Secure Grouping and Aggregation with MapReduce

Size: px
Start display at page:

Download "Secure Grouping and Aggregation with MapReduce"

Transcription

1 1/27 Secure Grouping and Aggregation with MapReduce Radu Ciucanu Matthieu Giraud Pascal Lafourcade Lihua Ye 28 July 2018 SECRYPT, Porto

2 2/27 Example of Grouping and Aggregation Name Department Salary Alice Computer Science 1900 Bob Mathematics 1750 Mallory Computer Science 1800 Oscar Physics 2000 Carol Mathematics 1600

3 2/27 Example of Grouping and Aggregation Name Department Salary Alice Computer Science 1900 Bob Mathematics 1750 Mallory Computer Science 1800 Oscar Physics 2000 Carol Mathematics 1600 Department COUNT SUM AVG MAX MIN Computer Science Mathematics Physics

4 MapReduce I Partitioning input data I Scheduling program execution on machines I Performing the shuffle I Handling machine failures Input 1 Input 2 Input 3 Map 1 Map 2 Map 3 Shuffle Programmer gives: Reduce 1 Reduce 2 Output 1 Output 2 I Input files I Map and Reduce 3/27

5 Grouping and Sum with MapReduce User Data owner D M R P γdept,sum(salary) (D) Map: M R: (πdept (t), πsalary (t)) Reduce: Input: (key P, values) sum = πdept (t) values πsalary (t) R P : (πdept (t), sum). t D Name Alice Bob Mallory Oscar Carol Department Computer Science Mathematics Computer Science Physics Mathematics Salary Department Salary Computer Science Mathematics Computer Science Physics Mathematics Department SUM Computer Science Mathematics Physics /27

6 Security Model Cloud is honest-but-curious f( Cloud Data Owner f ) User Security properties I Secrecy of and f( ) I User queries f( ) but cannot learn 5/27

7 Contributions Secure MapReduce Algorithms: I COUNT I SUM I AVG I MAX I MIN Secure Private Approach I Cloud nodes do not learn I Cloud nodes do not learn f( ) I User does not learn 6/27

8 7/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion

9 Pseudo-Random Permutation Idea: f : {0, 1} n {0, 1} n 0 {0, 1} n 1 Deterministic Result indistinguishable from a random Not inversible Notation: Data owner picks a key k and uses f k (m) 8/27

10 9/27 Fully Homomorphic Encryption (Gentry 2009) Idea: Perform ANY computations on encrypted data f, x i, f (E k (x 1 ),..., E k (x n )) = E k (f (x 1,..., x n )) Not yet efficient enough

11 Partial Homomorphic Encryption Paillier s Cryptosystem (1999) Public Key encryption Probabilistic encryption E pk (x + y) = E pk (x) E pk (y) E pk (x y) = (E pk (x)) y 10/27

12 11/27 Oder Preserving Encryption Agrawal et al. Cryptosystem (2004) Let c 1 = E k (m 1 ) and c 2 = E k (m 2 ) Symmetric encryption if m 1 < m 2 then c 1 < c 2

13 12/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion

14 13/27 COUNT, SUM and AVG Preprocessing on data All data are encrypted with Paillier with pk U All data d have f k (d) Name Dept Salary A CS 1900 B Math 1750 M CS 1800 O Phy 2000 C Math 1600 Name Dept Salary f k (A),E pku (A) f k (CS), E pku (CS) f k (1900), E pku (1900) f k (B),E pku (B) f k (Math), E pku (Math) f k (1750), E pku (1750) f k (M),E pku (M) f k (CS), E pku (CS) f k (1800), E pku (1800) f k (O),E pku (O) f k (Phy), E pku (Phy) f k (2000), E pku (2000) f k (C),E pku (C) f k (Math), E pku (Math) f k (1600), E pku (1600)

15 Secure Private COUNT Name Dept Salary fk(a),epk U (A) fk(cs), Epk U (CS) fk(1900), Epk U (1900) fk(b),epk U (B) fk(math), Epk U (Math) fk(1750), Epk U (1750) fk(m),epk U (M) fk(cs), Epk U (CS) fk(1800), Epk U (1800) fk(o),epk U (O) fk(phy), Epk U (Phy) fk(2000), Epk U (2000) fk(c),epk U (C) fk(math), Epk U (Math) fk(1600), Epk U (1600) (f k (CS), (E pku (CS), E pku (1))) (f k (CS), (E pku (CS) E pku (1))) (f k (Math), (E pku (Math), E pku (1))) (f k (Math), (E pku (Math), E pku (1))) (f k (Phy), (E pku (Phy), E pku (1))) (Epk U (CS), Epk U (2)) (Epk U (Math), Epk U (2)) (Epk U (Phy), Epk U (1)) γ A,COUNT( ) (D) Map: M R: { (π A f k (t), (π A E pku (t), E pku (1))) } t D Reduce: count = E pku ( π A f k (t) values 1) = π A f k (t) values E pk U (1) R P : (π A E pku (t), count). 14/27

