2018 IEEE Symposium on Privacy-Aware Computing (PAC)最新文献

筛选
英文 中文
Backward Thinking of Routing with High Uncertainties: Causal Entropy Based Routing in Multi-Agent Networks 高不确定性路由的逆向思考:多智能体网络中基于因果熵的路由
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00021
Zhonghu Xu, Kai Xing, Xuefeng Liu, Jiannong Cao
{"title":"Backward Thinking of Routing with High Uncertainties: Causal Entropy Based Routing in Multi-Agent Networks","authors":"Zhonghu Xu, Kai Xing, Xuefeng Liu, Jiannong Cao","doi":"10.1109/PAC.2018.00021","DOIUrl":"https://doi.org/10.1109/PAC.2018.00021","url":null,"abstract":"This paper is motivated by the task of modeling routing decisions with sequential forwarding interactions in multi-agent networks with topology uncertainties, e.g., agents' mobility traces with uncertain speed and direction, links to someone unknown in stranger social networks, both making their interactions come across at uncertain time and location. Since most routing designs assume that agents' behaviors be regular or with known probability distribution and envision the future of topology as stable/predictable (namely limited uncertainty), these approaches may suffer the difficulty dealing with the networks with high uncertainties. The proposed research aims to provide an effective solution for message routing among agents in such networks. Specifically, we introduce a new principle of causal entropy force in multi-agent networks for routing with high uncertainties, provide a new thinking way of routing, backward thinking, and build connections between individual intelligence, topology uncertainties, and message routing through path entropy in phase space. The experiment results with real dataset (30K taxies) indicate that the proposed method could achieve 83% message delivery rate, compared with 20%-25% of traditional approaches, and generally achieve much less latency compared with typical methods.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/pac.2018.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/pac.2018.00003","DOIUrl":"https://doi.org/10.1109/pac.2018.00003","url":null,"abstract":"","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122149769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving POI Recommendation Using Nonnegative Matrix Factorization 基于非负矩阵分解的隐私保护POI推荐
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00018
Xiwei Wang, Hao Yang, Kiho Lim
{"title":"Privacy-Preserving POI Recommendation Using Nonnegative Matrix Factorization","authors":"Xiwei Wang, Hao Yang, Kiho Lim","doi":"10.1109/PAC.2018.00018","DOIUrl":"https://doi.org/10.1109/PAC.2018.00018","url":null,"abstract":"Location based social networks (LBSNs) have become an essential part of life for many smartphone users. With the sheer volume of new information in LBSNs produced every day, people can easily feel overwhelmed when deciding which places to visit, e.g., restaurants, grocery stores, bars. Point-of-interest (POI) recommender systems are there to help people find their favorite places. To make recommendations, the system needs to learn users' preference, which usually requires their check-in data. This can potentially deter people from using the system because personal location and check-in data are considered as users' privacy and many do not feel comfortable sharing the information with other parties. In this paper, we propose a nonnegative matrix factorization (NMF) based privacy-preserving POI recommendation framework, in which the latent factors in NMF are learned on user group preference instead of individual user preference. Recommendations are made by personalizing the group preference on user's local devices. There are no location or check-in data collected from the users anywhere throughout the learning and recommendation processes.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128984133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PAC 2018 Organizing Committee PAC 2018组委会
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/pac.2018.00006
{"title":"PAC 2018 Organizing Committee","authors":"","doi":"10.1109/pac.2018.00006","DOIUrl":"https://doi.org/10.1109/pac.2018.00006","url":null,"abstract":"","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129098446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy, Polarization, and Passage of Divisive Laws 隐私、两极分化和分裂性法律的通过
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00007
Benjamin Johnson, Paul Laskowski
