Quantifying location privacy

Size: px
Start display at page:

Download "Quantifying location privacy"

Transcription

1 Sébastien Gambs Quantifying location privacy 1 Quantifying location privacy Sébastien Gambs Université de Rennes 1 - INRIA sgambs@irisa.fr 10 September 2013

2 Sébastien Gambs Quantifying location privacy 2

3 Sébastien Gambs Quantifying location privacy 3

4 Geolocation and privacy Geolocation associate a geographical location to an object such as a cell phone, a computer or a GPS-equipped vehicle. These objects are often personal and link to a particular individual (or a group of individuals such as a family). If disclose to unauthorized entities, these information can lead to a privacy breach in the same manner that the history of purchase of an individuals or his personal queries. Main goal: reconcile geolocation and privacy for applications which rely on the spatio-temporal data of individual. Sébastien Gambs Quantifying location privacy 4

5 1 AlsoSébastien sometimes Gambs called locational privacy. Quantifying location privacy 5 Geo-privacy Geo-privacy 1 seeks to prevent an unauthorized entity from learning the past, current and future location of an individual (Beresford et Stajano 03). Remark : the personal spatio-temporal data of an individual can play the role of quasi-identifiers. From the geolocated data of an individual, it is possible to infer : his home and place of work, his identity, his center of interests, his habits or a deviation from his usual behaviour. Privacy breach

6 Sébastien Gambs Quantifying location privacy 6 Geolocation, a new type of personal data (INRIA Alumni)

7 Sébastien Gambs Quantifying location privacy 7 Geolocated query

8 Sébastien Gambs Quantifying location privacy 8 Collaborative traffic monitoring

9 Sébastien Gambs Quantifying location privacy 9 Geosocial network

10 Sébastien Gambs Quantifying location privacy 10 Dimensions to take into account when designing a location privacy metric 1. Periodicity of location data : Continuous (the user regularly releases his position) or Sporadic (irregular samples of the user position). 2. Type of location data : GPS traces, Call data records, Contact traces. 3. Imprecision versus inaccuracy. 4. Geosanitization mechanisms Example: differential privacy for location data (cf. two previous talks).

11 Properties of a good location privacy model 1. The model should be realistic. It should capture realistic threats against location privacy. 2. The model should be quantifiable. It should be equipped with a privacy metric that can tell between two different situations, which one is the most harmful to privacy. 3. The model should be intuitive and comprehensible. It should help to reason on location privacy and how to achieve it. 4. The model should be testable/falsifiable. It should be possible to verify/disprove/test the limits of the guarantees provided by the model. Sébastien Gambs Quantifying location privacy 11

12 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 12

13 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 13 Limit of pseudonymity Replacing the name of a person by a pseudonym preservation of the privacy of this individual (Extract from an article from the New York Times, 6 August 2006) The same phenomenon is true for geolocated data. Example: if the granularity is too small, the pair home-work becomes unique for a large fraction of the population (Colle and Kartridge 09).

14 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 14 Inference attack Inference attack : the adversary takes as input a geolocated dataset (and possibly some background knowledge) and tries to infer some personal information regarding individuals contained in the dataset. Main challenge : to be able to give some privacy guarantees even against an adversary having some auxiliary knowledge. We may not even be able to model this a priori knowledge. Remark: maybe my data is private today but it may not be so in the future due to the public release of some other data.

15 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 15 Objective of inference attack Identification of important places, called Point of Interests (POI), characterizing the interests of an individual. Example: home, place of work, gymnasium, political headquarters, medical center,... Prediction of the movement patterns of an individual, such as his past, present and future locations. Linking the records of the same individual contained in the same dataset or in different datasets (either anonymized or under different pseudonyms). The linking disclosure risk measures the success probability of this attack. Discover social relations between individuals. Example: people that are in the vicinity of each other on a frequent basis.

