded reachability problems of dense-time probabilistic ...
In particular, we would like to thank Holger Hermanns and Lijun Zhang for familiarizing us with probabilistic model checking in general and the intricacies of step-bounded probabilistic properties in particular ...
doi:10.1016/j.jlap.2010.07.003
fatcat:af5e2hgxmnayzdgncq7cuntnr4
PODS employs a unique data model that is flexible and allows efficient computation. ...
Evaluation results show that our techniques can achieve high performance while satisfying accuracy requirements, and significantly outperform a state-of-the-art sampling method. ...
The authors would like to thank Peter Haas for useful conversations, Divesh Srivastava for comments on an earlier draft of this paper, and the anonymous reviewers for their helpful feedback. ...
doi:10.1145/1807167.1807187
dblp:conf/sigmod/TranPLDL10
fatcat:pfonw4lck5hrlmu5n7tam4mgny
The Tile Complexity of Linear Assemblies
[chapter]
2009
Lecture Notes in Computer Science
We describe a natural extension to TAM called the Probabilistic Tile Assembly Model (PTAM) to model the inherent probabilistic behavior in physically realized selfassembled systems. ...
Thus, for linear assembly systems, we have shown that randomization can be exploited to get large improvements in tile complexity at a small expense of precision in length. ...
Acknowledgements We wish to thank our anonymous reviewers for helpful comments, especially for pointing out the error resilience of temperature 1 assemblies. ...
doi:10.1007/978-3-642-02927-1_21
fatcat:rixb7mktazcmthm2crju47vzvm
Interaction of lexical strata in hybrid compound words through gradient phonotactics
2022
Proceedings of the Annual Meetings on Phonology
We analyse hybrid compound words in Japanese, where a hybrid compound is one formed from stems that belong to more than one lexical stratum. ...
In native-foreign compounds, where one stem belongs to one of the three native strata: Yamato, Sino Japanese and mimetic, as identified by Itô and Mester (1995), and the other to the foreign stratum, we ...
In §6 we discuss probabilistic models of phonotactics with an example of a word passed through an RNN model, and show how the model's probabilities of a stem in a compound vary depending on the nature ...
doi:10.3765/amp.v9i0.5158
fatcat:2e4mrswugvce7bwgtnqi6vpdha
A Variant of Boyen-Waters Anonymous IBE Scheme
[chapter]
2011
Lecture Notes in Computer Science
The first HIBE scheme was proposed by Gentry and Silverberg [20] which can be seemed as an extension of Boneh-Franklin IBE scheme. Their scheme was proved to be secure in the random oracle model. ...
In this paper, we present a novel anonymous identity-based encryption scheme. ...
Gentry [18] proposed a concrete construction of anonymous IBE in the standard model and Boyen and Waters (BW-HIBE) [10] also proposed another anonymous IBE scheme and an anonymous HIBE scheme. ...
doi:10.1007/978-3-642-25243-3_4
fatcat:kmqm4ij5hfcjjjpf4tgtjgymky
Optimal Scheduling of an Isolated Microgrid with Battery Storage Considering Load and Renewable Generation Uncertainties
2018
IEEE transactions on industrial electronics (1982. Print)
The model is transformed into a readily solvable mixed integer linear programming (MILP) formulation in GAMS via a proposed discretized step transformation (DST) approach and finally solved by applying ...
By modeling the uncertainty of spinning reserves provided by energy storage with probabilistic constraints, a new optimal scheduling mode is proposed for minimizing the operating costs of an isolated microgrid ...
ACKNOWLEDGMENT The authors thank the anonymous reviewers for their careful work and thoughtful suggestions that have helped improve this paper substantially. ...
doi:10.1109/tie.2018.2840498
fatcat:xooftefydjdf3giggasjfszvpe
« Previous
Showing results 1 — 15 out of 7,067 results