A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using Safety Constraint for Transactional Dataset Anonymization
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. ...
We provide a safe grouping principle to ensure that correlated values are grouped together in unique partitions that enforce l-diversity at the level of individuals. ...
Conclusion In this paper, we proposed a safe grouping method to cope with defects of bucketization techniques in handling correlated values in a transactional dataset. ...
doi:10.1007/978-3-642-39256-6_11
fatcat:zglhd4smgzeqvli467z7zgiunu
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function
2022
Future Internet
In comparison to previously established work, the security of the transmitted message is improved through a reduction of more than 12% in the correlation coefficient between the constructed request transaction ...
and encrypted transaction, coupled with a decrease of up to 7% in computation time. ...
This solution was researched by collecting data from IoT devices using UAV and storing safely in blockchain through mobile edge computing. ...
doi:10.3390/fi14030077
fatcat:chenyyu2fzar5ach34qa3htzsm
Efficient Sanitization of Unsafe Data Correlations
2015
International Conference on Extending Database Technology
In this paper, we present a study to counter privacy violation due to unsafe data correlation. ...
We propose a safe correlation requirement to keep correlated values bounded by l-diversity and evaluate the trade-off to be made for the sake of a strong privacy guarantee. ...
A related problem is coping with correlations in transactional datasets where multiple tuples could be related to an 2 Note that while suppression prevents privacy violations, it does not necessarily prevent ...
dblp:conf/edbt/Bouna15
fatcat:5ocuwebqs5a3fbr3yi4tpff4ke
A Smart Association Rule Bit Vector Matrix for Mining Behavioral Patterns from Wireless Sensor Network
2019
International Journal of Trend in Scientific Research and Development
It may be also useful in resource management process by deciding which nodes can be switched safely to a sleep mode without affecting the coverage of the network. ...
By overcome that problem we are implementing associated correlated bit vector matrix for finding behavioral patterns of nodes in a wireless sensor network. By implementing this concept ...
in a transaction dataset. ...
doi:10.31142/ijtsrd21560
fatcat:d2ixri42crap5a7poypimoqf6i
U.S. Housing as a Global Safe Asset: Evidence from China Shocks
2021
International Finance Discussion Paper
households view U.S. housing as a safe haven asset. ...
prices in major U.S. cities that are highly exposed to demand from China have on average grown 7 percentage points faster than similar neighborhoods with low exposure over the period 2010-2016. ...
the gap in price growth between China-exposed and non-exposed areas in the U.S. ...
doi:10.17016/ifdp.2021.1332
fatcat:oqkmatpigbbr5dheh5qzz6fi7a
An Evaluation of Simple Function Point as a Replacement of IFPUG Function Point
2014
2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement
The data from a large popular public dataset were analyzed to verify the correlation of Simple Function Point with IFPUG Function Point, and the correlation of both size measures to development effort. ...
Simple Function Point was designed to be equivalent to IFPUG Function Point in terms of numerical results. ...
The data from this dataset are plotted in Fig. 8 .
B. Correlation tests The visual inspection of the data plot ( Fig. 8 ) clearly shows that SiFP and IFPUG FP are correlated. ...
doi:10.1109/iwsm.mensura.2014.28
dblp:conf/iwsm/LavazzaM14
fatcat:hsmm4dlcbnbanlusoozt2bkhqy
The LDBC Social Network Benchmark
2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15
This paper describes the LDBC Social Network Benchmark (SNB), and presents database benchmarking innovation in terms of graph query functionality tested, correlated graph generation techniques, as well ...
We describe the SNB Interactive Workload in detail and illustrate the workload with some early results, as well as the goals for the two other workloads. ...
DATAGEN ensures that this T SAFE is considerably long in all generated data. ...
doi:10.1145/2723372.2742786
dblp:conf/sigmod/ErlingALCGPPB15
fatcat:r7xm6c62vnbh5bikj4d77w4ozm
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
[article]
2019
arXiv
pre-print
By analyzing the transactions in the Blockchain, we were able to link 125 unique users to 20 Tor hidden services, including sensitive ones, such as The Pirate Bay and Silk Road. ...
This, for example, allows an adversary to link a user with @alice Twitter address to a Tor hidden service with private.onion address by finding at least one past transaction in the Blockchain that involves ...