16 Secure Private SUM Name Dept Salary fk(a),epk U (A) fk(cs), Epk U (CS) fk(1900), Epk U (1900) fk(b),epk U (B) fk(math), Epk U (Math) fk(1750), Epk U (1750) fk(m),epk U (M) fk(cs), Epk U (CS) fk(1800), Epk U (1800) fk(o),epk U (O) fk(phy), Epk U (Phy) fk(2000), Epk U (2000) fk(c),epk U (C) fk(math), Epk U (Math) fk(1600), Epk U (1600) (f k(cs), (E pku (CS), E pku (1900))) (f k(cs), (E pku (CS) E pku (1800))) (f k(math), (E pku (Math), E pku (1750))) (f k(math), (E pku (Math), E pku (1600))) (f k(phy), (E pku (Phy), E pku (2000))) (Epk U (CS), Epk U (3700)) (Epk U (Math), Epk U (3350)) (Epk U (Phy), Epk U (2000)) γ A,SUM(B) (D) Map: M R: { (π A f k (t), (π A E pku (t), π B E pku (t))) } t D Reduce: sum = E pku ( π A f k (t) values π B(t)) = π A f k (t) values π BE pku (t) R P : (π A E pku (t), sum). 15/27

17 16/27 Secure Private AVG γ A,AVG(B) (D) Map: M R: { (π A f k (t), (π A E pku (t), π B E pku (t), E pku (1))) } t D Reduce: count = E pku ( π A f k (t) values 1) = π A f k (t) values E pk U (1) sum = E pku ( π A f k (t) values π B(t)) = π A f k (t) values π BE pku (t) R P : (π A E pku (t), (sum, count)).

18 17/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion

19 18/27 MIN & MAX Preprocessing on data All data are encrypted with OPE with a shared key K DU And encrypted with the public key of the node pk C All data d have f k (d)

20 Secure Private MIN Name Dept Salary fk(a),ek DU (A) fk(cs), Ek DU (CS) fk(1900), Ek DU (1900) fk(b),ek DU (B) fk(math), Ek DU (Math) fk(1750), Ek DU (1750) fk(m),ek DU (M) fk(cs), Ek DU (CS) fk(1800), Ek DU (1800) fk(o),ek DU (O) fk(phy), Ek DU (Phy) fk(2000), Ek DU (2000) fk(c),ek DU (C) fk(math), Ek DU (Math) fk(1600), Ek DU (1600) (f k(cs), (E kdu (CS), E kdu (1900))) (f k(cs), (E kdu (CS) E kdu (1800))) (f k(math), (E kdu (Math), E kdu (1750))) (f k(math), (E kdu (Math), E kdu (1600))) (f k(phy), (E kdu (Phy), E kdu (2000))) (Ek DU (CS), Ek DU (1800)) (Ek DU (Math), EK DU (1600)) (Ek DU (Phy), Ek DU (2000)) γ A,MIN(B) (D) Map: M R: { (π A f k (t), (π A E pku (t), π B (t))) } t D Reduce: M = min πa f k (t) valuesd skd π B (t) R P : (π A E pku (t), M). 19/27

21 20/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion

22 21/27 Security Theorem The SP-SUM, SP-COUNT, SP-AVG, SP-MIN, and SP-MAX protocols securely compute the grouping and aggregation in the ROM in the presence of honest-but-curious adversary even if cloud nodes collude.

23 22/27 Combiners and Improvements COUNT SUM AVG Map can perform some aggregations MAX & MIN We can split it into 2 rounds to counter possible frequency attacks against OPE

24 23/27 Performances of COUNT, SUM & AVG Seconds Avg without combiner Avg with combiner Sum without combiner Sum with combiner Count without combiner Count with combiner 50 1,000 1,840 2,680 3,520 4,360 5,200 Number of tuples/k

25 24/27 Performances of MIN Seconds Nosecure 1Round Nosecure 2Round Secure 1Round Secure 2Round ,888 3,265 4,642 Number of tuples/k

26 25/27 Outline Cryptography Pseudo-Random Permutation Partial Homomorphic Encryption Oder Preserving Encryption Secure-Private MapReduce for COUNT, SUM and AVG Secure-Private MapReduce for MIN and MAX Security and Performances Conclusion

27 Conclusion Secure-Private MapReduce: COUNT, SUM, AVG, & MAX MIN Using Paillier and OPE Honest-but-curious adversay Next step Combinaisons of COUNT, SUM, AVG, MAX & MIN 26/27

28 Questions? 27/27

Big Data Anonymisation Techniques

Big Data Anonymisation Techniques Big Data Anonymisation Techniues BIG DATA is Useful Analysis and publication of large datasets are essential to research and business Very useful to: predict flu improve transportation, Logistic improve

More information

Protecting Patient Privacy in Genomic Analysis

Protecting Patient Privacy in Genomic Analysis Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh

More information

The Knapsack Problem

The Knapsack Problem Spring 2010 Chris Christensen HNR 304 The Knapsack Problem In 1978, Merkel and Hellman published a public-key encryption system based upon the knapsack problem ("Hiding information and signatures in trapdoor

More information

Dealing with Ambiguity in Plan Recognition under Time Constraints

Dealing with Ambiguity in Plan Recognition under Time Constraints Dealing with Ambiguity in Plan Recognition under Time Constraints Moser S. Fagundes, Felipe Meneguzzi, Rafael H. Bordini, Renata Vieira Pontifical Catholic University of Rio Grande do Sul Plan Recognition

More information

Protecting Patient Privacy in Genomic Analysis

Protecting Patient Privacy in Genomic Analysis Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh

More information

Constrained Keys for Invertible Pseudorandom Functions. Dan Boneh, Sam Kim, and David J. Wu Stanford University

