Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








212 Hits in 2.3 sec

Privacy Preserving Nearest Neighbor Search [chapter]

Mark Shaneck, Yongdae Kim, Vipin Kumar
2009 Machine Learning in Cyber Trust  
We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification.  ...  Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees.  ...  LOF Outlier Detection LOF outlier detection [2] is a method of outlier detection that relies on relative densities of data points.  ... 
doi:10.1007/978-0-387-88735-7_10 fatcat:obtqow5n2rcftgnfquik5jtnji

PCOR: Private Contextual Outlier Release via Differentially Private Search [article]

Masoumeh Shafieinejad
2021 arXiv   pre-print
Outlier detection plays a significant role in various real world applications such as intrusion, malfunction, and fraud detection.  ...  Hence, the first major challenge is that the privacy technique must preserve the validity of the context for each record.  ...  The last sample in the stack is the final privacy preserving answer. Proof.  ... 
arXiv:2103.05173v1 fatcat:bm2r3fhflbhkbnvwsrvl6b5a2i

An Analysis of ML-Based Outlier Detection from Mobile Phone Trajectories

Francisco Melo Pereira, Rute C. Sofia
2022 Future Internet  
Results achieved show that LOF exhibits the best performance across the different datasets, thus showing better suitability for outlier detection in the context of frameworks that perform PoI detection  ...  This paper provides an analysis of two machine learning algorithms, density-based spatial clustering of applications with noise (DBSCAN) and the local outlier factor (LOF), applied in the detection of  ...  Privacy Preservation and Security Considerations MCS requires first of all consent by the user.  ... 
doi:10.3390/fi15010004 fatcat:yip2ujd3dvck5nq5hf7yjw4dxi

Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems (January 2019)

Aaron J. Boddy, Will Hurst, Michael Mackay, Abdennour El Rhalibi
2019 IEEE Access  
This paper presents a system that employs a density-based local outlier detection model. The system is intended to add to the defense-in-depth of healthcare infrastructures.  ...  INDEX TERMS Data analysis, electronic patient records, healthcare infrastructures, information security, patient privacy, visualisation.  ...  There is a large volume of literature concerning big-data-based privacy-preserving machine learning algorithms.  ... 
doi:10.1109/access.2019.2906503 fatcat:7lf3454u4jgitmd3wvdtazeu6e

Oan: aykırı kayıt yönelimli fayda temelli mahremiyet koruma modeli

Yavuz Canbay, Yılmaz Vural, Şeref Sağıroğlu
2019 Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi  
In this study, a new outlier-oriented utility-based privacy preserving model named as OAN, which reduces the computational cost by detecting outliers before anonymization and increases data utility by  ...  In this study, a new outlier record-oriented utility-based privacy-preserving model named as OAN, which reduces the computational cost by detecting outliers before anonymization and increases data utility  ...  Wang H.W., Liu R., Hiding Outliers into Crowd: Privacy-preserving Data Publishing with Outliers, Data & Knowledge Engineering, 100, 94-115, 2015. 9.  ... 
doi:10.17341/gazimmfd.467390 fatcat:3k2s5fiqzbcavcamzyuhrlh2cu

Patient Privacy Violation Detection in Healthcare Critical Infrastructures: An Investigation Using Density-Based Benchmarking

William Hurst, Aaron Boddy, Madjid Merabti, Nathan Shone
2020 Future Internet  
The system outlined in this research employs an internal-focused methodology for anomaly detection by using the Local Outlier Factor (LOF) and Density-Based Spatial Clustering of Applications with Noise  ...  Out of 90,385 unique IDs, DBSCAN finds 102 anomalies, whereas 358 are detected using LOF.  ...  LOF Outlier Detection Results The LOF visualisation in Figure 8 creates an anomaly priority ordering display, where the advantage of a weighted anomaly score is apparent.  ... 
doi:10.3390/fi12060100 fatcat:lh46gbt5izbjvogmd5csoe4mz4

Privacy Preserving Nearest Neighbor Search

Mark Shaneck, Yongdae Kim, Vipin Kumar
2006 Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06)  
We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification.  ...  Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees.  ...  Previous work on privacy preserving outlier detection [49] required finding the number of neighbors closer than a threshold.  ... 
doi:10.1109/icdmw.2006.133 dblp:conf/icdm/ShaneckKK06 fatcat:wt5bkrfisngcdmdh3qatvbjv74

Privacy-Preserving Anomaly Detection Using Synthetic Data [chapter]

Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart
2020 Lecture Notes in Computer Science  
Besides anonymisation, which becomes difficult to achieve especially with high dimensional data, one approach for privacy-preserving data mining lies in the usage of synthetic data.  ...  to a lack of realistic outliers.  ...  For a detailed overview on privacy-preserving data publishing methods, see [5] .  ... 
doi:10.1007/978-3-030-49669-2_11 fatcat:rvd3js72gnd5fnv3xo5o3p6xs4

