International Conference on Pattern Analysis and Intelligent Systems最新文献

筛选
英文 中文
An efficient clustering method for k-anonymization 一种有效的k-匿名聚类方法
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 2008-03-29 DOI: 10.1145/1379287.1379297
Jun-Lin Lin, Meng-Cheng Wei
{"title":"An efficient clustering method for k-anonymization","authors":"Jun-Lin Lin, Meng-Cheng Wei","doi":"10.1145/1379287.1379297","DOIUrl":"https://doi.org/10.1145/1379287.1379297","url":null,"abstract":"The <i>k</i>-anonymity model is a privacy-preserving approach that has been extensively studied for the past few years. To minimize the information loss due to anonymization, it is crucial to group similar data together and then anonymize each group individually. This work proposes a clustering-based <i>k</i>-anonymization method that runs in <i>O</i>(<i>n<sup>2</sup>/k</i>) time. We experimentally compare our method with another clustering-based <i>k</i>-anonymization method recently proposed by Byun <i>et al</i>. Even though their method has a time complexity of O(<i>n</i><sup><i>2</i></sup>), the experiments show that our method outperforms their method with respect to information loss and resilience to outliers.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Data utility and privacy protection trade-off in k-anonymisation k-匿名中数据效用与隐私保护的权衡
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 2008-03-29 DOI: 10.1145/1379287.1379296
G. Loukides, J. Shao
{"title":"Data utility and privacy protection trade-off in k-anonymisation","authors":"G. Loukides, J. Shao","doi":"10.1145/1379287.1379296","DOIUrl":"https://doi.org/10.1145/1379287.1379296","url":null,"abstract":"K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information contained within it is hidden, yet the anonymised data is still useful in intended applications. However, maximising both data utility and privacy protection in k-anonymisation is not possible. Existing methods derive k-anonymisations by trying to maximise utility while satisfying a required level of protection. In this paper, we propose a method that attempts to optimise the trade-off between utility and protection. We introduce a measure that captures both utility and protection, and an algorithm that exploits this measure using a combination of clustering and partitioning techniques. Our experiments show that the proposed method is capable of producing k-anonymisations with required utility and protection trade-off and with a performance scalable to large datasets.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125523946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Distributed privacy preserving k-means clustering with additive secret sharing 具有可加性秘密共享的分布式隐私保护k-means聚类
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 2008-03-29 DOI: 10.1145/1379287.1379291
M. Doganay, T. Pedersen, Y. Saygin, E. Savaş, A. Levi
{"title":"Distributed privacy preserving k-means clustering with additive secret sharing","authors":"M. Doganay, T. Pedersen, Y. Saygin, E. Savaş, A. Levi","doi":"10.1145/1379287.1379291","DOIUrl":"https://doi.org/10.1145/1379287.1379291","url":null,"abstract":"Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the current techniques for privacy preserving data mining suffer from high communication and computation overheads which are prohibitive considering even a modest database size. Furthermore, the proposed techniques have strict assumptions on the involved parties which need to be relaxed in order to reflect the real-world requirements. In this paper we concentrate on a distributed scenario where the data is partitioned vertically over multiple sites and the involved sites would like to perform clustering without revealing their local databases. For this setting, we propose a new protocol for privacy preserving k-means clustering based on additive secret sharing. We show that the new protocol is more secure than the state of the art. Experiments conducted on real and synthetic data sets show that, in realistic scenarios, the communication and computation cost of our protocol is considerably less than the state of the art which is crucial for data mining applications.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Attribute selection in multivariate microaggregation 多元微聚合中的属性选择
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 2008-03-29 DOI: 10.1145/1379287.1379299
Jordi Nin, Javier Herranz, V. Torra