Constrained Keys for Invertible Pseudorandom Functions. Dan Boneh, Sam Kim, and David J. Wu Stanford University Constrained Keys for Invertible Pseudorandom Functions Dan Boneh, Sam Kim, and David J. Wu Stanford University Pseudorandom Functions (PRFs) [GGM84] k R K Pseudorandom f R Funs[X, Y] Random F: K X Y x

More information

Cloud Computing CS

Cloud Computing CS Cloud Computing CS 15-319 Pregel Lecture 10, Feb 15, 2012 Majd F. Sakr, Suhail Rehman and Mohammad Hammoud Today Last session Apache Mahout, Guest Lecture Today s session Pregel Announcement: Project Phases

More information

A parallel algorithm for optimal job shop scheduling of semi-constrained details processing on multiple machines

A parallel algorithm for optimal job shop scheduling of semi-constrained details processing on multiple machines INSTITUTE OF INFORMATION AND COMMUNICATION TECHNOLOGIES BULGARIAN ACADEMY OF SCIENCE A parallel algorithm for optimal job shop scheduling of semi-constrained details processing on multiple machines Daniela

More information

A Vision-based Affective Computing System. Jieyu Zhao Ningbo University, China

A Vision-based Affective Computing System. Jieyu Zhao Ningbo University, China A Vision-based Affective Computing System Jieyu Zhao Ningbo University, China Outline Affective Computing A Dynamic 3D Morphable Model Facial Expression Recognition Probabilistic Graphical Models Some

More information

Enhancing Privacy and Utility with Noisy Minimax Filter

Enhancing Privacy and Utility with Noisy Minimax Filter Enhancing Privacy and Utility with Noisy Minimax Filter Jihun Hamm Dept. Computer Science and Engineering The Ohio State University Syntactic anonymity Privacy measures for database release k-anonymity

More information

Fever Diagnosis Rule-Based Expert Systems

Fever Diagnosis Rule-Based Expert Systems Fever Diagnosis Rule-Based Expert Systems S. Govinda Rao M. Eswara Rao D. Siva Prasad Dept. of CSE Dept. of CSE Dept. of CSE TP inst. Of Science & Tech., TP inst. Of Science & Tech., Rajah RSRKRR College

More information

Assignment Question Paper I

Assignment Question Paper I Subject : - Discrete Mathematics Maximum Marks : 30 1. Define Harmonic Mean (H.M.) of two given numbers relation between A.M.,G.M. &H.M.? 2. How we can represent the set & notation, define types of sets?

More information

Design Strategies for ARX with Provable Bounds: SPARX and LAX

Design Strategies for ARX with Provable Bounds: SPARX and LAX Design Strategies for ARX with Provable Bounds: SPARX and LAX Daniel Dinu 1, Léo Perrin 1, Aleksei Udovenko 1, Vesselin Velichkov 1, Johann Großschädl 1, Alex Biryukov 1 1 SnT, University of Luxembourg

More information

Using a signature-based machine learning model to analyse a psychiatric stream of data

Using a signature-based machine learning model to analyse a psychiatric stream of data Using a signature-based machine learning model to analyse a psychiatric stream of data Imanol Perez (Joint work with T. Lyons, K. Saunders and G. Goodwin) Mathematical Institute University of Oxford Rough

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning Michèle Sebag ; TP : Herilalaina Rakotoarison TAO, CNRS INRIA Université Paris-Sud Nov. 9h, 28 Credit for slides: Richard Sutton, Freek Stulp, Olivier Pietquin / 44 Introduction

More information

MACHINE learning-as-a-service has seen an explosion

MACHINE learning-as-a-service has seen an explosion IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. X, NO. Y, MONTH 20XX 1 Demystifying Membership Inference Attacks in Machine Learning as a Service Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, and Wenqi

More information

Constraining Pseudorandom Functions Privately

Constraining Pseudorandom Functions Privately Constraining Pseudorandom Functions Privately David Wu Stanford University Joint work with Dan Boneh and Kevin Lewi Pseudorandom Functions (PRFs) [GGM84] : Pseudorandom Funs, Random, Constrained PRFs [BW13,

More information

11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE

11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE 11. NATIONAL DAFNE CLINICAL AND RESEARCH DATABASE The National DAFNE Clinical and Research database was set up as part of the DAFNE QA programme (refer to section 12) to facilitate Audit and was updated

More information

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper?

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper? Outline A Critique of Software Defect Prediction Models Norman E. Fenton Dongfeng Zhu What s inside this paper? What kind of new technique was developed in this paper? Research area of this technique?

More information

Assignment Question Paper I. 1. What is the external and internal commands and write 5 commands for each with result?

Assignment Question Paper I. 1. What is the external and internal commands and write 5 commands for each with result? Subject:- INFORMATION TECHNOLOGY Max Marks -30 kvksa esa gy djuk vfuok;z gsa 1. What is the external and internal commands and write 5 commands for each with result? 2. Writes the features of UNIX Operating

More information

On the Combination of Collaborative and Item-based Filtering

On the Combination of Collaborative and Item-based Filtering On the Combination of Collaborative and Item-based Filtering Manolis Vozalis 1 and Konstantinos G. Margaritis 1 University of Macedonia, Dept. of Applied Informatics Parallel Distributed Processing Laboratory

More information

Disease predictive, best drug: big data implementation of drug query with disease prediction, side effects & feedback analysis

Disease predictive, best drug: big data implementation of drug query with disease prediction, side effects & feedback analysis Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 6 (2017), pp. 2579-2587 Research India Publications http://www.ripublication.com Disease predictive, best drug: big data

More information

Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services. Alegria Baquero U. of California, Irvine

Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services. Alegria Baquero U. of California, Irvine Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services Alegria Baquero U. of California, Irvine Allan Schiffman CommerceNet Jeff Shrager CommerceNet & Stanford U. AMS@COMMERCE.NET

More information

Benchmark: Talend Open Studio vs Pentaho Data Integrator (aka Kettle) V0.23

Benchmark: Talend Open Studio vs Pentaho Data Integrator (aka Kettle) V0.23 Benchmark: Talend Open Studio vs Pentaho Data Integrator (aka Kettle) V0.23 MarcRussel@gmail.com Last modified: 2007-07-31 Table of contents Environment... 2 Test 1: Text Input file > Text Output file...

