9,611 Hits in 9.1 sec

Efficient Time-Stamped Event Sequence Anonymization

Reza Sherkat, Jing Li, Nikos Mamoulis
2013 ACM Transactions on the Web  
Existing trajectory anonymization techniques disregard the importance of time or the sensitivity of events.  ...  This paper is the first, to our knowledge, thorough study on timestamped event sequence anonymization. We propose a novel and tunable generalization framework tailored to event sequences.  ...  We extend traditional privacy models to event sequences to model privacy for both sequence identification and event prediction attacks. • In Sec. 4, we propose efficient algorithms to speed up anonymization  ... 
doi:10.1145/2532643 fatcat:qwr7vu3s7bcctarujcik3n3suy

Uncertain Observation Times [chapter]

Shaunak Chatterjee, Stuart Russell
2012 Lecture Notes in Computer Science  
Serious problems arise when these time stamps are taken literally.  ...  Standard temporal models assume that observation times are correct, whereas in many real-world settings (particularly those involving human data entry) noisy time stamps are quite common.  ...  IIS-0904672 RI: Hierarchical Decision Making for Physical Agents) and DARPA (DSO contract FA8650-11-1-7153: Open-Universe Theory for Bayesian Information and Decision Systems) for their support and the anonymous  ... 
doi:10.1007/978-3-642-33362-0_30 fatcat:66pcnxdf7bbsxi6actb5zbjhyy

Outsourcing Security Analysis with Anonymized Logs

Jianqing Zhang, Nikita Borisov, William Yurcik
2006 2006 Securecomm and Workshops  
We believe if the anonymization solution fulfills the constraints, MSSPs can detect the attacks efficiently and protect privacy simultaneously.  ...  In this paper we analyze the logs used for security analysis with the concern of privacy and propose the constraints on anonymization of security monitor logs.  ...  List Anonymization Constraints Recommended Anonymization Time Stamp Retain events interval and time dependence Random Time Shifts Source IP Addr.  ... 
doi:10.1109/seccomw.2006.359577 dblp:conf/securecomm/ZhangBY06 fatcat:qasl67puorczxh7oyynqau6gau

Trajectory Clustering and k-NN for Robust Privacy Preserving Spatiotemporal Databases

Elias Dritsas, Maria Trigka, Panagiotis Gerolymatos, Spyros Sioutas
2018 Algorithms  
In particular, we investigated the k-anonymity of mobile users based on real trajectory data. The k-anonymity set consists of the k nearest neighbors.  ...  Through experiments on real spatial datasets, we evaluated the anonymity robustness, the so-called vulnerability, of the proposed method.  ...  A simple description of a trajectory is as a finite sequence of pairs of locations with time-stamp, which meets GIS (Geographical Information System) database [2] .  ... 
doi:10.3390/a11120207 fatcat:yqhghdi4bbfktdvssvhgmz53kq

A Study of Annotation and Alignment Accuracy for Performance Comparison in Complex Orchestral Music [article]

Thassilo Gadermaier, Gerhard Widmer
2019 arXiv   pre-print
A statistical evaluation of the marker time stamps will provide (a) an estimate of the expected timing precision of human annotations and (b) a ground truth for subsequent automatic alignment experiments  ...  First, we analyze different annotations of the same musical piece, quantifying timing deviations between the respective human annotators.  ...  If the variance σ 2 of the time stamps is assumed to be constant over time (across the whole piece or part to be annotated), subtracting two sequences θ 1 n , θ 2 n of markers for the same score events  ... 
arXiv:1910.07394v1 fatcat:6xjtjdtsnngnfndmi5e6m7y5fe

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks

Shan Chang, Yong Qi, Hongzi Zhu, Jizhong Zhao, Xuemin Shen
2012 IEEE Transactions on Parallel and Distributed Systems  
In urban vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable.  ...  More specifically, when a vehicle approaches a road-side unit (RSU), it actively demands an authorized message from the RSU as the proof of the appearance time at this RSU.  ...  Therefore, time stamps should be generated for individual vehicles.  ... 
doi:10.1109/tpds.2011.263 fatcat:riygie4mgnd5jjmpqqyman5qjy

Instability and performance limits of distributed simulators of feedforward queueing networks

Rajeev Shorey, Anurag Kumar, Kiran M. Rege
1997 ACM Transactions on Modeling and Computer Simulation  
We show that, with quite general stochastic assumptions for message arrival and time-stamp processes, the message queues are unstable for conservative sequencing, and for conservative sequencing with maximum  ...  We view each logical process in a distributed simulation as comprising a message sequencer with associated message queues, followed by an event processor.  ...  ACKNOWLEDGMENTS The authors would like to thank Philip Heidelberger for a useful discussion, and the anonymous referees for providing comments that have improved the presentation of the article.  ... 
doi:10.1145/249204.249206 fatcat:a2sm6m63nrhorha6i6eokwufou

A Renewal Model of Intrusion [article]