16 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 16 Auxiliary knowledge The adversary can have auxiliary knowledge that may help him in conducting a privacy breach. Examples of auxiliary knowledge : presence of an individual within an anonymized dataset, partial knowledge of its attributes (such as home address or place of work), a model of his habits, knowledge of his social network, knowledge of the distribution of the attributes within the population, geographical knowledge of roads and relief,...

17 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 17 Identification of POIs through clustering algorithm Main idea : search for gaps in the mobility traces. Inference attack : 1. Delete all mobility traces in which the person is in movement. 2. Find gaps in the traces (significative stop periods that have last at least 10 or 20 minutes). 3. Keep the mobility trace just before and after the gap. 4. Run a clustering algorithm on the remaining traces in order to discover significant clusters. 5. Return as POI the median of each cluster. Validation issue : how to evaluate the quality of the POIs returned if we do not have access to a ground truth?

18 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 18 Identification of the house of a taxi (view from GEPETO, AINA 09)

19 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 19 Identification of the house of a taxi (view from GoogleMaps and StreetView)

20 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 20 Mobility Markov chain (TDP 11) Objective : to represent in a compact way the mobility behaviour of an individual. The states of the chain are POIs and a transitions represents the probability from moving from one POI to another. Construction : Remove all moving traces. From the resulting traces, extract the POIs by running a clustering algorithm. Label each trace with the corresponding POI and compute the transitions probabilities. Temporal variant of the model (DYNAM 11): decompose the time into slices, the label of a stage corresponds to POI/time slice.

21 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 21 Example of mobility Markov chain

22 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 22 Predicting the next location of an individual (MPM 12) Prediction technique : from the actual location, choose te transition leaving from this POI that has the highest probability and predicts the corresponding POI. Evaluation method : splitting of the mobility traces betweena training set and a testing set (50%-50%). The mobility Markov chain is learnt from the training set and his prediction rate is evaluated in the testing set. Variant of the method : to remember the n last visited states (instead of simply the current one). Example : a user has visited work and then supermarket, which POI is the one where the user will go?

23 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 23 Experimental results The prediction method was tested on 3 mobility datasets (synthetic, Phonetic, Geolife) with n varying between 1 and 3 (best prediction rate obtained for n = 2). Results : success rate of the prediction between 70 and 95%.

24 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 24 De-anonymization attack via MMC (TrustCom 13) Objective : find an individual in an anonymous geolocated database. Assumption : the adversary has been able to observe in the past the mobility of the some individuals present in the dataset. Main idea : to compute a distance metric between 2 MMCs quantifying the difference between two mobility behaviours.

25 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 25 De-anonymization attack via MMC Design of different distance metrics (geometrical, topological, logical) between MMCs and different way to combine the predictors. Best de-anonymization rate : 45% (obtained by combining 2 predictors).

26 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC A generic framework for inference attack on location data Figure: Shokri, Theodorakopoulos, Le Boudec and Hubaux 11. Sébastien Gambs Quantifying location privacy 26

27 Sébastien Gambs Quantifying location privacy 27 Spatial cloacking l-diversity and t-closeness Unlinkability

28 Sébastien Gambs Quantifying location privacy 28 Sanitization Spatial cloacking l-diversity and t-closeness Unlinkability Sanitization : process increasing the uncertainty in the data in order to preserve privacy. Inherent trade-off between the desired level of privacy and the utility of the sanitized data. Typical application : public release of data. Examples drawn from the sanitization entry on Wikipedia

29 Sébastien Gambs Quantifying location privacy 29 k-anonymity Spatial cloacking l-diversity and t-closeness Unlinkability Often, finding the optimal way of sanitizing the data is a NP-hard problem. Example of sanitization method with guarantees : k-anonymity (Sweeney 02). Main idea : protect the privacy of an individual by blending him into the crowd. k-anonymisation : process which constructs a database processus (by suppression and generalization) in which each record is indistinguishable from at least k 1 other records. Guarantee : no individual can be targeted with a probability 1 over k 1, even for an adversary having auxiliary knowledge.