More information

Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview

Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview Using the NIH Collaboratory's and PCORnet's distributed data networks for clinical trials and observational research - A preview Millions of people. Strong collaborations. Privacy first. Jeffrey Brown,

More information

1 Cohort Identification within FDA's Mini-Sentinel Program

1 Cohort Identification within FDA's Mini-Sentinel Program info@mini-sentinel.org 1 Cohort Identification within FDA's Mini-Sentinel Program October 31, 2013 Mini-Sentinel partner organizations Lead HPHC Institute Data and scientific partners Scientific partners

More information

ANN predicts locoregional control using molecular marker profiles of. Head and Neck squamous cell carcinoma

ANN predicts locoregional control using molecular marker profiles of. Head and Neck squamous cell carcinoma ANN predicts locoregional control using molecular marker profiles of Head and Neck squamous cell carcinoma Final Project: 539 Dinesh Kumar Tewatia Introduction Radiotherapy alone or combined with chemotherapy,

More information

A Network Partition Algorithm for Mining Gene Functional Modules of Colon Cancer from DNA Microarray Data

A Network Partition Algorithm for Mining Gene Functional Modules of Colon Cancer from DNA Microarray Data Method A Network Partition Algorithm for Mining Gene Functional Modules of Colon Cancer from DNA Microarray Data Xiao-Gang Ruan, Jin-Lian Wang*, and Jian-Geng Li Institute of Artificial Intelligence and

More information

Measurement System Analysis Page 1 of 15

Measurement System Analysis Page 1 of 15 Measurement System Analysis Page 1 of 15 Objective: The goal of this task is to demonstrate the recording data interface and graphical features of the Measurement System Analysis Module (MSA). Three common

More information

Mathematically Modeling Biochemistry

Mathematically Modeling Biochemistry Mathematically Modeling Biochemistry Nathan Addy Scientific Programmer October 23, 2008 Overview What are the systems we study? What approaches to do we use to study them? Why these approaches? How does

More information

Wolfram Alpha: Inside and Out

Wolfram Alpha: Inside and Out Wolfram Alpha: Inside and Out Eric Rowland Mathematics Department Tulane University, New Orleans April 10, 2010 Eric Rowland (Tulane University) Wolfram Alpha: Inside and Out April 10, 2010 1 / 16 Outline

More information

Motivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience.

Motivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience. Outline: Motivation. What s the attention mechanism? Soft attention vs. Hard attention. Attention in Machine translation. Attention in Image captioning. State-of-the-art. 1 Motivation: Attention: Focusing

More information

A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis

A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis Anne Benoit, Yves Robert, Frédéric Vivien To cite this version: Anne Benoit, Yves Robert, Frédéric Vivien. A Guide to Algorithm

More information

Grade 6 Math Circles Winter February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers?

Grade 6 Math Circles Winter February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers? Faculty of Mathematics Waterloo, Ontario N2L 3G1 Grade 6 Math Circles Winter 2018 - February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers? Centre for Education

More information

CPSC 121 Some Sample Questions for the Final Exam

CPSC 121 Some Sample Questions for the Final Exam CPSC 121 Some Sample Questions for the Final Exam [0] 1. Tautologies and Contradictions: Determine whether the following statements are tautologies (definitely true), contradictions (definitely false),

More information

Harold Rogers Prescription Drug Monitoring Program National Meeting. August 17, 2016

Harold Rogers Prescription Drug Monitoring Program National Meeting. August 17, 2016 Harold Rogers Prescription Drug Monitoring Program National Meeting August 17, 2016 Assessment of Opioid-Related Deaths in Massachusetts 2 Trends in Opioid-Related Mortality: Massachusetts 350% increase

More information

Course Syllabus. Operating Systems, Spring 2016, Meni Adler, Danny Hendler and Amnon Meisels 1 3/14/2016

Course Syllabus. Operating Systems, Spring 2016, Meni Adler, Danny Hendler and Amnon Meisels 1 3/14/2016 Course Syllabus. Introduction - History; Views; Concepts; Structure 2. Process Management - Processes; State + Resources; Threads; Unix implementation of Processes 3. Scheduling Paradigms; Unix; Modeling

More information

Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis

Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL Lee W. Wagenhals Alexander H. Levis ,@gmu.edu Adversary Behavioral Modeling Maxwell AFB, Montgomery AL March 8-9, 2007 1 Outline Pythia

More information

Semantic Pattern Transformation

Semantic Pattern Transformation Semantic Pattern Transformation IKNOW 2013 Peter Teufl, Herbert Leitold, Reinhard Posch peter.teufl@iaik.tugraz.at Our Background Topics Mobile device security Cloud security Security consulting for public

More information

Cayley Graphs. Ryan Jensen. March 26, University of Tennessee. Cayley Graphs. Ryan Jensen. Groups. Free Groups. Graphs.