Semi-supervised Learning Framework for UAV Detection [article]

Olusiji O Medaiyese, Martins Ezuma, Adrian P Lauf, Ismail Guvenc
2021 arXiv   pre-print
We developed a local outlier factor model as the UAV detection algorithm using the coefficient variances of the wavelet packets from WiFi and Bluetooth signals.  ...  The application of this approach is not limited to UAV detection as it can be extended to the detection of rogue RF devices in an environment.  ...  A global outlier detection algorithm might not be able to detect L 1 and L 2 as outliers. Information about how LOF computes the local density of a datapoint can be found in [21] .  ... 
arXiv:2104.06614v1 fatcat:mzi3lzwqgjgk5ew33zxnnzicim

Arrays of (locality-sensitive) Count Estimators (ACE)

Chen Luo, Anshumali Shrivastava
2018 Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18  
Even being a well-studied topic, existing techniques for unsupervised anomaly detection require storing significant amounts of data, which is prohibitive from memory, latency and privacy perspectives,  ...  In addition, ACE has appealing privacy properties.  ...  Privacy-preserving anomaly detection is a challenging problem in itself [7] .  ... 
doi:10.1145/3178876.3186056 dblp:conf/www/LuoS18 fatcat:ysyaoli5kjhezimx6jvh5xzb6i

Achieving differential privacy for k-nearest neighbors based outlier detection by data partitioning [article]

Jens Rauch, Iyiola E. Olatunji, Megha Khosla
2021 arXiv   pre-print
When applying outlier detection in settings where data is sensitive, mechanisms which guarantee the privacy of the underlying data are needed.  ...  The k-nearest neighbors (k-NN) algorithm is a simple and one of the most effective methods for outlier detection.  ...  The existing works, which have proposed solutions for privacy preserving outlier detection either relax the concept of -DP [3, 5, 15] or use simplified definitions of outliers [17, 4, 13] in order  ... 
arXiv:2104.07938v1 fatcat:srji6zh7lva5dbiwcuzcsqlmwi

Arrays of (locality-sensitive) Count Estimators (ACE): High-Speed Anomaly Detection via Cache Lookups [article]

Chen Luo, Anshumali Shrivastava
2017 arXiv   pre-print
These tiny 4MB arrays of counts are sufficient for unsupervised anomaly detection.  ...  Anomaly detection is one of the frequent and important subroutines deployed in large-scale data processing systems.  ...  It turns out that our proposed ACE algorithm has ideal properties for privacy preserving anomaly detection.  ... 
arXiv:1706.06664v1 fatcat:touxonk5kbf5nlxyfkbo46cjnu

Detection of Malicious DNS-over-HTTPS Traffic: An Anomaly Detection Approach using Autoencoders [article]

Sergio Salinas Monroy, Aman Kumar Gupta, Garrett Wahlstedt
2023 arXiv   pre-print
We run extensive experiments to evaluate the performance of our proposed autoencoder and compare it to that of other anomaly detection algorithms, namely, local outlier factor, one-class support vector  ...  To maintain the privacy of users' web browsing history, popular browsers encrypt their DNS traffic using the DNS-over-HTTPS (DoH) protocol.  ...  We summarize our contributions as follows. • We design a privacy-preserving anomaly detection autoencoder to detect malicious DoH traffic.  ... 
arXiv:2310.11325v1 fatcat:fgophas3mnaerk7cn3445b6olm

Custom Outlier Detection for Electrical Energy Consumption Data Applied in Case of Demand Response in Block of Buildings

Dacian I Jurj, Levente Czumbil, Bogdan Bârgăuan, Andrei Ceclan, Alexis Polycarpou, Dan D Micu
2021 Sensors  
Quantitative and qualitative methods were created with the scope of error reduction and were covered in multiple surveys and overviews to cope with outlier detection.  ...  The aim of this paper is to provide an extended analysis of the outlier detection, using probabilistic and AI techniques, applied in a demo pilot demand response in blocks of buildings project, based on  ...  The adjustment of the valid outliers was conducted using one of the most popular outlier detection techniques in literature, that is the shape-preserving piecewise cubic spline interpolation [65] .  ... 
doi:10.3390/s21092946 pmid:33922298 fatcat:c6drxafbg5gxhbghwjqm2bsjza

Outlier Detection using AI: A Survey [article]

Md Nazmul Kabir Sikder, Feras A. Batarseh
2021 arXiv   pre-print
It is important to detect outlier events as carefully as possible to avoid infrastructure failures because anomalous events can cause minor to severe damage to infrastructure.  ...  Accordingly, and due to its variability, Outlier Detection (OD) is an ever-growing research field. In this chapter, we discuss the progress of OD methods using AI techniques.  ...  However, most of the real-world datasets are not publicly, because of security and privacy concerns.  ... 
arXiv:2112.00588v1 fatcat:yonfnhohpnbxxgiwrxon74mcny
« Previous Showing results 1 — 15 out of 212 results