30 Sébastien Gambs Quantifying location privacy 30 Spatial cloacking l-diversity and t-closeness Unlinkability Spatial cloacking Spatial cloacking (Gruteser and Grunwald 03) : extension of the concept of k-anonymity to spatio-temporal data. Main idea : ensure that at each time step, each individual is located within an area that is shared by at least k 1 other individuals. Possible method : recursively split the space in areas of different sizes such that each area respects the property of k-anonymity.

31 Sébastien Gambs Quantifying location privacy 31 Illustration of spatial cloacking Spatial cloacking l-diversity and t-closeness Unlinkability Illustration of spatial cloacking for k = 3 (extrait de Gruteser et Grunwald 03).

32 Sébastien Gambs Quantifying location privacy 32 Spatial cloacking l-diversity and t-closeness Unlinkability Limits of geographical masks and spatial cloacking If the adversary has some geographical knowledge about the sanitized area, he can discard some hypothesies that are not really realistic. Example : if after a random perturbation the returned location is situated within an area difficult to reach such as river or a mountain the adversary can easily discard this hypothesis by considering instead the closes accessible area. Linkability risk : even if it is impossible to identify exactly an individual, it is sometimes possible to link the actions of a group of individuals. Example of inference : at each time step, I am able to follow the movement of one group from one area to another.

33 Sébastien Gambs Quantifying location privacy 33 Spatial cloacking l-diversity and t-closeness Unlinkability l-diversity and t-closeness (Location) l-diversity: guarantee than for each spatial area revealed, there is enough diversity in terms of semantics of the possible locations. Can be instantiated by an entropic measure. (Location) t-closeness: provides a stronger guarantee by requiring that the distribution of possible locations is close to the distribution of the whole population. Can be instantiated by a divergence on distributions such as Kullback-Leibler divergence (relative entropy). Complementary to the guarantee provided by k-anonymity.

34 Spatial cloacking l-diversity and t-closeness Unlinkability Mix-zone (Beresford and Stajano 03) Inspired from the Mix-nets of Chaum which are used for the anonymous communication of messages. Mix-zone : area of space where no observation are produced and such that a new pseudonym will be generated when a person leaves the area which is different from the one that this person had when entering. Main goal : make it more difficult to link the actions of an individual. Example : the laboratory can be a mix-zone where no measurement are performed while we are here. When we leave it, we will receive a different pseudonym from the one we had before entering. Privacy metric : probability of success of an adversary in reconstructing the path of an individual. Sébastien Gambs Quantifying location privacy 34

35 Illustration of mix-zone Spatial cloacking l-diversity and t-closeness Unlinkability Measures are taken in the application zone contrary to the mix zone (Beresford and Stajano 03). Alternative to provide unlinkability : anonymity + path confusion. Sébastien Gambs Quantifying location privacy 35

36 Sébastien Gambs Quantifying location privacy 36

37 Sébastien Gambs Quantifying location privacy 37 Towards a generic location privacy model Should be able to resist to most of the state of the art inference attacks. Should be equipped with a privacy parameter that can be changed to tune the privacy model. Should work despite strong adversary knowledge. Example: mobility model, social network. Possible direction: geo-indistinguishability + l diversity for semantics of location + unlinkability + evaluation of the privacy level through inference attacks.