Cayley Graphs. Ryan Jensen. March 26, University of Tennessee. Cayley Graphs. Ryan Jensen. Groups. Free Groups. Graphs. Cayley Forming Free Cayley Cayley University of Tennessee March 26, 2014 Group Cayley Forming Free Cayley Definition A group is a nonempty set G with a binary operation which satisfies the following: (i)

More information

and Internet Computing Amin Saberi Stanford University

and Internet Computing Amin Saberi Stanford University Epidemics Algorithmic on Social Game Networks Theory and Internet Computing Amin Saberi Stanford University Social Networks as Graphs Nodes: individuals, webpages (blogs), profiles, PC s Edges: friendship,

More information

Edge Detection Techniques Using Fuzzy Logic

Edge Detection Techniques Using Fuzzy Logic Edge Detection Techniques Using Fuzzy Logic Essa Anas Digital Signal & Image Processing University Of Central Lancashire UCLAN Lancashire, UK eanas@uclan.a.uk Abstract This article reviews and discusses

More information

Statistical Hocus Pocus? Assessing the Accuracy of a Diagnostic Screening Test When You Don t Even Know Who Has the Disease

Statistical Hocus Pocus? Assessing the Accuracy of a Diagnostic Screening Test When You Don t Even Know Who Has the Disease Statistical Hocus Pocus? Assessing the Accuracy of a Diagnostic Screening Test When You Don t Even Know Who Has the Disease Michelle Norris Dept. of Mathematics and Statistics California State University,

More information

Multiple Treatments on the Same Experimental Unit. Lukas Meier (most material based on lecture notes and slides from H.R. Roth)

Multiple Treatments on the Same Experimental Unit. Lukas Meier (most material based on lecture notes and slides from H.R. Roth) Multiple Treatments on the Same Experimental Unit Lukas Meier (most material based on lecture notes and slides from H.R. Roth) Introduction We learned that blocking is a very helpful technique to reduce

More information

Cryptography and related topics in Privacy, Security and Theoretical Computer Science.

Cryptography and related topics in Privacy, Security and Theoretical Computer Science. Dakshita Khurana Phone: +1 (720) 272 7189 Email: dakshita@cs.ucla.edu WebURL: http://web.cs.ucla.edu/~dakshita/ Research Interests Cryptography and related topics in Privacy, Security and Theoretical Computer

More information

Exploring uncertainty in cost effectiveness analysis. Francis Ruiz NICE International (acknowledgements to: Benjarin Santatiwongchai of HITAP)

Exploring uncertainty in cost effectiveness analysis. Francis Ruiz NICE International (acknowledgements to: Benjarin Santatiwongchai of HITAP) Exploring uncertainty in cost effectiveness analysis Francis Ruiz NICE International (acknowledgements to: Benjarin Santatiwongchai of HITAP) NICE International and HITAP copyright 2013 Why uncertainty

More information

A Bayesian Network Model of Knowledge-Based Authentication

A Bayesian Network Model of Knowledge-Based Authentication Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication

More information

arxiv: v2 [cs.lg] 1 Nov 2017

arxiv: v2 [cs.lg] 1 Nov 2017 Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods arxiv:1705.07263v2 [cs.lg] 1 Nov 2017 ABSTRACT Neural networks are known to be vulnerable to adversarial examples: inputs that

More information

Intelligent Machines That Act Rationally. Hang Li Toutiao AI Lab

Intelligent Machines That Act Rationally. Hang Li Toutiao AI Lab Intelligent Machines That Act Rationally Hang Li Toutiao AI Lab Four Definitions of Artificial Intelligence Building intelligent machines (i.e., intelligent computers) Thinking humanly Acting humanly Thinking

More information

Cost-sensitive Dynamic Feature Selection

Cost-sensitive Dynamic Feature Selection Cost-sensitive Dynamic Feature Selection He He 1, Hal Daumé III 1 and Jason Eisner 2 1 University of Maryland, College Park 2 Johns Hopkins University June 30, 2012 He He, Hal Daumé III and Jason Eisner

More information

Common Core Standards: The New US Intended Curriculum

Common Core Standards: The New US Intended Curriculum Common Core Standards: The New US Intended Curriculum Andy Porter Jennifer McMaken Jun Hwang Rui Yang University of Pennsylvania Presented at the Brown Center on Education Policy at Brookings October 28,

More information

A walk in the park with Probabilites and Stats. it::unimi::sps::webcomm

A walk in the park with Probabilites and Stats. it::unimi::sps::webcomm A walk in the park with Probabilites and Stats it::unimi::sps::webcomm S Data presentation: Spreadsheet S A spreadsheet is a collection of data orginized as row of cells: The cell "A1" S Each cell can

More information

Implementation of Perception Classification based on BDI Model using Bayesian Classifier

Implementation of Perception Classification based on BDI Model using Bayesian Classifier Implementation of Perception Classification based on BDI Model using Bayesian Classifier Vishwanath Y 1 Murali T S 2 Dr M.V Vijayakumar 3 1 Research Scholar, Dept. of Computer Science & Engineering, Jain

More information

Prediction of Diabetes Using Probability Approach

Prediction of Diabetes Using Probability Approach Prediction of Diabetes Using Probability Approach T.monika Singh, Rajashekar shastry T. monika Singh M.Tech Dept. of Computer Science and Engineering, Stanley College of Engineering and Technology for