{"title":"Privacy, Polarization, and Passage of Divisive Laws","authors":"Benjamin Johnson, Paul Laskowski","doi":"10.1109/PAC.2018.00007","DOIUrl":"https://doi.org/10.1109/PAC.2018.00007","url":null,"abstract":"Notions of privacy are particularly salient to marginalized groups of people, especially when they find themselves disproportionately affected by the enforcement of laws. We use game theoretic modeling to explore the connections between privacy, polarization, and the divisiveness of laws. Our framework is based on a population of citizens that may be more or less polarized. A law is defined in terms of its effect on each citizen and must gain support from a majority in order to pass. We define a notion of divisiveness which allows us to measure the extent to which a law disproportionately affects different groups of citizens. Our framework allows us to explore four distinct notions of privacy, two that result from technological measures and two that emerge from legal theory. We find that privacy can prevent the passage of certain divisive laws, but the effects depend strongly on which type of privacy is in use.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126741009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Enabled Crowdsourced Transmitter Localization Using Adjusted Measurements 隐私启用众包发射机定位使用调整的测量
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00016
Harsimran Singh, Shamik Sarkar, Anuj Dimri, Aditya Bhaskara, Neal Patwari, S. Kasera, Samuel Ramirez, K. Derr
{"title":"Privacy Enabled Crowdsourced Transmitter Localization Using Adjusted Measurements","authors":"Harsimran Singh, Shamik Sarkar, Anuj Dimri, Aditya Bhaskara, Neal Patwari, S. Kasera, Samuel Ramirez, K. Derr","doi":"10.1109/PAC.2018.00016","DOIUrl":"https://doi.org/10.1109/PAC.2018.00016","url":null,"abstract":"We address the problem of location privacy in the context of crowdsourced localization of spectrum offenders where participating receivers report received signal strength (RSS) measurements and their location to a central controller. We present a novel approach, that we call the adjusted measurement approach, in which we generate pseudo-locations for participating receivers and report these pseudo-locations along with adjusted RSS measurements as if the measurements were made at the pseudo-locations. The RSS values are adjusted by representing those as a weighted linear combination of the RSS values at the receivers, where receivers closer to the false location have a higher weight than those far away. We use two RSS datasets, one from a cluttered office (indoor) and another from roadways in Phoenix, Arizona (outdoor) to evaluate our approach. We compare the localization error of our approach with that of the naive approach that simply adds noise to locations. Our results demonstrate that location privacy can be preserved without a significant increase in the localization error. We also formulate an adversary attack that attempts to solve the inverse problem of determining the true locations of the receivers from their false locations. Our evaluations show that the adversary does no better than random guessing of true locations in the monitored area.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy-Preserving Data Collection in Context-Aware Applications 上下文感知应用中保护隐私的数据收集
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00014
Wei Li, Chun-qiang Hu, Tianyi Song, Jiguo Yu, Xiaoshuang Xing, Zhipeng Cai
{"title":"Privacy-Preserving Data Collection in Context-Aware Applications","authors":"Wei Li, Chun-qiang Hu, Tianyi Song, Jiguo Yu, Xiaoshuang Xing, Zhipeng Cai","doi":"10.1109/PAC.2018.00014","DOIUrl":"https://doi.org/10.1109/PAC.2018.00014","url":null,"abstract":"Thanks to the development and popularity of context-aware applications, the quality of users' life has been improved through a wide variety of customized services. Meanwhile, users are suffering severe risk of privacy leakage and their privacy concerns are growing over time. To tackle the contradiction between the serious privacy issues and the growing privacy concerns in context-aware applications, in this paper, we propose a privacy-preserving data collection scheme by incorporating the complicated interactions among user, attacker, and service provider into a three-antithetic-party game. Under such a novel game model, we identify and rigorously prove the best strategies of the three parties and the equilibriums of the games. Furthermore, we evaluate the performance of our proposed data collection game by performing extensive numerical experiments, confirming that the user's data privacy can be effective preserved.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132360448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy Epsilon投票:差分隐私参数选择机制设计
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00009
Nitin Kohli, Paul Laskowski
