65,280 Hits in 3.4 sec

Development of Fuzzy Risk Calculation Method for a Dynamic Federation of Clouds

Rasim Alguliyev, Fargana Abdullayeva
2015 Intelligent Information Management  
Here, for solving this problem, first of all, important factors which are capable of seriously influencing the information security level of clouds are selected and then hierarchical risk assessment architecture  ...  is proposed based on these factors.  ...  The next layer of the hierarchy is sub factors of the main factors. Step 2. Establishment of comparison matrix for each layer.  ... 
doi:10.4236/iim.2015.74018 fatcat:44mrxqp3hvemjmz4m2w34sfmje

Practical and Secure Federated Recommendation with Personalized Masks [article]

Liu Yang, Junxue Zhang, Di Chai, Leye Wang, Kun Guo, Kai Chen, Qiang Yang
2022 arXiv   pre-print
In this paper, we proposed federated masked matrix factorization (FedMMF) to protect the data privacy in federated recommender systems without sacrificing efficiency and effectiveness.  ...  On the other hand, combined with the adaptive secure aggregation protocol, personalized mask could further improve efficiency. Theoretically, we provide security analysis for personalized mask.  ...  Then, federated matrix factorization is performed on the masked ratings of all parties. An adaptive secure aggregation method is adopted.  ... 
arXiv:2109.02464v2 fatcat:ckwkk5mpfbbkxicioaztbslq6q

Privacy Threats Against Federated Matrix Factorization [article]

Dashan Gao, Ben Tan, Ce Ju, Vincent W. Zheng, Qiang Yang
2020 arXiv   pre-print
However, the privacy threats in federated matrix factorization are not studied.  ...  In this paper, we categorize federated matrix factorization into three types based on the partition of feature space and analyze privacy threats against each type of federated matrix factorization model  ...  Background In this section, we introduce the matrix factorization method based on stochastic gradient descent, as well as the security model considered in this paper.  ... 
arXiv:2007.01587v1 fatcat:kevu5w6hxrc2vkzfwhvin6imhu

Shared MF: A privacy-preserving recommendation system [article]

Senci Ying
2020 arXiv   pre-print
Based on Federated learning technology, this paper proposes a shared matrix factorization scheme called SharedMF.  ...  Matrix factorization is one of the most commonly used technologies in recommendation system.  ...  In this paper, we propose a secure distributed matrix factorization recommendation system framework, called SharedMF.  ... 
arXiv:2008.07759v1 fatcat:tbyj3rth5zesla6mevnf7tjrg4

Efficient Federated Matrix Factorization against Inference Attacks

Di Chai, Leye Wang, Kai Chen, Qiang Yang
2022 ACM Transactions on Intelligent Systems and Technology  
Therefore, in this paper, we propose an efficient federated matrix factorization method that protects users against inference attacks.  ...  For example, we can apply both homomorphic encryption and diferential privacy in FL to get a more secure solution. The irst secure federated matrix factorization is proposed by Chai et al. [7] .  ...  Existing works in secure matrix factorization can be categorized into three types: encryption methods, diferential privacy methods, and federated methods.  ... 
doi:10.1145/3501812 fatcat:zcxme4c5rvbpdeqjgujxopkhjq

Towards Privacy-Preserving and Verifiable Federated Matrix Factorization [article]

Xicheng Wan and Yifeng Zheng and Qun Li and Anmin Fu and Mang Su and Yansong Gao
2022 arXiv   pre-print
Very recently, some research efforts have been initiated to explore the applicability of FL for matrix factorization (MF), a prevalent method used in modern recommendation systems and services.  ...  VPFedMF provides guarantees on the confidentiality of individual gradient updates through lightweight and secure aggregation.  ...  VPFedMF is tested over a real-world movie rating dataset for federated matrix factorization.  ... 
arXiv:2204.01601v2 fatcat:366tl652orer7fcvhaxy7qz7yi

Problems and Tools for the Detection of Threats to Personnel Security in the Region

N. V. Kuznetsova, A. Yu. Timofeeva
2016 R-Economy  
factor).  ...  The hierarchical factor analysis is used to identify types of threats (lower level factors) and to estimate their effect on the general level of the urgency of threats to personnel security (upper-level  ...  resource potential as a factor of its sustainable socio-economic development").  ... 
doi:10.15826/recon.2016.2.4.041 fatcat:qpbsxgxxo5cfzahxkdubyg7jxa

Practical Lossless Federated Singular Vector Decomposition over Billion-Scale Data [article]

Di Chai, Leye Wang, Junxue Zhang, Liu Yang, Shuowei Cai, Kai Chen, Qiang Yang
2022 arXiv   pre-print
to achieve lossless accuracy; and 2) As the masks do not inflate the data, FedSVD avoids extra computation and communication overhead during the factorization to maintain high efficiency.  ...  At the heart of FedSVD is a lossless matrix masking scheme delicately designed for SVD: 1) While adopting the masks to protect private data, FedSVD completely removes them from the final results of SVD  ...  Outsourcing matrix factorization techniques: The secure outsourcing computation is a traditional research topic. Zhang et al.  ... 
arXiv:2105.08925v3 fatcat:anoy5buvyvdxdodgb65yydtibq

Complexity of Global Refugee Crisis: Needs for Global Transdisciplinary Collaboration

