Filters








12 Hits in 6.8 sec

Building a Collaborative Phone Blacklisting System with Local Differential Privacy [article]

Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad
2020 arXiv   pre-print
blacklist using a reasonable overall privacy budget and at the same time preserve users' privacy while maintaining utility for the learned blacklist.  ...  In this paper, we study whether it is possible to build a practical collaborative phone blacklisting system that makes use of local differential privacy (LDP) mechanisms to provide clear privacy guarantees  ...  To address this challenge, Qin et al [24] proposed a protocol, called LDPMiner, for finding heavy hitters from set-valued data.  ... 
arXiv:2006.09287v1 fatcat:cnosekmvbzallleylclntqaiwm

Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users [article]

Moni Naor, Neil Vexler
2020 arXiv   pre-print
For collecting statistics about data from larger domains (for histograms and heavy hitters) we present a mechanism that prevents tracking for a limited number of responses.  ...  We show how differentially private and untrackable mechanisms can be combined to achieve a bound for the problem of detecting when a certain user changed their private value.  ...  Acknowledgements We thank Alexandra Korolova for many discussions and suggestions regarding the RAPPOR project as well as Guy Rothblum and Kobbi Nissim for much appreciated comments for their invaluable  ... 
arXiv:2004.03002v1 fatcat:rf4rfml5ebcbhlfluk2l7qc2we

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols.  ...  This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down  ...  For instance, switches can perform a flow-size aware routing method to redirect traffic upon detecting a heavy hitter. B.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols.  ...  This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down  ...  For instance, switches can perform a flow-size aware routing method to redirect traffic upon detecting a heavy hitter. B.  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

Exploiting Cloud Utility Models for Profit and Ruin

Joseph Idziorek, Mark Tannian
2011 2011 IEEE 4th International Conference on Cloud Computing  
ACKNOWLEDGEMENTS Having nearly completed my PhD program, I now know why people are so grateful in the acknowledgements section of their dissertations -the work of a dissertation is completed with the love  ...  If it is true that it takes a "village"  ...  Although the responsibility for privacy protection is initially upon the tenant, it may be possible to share responsibility with the CSP if the CSP is deemed to be influencing the means by which privacy  ... 
doi:10.1109/cloud.2011.45 dblp:conf/IEEEcloud/IdziorekT11 fatcat:427chhohqbcoflel5cfsl7a4jy

Deep Neural Mobile Networking [article]

Chaoyun Zhang
2020 arXiv   pre-print
This makes monitoring and managing the multitude of network elements intractable with existing tools and impractical for traditional machine learning algorithms that rely on hand-crafted feature engineering  ...  The next generation of mobile networks is set to become increasingly complex, as these struggle to accommodate tremendous data traffic demands generated by ever-more connected devices that have diverse  ...  Such services are heavy hitters, i.e., generate sizeable amounts of network traffic, and have Quality of Service (QoS) requirements.  ... 
arXiv:2011.05267v1 fatcat:yz2zp5hplzfy7h5kptmho7mbhe

Real-time Netshuffle: Graph distortion for on-line anonymization

Ruma R. Paul, Victor C. Valgenti, Min Sik Kim
2011 2011 19th IEEE International Conference on Network Protocols  
In order to deal with both of these contradictory concerns traffic trace anonymization is the answer, which hides sensitive information while preserves empirical value of the trace.  ...  Not only must this data meet stringent timing constraints, but it must also address the potential privacy and security concerns that might arise.  ...  Min Sik Kim for his guidance and support for the past two and half years and also for patiently reviewing each and every chapter of my thesis. I also thank Dr. Carl  ... 
doi:10.1109/icnp.2011.6089040 dblp:conf/icnp/PaulVK11 fatcat:shcqau2vqvgltkvzcizbzckxye

Input Secrecy & Output Privacy: Efficient Secure Computation of Differential Privacy Mechanisms

Jonas Böhler
2021
In this thesis, we present efficient MPC protocols for distributed parties to collaboratively compute D [...]  ...  Differential privacy (DP), a rigorous privacy notion for anonymization mechanisms, is widely deployed in the industry, e.g., by Google, Apple, and Microsoft.  ...  Due to thresholding, we cannot guarantee to find exactly 𝑘 heavy hitters but only at most 𝑘 as values with small counts (unlikely to be heavy hitters) might not exceed the threshold and are dropped.  ... 
doi:10.5445/ir/1000141098 fatcat:o5ff2uye2be7th6dwlvaohldnq

A Work Life Balance of Employees and Its Effect on Emotional Intelligence

Dr. G. SUGANTHI
2019 Zenodo  
There is a need to carry out studies with a larger sample size to make results more generalized  ...  However, there is a important to investigate increasing cases of work life problems of school teachers.  ...  For a simple and better understanding of the data, descriptive statistics are presented on time plots as the data pertains to seventeen years i.e. 2001 to 2017.The socio-economic activities covered in  ... 
doi:10.5281/zenodo.5476173 fatcat:5rro63pefzbpxigfgnilhazy5a

D. Trump's Economic Model: Results and Prospects
Экономическая модель Д. Трампа: итоги и перспективы

V. Supyan, Institute of the USA and Canadian Studies, Russian Academy of Sciences, 2/3 Khlebnyi Per., Moscow, 121069, Russian Federation
2020 Mirovaya Ekonomika i Mezhdunarodnye Otnosheniya  
But what most distinguishes these two heavy hitters from the crowd is their own clever use of economic arguments and tortured use of statistics. Wow.  ...  When none of us noticed the first changes, the factory decided to go for it again...Putting less plastic in the bottles generated savings, but these were not shared with the importer.  ... 
doi:10.20542/0131-2227-2020-64-7-34-42 fatcat:er3f2xhuvzfurmghiwzacmgu7u

An empirical evaluation of misconfiguration in Internet services [article]

Tobias Fiebig, Technische Universität Berlin, Technische Universität Berlin, Anja Feldmann
2017
We find that complex attacks are commonly prevented by easy to implement technical mitigations.  ...  In fact, there is a constant stream of new, complex techniques to ensure the confidentiality, integrity, and availability of data and systems.  ...  Interestingly, this large share of NXDOMAIN responses is caused by only a small number of heavy hitters. We identify the networks to which these records belong as Teredo (Huitema, 2006) prefixes.  ... 
doi:10.14279/depositonce-6140 fatcat:lvw4geuxrrgfhi3ms3t7m6pkl4

Automated Monitoring and Security Services in Federated Software-defined Network Infrastructures [article]

Adam Pavlidis, National Technological University Of Athens
2020
Typically, such processing techniques perform well, but rely on traditional protocols for data extraction.  ...  As a first step, we propose a framework that distributes filtering rules for multi-vector anomalies to devices across an attack path, enhancing their mitigation potential.  ...  Then: ( ) ( ) Intuitively, our approach tends to assign the most important flows, e.g. heavy hitters, to the collaborators with the higher reputation values.  ... 
doi:10.26240/heal.ntua.18573 fatcat:cdkvlvomqjf2rgb5gein4snioq