Filters








7,572 Hits in 3.9 sec

Using Safety Constraint for Transactional Dataset Anonymization [chapter]

Bechara Al Bouna, Chris Clifton, Qutaibah Malluhi
2013 Lecture Notes in Computer Science  
In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset.  ...  We provide a safe grouping principle to ensure that correlated values are grouped together in unique partitions that enforce l-diversity at the level of individuals.  ...  Conclusion In this paper, we proposed a safe grouping method to cope with defects of bucketization techniques in handling correlated values in a transactional dataset.  ... 
doi:10.1007/978-3-642-39256-6_11 fatcat:zglhd4smgzeqvli467z7zgiunu

Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function

Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman, Rafiqul Islam
2022 Future Internet  
In comparison to previously established work, the security of the transmitted message is improved through a reduction of more than 12% in the correlation coefficient between the constructed request transaction  ...  and encrypted transaction, coupled with a decrease of up to 7% in computation time.  ...  This solution was researched by collecting data from IoT devices using UAV and storing safely in blockchain through mobile edge computing.  ... 
doi:10.3390/fi14030077 fatcat:chenyyu2fzar5ach34qa3htzsm

Efficient Sanitization of Unsafe Data Correlations

Bechara al Bouna, Chris Clifton, Qutaibah M. Malluhi
2015 International Conference on Extending Database Technology  
In this paper, we present a study to counter privacy violation due to unsafe data correlation.  ...  We propose a safe correlation requirement to keep correlated values bounded by l-diversity and evaluate the trade-off to be made for the sake of a strong privacy guarantee.  ...  A related problem is coping with correlations in transactional datasets where multiple tuples could be related to an 2 Note that while suppression prevents privacy violations, it does not necessarily prevent  ... 
dblp:conf/edbt/Bouna15 fatcat:5ocuwebqs5a3fbr3yi4tpff4ke

A Smart Association Rule Bit Vector Matrix for Mining Behavioral Patterns from Wireless Sensor Network

Uppada Venkateswara Rao, Dr. Somaraju Mouli
2019 International Journal of Trend in Scientific Research and Development  
It may be also useful in resource management process by deciding which nodes can be switched safely to a sleep mode without affecting the coverage of the network.  ...  By overcome that problem we are implementing associated correlated bit vector matrix for finding behavioral patterns of nodes in a wireless sensor network. By implementing this concept  ...  in a transaction dataset.  ... 
doi:10.31142/ijtsrd21560 fatcat:d2ixri42crap5a7poypimoqf6i

U.S. Housing as a Global Safe Asset: Evidence from China Shocks

William Barcelona, Board of Governors of the Federal Reserve System, Nathan Converse, Anna Wong, Board of Governors of the Federal Reserve System, Board of Governors of the Federal Reserve System
2021 International Finance Discussion Paper  
households view U.S. housing as a safe haven asset.  ...  prices in major U.S. cities that are highly exposed to demand from China have on average grown 7 percentage points faster than similar neighborhoods with low exposure over the period 2010-2016.  ...  the gap in price growth between China-exposed and non-exposed areas in the U.S.  ... 
doi:10.17016/ifdp.2021.1332 fatcat:oqkmatpigbbr5dheh5qzz6fi7a

An Evaluation of Simple Function Point as a Replacement of IFPUG Function Point

Luigi Lavazza, Roberto Meli
2014 2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement  
The data from a large popular public dataset were analyzed to verify the correlation of Simple Function Point with IFPUG Function Point, and the correlation of both size measures to development effort.  ...  Simple Function Point was designed to be equivalent to IFPUG Function Point in terms of numerical results.  ...  The data from this dataset are plotted in Fig. 8 . B. Correlation tests The visual inspection of the data plot ( Fig. 8 ) clearly shows that SiFP and IFPUG FP are correlated.  ... 
doi:10.1109/iwsm.mensura.2014.28 dblp:conf/iwsm/LavazzaM14 fatcat:hsmm4dlcbnbanlusoozt2bkhqy

The LDBC Social Network Benchmark

Orri Erling, Alex Averbuch, Josep Larriba-Pey, Hassan Chafi, Andrey Gubichev, Arnau Prat, Minh-Duc Pham, Peter Boncz
2015 Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15  
This paper describes the LDBC Social Network Benchmark (SNB), and presents database benchmarking innovation in terms of graph query functionality tested, correlated graph generation techniques, as well  ...  We describe the SNB Interactive Workload in detail and illustrate the workload with some early results, as well as the goals for the two other workloads.  ...  DATAGEN ensures that this T SAFE is considerably long in all generated data.  ... 
doi:10.1145/2723372.2742786 dblp:conf/sigmod/ErlingALCGPPB15 fatcat:r7xm6c62vnbh5bikj4d77w4ozm

Deanonymizing Tor hidden service users through Bitcoin transactions analysis [article]

Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
2019 arXiv   pre-print
By analyzing the transactions in the Blockchain, we were able to link 125 unique users to 20 Tor hidden services, including sensitive ones, such as The Pirate Bay and Silk Road.  ...  This, for example, allows an adversary to link a user with @alice Twitter address to a Tor hidden service with private.onion address by finding at least one past transaction in the Blockchain that involves  ...  After wallet-closure analysis, we used the datasets to analyze the transactions in the Blockchain.  ... 
arXiv:1801.07501v3 fatcat:bas6p4v7nngepabk6c5zhcetbe

