Filters








47 Hits in 11.1 sec

Flexible data anonymization using ARX-Current status and challenges ahead

Fabian Prasser, Johanna Eicher, Helmut Spengler, Raffael Bild, Klaus A. Kuhn
2020 Software, Practice & Experience  
Finally, we discuss practical experiences with ARX and present remaining issues and challenges ahead.  ...  For instance, the effectiveness of different anonymization techniques depends on context, and thus tools need to support a large set of methods to ensure that the usefulness of data is not overly affected  ...  Moreover, we would like to thank the anonymous  ... 
doi:10.1002/spe.2812 fatcat:5mzoacmnjjdwrn2xsoincydjyy

Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata [article]

Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel H. Nunes
2022 arXiv   pre-print
The approach we suggest brings three principal advantages: it is flexible, allowing for precise quantification and comparison of privacy risks for attacks both known and novel; it can be computationally  ...  tractable for very large, longitudinal datasets; and its results are explainable both to politicians and to the general public.  ...  They have been adopted in practice by the popular ARX data-anonymization tool [40] , among others.  ... 
arXiv:2204.13734v1 fatcat:2lyslkcw4rfjxecvxnqxqfgof4

Advanced Statistical Learning on Short Term Load Process Forecasting [article]

Junjie Hu, Brenda López Cabrera, Awdesch Melzer
2021 arXiv   pre-print
We propose different statistical nonlinear models to manage these challenges of hard type datasets and forecast 15-min frequency electricity load up to 2-days ahead.  ...  The predictive information is fundamental for the risk and production management of electricity consumers.  ...  The decision to which expectile level the current data belongs and, hence, where the forecast of the load will be, is entirely data-driven and is evaluated by a change-point test.  ... 
arXiv:2110.09920v1 fatcat:mpe4kouebrbstbbpigdhtt52ou

Data-Powered Positive Deviance during the SARS-CoV-2 Pandemic—An Ecological Pilot Study of German Districts

Joshua Driesen, Ziad El-Khatib, Niklas Wulkow, Mitchell Joblin, Iskriyana Vasileva, Andreas Glücker, Valentin Kruspel, Catherine Vogel
2021 International Journal of Environmental Research and Public Health  
Our qualitative analysis suggests that quick, proactive, decisive, and flexible/pragmatic actions, the willingness to take risks and deviate from standard procedures, good information flows both in terms  ...  We introduced the mixed-methods Data-Powered Positive Deviance (DPPD) framework as a potential addition to the set of tools used to search for effective response strategies against the SARS-CoV-2 pandemic  ...  "But that is precisely the point, acting flexibly and pragmatically, looking ahead and staying ahead of the situation, as you say in crisis response circles.  ... 
doi:10.3390/ijerph18189765 pmid:34574701 fatcat:rwjs7w3hnrcmrl32i6bfsz4hwi

D3.2 - First version of the framework for the collection, cleaning, integration & anonymization of big data

Ekaterina Gilman, Panos Kostakos, Marta Cortés, Hassan Mehmood, Jukka Riekki, Andrew Byrne, Katerina Valta, Stavros Tekes, Chandan Kumar, Jun Sun, Steffen Staab, Ioannis Pragidis (+28 others)
2018 Zenodo  
, interoperability, and data privacy solutions; iv) describes the software to fetch the data to the platform; as well as v) discusses challenges and future work.  ...  This report delivers the first version of the CUTLER data collection and pre-processing framework. It describes architectural and software solutions developed so far.  ...  Another option for anonymization is the ARX data anonymization tool [41] , an open source tool for anonymizing sensitive personal data.  ... 
doi:10.5281/zenodo.3385965 fatcat:rakmp6iztbgivfbeza3mmpxleq

D2.4 Profiling Analytics and Privacy Methodological Foundations Release I

Suite5, Frankfurt University, UBITECH, NTUA
2018 Zenodo  
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue  ...  , Past cases profile data, Current child Table 3 - 3 12 Data sources to be used for profiling Type Data sources Mandatory Past cases data, current Child Profile Optional Social media data  ...  , data-related, challenge.  ... 
doi:10.5281/zenodo.2542731 fatcat:ecplhyb5hrapffb4amahnfr6ry

Quantifying SARS‐CoV‐2 Infection Risk Within the Google/Apple Exposure Notification Framework to Inform Quarantine Recommendations

Amanda M. Wilson, Nathan Aviles, James I. Petrie, Paloma I. Beamer, Zsombor Szabo, Michelle Xie, Janet McIllece, Yijie Chen, Young‐Jun Son, Sameer Halai, Tina White, Kacey C. Ernst (+1 others)
2021 Risk Analysis  
Public health authorities can either set a threshold on initial infection risk to determine 14-day quarantine onset, or on the conditional probability of current and future infectiousness conditions to  ...  It can be adjusted for negative test results using Bayes' theorem.  ...  The Covid Watch app is currently programmed either to use a threshold on infection risk to determine 14-day quarantine onset, or on risk of current and future infectiousness to determine both quarantine  ... 
doi:10.1111/risa.13768 pmid:34155669 pmcid:PMC8447042 fatcat:vmv2luz4krbfph4rgohgt7auaq

LIPIcs : an Open-Access Series for International Conference Proceedings

Marc Herbstritt, Wolfgang Thomas
2016 ERCIM News  
However, current technological and social landscapes are now calling for a shift towards the introduction of a more flexible, hybrid computing paradigm.  ...  also as a metaboliser statuses) from individual genotype profiles.  ...  and integrated security assurance to allow application self-protection at runtime.  ... 
doi:10.18154/rwth-2018-223393 fatcat:ddo7qz65l5b7peuksw2amaoxai