Daniel Moran, Utku Gulbulak, Atila Ertas, Spencer Yancey, Cody Carson, Karina Puente, Jeremy Zinsmeyer, Iyayi Agbontaen, Alejandra Caldera, Ahmad Hadi Bakir, Harrison Baucum, Daniel Mendoza Pautt (+10 others)
2020 Transdisciplinary Journal of Engineering & Science  
Factors being considered for their impact on resettlement include budget and cost issues, federal law and policies, administration challenges, security screening process, education and training, health  ...  The issue of refugee resettlement is complex and includes many factors to consider.  ...  Factors being considered for their impact on resettlement include: budget and cost issues, federal law and policies, administration challenges, security screening process, education and training, health  ... 
doi:10.22545/2020/00137 fatcat:2fzzmq5guvga7kxalbptpnkrsq

Macroeconomic dataset for comparative studies on coastal and inland regions in innovation space of Russia

Anna A. Mikhaylova, Andrey S. Mikhaylov, Oksana V. Savchina
2019 Data in Brief  
The database includes statistics for a total set of 85 regions of the Russian Federation over a period of 2015 and 2016. Spatial differentiation is made on to coastal and inland regions.  ...  The dataset covers a series of 50 indicators grouped into a matrix of 5 elements of regional innovation system (human resources - HR, infrastructure, research & development sector - R&D, innovative milieu  ...  Supplements 2e9 present the matrix of innovation security for all administrative units of the Russian Federation for 2015, 2016.  ... 
doi:10.1016/j.dib.2019.104640 pmid:31687443 pmcid:PMC6820115 fatcat:p3qhxp3tcrf23dbtpdvlz45iyy

Federated Tensor Factorization for Computational Phenotyping

Yejin Kim, Jimeng Sun, Hwanjo Yu, Xiaoqian Jiang
2017 Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '17  
We developed secure data harmonization and federated computation procedures based on alternating direction method of multipliers (ADMM).  ...  In this paper, we developed a novel solution to enable federated tensor factorization for computational phenotyping without sharing patient-level data.  ...  The server then generates harmonized factor matrix (global factor matrix) by combining all the local factor matrices with Lagrangian multipliers (step 4).  ... 
doi:10.1145/3097983.3098118 pmid:29071165 pmcid:PMC5652331 dblp:conf/kdd/KimSYJ17 fatcat:emkfezxivbfdhbvljoczvszpku

A New Dynamic Trust Model for "On Cloud" Federated Identity Management

Keltoum Bendiab, Stavros Shiaeles, Samia Boucherkha
2018 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)  
It is considered as a promising approach to facilitate secure resource sharing between collaborating partners in the Cloud.  ...  However, current FIM frameworks such as OpenID, SAML, Liberty Alliance, Shibboleth and WS-Federation do not define a suitable trust model to allow dynamic and agile federation establishment.  ...  IV INITIAL WEIGHT MATRIX OF CAUSAL RELATIONSHIPS FROM THE CSP TABLE V. INITIAL WEIGHT MATRIX OF CAUSAL RELATIONSHIPS FROM THE CSP  ... 
doi:10.1109/ntms.2018.8328673 dblp:conf/ntms/BendiabSB18 fatcat:vjcdmlycxfantjeyso4gkxs34e


Javad Daryaei, Ahmad Hosseini Golafshan, Mahmood Modiri, Parvaneh Gelard
2020 Revista Gênero & Direito  
Then, the final model of the research was identified with 6 factors and 22 sub-factors using the fuzzy Delphi method.  ...  Fuzzy DEMATEL and fuzzy ANP methods were used to examine the relationship between criteria and weighting the factors.  ...  to the factor of "defect in dependency on companies providing service" which is a "security" factor.  ... 
doi:10.22478/ufpb.2179-7137.2020v9n2.50367 fatcat:w4ynmkqzhnfbjbetmz6pysgjii

Estimation of traffic matrices via super-resolution and federated learning

Roberto Amoroso, Flavio Esposito, Maria Luisa Merani
2020 Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies  
Existing traffic matrix inference approaches that use statistical methods, often make assumptions on the structure of the matrix that may be invalid.  ...  Inspired by the field of image processing, we propose a superresolution technique for traffic matrix inference that does not require any knowledge on the structural properties of the matrix elements to  ...  We analyze the benefits of training our Traffic-Matrix Super Resolution model with federated learning.  ... 
doi:10.1145/3386367.3431677 dblp:conf/conext/AmorosoEM20 fatcat:wv7zexs6wravrhqssjw56mvyki

Critical Dimensions of Blockchain Technology Implementation in the Healthcare Industry: An Integrated Systems Management Approach

Satyabrata Aich, Sushanta Tripathy, Moon-Il Joo, Hee-Cheol Kim
2021 Sustainability  
Blockchain technology has gained increasing attention as it ensures transparency, trust, privacy, and security. However, the critical factors affecting efficiency require further study.  ...  Although life is thus improved, security issues remain important, especially in the healthcare sector.  ...  matrix Determine driving and dependent factors 3: Level partitioning Define structural levels (factor level partitioning) 4: ISM modeling Develop an ISM model using a reachability matrix and level  ... 
doi:10.3390/su13095269 fatcat:sjvxz3o4zjef5oudde667f5ncu
« Previous Showing results 1 — 15 out of 65,280 results