After wallet-closure analysis, we used the datasets to analyze the transactions in the Blockchain. ...
arXiv:1801.07501v3
fatcat:bas6p4v7nngepabk6c5zhcetbe
Understanding the Strategic Consequences of Customer Privacy Concerns: A Meta-Analytic Review
2020
Journal of Retailing
Despite noteworthy advances in theory and retail practice, the extant scholarship on customer privacy concerns is scattered across a wide range of academic domains and remains fragmented, in terms of both ...
Based on 1,103 effects in 304 papers, we offer several key insights that are pertinent to retail scholars and managers who wish to empirically capture and mitigate the impact of customer privacy concerns ...
We are also grateful for Victoria Andrade for her support in data collection.
Appendix A. ...
doi:10.1016/j.jretai.2020.05.007
fatcat:ay5svonknbagxgk6yci7f2aysm
Liquidity risk and syndicate structure
2009
Journal of Financial Economics
Links from transactions deposits to liquidity exposure are about 50% larger at participant banks than at lead arrangers. ...
In contrast, liquidity risk does not explain the share of banks as lead lenders. ...
On the other hand, prior commitments could be negatively correlated with incremental liquidity risk exposure (reflecting a bank's hesitance to become too exposed to liquidity), or positively correlated ...
doi:10.1016/j.jfineco.2008.10.004
fatcat:cca3okok3rdhnk2yp4ti65mvhy
Liquidity Risk and Syndicate Structure
2008
Social Science Research Network
Links from transactions deposits to liquidity exposure are about 50% larger at participant banks than at lead arrangers. ...
In contrast, liquidity risk does not explain the share of banks as lead lenders. ...
On the other hand, prior commitments could be negatively correlated with incremental liquidity risk exposure (reflecting a bank's hesitance to become too exposed to liquidity), or positively correlated ...
doi:10.2139/ssrn.1103234
fatcat:6tfzxv5fwrc7th6pdxcer7elce
Dual water choices: The assessment of the influential factors on water sources choices using unsupervised machine learning market basket analysis
2021
IEEE Access
Data of 51 socio-economic factors collected from 295 individuals living in 65 households in Ambo city in the Oromia region of Ethiopians were used for this purpose. ...
., public tap and river water), (ii) the water was collected females in 92% of the households, and (iii) majority of people preferred bathing and laundering in the river (support = 32% and confidence = ...
In a given transaction, where each transaction is a set of items, the association rule reveals that the transaction in the dataset containing X also contains Y expressed as equation (1) . ...
doi:10.1109/access.2021.3124817
fatcat:lekmroyvsbcrbelizlsojxxq3q
Detection of fraud risks in retailing sector using MLP and SVM techniques
2019
Turkish Journal of Electrical Engineering and Computer Sciences
In the retailing sector, especially purchasing processes are subject to high fraud risks. ...
Besides, in this study, it is presumed that the detected fraud data can be proactively used in the struggle against fraud with fraud-governance risk and compliance software by converting it into scenario ...
Figure 3 . 3 Correlations between attributes of retail fraud dataset. ...
doi:10.3906/elk-1902-18
fatcat:ignjyp7wtfh4djyhm3gkwphi3i
Analyzing Main Topics Regarding The Electronic Information and Transaction Act in Instagram Using Latent Dirichlet Allocation
2021
Data Science: Journal of Computing and Applied Informatics
The separation between latent topics among random mixtures helps to identify the common ground and correlation between each post. ...
The rising usage of information technology prompts regulators to develop The Electronic Information Transaction Act to protect the populace from cybercrime. ...
Each document has correlation probabilities with each topic, visualized in θ. Additionally, each topic has certain distribution of words that correlates with the topic, visualized in β. ...
doi:10.32734/jocai.v5.i2-6125
fatcat:xhf2wb5yire7bjqmnbgapbayky
Fault Tolerant Frequent Pattern Mining
[article]
2016
arXiv
pre-print
FP-Growth algorithm is a Frequent Pattern Min- ing (FPM) algorithm that has been extensively used to study correlations and patterns in large scale datasets. ...
We evaluate our FT algorithm on a large scale InfiniBand cluster with several large datasets using up to 2K cores. ...
An extensive evaluation over 256, 512, 1024, and 2048 cores has been performed on large datasets, i.e., 100 and 200 million transactions datasets. ...
arXiv:1610.05116v1
fatcat:ozvtsumo6rcrtk7ipkeslrfcea
« Previous
Showing results 1 — 15 out of 7,572 results