On the Opportunities and Risks of Foundation Models [article]

Rishi Bommasani, Drew A. Hudson, Ehsan Adeli, Russ Altman, Simran Arora, Sydney von Arx, Michael S. Bernstein, Jeannette Bohg, Antoine Bosselut, Emma Brunskill, Erik Brynjolfsson, Shyamal Buch (+102 others)
2021 arXiv   pre-print
., BERT, DALL-E, GPT-3) that are trained on broad data at scale and are adaptable to a wide range of downstream tasks.  ...  Despite the impending widespread deployment of foundation models, we currently lack a clear understanding of how they work, when they fail, and what they are even capable of due to their emergent properties  ...  Fernando Pereira, Vinodkumar Prabhakaran, Colin Raffel, Marten van Schijndel, Ludwig Schmidt, Yoav Shoham, Madalsa Singh, Megha Srivastava, Jacob Steinhardt, Emma Strubell, Qian Yang, Luke Zettlemoyer, and  ... 
arXiv:2108.07258v2 fatcat:yktkv4diyrgzzfzqlpvaiabc2m

Security and privacy issues in implantable medical devices: A comprehensive survey

Carmen Camara, Pedro Peris-Lopez, Juan E. Tapiador
2015 Journal of Biomedical Informatics  
On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power.  ...  Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it.  ...  The authors would like to thank the anonymous reviewers for constructive feedback and insightful suggestions that helped to improve the quality of this paper.  ... 
doi:10.1016/j.jbi.2015.04.007 pmid:25917056 fatcat:mhk7q2cckvbuffva6whz2kywee

Digitally Connected: Global Perspectives on Youth and Digital Media

Sandra Cortesi, Urs Gasser, Gameli Adzaho, Bruce Baikie, Jacqueline Baljeu, Matthew Battles, Jacqueline Beauchere, Elsa Brown, Jane O Burns, Patrick Burton, Jasmina Byrne, Maximillion Colombo (+37 others)
2015 Social Science Research Network  
The opportunity to share our experiences with our international colleagues was invaluable, and we eagerly look forward to a collaborative future. References / Resources / Links  ...  It cannot be stressed enough that training courses need an ICT professional -not necessarily an expertwho can stay ahead of, engage with, and challenge the youth-and the teachers.  ...  Even where companies share data with researchers -as several US Internet companies do on an individual and ad hoc basis -a second challenge emerges: In big data environments, traditional methods of data  ... 
doi:10.2139/ssrn.2585686 fatcat:ehi5kz4qmrc2ni5kiqfc5btzbe

Study of Plasmid-Mediated Extended-Spectrum β-Lactamase-Producing Strains of Enterobacteriaceae, Isolated from Diabetic Foot Infections in a North Indian Tertiary-Care Hospital

Mohammad Zubair, Abida Malik, Jamal Ahmad
2012 Diabetes Technology & Therapeutics  
Detailed history and patient's profile, grade of DFU, co-morbidities and complications, laboratory data, and final outcome were collected.  ...  Standard methods were used for culture identification, sensitivity testing, and ESBL detection.  ...  Rafat Fatima, Diabetic Educator, Center for Diabetes and Endocrinology, for dietary advice and monitoring the patient's diet. The authors also like to thank Dr. Danish H and Dr. S. Y.  ... 
doi:10.1089/dia.2011.0197 pmid:22225456 fatcat:lvm52fx5u5flvkvv7o5wjyzehi

Iterative Most-Likely Point Registration (IMLP): A Robust Algorithm for Computing Optimal Shape Alignment

Seth D. Billings, Emad M. Boctor, Russell H. Taylor, M. Sohel Rahman
2015 PLoS ONE  
Our GTLS approach has improved accuracy, efficiency, and stability compared to prior methods presented for this problem and offers a straightforward implementation using standard least squares.  ...  The performance of IMLP is shown to be superior with respect to these algorithms over a wide range of noise conditions, outliers, and misalignments using both mesh and point-cloud representations of various  ...  Acknowledgments The authors would like to thank our anonymous reviewers for their helpful insights and suggestions, which have improved the clarity and strengthened the content of this manuscript Author  ... 
doi:10.1371/journal.pone.0117688 pmid:25748700 pmcid:PMC4352012 fatcat:yjucfnygn5gyfiki67tqofysru

Tarpeia: workings of a Roman myth

2016 ChoiceReviews  
Note how Ennius, Junius, and Sulpicius are given status as individual speakers, and in the second passage anonymous speakers, collectively at least, actively exert their voice ( prodiderunt, dicunt).  ...  What is it to belong to and in Rome? The third chapter jumps ahead a little more than a century.  ...  She used his love to the advantage of her native Naxians; she bargained that she would be his if he would consent to her wishes.  ... 
doi:10.5860/choice.195263 fatcat:omuvla6ftzgotef7qjx34gmxzm

Farewell to the self-employed: deconstructing a socioeconomic and legal solipsism

1992 ChoiceReviews  
H D 8036.L 56 1992 3 3 1 .1 2 -dc20 91-39643 British Library Cataloguing in Publication Data is available.  ...  In German Idealism and in Marx, self-consciousness, self determination, and self-realization qualified as the concepts in which the normative content of modernity was summarized.  ...  , the Bureau of the Census What You See Is What You Conceived: The Current Population Survey There is a sense in which many of the facts presented by the bureaucracies did not even exist ahead of time  ... 
doi:10.5860/choice.30-0388 fatcat:pzej6bcu5zbiddyqbdcmzbmg2i
« Previous Showing results 1 — 15 out of 47 results