Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,067 Hits in 5.2 sec

Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion

Anna Oganian, Josep Domingo-Ferrer
2017 Transactions on Data Privacy  
The proposed method satisfies the requirements of k-anonymity; in particular we use a variant of the k-anonymity privacy model, namely probabilistic k-anonymity, by incorporating constraints on cluster  ...  In this paper we propose a new scheme for disclosure limitation, based on the idea of local synthesis of data. Our approach is predicated on model-based clustering.  ...  Specifically, we will use a variant of the k-anonymity criterion, called probabilistic k-anonymity (Soria-Comas and Definition 1 (Probabilistic k-anonymity).  ... 
pmid:31555393 pmcid:PMC6760907 fatcat:35uxhrzbuvdfdajplsa5yzkgyu

Hybrid Fuzzy Auto-Regressive Integrated Moving Average (FARIMAH) Model for Forecasting the Foreign Exchange Markets

Mehdi Khashei, Farimah Mokhatab Rafiei, Mehdi Bijari
2013 International Journal of Computational Intelligence Systems  
In this paper, a new hybrid model of FARIMA models is proposed by combining with probabilistic neural classifiers, called FARIMAH, in order to yield a more general and more accurate model than FARIMA models  ...  the traditional ARIMA models; especially data limitation, and yield more accurate results.  ...  Acknowledgements The authors wish to express their gratitude to anonymous reviewers, Dr. G. A. Raissi ardali, and Dr. A.  ... 
doi:10.1080/18756891.2013.809937 fatcat:ox2hkptwhzek5j53dkwn234lxm

Using Hybrid and Diversity-Based Adaptive Ensemble Method for Binary Classification

Xing Fan, Chung-Horng Lung, Samuel A. Ajila
2018 International Journal of Intelligence Science  
The proposed method is a non-linear combination of base models and the application of adaptive selection of the most suitable model for each data instance.  ...  Ensemble method, an important machine learning technique uses multiple single models to construct a hybrid model. A hybrid model generally performs better compared to a single individual model.  ...  of an anonymous person relationship string The role of an anonymous person in a family race string The race of an anonymous person In the case of RBP, Logistic Regression and Random Forests  ... 
doi:10.4236/ijis.2018.83003 fatcat:tw67ulhz4zaezjolmq4saodcqy

Mixed Sum-Product Networks: A Deep Architecture for Hybrid Domains

Alejandro Molina, Antonio Vergari, Nicola Di Mauro, Sriraam Natarajan, Floriana Esposito, Kristian Kersting
2018 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Users spend significant amounts of time in identifying the parametric form of the random variables (Gaussian, Poisson, Logit, etc.) involved and learning the mixed models.  ...  While all kinds of mixed data---from personal data, over panel and scientific data, to public and commercial data---are collected and stored, building probabilistic graphical models for these hybrid domains  ...  Acknowledgements: The authors would like to thank the anonymous reviewer for the valuable feedback.  ... 
doi:10.1609/aaai.v32i1.11731 fatcat:xaoqqpiseverfp2f3ncm76itpa

Improving the Performance of Various Privacy Preserving Databases using Hybrid Geometric Data Perturbation Classification Model

Sk. Mohammed Gouse, G.Krishna Mohan
2020 International Journal of Advanced Computer Science and Applications  
In this work, a new data transformation approach, hybrid geometrical perturbation approach and hybrid boosting classifier are proposed in order to enhance the overall efficiency of the model on the privacy  ...  In order to improve the privacy, accuracy and runtime of the traditional privacy preserving models, a hybrid perturbation based privacy preserving classification model is proposed on the multiple databases  ...  In this proposed classification model, a novel random tree and non-linear kernel function based multiclass SVM approach.  ... 
doi:10.14569/ijacsa.2020.0111034 fatcat:ckipn7ikhvhrtc35rggyhe5yvi

Plaintext-Checkable Encryption [chapter]

Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie
2012 Lecture Notes in Computer Science  
We provide efficient generic random-oracle constructions for PCE based on any probabilistic or deterministic encryption scheme; we also give a practical construction in the standard model.  ...  Deterministic/probabilistic encryption, unlinkability, group signature with VLR and backward unlinkability.  ...  Generic Constructions for PCE in the ROM We show how to obtain secure PCE schemes using a secure probabilistic or deterministic encryption scheme with security proofs in the random-oracle model.  ... 
doi:10.1007/978-3-642-27954-6_21 fatcat:ur4pmqah2fb57hmg2cfzs2vly4

Guest Editorial Introduction to the Special Section on Reloading Feature-Rich Information Networks

Andrea Tagarelli, Sabrina Gaito, Roberto Interdonato, Tsuyoshi Murata, Alessandra Sala, My T. Thai
2021 IEEE Transactions on Network Science and Engineering  
A time-evolving analysis approach is developed by formulating multi-objective optimization problems corresponding to the linear and nonlinear models.  ...  and link prediction, to community detection, from mitigation and restoration in response to cascading node failures, to network anonymization, to new models and applications in finance network, and communication  ... 
doi:10.1109/tnse.2021.3073824 fatcat:vdd4jtbiefa6pee3bhfzonhp4q

A new methodological development for solving linear bilevel integer programming problems in hybrid fuzzy environment

Animesh Biswas, Arnab Kumar De
2016 New Trends in Mathematical Sciences  
In the proposed approach a new chance constrained programming methodology is developed from the view point of managing those probabilistic constraints in a hybrid fuzzy environment.  ...  This paper deals with fuzzy goal programming approach to solve fuzzy linear bilevel integer programming problems with fuzzy probabilistic constraints following Pareto distribution and Frechet distribution  ...  The authors are thankful to the anonymous reviewers for the constructive comments and suggestions in improving the quality of the article.  ... 
doi:10.20852/ntmsci.2016217828 fatcat:osulor22pvecndjqlbxeaorpry

