Filters








197 Hits in 3.7 sec

Spy vs. Spy: Rumor Source Obfuscation [article]

Giulia Fanti, Peter Kairouz, Sewoong Oh, Pramod Viswanath
2015 arXiv   pre-print
Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles.  ...  Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary.  ...  Although adaptive diffusion obfuscates the source on infinite regular trees, real world contact networks have cycles, and degrees are irregular, and the size is finite.  ... 
arXiv:1412.8439v3 fatcat:qj7afdjfuvbqfpwwljnf3hsx4i

Hiding the Rumor Source [article]

Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, Pramod Viswanath
2016 arXiv   pre-print
Experiments on a sampled Facebook network demonstrate that adaptive diffusion effectively hides the location of the source even when the graph is finite, irregular and has cycles.  ...  the source when the underlying contact network is an infinite regular tree.  ...  Irregular Trees In this section, we study adaptive diffusion on irregular trees, with potentially different degrees at the vertices.  ... 
arXiv:1509.02849v2 fatcat:f4q6qv4nrnhifdy7yg7irii4bm

Rumor source detection with multiple observations under adaptive diffusions [article]

Miklos Z. Racz, Jacob Richey
2020 arXiv   pre-print
We show that (1) a weak form of source obfuscation is still possible in the case of two independent snapshots, but (2) already with three observations there is a simple algorithm that finds the rumor source  ...  Recent work, motivated by anonymous messaging platforms, has introduced adaptive diffusion protocols which can obfuscate the source of a rumor: a "snapshot adversary" with access to the subgraph of "infected  ...  Rumor source obfuscation.  ... 
arXiv:2006.11211v1 fatcat:3jt3geh4rjgwrpjdcchbvsqsgy

Infection Spreading and Source Identification: A Hide and Seek Game

Wuqiong Luo, Wee Peng Tay, Mei Leng
2016 IEEE Transactions on Signal Processing  
On the other hand, the network administrator aims to identify the source node based on knowledge of which nodes have been infected.  ...  The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator  ...  Moreover, simulations are provided in [20] to verify the performance of the messaging protocol on irregular trees and general networks.  ... 
doi:10.1109/tsp.2016.2558168 fatcat:gro2vrwcirffbl2r7logzqfx4m

Epidemic Source Detection in Contact Tracing Networks: Epidemic Centrality in Graphs and Message-Passing Algorithms [article]

Pei-Duo Yu and Chee Wei Tan and Hung-Lin Fu
2022 arXiv   pre-print
We study the epidemic source detection problem in contact tracing networks modeled as a graph-constrained maximum likelihood estimation problem using the susceptible-infected model in epidemiology.  ...  In particular, we show that the optimal solution of the maximum likelihood estimator can be refined to distances on graphs based on a novel statistical distance centrality that captures the optimality  ...  Note that, when G n is a general graph, rumor center is only defined on the BFS spanning tree of G n .  ... 
arXiv:2201.06751v1 fatcat:mqzkoq62qrbivgq3uefgppoee4

Metadata-conscious anonymous messaging

Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, Pramod Viswanath
2016 IEEE Transactions on Signal and Information Processing over Networks  
We further demonstrate empirically that adaptive diffusion hides the source effectively on real social networks.  ...  The spread of messages on these platforms can be modeled by a diffusion process over a graph.  ...  Specifically, we show that the tree protocol achieves provably (asymptotically) optimal source obfuscation, significantly improving upon standard diffusion.  ... 
doi:10.1109/tsipn.2016.2605761 fatcat:rugyvh2ojfb3xa7jrnddmzehy4

Anonymity Properties of the Bitcoin P2P Network [article]

Giulia Fanti, Pramod Viswanath
2017 arXiv   pre-print
We theoretically prove that Bitcoin's networking protocols (both pre- and post-2015) offer poor anonymity properties on networks with a regular-tree topology.  ...  In doing so, we consider new adversarial models and spreading mechanisms that have not been previously studied in the source-finding literature.  ...  Andrew Miller for pointing out the Bitcoin community's transition from trickle to diffusion, Varun Jog for valuable insights about the limiting behavior of Pòlya urns, and Sewoong Oh for discussions on  ... 
arXiv:1703.08761v1 fatcat:imte7a44fjauzalyxqt2gieusm

Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? [article]