38 Sébastien Gambs Quantifying location privacy 38 This is the end! Thanks for your attention. Questions?

Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version

Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version Gergely Acs, Claude Castelluccia, Daniel Le étayer 1 Introduction Anonymization is a critical

More information

Big Data Anonymisation Techniques

Big Data Anonymisation Techniques Big Data Anonymisation Techniues BIG DATA is Useful Analysis and publication of large datasets are essential to research and business Very useful to: predict flu improve transportation, Logistic improve

More information

A formal model of obfuscation and negotiation for location privacy

A formal model of obfuscation and negotiation for location privacy A formal model of obfuscation and negotiation for location privacy Matt Duckham and Lars Kulik University of Melbourne Victoria 3010, Australia Pervasive 2005: Matt Duckham and Lars Kulik May 10, 2005

More information

Bayesian (Belief) Network Models,

Bayesian (Belief) Network Models, Bayesian (Belief) Network Models, 2/10/03 & 2/12/03 Outline of This Lecture 1. Overview of the model 2. Bayes Probability and Rules of Inference Conditional Probabilities Priors and posteriors Joint distributions

More information

Driving forces of researchers mobility

Driving forces of researchers mobility Driving forces of researchers mobility Supplementary Information Floriana Gargiulo 1 and Timoteo Carletti 1 1 NaXys, University of Namur, Namur, Belgium 1 Data preprocessing The original database contains

More information

Schutz der Privatsphäre (WS15/16) Introduction to Privacy (Part 1)

Schutz der Privatsphäre (WS15/16) Introduction to Privacy (Part 1) You have zero privacy. Get over it. Scott McNealy, 1999 Privacy, k anonymity, and differential privacy Johann Christoph Freytag Humboldt-Universität zu Berlin 1 Is it always obvious? Is it always obvious

More information

Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services. Alegria Baquero U. of California, Irvine

Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services. Alegria Baquero U. of California, Irvine Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services Alegria Baquero U. of California, Irvine Allan Schiffman CommerceNet Jeff Shrager CommerceNet & Stanford U. AMS@COMMERCE.NET

More information

From Mobile Phone Monitoring of Depressive States using GPS Traces Analysis to Data-Driven Behaviour Change Interventions

From Mobile Phone Monitoring of Depressive States using GPS Traces Analysis to Data-Driven Behaviour Change Interventions From Mobile Phone Monitoring of Depressive States using GPS Traces Analysis to Data-Driven Behaviour Change Interventions Luca Canzian Qascom Mirco Musolesi University College London Outline Motivation

More information

CHAPTER 5: PRODUCING DATA

CHAPTER 5: PRODUCING DATA CHAPTER 5: PRODUCING DATA 5.1: Designing Samples Exploratory data analysis seeks to what data say by using: These conclusions apply only to the we examine. To answer questions about some of individuals

More information

Knock Knock, Who s There? Membership Inference on Aggregate Location Data

Knock Knock, Who s There? Membership Inference on Aggregate Location Data Knock Knock, Who s There? Membership Inference on Aggregate Location Data Apostolos Pyrgelis University College London apostolos.pyrgelis.14@ucl.ac.uk Carmela Troncoso IMDEA Software Institute carmela.troncoso@imdea.org

More information

Measuring Focused Attention Using Fixation Inner-Density

Measuring Focused Attention Using Fixation Inner-Density Measuring Focused Attention Using Fixation Inner-Density Wen Liu, Mina Shojaeizadeh, Soussan Djamasbi, Andrew C. Trapp User Experience & Decision Making Research Laboratory, Worcester Polytechnic Institute

More information

Challenges in Big Data Analytics. Izabela Moise, Evangelos Pournaras, Dirk Helbing

Challenges in Big Data Analytics. Izabela Moise, Evangelos Pournaras, Dirk Helbing Challenges in Big Data Analytics Izabela Moise, Evangelos Pournaras, Dirk Helbing Izabela Moise, Evangelos Pournaras, Dirk Helbing 1 Big Data - Big Value There is a big data revolution. But it is not the

More information

Temporal Analysis of Online Social Graph by Home Location

Temporal Analysis of Online Social Graph by Home Location Temporal Analysis of Online Social Graph by Home Location Shiori Hironaka Mitsuo Yoshida Kyoji Umemura Toyohashi University of Technology Aichi, Japan s143369@edu.tut.ac.jp, yoshida@cs.tut.ac.jp, umemura@tut.jp

More information

Actions in the Eye: Dynamic Gaze Datasets and Learnt Saliency Models for Visual Recognition