Anonymous attribute-based encryption supporting efficient decryption test

Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
However, in existing anonymous ABE work, a user knows whether the attributes and the policy match or not only after repeating decryption attempts.  ...  As a result, this direct decryption method in anonymous ABE will suffer a severe efficiency drawback.  ...  C is a random element in GT regardless of the random coin, while the rest of the challenge ciphertext are generated in a normal way.  ... 
doi:10.1145/2484313.2484381 dblp:conf/ccs/ZhangCLWL13 fatcat:4alxqaddcjeahodjhhzg2ar4zm

Engineering constraint solvers for automatic analysis of probabilistic hybrid automata

Martin Fränzle, Tino Teige, Andreas Eggers
2010 The Journal of Logic and Algebraic Programming  
In this article, we recall different approaches to the constraint-based, symbolic analysis of hybrid discrete-continuous systems and combine them to a technology able to address hybrid systems exhibiting  ...  Generalizing SMT-based bounded model-checking of hybrid automata [5, 31] , stochastic SMT including ODEs permits the direct analysis of probabilistic bounded reachability problems of dense-time probabilistic  ...  In particular, we would like to thank Holger Hermanns and Lijun Zhang for familiarizing us with probabilistic model checking in general and the intricacies of step-bounded probabilistic properties in particular  ... 
doi:10.1016/j.jlap.2010.07.003 fatcat:af5e2hgxmnayzdgncq7cuntnr4

PODS

Thanh T.L. Tran, Liping Peng, Boduo Li, Yanlei Diao, Anna Liu
2010 Proceedings of the 2010 international conference on Management of data - SIGMOD '10  
PODS employs a unique data model that is flexible and allows efficient computation.  ...  Evaluation results show that our techniques can achieve high performance while satisfying accuracy requirements, and significantly outperform a state-of-the-art sampling method.  ...  The authors would like to thank Peter Haas for useful conversations, Divesh Srivastava for comments on an earlier draft of this paper, and the anonymous reviewers for their helpful feedback.  ... 
doi:10.1145/1807167.1807187 dblp:conf/sigmod/TranPLDL10 fatcat:pfonw4lck5hrlmu5n7tam4mgny

The Tile Complexity of Linear Assemblies [chapter]

Harish Chandran, Nikhil Gopalkrishnan, John Reif
2009 Lecture Notes in Computer Science  
We describe a natural extension to TAM called the Probabilistic Tile Assembly Model (PTAM) to model the inherent probabilistic behavior in physically realized selfassembled systems.  ...  Thus, for linear assembly systems, we have shown that randomization can be exploited to get large improvements in tile complexity at a small expense of precision in length.  ...  Acknowledgements We wish to thank our anonymous reviewers for helpful comments, especially for pointing out the error resilience of temperature 1 assemblies.  ... 
doi:10.1007/978-3-642-02927-1_21 fatcat:rixb7mktazcmthm2crju47vzvm

Interaction of lexical strata in hybrid compound words through gradient phonotactics

Eric Robert Rosen, Matthew Goldrick
2022 Proceedings of the Annual Meetings on Phonology  
We analyse hybrid compound words in Japanese, where a hybrid compound is one formed from stems that belong to more than one lexical stratum.  ...  In native-foreign compounds, where one stem belongs to one of the three native strata: Yamato, Sino Japanese and mimetic, as identified by Itô and Mester (1995), and the other to the foreign stratum, we  ...  In §6 we discuss probabilistic models of phonotactics with an example of a word passed through an RNN model, and show how the model's probabilities of a stem in a compound vary depending on the nature  ... 
doi:10.3765/amp.v9i0.5158 fatcat:2e4mrswugvce7bwgtnqi6vpdha

A Variant of Boyen-Waters Anonymous IBE Scheme [chapter]

Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing
2011 Lecture Notes in Computer Science  
The first HIBE scheme was proposed by Gentry and Silverberg [20] which can be seemed as an extension of Boneh-Franklin IBE scheme. Their scheme was proved to be secure in the random oracle model.  ...  In this paper, we present a novel anonymous identity-based encryption scheme.  ...  Gentry [18] proposed a concrete construction of anonymous IBE in the standard model and Boyen and Waters (BW-HIBE) [10] also proposed another anonymous IBE scheme and an anonymous HIBE scheme.  ... 
doi:10.1007/978-3-642-25243-3_4 fatcat:kmqm4ij5hfcjjjpf4tgtjgymky

Optimal Scheduling of an Isolated Microgrid with Battery Storage Considering Load and Renewable Generation Uncertainties

Yang Li, Zhen Yang, Guoqing Li, Dongbo Zhao, Wei Tian
2018 IEEE transactions on industrial electronics (1982. Print)  
The model is transformed into a readily solvable mixed integer linear programming (MILP) formulation in GAMS via a proposed discretized step transformation (DST) approach and finally solved by applying  ...  By modeling the uncertainty of spinning reserves provided by energy storage with probabilistic constraints, a new optimal scheduling mode is proposed for minimizing the operating costs of an isolated microgrid  ...  ACKNOWLEDGMENT The authors thank the anonymous reviewers for their careful work and thoughtful suggestions that have helped improve this paper substantially.  ... 
doi:10.1109/tie.2018.2840498 fatcat:xooftefydjdf3giggasjfszvpe
« Previous Showing results 1 — 15 out of 7,067 results