{"title":"Attribute selection in multivariate microaggregation","authors":"Jordi Nin, Javier Herranz, V. Torra","doi":"10.1145/1379287.1379299","DOIUrl":"https://doi.org/10.1145/1379287.1379299","url":null,"abstract":"Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of the cluster. When the number of attributes of the dataset is large, a common practice is to split the dataset into smaller blocks of attributes. Microaggregation is successively and independently applied to each block. In this way, the effect of the noise introduced by microaggregation is reduced, but at the cost of losing the k-anonymity property.\u0000 The goal of this work is to show that, besides of the specific microaggregation method employed, the value of the parameter k, and the number of blocks in which the dataset is split, there exists another factor which can influence the quality of the microaggregation: the way in which the attributes are grouped to form the blocks. When correlated attributes are grouped in the same block, the statistical utility of the protected dataset is higher. In contrast, when correlated attributes are dispersed into different blocks, the achieved anonymity is higher, and, so, the disclosure risk is lower. We present quantitative evaluations of such statements based on different experiments on real datasets.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Location privacy via unlinkability: an alternative to cloaking and perturbation 通过不可链接的位置隐私:伪装和干扰的替代方案
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 2008-03-29 DOI: 10.1145/1379287.1379289
J. Domingo-Ferrer
{"title":"Location privacy via unlinkability: an alternative to cloaking and perturbation","authors":"J. Domingo-Ferrer","doi":"10.1145/1379287.1379289","DOIUrl":"https://doi.org/10.1145/1379287.1379289","url":null,"abstract":"The usual approach to location privacy is to cloak and/or perturb the positions or trajectories of the mobile objects. However, if unlinkability of the various interactions between a mobile object and the service/control system can be afforded and achieved, neither cloaking nor perturbation are necessary. This results in higher privacy for the mobile object and better accuracy of the aggregated mobility information gathered by the service/control system. We illustrate the feasibility of this approach in the scenario of car-to-car communication.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of PriServ, a privacy service for DHTs 为dht设计的隐私服务PriServ
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 2008-03-29 DOI: 10.1145/1379287.1379293
M. Jawad, Patricia Serrano-Alvarado, P. Valduriez
{"title":"Design of PriServ, a privacy service for DHTs","authors":"M. Jawad, Patricia Serrano-Alvarado, P. Valduriez","doi":"10.1145/1379287.1379293","DOIUrl":"https://doi.org/10.1145/1379287.1379293","url":null,"abstract":"By decentralizing control, P2P systems provide efficient, scalable data sharing. However, when sharing data for different purposes (e.g., billing, purchase, shipping, etc.), data privacy can be easily violated by untrustworthy peers wich may use data for other purposes (e.g., marketing, fraudulence, profiling, etc.). A basic principle of data privacy is purpose specification which states that data providers should be able to specify the purpose for which their data will be collected and used. In the context of P2P systems, decentralized control makes it hard to enforce purpose-based privacy. And the major problem of data disclosure is not addressed. Hippocratic databases provide mechanisms for enforcing purpose-based disclosure control within a corporation datastore. In this paper, we apply the Hippocratic database principles to P2P systems to enforce purpose-based privacy. We focus on Distributed Hash Tables (DHTs), because they provide strong guarantees in terms of access performance. We propose PriServ, a privacy service which prevents privacy violation by prohibiting malicious data access. The performance evaluation of our approach through simulation shows that the overhead introduced by PriServ is small.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131823090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Protecting privacy in recorded conversations 保护谈话记录中的隐私
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 2008-03-29 DOI: 10.1145/1379287.1379295
Scot Cunningham, T. Truta
{"title":"Protecting privacy in recorded conversations","authors":"Scot Cunningham, T. Truta","doi":"10.1145/1379287.1379295","DOIUrl":"https://doi.org/10.1145/1379287.1379295","url":null,"abstract":"Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora exist within the archives of various businesses and institutions; however, these entities are often prevented from sharing their data due to privacy rules and regulations. Efforts to \"scrub\" this data to make it shareable can result in data that has been either inadequately protected or data that has been rendered virtually unusable due to the loss resulting from suppression. This work attempts to address these issues by developing a scientific workflow that combines proven techniques in data privacy with controlled audio distortion resulting in corpora that have been adequately protected with minimal information loss.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134049810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards formal verification of cryptographic circuits: A functional approach 迈向加密电路的形式化验证:一种功能方法