More information

Empirical function attribute construction in classification learning

Empirical function attribute construction in classification learning Pre-publication draft of a paper which appeared in the Proceedings of the Seventh Australian Joint Conference on Artificial Intelligence (AI'94), pages 29-36. Singapore: World Scientific Empirical function

More information

Loop Dependence and Parallelism

Loop Dependence and Parallelism Loop Dependence and Parallelism Announcements Reading assignments for next week due Midterm is Monday March 6th, example midterms posted Assignment 2 is due the week after that. Start now! Today Data dependencies

More information

Journal of Statistical Software

Journal of Statistical Software JSS Journal of Statistical Software August 2006, Volume 16, Issue 7. http://www.jstatsoft.org/ A Computational Tool for Testing Dose-related Trend Using an Age-adjusted Bootstrap-based Poly-k Test Hojin

More information

Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version

Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version Gergely Acs, Claude Castelluccia, Daniel Le étayer 1 Introduction Anonymization is a critical

More information

International Journal of Research in Science and Technology. (IJRST) 2018, Vol. No. 8, Issue No. IV, Oct-Dec e-issn: , p-issn: X

International Journal of Research in Science and Technology. (IJRST) 2018, Vol. No. 8, Issue No. IV, Oct-Dec e-issn: , p-issn: X CLOUD FILE SHARING AND DATA SECURITY THREATS EXPLORING THE EMPLOYABILITY OF GRAPH-BASED UNSUPERVISED LEARNING IN DETECTING AND SAFEGUARDING CLOUD FILES Harshit Yadav Student, Bal Bharati Public School,

More information

COMPUTER PROGRAMMING

COMPUTER PROGRAMMING For updated version, please click on http://ocw.ump.edu.my COMPUTER PROGRAMMING INPUT, OUTPUT AND ASSIGNMENT INSTRUCTION - EXERCISE by LIM KAR SING FACULTY OF CIVIL ENGINEERING & EARTH RESOURCES UNIVERSITI

More information

Modeling State Space Search Technique for a Real World Adversarial Problem Solving

Modeling State Space Search Technique for a Real World Adversarial Problem Solving Modeling State Space Search Technique for a Real World Adversarial Problem Solving Kester O. OMOREGIE Computer Science Department, Auchi Polytechnic, Auchi, NIGERIA Stella C. CHIEMEKE Computer Science

More information

Authentication in dynamic groups using Identity-based Signatures

Authentication in dynamic groups using Identity-based Signatures Nils gentschen Felde, Sophia Grundner-Culemann, Tobias Guggemos Munich Network Management-Team Ludwig-Maximilians-Universität München Authentication in dynamic groups using Identity-based Signatures October

More information

RELYING ON TRUST TO FIND RELIABLE INFORMATION. Keywords Reputation; recommendation; trust; information retrieval; open distributed systems.

RELYING ON TRUST TO FIND RELIABLE INFORMATION. Keywords Reputation; recommendation; trust; information retrieval; open distributed systems. Abstract RELYING ON TRUST TO FIND RELIABLE INFORMATION Alfarez Abdul-Rahman and Stephen Hailes Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom E-mail:

More information

Chapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42

Chapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42 Table of Contents Preface..... 21 About the Authors... 23 Acknowledgments... 24 How This Book is Organized... 24 Who Should Buy This Book?... 24 Where to Find Answers to Review Questions and Exercises...

More information

CS 420/527 Project 3 Hopfield Net

CS 420/527 Project 3 Hopfield Net I. Introduction CS 420/527 Project 3 Hopfield Net In this project, the associative memory capacity of Hopefield network is investigated and discussion is given based on experiments. Generally, the neural

More information

Goals of this course. What is Big Data? Big Data. The three Vs in Big Data. 8/20/2018 Week 1-A Sangmi Lee Pallickara

Goals of this course. What is Big Data? Big Data. The three Vs in Big Data. 8/20/2018 Week 1-A Sangmi Lee Pallickara 8/20/2018 CS435 Introduction to Big Data - FALL 2018 W1.A.0 CS435 Introduction to Big Data 8/20/2018 CS435 Introduction to Big Data - FALL 2018 W1.A.1 Part 0. Introduction Introduction to Big Data PART

More information

The storage and recall of memories in the hippocampo-cortical system. Supplementary material. Edmund T Rolls

The storage and recall of memories in the hippocampo-cortical system. Supplementary material. Edmund T Rolls The storage and recall of memories in the hippocampo-cortical system Supplementary material Edmund T Rolls Oxford Centre for Computational Neuroscience, Oxford, England and University of Warwick, Department

More information

Predictive Diagnosis. Clustering to Better Predict Heart Attacks x The Analytics Edge

Predictive Diagnosis. Clustering to Better Predict Heart Attacks x The Analytics Edge Predictive Diagnosis Clustering to Better Predict Heart Attacks 15.071x The Analytics Edge Heart Attacks Heart attack is a common complication of coronary heart disease resulting from the interruption

More information

Reliability. Scale: Empathy

Reliability. Scale: Empathy /VARIABLES=Empathy1 Empathy2 Empathy3 Empathy4 /STATISTICS=DESCRIPTIVE SCALE Reliability Notes Output Created Comments Input Missing Value Handling Syntax Resources Scale: Empathy Data Active Dataset Filter