Tommi Gröndahl, N. Asokan
2019 arXiv   pre-print
Additionally, we discuss forms of deception beyond semantic content, focusing on hiding author identity by writing style obfuscation.  ...  Surveying the literature on both author identification and obfuscation techniques, we conclude that current style transformation methods fail to achieve reliable obfuscation while simultaneously ensuring  ...  A comparison of studies using ILT for style obfuscation ("Success" = the reported success of the approach in deceiving author identification, based on the source paper.)  ... 
arXiv:1902.08939v2 fatcat:qjbxcq5fpjaubj5z5xii3v44mu

Text Analysis in Adversarial Settings

Tommi Gröndahl, N. Asokan
2019 ACM Computing Surveys  
Additionally, we discuss forms of deception beyond semantic content, focusing on hiding author identity by writing style obfuscation.  ...  Surveying the literature on both author identification and obfuscation techniques, we conclude that current style transformation methods fail to achieve reliable obfuscation while simultaneously ensuring  ...  This feature had a positive effect on classification, and links troll-detection to rumor-debunking, where similar content-comparison methods prevail [147] .  ... 
doi:10.1145/3310331 fatcat:563vjvd63fcdnnswmvmsxthu7e

Construing the big data based on taxonomy, analytics and approaches

Ajeet Ram Pathak, Manjusha Pandey, Siddharth Rautaray
2018 Iran Journal of Computer Science  
Researchers are also focusing on detecting the rumors, fake news and fake likes, videos, text, and audio recordings from social media platforms [128, 129] .  ...  They are characterized by partial, irregular and implicit structure.  ... 
doi:10.1007/s42044-018-0024-3 fatcat:teiovluolngepjyebzz2wnwjxu

"The Fruit of the Poisonous Tree" Revisited and Shepardized

Robert M. Pitler
1968 California Law Review  
source," there is little reason to view the evidence as anything other than the "fruit of the poisonous tree."  ...  source.  ... 
doi:10.2307/3479264 fatcat:ofdjx4ggbffbri4g6o4cloaata

How to apply de Bruijn graphs to genome assembly

Phillip E C Compeau, Pavel A Pevzner, Glenn Tesler
2011 Nature Biotechnology  
One of the simplest data structures is a binary tree in which each node begets two more nodes. e branches of this graph expand in powers of two, so a er just 16 generations, there are already 131,071 nodes  ...  But graph algorithms are computationally challenging because of their irregular structure and combinatorial expansion.  ... 
doi:10.1038/nbt.2023 pmid:22068540 pmcid:PMC5531759 fatcat:yvbmxbd2pnbg5ojtaqggieuiia

Event Prediction in the Big Data Era: A Systematic Survey [article]

Liang Zhao
2020 arXiv   pre-print
There is a large amount of existing work that focuses on addressing the challenges involved, including heterogeneous multi-faceted outputs, complex dependencies, and streaming data feeds.  ...  To improve the memory efficiency, this can be limited to a consideration of just the source and current locations, leveraging a quad-tree style architecture to store the historical information.  ...  Similarly, [45] proposed another tree structure referred to as a "circular binary search tree" to manage the event occurrence pattern.  ... 
arXiv:2007.09815v3 fatcat:ypmjm3n3xjbcjbzdlhowdkaona

Mechanics Lost: Husserl's Galileo and Ihde's Telescope

Harald A. Wiltsche
2016 Husserl Studies  
License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source  ...  On the other hand, however, Galileo obfuscated the true nature of his own revolution because he failed to inquire into the ''how'' of geometry's applicability to reality.  ...  This means, among other things, that the stick has become a source of direct, non-inferential information about the world.  ... 
doi:10.1007/s10743-016-9204-x fatcat:jslpgln5vvfzrpw5tbtllafcym

Two bits: the cultural significance of free software

2008 ChoiceReviews  
One such lieutenant was Dave Miller, who maintained a "mirror" of the stable Linux kernel tree, the VGER tree, on a server at Rutgers.  ...  UNIX is admired for its integrity as a conceptual thing and despised (or marveled at) for its truly tangled genealogical tree of ports and forks: new versions of UNIX, some based directly on the source  ...  The most recent source for this is Rabinow, Anthropos Today.  ... 
doi:10.5860/choice.46-2158 fatcat:jtxrurovzvexbm7lslgffroqem
« Previous Showing results 1 — 15 out of 197 results