{"title":"Epsilon Voting: Mechanism Design for Parameter Selection in Differential Privacy","authors":"Nitin Kohli, Paul Laskowski","doi":"10.1109/PAC.2018.00009","DOIUrl":"https://doi.org/10.1109/PAC.2018.00009","url":null,"abstract":"The behavior of a differentially private system is governed by a parameter epsilon which sets a balance between protecting the privacy of individuals and returning accurate results. While a system owner may use a number of heuristics to select epsilon, existing techniques may be unresponsive to the needs of the users who's data is at risk. A promising alternative is to allow users to express their preferences for epsilon. In a system we call epsilon voting, users report the parameter values they want to a chooser mechanism, which aggregates them into a single value. We apply techniques from mechanism design to ask whether such a chooser mechanism can itself be truthful, private, anonymous, and also responsive to users. Without imposing restrictions on user preferences, the only feasible mechanisms belong to a class we call randomized dictatorships with phantoms. This is a restrictive class in which at most one user has any effect on the chosen epsilon. On the other hand, when users exhibit single-peaked preferences, a broader class of mechanisms - ones that generalize the median and other order statistics - becomes possible.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122298435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Reputation Management Framework for MANETs manet的声誉管理框架
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00019
Shiwen Wang, Hui Xia
{"title":"A Reputation Management Framework for MANETs","authors":"Shiwen Wang, Hui Xia","doi":"10.1109/PAC.2018.00019","DOIUrl":"https://doi.org/10.1109/PAC.2018.00019","url":null,"abstract":"Resistance to malicious attacks and assessment of the trust value of nodes are important aspects of trusted mobile ad hoc networks (MANETs), and it is therefore necessary to establish an effective reputation management system. Previous studies have relied on the direct monitoring of nodes, recommendations from neighbors or a combination of these two methods to calculate a reputation value. However, these models can neither collect trust information effectively, nor cooperate to resist an attack, instead increasing the network load. To solve these problems, this paper proposes a novel reputation management framework that collects trust information and calculates the reputation value of nodes by selecting special nodes as management nodes. This framework can effectively identify malicious information and improve the credibility of a reputation value.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"109 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BigBing: Privacy-Preserving Cloud-Based Malware Classification Service BigBing:隐私保护云恶意软件分类服务
2018 IEEE Symposium on Privacy-Aware Computing (PAC) Pub Date : 2018-09-01 DOI: 10.1109/PAC.2018.00011
Y. Kucuk, Nikhil Patil, Zhan Shu, Guanhua Yan
{"title":"BigBing: Privacy-Preserving Cloud-Based Malware Classification Service","authors":"Y. Kucuk, Nikhil Patil, Zhan Shu, Guanhua Yan","doi":"10.1109/PAC.2018.00011","DOIUrl":"https://doi.org/10.1109/PAC.2018.00011","url":null,"abstract":"Although cloud-based malware defense services have made significant contributions to thwarting malware attacks, there have been privacy concern over using these services to analyze suspicious files which may contain user-sensitive data. We develop a new platform called BigBing (a big data approach to binary code genomics) to offer a privacy-preserving cloud-based malware classification service. BigBing relies on a community of contributors who would like to share their binary executables, and uses a novel blockchain-based scheme to ensure the privacy of possibly user-sensitive data contained within these files. To scale up malware defense services, BigBing trains user-specific classification models to detect malware attacks seen in their environments. We have implemented a prototype of BigBing, comprised of a big data cluster, a pool of servers for feature extraction, and a frontend gateway that facilitates the interaction between users and the BigBing backend. Using a real-world malware dataset, we evaluate both execution and classification performances of the service offered by BigBing. Our experimental results demonstrate that BigBing offers a useful privacy-preserving cloud-based malware classification service to fight against the ever-growing malware attacks.","PeriodicalId":208309,"journal":{"name":"2018 IEEE Symposium on Privacy-Aware Computing (PAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126838066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信