Understanding the Strategic Consequences of Customer Privacy Concerns: A Meta-Analytic Review

Shintaro Okazaki, Martin Eisend, Kirk Plangger, Ko de Ruyter, Dhruv Grewal
2020 Journal of Retailing  
Despite noteworthy advances in theory and retail practice, the extant scholarship on customer privacy concerns is scattered across a wide range of academic domains and remains fragmented, in terms of both  ...  Based on 1,103 effects in 304 papers, we offer several key insights that are pertinent to retail scholars and managers who wish to empirically capture and mitigate the impact of customer privacy concerns  ...  We are also grateful for Victoria Andrade for her support in data collection. Appendix A.  ... 
doi:10.1016/j.jretai.2020.05.007 fatcat:ay5svonknbagxgk6yci7f2aysm

Liquidity risk and syndicate structure

Evan Gatev, Philip E. Strahan
2009 Journal of Financial Economics  
Links from transactions deposits to liquidity exposure are about 50% larger at participant banks than at lead arrangers.  ...  In contrast, liquidity risk does not explain the share of banks as lead lenders.  ...  On the other hand, prior commitments could be negatively correlated with incremental liquidity risk exposure (reflecting a bank's hesitance to become too exposed to liquidity), or positively correlated  ... 
doi:10.1016/j.jfineco.2008.10.004 fatcat:cca3okok3rdhnk2yp4ti65mvhy

Liquidity Risk and Syndicate Structure

Evan Gatev, Philip E. Strahan
2008 Social Science Research Network  
Links from transactions deposits to liquidity exposure are about 50% larger at participant banks than at lead arrangers.  ...  In contrast, liquidity risk does not explain the share of banks as lead lenders.  ...  On the other hand, prior commitments could be negatively correlated with incremental liquidity risk exposure (reflecting a bank's hesitance to become too exposed to liquidity), or positively correlated  ... 
doi:10.2139/ssrn.1103234 fatcat:6tfzxv5fwrc7th6pdxcer7elce

Dual water choices: The assessment of the influential factors on water sources choices using unsupervised machine learning market basket analysis

Tiyasha Tiyasha, Suraj Kumar Bhagat, Firaol Fituma, Tran Minh Tung, Shamsuddin Shahid, Zaher Mundher Yaseen
2021 IEEE Access  
Data of 51 socio-economic factors collected from 295 individuals living in 65 households in Ambo city in the Oromia region of Ethiopians were used for this purpose.  ...  ., public tap and river water), (ii) the water was collected females in 92% of the households, and (iii) majority of people preferred bathing and laundering in the river (support = 32% and confidence =  ...  In a given transaction, where each transaction is a set of items, the association rule reveals that the transaction in the dataset containing X also contains Y expressed as equation (1) .  ... 
doi:10.1109/access.2021.3124817 fatcat:lekmroyvsbcrbelizlsojxxq3q

Detection of fraud risks in retailing sector using MLP and SVM techniques

2019 Turkish Journal of Electrical Engineering and Computer Sciences  
In the retailing sector, especially purchasing processes are subject to high fraud risks.  ...  Besides, in this study, it is presumed that the detected fraud data can be proactively used in the struggle against fraud with fraud-governance risk and compliance software by converting it into scenario  ...  Figure 3 . 3 Correlations between attributes of retail fraud dataset.  ... 
doi:10.3906/elk-1902-18 fatcat:ignjyp7wtfh4djyhm3gkwphi3i

Analyzing Main Topics Regarding The Electronic Information and Transaction Act in Instagram Using Latent Dirichlet Allocation

Hans Kresnawan, Sola Graciana Felle, Hanna Gloria Mokay, Nur Aini Rakhmawati
2021 Data Science: Journal of Computing and Applied Informatics  
The separation between latent topics among random mixtures helps to identify the common ground and correlation between each post.  ...  The rising usage of information technology prompts regulators to develop The Electronic Information Transaction Act to protect the populace from cybercrime.  ...  Each document has correlation probabilities with each topic, visualized in θ. Additionally, each topic has certain distribution of words that correlates with the topic, visualized in β.  ... 
doi:10.32734/jocai.v5.i2-6125 fatcat:xhf2wb5yire7bjqmnbgapbayky

Fault Tolerant Frequent Pattern Mining [article]

Sameh Shohdy, Abhinav Vishnu, Gagan Agrawal
2016 arXiv   pre-print
FP-Growth algorithm is a Frequent Pattern Min- ing (FPM) algorithm that has been extensively used to study correlations and patterns in large scale datasets.  ...  We evaluate our FT algorithm on a large scale InfiniBand cluster with several large datasets using up to 2K cores.  ...  An extensive evaluation over 256, 512, 1024, and 2048 cores has been performed on large datasets, i.e., 100 and 200 million transactions datasets.  ... 
arXiv:1610.05116v1 fatcat:ozvtsumo6rcrtk7ipkeslrfcea
« Previous Showing results 1 — 15 out of 7,572 results