Actions in the Eye: Dynamic Gaze Datasets and Learnt Saliency Models for Visual Recognition Actions in the Eye: Dynamic Gaze Datasets and Learnt Saliency Models for Visual Recognition Stefan Mathe, Cristian Sminchisescu Presented by Mit Shah Motivation Current Computer Vision Annotations subjectively

More information

High-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany

High-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany High-level Vision Bernd Neumann Slides for the course in WS 2004/05 Faculty of Informatics Hamburg University Germany neumann@informatik.uni-hamburg.de http://kogs-www.informatik.uni-hamburg.de 1 Contents

More information

Annotating If Authors of Tweets are Located in the Locations They Tweet About

Annotating If Authors of Tweets are Located in the Locations They Tweet About Annotating If Authors of Tweets are Located in the Locations They Tweet About Vivek Doudagiri, Alakananda Vempala and Eduardo Blanco Human Intelligence and Language Technologies Lab University of North

More information

Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis

Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL Lee W. Wagenhals Alexander H. Levis ,@gmu.edu Adversary Behavioral Modeling Maxwell AFB, Montgomery AL March 8-9, 2007 1 Outline Pythia

More information

CISC453 Winter Probabilistic Reasoning Part B: AIMA3e Ch

CISC453 Winter Probabilistic Reasoning Part B: AIMA3e Ch CISC453 Winter 2010 Probabilistic Reasoning Part B: AIMA3e Ch 14.5-14.8 Overview 2 a roundup of approaches from AIMA3e 14.5-14.8 14.5 a survey of approximate methods alternatives to the direct computing

More information

Analysis A step in the research process that involves describing and then making inferences based on a set of data.

Analysis A step in the research process that involves describing and then making inferences based on a set of data. 1 Appendix 1:. Definitions of important terms. Additionality The difference between the value of an outcome after the implementation of a policy, and its value in a counterfactual scenario in which the

More information

Learning Navigational Maps by Observing the Movement of Crowds

Learning Navigational Maps by Observing the Movement of Crowds Learning Navigational Maps by Observing the Movement of Crowds Simon T. O Callaghan Australia, NSW s.ocallaghan@acfr.usyd.edu.au Surya P. N. Singh Australia, NSW spns@acfr.usyd.edu.au Fabio T. Ramos Australia,

More information

Enhancing Privacy and Utility with Noisy Minimax Filter

Enhancing Privacy and Utility with Noisy Minimax Filter Enhancing Privacy and Utility with Noisy Minimax Filter Jihun Hamm Dept. Computer Science and Engineering The Ohio State University Syntactic anonymity Privacy measures for database release k-anonymity

More information

Lecture 01 Analysis of Animal Populations: Theory and Scientific Process

Lecture 01 Analysis of Animal Populations: Theory and Scientific Process 1 of 1 Lecture 01 Analysis of Animal Populations: Theory and Scientific Process Motivation 1. Review the basic theory of animal population dynamics 2. Lay the foundation for the analysis of animal populations

More information

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper?

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper? Outline A Critique of Software Defect Prediction Models Norman E. Fenton Dongfeng Zhu What s inside this paper? What kind of new technique was developed in this paper? Research area of this technique?

More information

TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS)

TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS) TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS) AUTHORS: Tejas Prahlad INTRODUCTION Acute Respiratory Distress Syndrome (ARDS) is a condition

More information

Eric Horvitz Microsoft Research. PerCom 2011 Seattle, WA

Eric Horvitz Microsoft Research. PerCom 2011 Seattle, WA Eric Horvitz Microsoft Research PerCom 2011 Seattle, WA What might we learn about human behavior and of world phenomena from logs of the activities of people? How can we harness data about people while

More information

The State of the Art in Indicator Research

The State of the Art in Indicator Research International Society for Quality-of-Life Studies (ISQOLS) The State of the Art in Indicator Research Filomena Maggino filomena.maggino@unifi.it The State of the Art in Indicator Research I 1. Developing