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 1900-01-01 DOI: 10.1109/PAIS.2018.8598527
Abir Bitat, S. Merniz
{"title":"Towards formal verification of cryptographic circuits: A functional approach","authors":"Abir Bitat, S. Merniz","doi":"10.1109/PAIS.2018.8598527","DOIUrl":"https://doi.org/10.1109/PAIS.2018.8598527","url":null,"abstract":"Late detection of errors in hardware designs usually results in great costs. On the other hand, the growing advances on this field has let the complexity level to increase extensively. The problem is that the typical Hardware Description Languages (HDL) like VHDL and Verilog are made for synthesis and simulation only. But, the simulation technique could be deficient in complex designs such as the cryptographic circuits. Formal verification has became an important technique towards establishing the correctness of hardware designs. This paper presents a formal verification approach for the cryprographic circuits. It consists on using the functional language Haskell to formally describe both the behavioral and the structural descriptions. In addition, it relies on the use of the hierarchy and modularity techniques in order to reduce the complexity of the designs; and hence simplify the verification task. To show the potential features of the proposed approach, it is applied to the Data Encryption Standard (DES) circuit and its formal specification is presented.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"20 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stereo Visual Odometry for Mobile Robot 移动机器人的立体视觉里程计
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 1900-01-01 DOI: 10.1109/PAIS.2018.8598501
Abdelghani Boucheloukh, F. Boudjema, A. Nemra, Fethi Demim, R. Louali
{"title":"Stereo Visual Odometry for Mobile Robot","authors":"Abdelghani Boucheloukh, F. Boudjema, A. Nemra, Fethi Demim, R. Louali","doi":"10.1109/PAIS.2018.8598501","DOIUrl":"https://doi.org/10.1109/PAIS.2018.8598501","url":null,"abstract":"This paper presents a visual localized approach, based on Speeded Up Robust Features (SURF) from a stereo system with optimization tool constraints to obtain high matching precision between images. The contribution of this paper presents a robust visual odometry and a 3D reconstruction algorithm based on Adaptive Iterative Closest SURF Point (AICSP). This algorithm combines the robustness of SURF to detect and match a good feature, and the accuracy of the Adaptive ICP algorithm, which is used to give more importance for near 3D weighted points with their inverse depth. The proposed algorithm is validated and compared to other optimization techniques based on Singular Values Decomposition (SVD) and Quaternion. Experimental results show robustness, accuracy and acceptable outcomes from our algorithm in both: indoor and outdoor environments using Pioneer 3-AT.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"388 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121773401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Multicriteria Ranking based web service Discovery approach 改进的基于多标准排名的web服务发现方法
International Conference on Pattern Analysis and Intelligent Systems Pub Date : 1900-01-01 DOI: 10.1109/PAIS.2018.8598539
D. E. Abdelli, F. M. Bouyakoub
{"title":"Improved Multicriteria Ranking based web service Discovery approach","authors":"D. E. Abdelli, F. M. Bouyakoub","doi":"10.1109/PAIS.2018.8598539","DOIUrl":"https://doi.org/10.1109/PAIS.2018.8598539","url":null,"abstract":"Several Web services offering the same functionality can be provided to the customer. Thus, nonfunctional parameters (quality of service parameters) are introduced to improve the quality of the selection process by selecting the best service. In this paper, we propose a services discovery approach based on a multicriteria optimization; for that, we use reference point ranking and fuzzy logics function. This approach helps to choose the service offering the best level of quality parameters between services that have the same functionalities. To validate the approach, we used a dataset of about 600 services.","PeriodicalId":245552,"journal":{"name":"International Conference on Pattern Analysis and Intelligent Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125346018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信