More information

Nature Methods: doi: /nmeth.3115

Nature Methods: doi: /nmeth.3115 Supplementary Figure 1 Analysis of DNA methylation in a cancer cohort based on Infinium 450K data. RnBeads was used to rediscover a clinically distinct subgroup of glioblastoma patients characterized by

More information

Curriculum structure of B.Tech ECE Programme (III Semester onwards)

Curriculum structure of B.Tech ECE Programme (III Semester onwards) 1.Range for total credits in III, IV, V and VI semester is 22-28 2. A course on Management (PC), will be run in VII semester for four branches and the rest will have it in VIII semester 3. Course credit

More information

Comparison of discrimination methods for the classification of tumors using gene expression data

Comparison of discrimination methods for the classification of tumors using gene expression data Comparison of discrimination methods for the classification of tumors using gene expression data Sandrine Dudoit, Jane Fridlyand 2 and Terry Speed 2,. Mathematical Sciences Research Institute, Berkeley

More information

Predicting Heart Attack using Fuzzy C Means Clustering Algorithm

Predicting Heart Attack using Fuzzy C Means Clustering Algorithm Predicting Heart Attack using Fuzzy C Means Clustering Algorithm Dr. G. Rasitha Banu MCA., M.Phil., Ph.D., Assistant Professor,Dept of HIM&HIT,Jazan University, Jazan, Saudi Arabia. J.H.BOUSAL JAMALA MCA.,M.Phil.,

More information

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression

More information

Math HL Chapter 12 Probability

Math HL Chapter 12 Probability Math HL Chapter 12 Probability Name: Read the notes and fill in any blanks. Work through the ALL of the examples. Self-Check your own progress by rating where you are. # Learning Targets Lesson I have

More information

Assessing Modes of Interaction

Assessing Modes of Interaction Project 2 Assessing Modes of Interaction Analysis of exercise equipment Overview For this assignment, we conducted a preliminary analysis of two similar types of elliptical trainers. We are able to find

More information

Sequential Decision Making

Sequential Decision Making Sequential Decision Making Sequential decisions Many (most) real world problems cannot be solved with a single action. Need a longer horizon Ex: Sequential decision problems We start at START and want

More information

Unit 2 Boundary Value Testing, Equivalence Class Testing, Decision Table-Based Testing. ST 8 th Sem, A Div Prof. Mouna M.

Unit 2 Boundary Value Testing, Equivalence Class Testing, Decision Table-Based Testing. ST 8 th Sem, A Div Prof. Mouna M. Unit 2 Boundary Value Testing, Equivalence Class Testing, Decision Table-Based Testing ST 8 th Sem, A Div 2017-18 Prof. Mouna M. Naravani 19-02-2018 Dept. of CSE, BLDEACET, Vijarapur 2 Boundary Value Testing

More information

Implementation of Inference Engine in Adaptive Neuro Fuzzy Inference System to Predict and Control the Sugar Level in Diabetic Patient

Implementation of Inference Engine in Adaptive Neuro Fuzzy Inference System to Predict and Control the Sugar Level in Diabetic Patient , ISSN (Print) : 319-8613 Implementation of Inference Engine in Adaptive Neuro Fuzzy Inference System to Predict and Control the Sugar Level in Diabetic Patient M. Mayilvaganan # 1 R. Deepa * # Associate

More information

Question 1 Multiple Choice (8 marks)

Question 1 Multiple Choice (8 marks) Philadelphia University Student Name: Faculty of Engineering Student Number: Dept. of Computer Engineering First Exam, First Semester: 2015/2016 Course Title: Neural Networks and Fuzzy Logic Date: 19/11/2015

More information

PERSONALIZED medicine is a healthcare paradigm that. ConfidentCare: A Clinical Decision Support System for Personalized Breast Cancer Screening

PERSONALIZED medicine is a healthcare paradigm that. ConfidentCare: A Clinical Decision Support System for Personalized Breast Cancer Screening XXXXX XXXXXXX XXXXXX, VOL. XX, NO. X, XXXX 2016 1 ConfidentCare: A Clinical Decision Support System for Personalized Breast Cancer Screening Ahmed M. Alaa, Member, IEEE, Kyeong H. Moon, William Hsu, Member,

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 12 July 2013 Version of attached file: Accepted Version Peer-review status of attached file: Peer-reviewed Citation for published item: Chen, Bindi and Tavner,

More information

JSM Survey Research Methods Section

JSM Survey Research Methods Section Methods and Issues in Trimming Extreme Weights in Sample Surveys Frank Potter and Yuhong Zheng Mathematica Policy Research, P.O. Box 393, Princeton, NJ 08543 Abstract In survey sampling practice, unequal

More information

ACUTE LEUKEMIA CLASSIFICATION USING CONVOLUTION NEURAL NETWORK IN CLINICAL DECISION SUPPORT SYSTEM

ACUTE LEUKEMIA CLASSIFICATION USING CONVOLUTION NEURAL NETWORK IN CLINICAL DECISION SUPPORT SYSTEM ACUTE LEUKEMIA CLASSIFICATION USING CONVOLUTION NEURAL NETWORK IN CLINICAL DECISION SUPPORT SYSTEM Thanh.TTP 1, Giao N. Pham 1, Jin-Hyeok Park 1, Kwang-Seok Moon 2, Suk-Hwan Lee 3, and Ki-Ryong Kwon 1