More information

A Framework for Conceptualizing, Representing, and Analyzing Distributed Interaction. Dan Suthers

A Framework for Conceptualizing, Representing, and Analyzing Distributed Interaction. Dan Suthers 1 A Framework for Conceptualizing, Representing, and Analyzing Distributed Interaction Dan Suthers Work undertaken with Nathan Dwyer, Richard Medina and Ravi Vatrapu Funded in part by the U.S. National

More information

Developing and Testing Hypotheses Kuba Glazek, Ph.D. Methodology Expert National Center for Academic and Dissertation Excellence Los Angeles

Developing and Testing Hypotheses Kuba Glazek, Ph.D. Methodology Expert National Center for Academic and Dissertation Excellence Los Angeles Developing and Testing Hypotheses Kuba Glazek, Ph.D. Methodology Expert National Center for Academic and Dissertation Excellence Los Angeles NATIONAL CENTER FOR ACADEMIC & DISSERTATION EXCELLENCE Overview

More information

From where does the content of a certain geo-communication come? semiotics in web-based geo-communication Brodersen, Lars

From where does the content of a certain geo-communication come? semiotics in web-based geo-communication Brodersen, Lars Downloaded from vbn.aau.dk on: april 02, 2019 Aalborg Universitet From where does the content of a certain geo-communication come? semiotics in web-based geo-communication Brodersen, Lars Published in:

More information

HBML: A Representation Language for Quantitative Behavioral Models in the Human Terrain

HBML: A Representation Language for Quantitative Behavioral Models in the Human Terrain HBML: A Representation Language for Quantitative Behavioral Models in the Human Terrain Nils F. Sandell, Robert Savell David Twardowski, George Cybenko Conference on Social Computing, Behavioral Modeling,

More information

Neuroinformatics. Ilmari Kurki, Urs Köster, Jukka Perkiö, (Shohei Shimizu) Interdisciplinary and interdepartmental

Neuroinformatics. Ilmari Kurki, Urs Köster, Jukka Perkiö, (Shohei Shimizu) Interdisciplinary and interdepartmental Neuroinformatics Aapo Hyvärinen, still Academy Research Fellow for a while Post-docs: Patrik Hoyer and Jarmo Hurri + possibly international post-docs PhD students Ilmari Kurki, Urs Köster, Jukka Perkiö,

More information

"Preparedness and Personal Awareness" - Albert Timen

Preparedness and Personal Awareness - Albert Timen For The Everyday Civilian The reality of Terrorism and Terror threats around us is not new, neither a surprising actuality, yet still the wave of events ranging from "Lone wolf" Active Shooter to a combined

More information

A Model Officer: An Agent-based Model of Policing

A Model Officer: An Agent-based Model of Policing A Model Officer: An Agent-based Model of Policing Sarah Wise* 1 and Tao Cheng 1 Department of Civil, Environmental, and Geomatic Engineering University College London November 7, 2014 Summary The way police

More information

A Common-Sense Framework for Assessing Information-Based Counterterrorist Programs

A Common-Sense Framework for Assessing Information-Based Counterterrorist Programs A Common-Sense Framework for Assessing Information-Based Counterterrorist Programs Fred H. Cate Distinguished Professor and Director Center for Applied Cybersecurity Research, Indiana University Herbert

More information

Supporting Effective PrEP Pill Taking and Providing HIV Risk Reduction Counselling.