David Tolpin
2018 arXiv   pre-print
We adopt Bayesian approach to infer the probability of an intrusion in a sequence of events, a MAP subsequence of events constituting the intrusion, and the marginal probability of each event in a sequence  ...  Given a process and a sequence of events, an intrusion is a subsequence of events that is not produced by the process.  ...  Evaluation on Anonymized Real-World Data We obtained anonymized data from an online payment system, consisting of 1000 log fragments. The data contains time stamps and amounts of payments.  ... 
arXiv:1709.08163v5 fatcat:dqxu7ys2wrckxaithpsb7crvtq

Almost Event-Rate Independent Monitoring of Metric Temporal Logic [chapter]

David Basin, Bhargav Nagaraja Bhatt, Dmitriy Traytel
2017 Lecture Notes in Computer Science  
must store the event rate as a number.  ...  We put forward the stronger notion of event-rate independence, where the monitor's space usage does not depend on the event rate.  ...  Jasmin Blanchette, Srdjan Krstic, and anonymous TACAS reviewers helped to improve the presentation of this work.  ... 
doi:10.1007/978-3-662-54580-5_6 fatcat:l7z7qhwmu5hqzejvo7hts6wy5a

Monitoring web browsing behavior with differential privacy

Liyue Fan, Luca Bonomi, Li Xiong, Vaidy Sunderam
2014 Proceedings of the 23rd international conference on World wide web - WWW '14  
However, releasing private user data to the greater public would concern web users about their privacy, especially after the incident of AOL search log release where anonymization was not correctly done  ...  Our proposed algorithms utilize the rich correlation of the time series of aggregated data and adopt a state-space approach to estimate the underlying, true aggregates from the perturbed values by the  ...  Among these works two major research directions have been developed investigating the private release of numeric time series [23, 7, 11, 14, 22] and discrete series (event sequences) [16, 25] respectively  ... 
doi:10.1145/2566486.2568038 dblp:conf/www/FanBXS14 fatcat:av6psvhd5vhfdgb6jpk2ba7ojy

Sharing network logs for computer forensics: a new tool for the anonymization of netflow records

A.J. Slagell, Yifan Li, K. Luo
2005 Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.  
The process also alters logs significantly, losing fragmentation information, the size and number of packets and information about retransmissions, thus skewing time-stamps, sequence numbers and checksums  ...  One could scan a network with a special sequence determining the length of times between probes.  ... 
doi:10.1109/seccmw.2005.1588293 fatcat:fgws6nfvcjagdbm5rpc3asnpee

Sequential consistency versus linearizability

Hagit Attiya, Jennifer L. Welch
1994 ACM Transactions on Computer Systems  
(5) for each real time t,in the corresponding sequence all nontimer events are ordered before any timer event, and there is at most one timer event.  ...  the event for p at time t,in CT', involves the event for p at time t -s.)  ... 
doi:10.1145/176575.176576 fatcat:a6wuqskvkrbetage6xumf6z3i4

Explainable Inference on Sequential Data via Memory-Tracking

Biagio La Rosa, Roberto Capobianco, Daniele Nardi
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
By tracking both the memory access at prediction time, and the information stored by the network at each step of the input sequence, we can retrieve the most relevant input steps associated to each prediction  ...  We validate our approach (1) on a modified T-maze, which is a non-Markovian discrete control task evaluating an algorithm's ability to correlate events far apart in history, and (2) on the Story Cloze  ...  Acknowledgments The authors thank the anonymous reviewers for their valuable feedback. This research was developed with funding from the Defense Advanced Research Projects Agency (DARPA).  ... 
doi:10.24963/ijcai.2020/274 dblp:conf/ijcai/BhattacharjyaGS20 fatcat:27vzvsorineytp447kfmjkndpy

A Functioning Beta Solution to the Challenge of Opening Transit Payment System Transaction Data [article]

David Ory, Stephen Granger-Bevan
2016 arXiv   pre-print
And, should we take a different anonymizing approach?  ...  In an effort to share usable data that protects customer privacy, MTC developed an anonymizing scheme that is the subject of the present paper.  ...  To maintain the correct sequence of transactions that occur within identically-labeled time intervals, a trip sequence identifier is added to the data.  ... 
arXiv:1609.08757v1 fatcat:gqayqu5a3rgivca3u66rbnyayq

Implementing a Practical Spatio-Temporal Composite Event Language [chapter]

Ken Moody, Jean Bacon, David Evans, Scarlet Schwiderski-Grosche
2010 Lecture Notes in Computer Science  
An earlier paper introduced SpaTeC, a composite event language that enables simultaneous matching of event occurrences over space and time.  ...  Composite event patterns are essentially those of the earlier paper, with the addition of primitive patterns, which enforce restrictions on the space and/or time of event occurrences.  ...  Stagecoach in Cambridge has greatly assisted TIME-EACM by making GPS data feeds from their buses available in real time, and by suggesting some of the scenarios developed in the paper.  ... 
doi:10.1007/978-3-642-17226-7_7 fatcat:vs32lkdo3zg3pl6u4zifspevsa
« Previous Showing results 1 — 15 out of 9,611 results