More information

Neurons and neural networks II. Hopfield network

Neurons and neural networks II. Hopfield network Neurons and neural networks II. Hopfield network 1 Perceptron recap key ingredient: adaptivity of the system unsupervised vs supervised learning architecture for discrimination: single neuron perceptron

More information

A Programming Approach to the CS Principles Data Task

A Programming Approach to the CS Principles Data Task A Programming Approach to the CS Principles Data Task (from The Beauty and Joy of Computing team) UC Berkeley Sr Lecturer SOE Dan Garcia bjc.berkeley.edu Broadening Participation in HS CS! New Course:

More information

Classification of Thyroid Disease Using Data Mining Techniques

Classification of Thyroid Disease Using Data Mining Techniques Volume 119 No. 12 2018, 13881-13890 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Classification of Thyroid Disease Using Data Mining Techniques Sumathi A, Nithya G and Meganathan

More information

Excess BTM Production. Issue Paper

Excess BTM Production. Issue Paper Excess BTM Production Issue Paper Date paper published: June 28, 2018 Table of Contents 1. Executive Summary... 3 2. Plan for Stakeholder Engagement... 4 3. Background... 4 4. Scope... 5 5. Clarification

More information

arxiv: v1 [cs.cv] 13 Jul 2018

arxiv: v1 [cs.cv] 13 Jul 2018 Multi-Scale Convolutional-Stack Aggregation for Robust White Matter Hyperintensities Segmentation Hongwei Li 1, Jianguo Zhang 3, Mark Muehlau 2, Jan Kirschke 2, and Bjoern Menze 1 arxiv:1807.05153v1 [cs.cv]

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to publication record in Explore Bristol Research PDF-document

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to publication record in Explore Bristol Research PDF-document Araiza Illan, D., Pipe, A. G., & Eder, K. I. (2016). Intelligent Agent-Based Stimulation for Testing RoboticaSoftware in Human-Robot Interaction. arxiv, [1604.05508]. Peer reviewed version Link to publication

More information

Regression. Page 1. Variables Entered/Removed b Variables. Variables Removed. Enter. Method. Psycho_Dum

Regression. Page 1. Variables Entered/Removed b Variables. Variables Removed. Enter. Method. Psycho_Dum Regression Model Variables Entered/Removed b Variables Entered Variables Removed Method Meds_Dum,. Enter Psycho_Dum a. All requested variables entered. b. Dependent Variable: Beck's Depression Score Model

More information

Modeling Sentiment with Ridge Regression

Modeling Sentiment with Ridge Regression Modeling Sentiment with Ridge Regression Luke Segars 2/20/2012 The goal of this project was to generate a linear sentiment model for classifying Amazon book reviews according to their star rank. More generally,

More information

Keywords Missing values, Medoids, Partitioning Around Medoids, Auto Associative Neural Network classifier, Pima Indian Diabetes dataset.

Keywords Missing values, Medoids, Partitioning Around Medoids, Auto Associative Neural Network classifier, Pima Indian Diabetes dataset. Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Medoid Based Approach

More information

Online Journal for Weightlifters & Coaches

Online Journal for Weightlifters & Coaches Online Journal for Weightlifters & Coaches WWW.WL-LOG.COM Genadi Hiskia Dublin, October 7, 2016 WL-LOG.com Professional Online Service for Weightlifters & Coaches Professional Online Service for Weightlifters

More information

Programs for facies modeling with DMPE

Programs for facies modeling with DMPE Programs for facies modeling with DMPE Yupeng Li and Clayton V. Deutsch The programs needed for direct multivariate probability estimation (DMPE) are introduced in detail. The first program (TPcalc) is

More information

Multi Parametric Approach Using Fuzzification On Heart Disease Analysis Upasana Juneja #1, Deepti #2 *

Multi Parametric Approach Using Fuzzification On Heart Disease Analysis Upasana Juneja #1, Deepti #2 * Multi Parametric Approach Using Fuzzification On Heart Disease Analysis Upasana Juneja #1, Deepti #2 * Department of CSE, Kurukshetra University, India 1 upasana_jdkps@yahoo.com Abstract : The aim of this

More information

Behavioral Data Mining. Lecture 4 Measurement

Behavioral Data Mining. Lecture 4 Measurement Behavioral Data Mining Lecture 4 Measurement Outline Hypothesis testing Parametric statistical tests Non-parametric tests Precision-Recall plots ROC plots Hardware update Icluster machines are ready for

More information

Automatic Hemorrhage Classification System Based On Svm Classifier

Automatic Hemorrhage Classification System Based On Svm Classifier Automatic Hemorrhage Classification System Based On Svm Classifier Abstract - Brain hemorrhage is a bleeding in or around the brain which are caused by head trauma, high blood pressure and intracranial

More information

Review for Final Exam

Review for Final Exam John Jay College of Criminal Justice The City University of New York Department of Mathematics and Computer Science MAT 108 - Finite Mathematics Review for Final Exam SHORT ANSWER. The following questions

More information

COLOR-PERMUTING AUTOMORPHISMS OF CAYLEY GRAPHS

COLOR-PERMUTING AUTOMORPHISMS OF CAYLEY GRAPHS COLOR-PERMUTING AUTOMORPHISMS OF CAYLEY GRAPHS MELANIE ALBERT, JENNA BRATZ, PATRICIA CAHN, TIMOTHY FARGUS, NICHOLAS HABER, ELIZABETH MCMAHON, JAREN SMITH, AND SARAH TEKANSIK Abstract. Given a group G with

More information