Supporting Effective PrEP Pill Taking and Providing HIV Risk Reduction Counselling. Supporting Effective PrEP Pill Taking and Providing HIV Risk Reduction Counselling bbrown@anovahealth.co.za Outline 1. Integrating PrEP into standard HIV risk reduction practices 2. Strategies to Support

More information

Searching for Temporal Patterns in AmI Sensor Data

Searching for Temporal Patterns in AmI Sensor Data Searching for Temporal Patterns in AmI Sensor Data Romain Tavenard 1,2, Albert A. Salah 1, Eric J. Pauwels 1 1 Centrum voor Wiskunde en Informatica, CWI Amsterdam, The Netherlands 2 IRISA/ENS de Cachan,

More information

Brendan O Connor,

Brendan O Connor, Some slides on Paul and Dredze, 2012. Discovering Health Topics in Social Media Using Topic Models. PLOS ONE. http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0103408 Brendan O Connor,

More information

Background paper number 5

Background paper number 5 Background paper number 5 Assessing the quality and coverage of surveillance data in the UK: how is it done and how can HPA help to develop the Task Force framework for assessment of surveillance data,

More information

Please take time to read this document carefully. It forms part of the agreement between you and your counsellor and Insight Counselling.

Please take time to read this document carefully. It forms part of the agreement between you and your counsellor and Insight Counselling. Informed Consent Please take time to read this document carefully. It forms part of the agreement between you and your counsellor and Insight Counselling. AGREEMENT FOR COUNSELLING SERVICES CONDUCTED BY

More information

How to use research to lead your clinical decision

How to use research to lead your clinical decision ] 6 How to use research to lead your clinical decision ASK ACQUIRE ANALYZE ANSWER APPLY ASSESS making.] Phil Page PhD, PT, ATC, CSCS, FACSM 1) ASK What is your question? Be very specific in what you want

More information

Analyzing Spammers Social Networks for Fun and Profit

Analyzing Spammers Social Networks for Fun and Profit Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin Guofei Gu Texas A&M University Analyzing Spammers Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Presentation:

More information

Guaranteeing AI Robustness against Deception (GARD)

Guaranteeing AI Robustness against Deception (GARD) Guaranteeing AI Robustness against Deception (GARD) Dr. Hava Siegelmann I2O Proposers Day Brief 6 February 2019 Ground Rules Purpose of this briefing Discuss program objectives and structure BAA takes

More information

Profiling Drivers Risky Behaviour Towards All Road Users

Profiling Drivers Risky Behaviour Towards All Road Users Profiling Drivers Risky Behaviour Towards All Road Users Adrian B. Ellison, Stephen Greaves & Rhonda Daniels Institute of Transport and Logistics Studies The University of Sydney ACRS Conference, 10 August

More information

Measuring impact. William Parienté UC Louvain J PAL Europe. povertyactionlab.org

Measuring impact. William Parienté UC Louvain J PAL Europe. povertyactionlab.org Measuring impact William Parienté UC Louvain J PAL Europe povertyactionlab.org Course overview 1. What is evaluation? 2. Measuring impact 3. Why randomize? 4. How to randomize 5. Sampling and Sample Size

More information

Crime Research in Geography

Crime Research in Geography Crime Research in Geography Resource allocation: we helped design the police Basic Command Unit families for the national resource allocation formula in the 1990s. More recently been advising West Yorkshire

More information

Political Science 15, Winter 2014 Final Review

Political Science 15, Winter 2014 Final Review Political Science 15, Winter 2014 Final Review The major topics covered in class are listed below. You should also take a look at the readings listed on the class website. Studying Politics Scientifically

More information

What Triggers Human Remembering of Events?

What Triggers Human Remembering of Events? What Triggers Human Remembering of Events? Large-Scale Analysis of Collective Memory in Wikipedia Nattiya Kanhabua, Tu Ngoc Nguyen and Claudia Niederée L3S Research Center, Hannover, Germany Concise Preservation

More information

Motivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience.

Motivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience. Outline: Motivation. What s the attention mechanism? Soft attention vs. Hard attention. Attention in Machine translation. Attention in Image captioning. State-of-the-art. 1 Motivation: Attention: Focusing

More information

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018

Introduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018 Introduction to Machine Learning Katherine Heller Deep Learning Summer School 2018 Outline Kinds of machine learning Linear regression Regularization Bayesian methods Logistic Regression Why we do this

More information

Lecture #4: Overabundance Analysis and Class Discovery

Lecture #4: Overabundance Analysis and Class Discovery 236632 Topics in Microarray Data nalysis Winter 2004-5 November 15, 2004 Lecture #4: Overabundance nalysis and Class Discovery Lecturer: Doron Lipson Scribes: Itai Sharon & Tomer Shiran 1 Differentially

More information

PIB Ch. 18 Sequence Memory for Prediction, Inference, and Behavior. Jeff Hawkins, Dileep George, and Jamie Niemasik Presented by Jiseob Kim

PIB Ch. 18 Sequence Memory for Prediction, Inference, and Behavior. Jeff Hawkins, Dileep George, and Jamie Niemasik Presented by Jiseob Kim PIB Ch. 18 Sequence Memory for Prediction, Inference, and Behavior Jeff Hawkins, Dileep George, and Jamie Niemasik Presented by Jiseob Kim Quiz Briefly describe the neural activities of minicolumn in the

More information

Genetic Testing Program for Huntington s Disease

Genetic Testing Program for Huntington s Disease Genetic Testing Program for Huntington s Disease Genetic testing for the Huntington s Disease (HD) gene expansion became possible in 1993. This test can be used to confirm the diagnosis in someone who

More information

PGT: Measuring Mobility Relationship using Personal, Global and Temporal Factors

PGT: Measuring Mobility Relationship using Personal, Global and Temporal Factors PGT: using Personal, Global and Temporal Factors Hongjian Wang, Zhenhui Li, Wang-Chien Lee Penn State University ICDM 2014 Shenzhen Measure the mobility relationship strength Given trajectories of two

More information

Introduction to Applied Research in Economics

Introduction to Applied Research in Economics Introduction to Applied Research in Economics Dr. Kamiljon T. Akramov IFPRI, Washington, DC, USA Regional Training Course on Applied Econometric Analysis June 12-23, 2017, WIUT, Tashkent, Uzbekistan Why

More information

Where you stop is who you are: understanding people s activities by places visited

Where you stop is who you are: understanding people s activities by places visited BMI'10 38 Karlsruhe, September 21th, 2010 Where you stop is who you are: understanding people s activities by places visited Laura Spinsanti, 1 Fabrizio Celli, 1, Chiara Renso 2 1 EPFL, Lausanne, Switzerland

More information

Estimation of the severity of traffic conflicts in naturalistic driving studies. Omar Bagdadi

Estimation of the severity of traffic conflicts in naturalistic driving studies. Omar Bagdadi Estimation of the severity of traffic conflicts in naturalistic driving studies Omar Bagdadi Aim Development of a method to estimate the severity of traffic conflicts in naturalistic driving studies, NDS.

More information

FriendFinder: A Privacy Aware Grid Based Location Service

FriendFinder: A Privacy Aware Grid Based Location Service FriendFinder: A Privacy Aware Grid Based Location Service Ove Andersen Laurynas Siksnys Jeppe R. Thomsen Aalborg University Department of Computer Science Selma Lagerløfs Vej 300, DK-9220 Aalborg Ø Denmark

More information

MyWindFit Member Analytics Portal

MyWindFit Member Analytics Portal Member Analytics Portal The member section of is a private and personalized cloud database that contains the detailed records of all your activity. It also contains an analysis package that enables you

More information

EER Assurance Criteria & Assertions IAASB Main Agenda (June 2018)

EER Assurance Criteria & Assertions IAASB Main Agenda (June 2018) Definition EER Assurance Criteria & Assertions Criteria & Assertions guidance skeleton Agenda Item 4-B Suitability of Criteria 1. Criteria specify both: the nature and scope of the topics and related resources

More information

Statement of research interest

Statement of research interest Statement of research interest Milos Hauskrecht My primary field of research interest is Artificial Intelligence (AI). Within AI, I am interested in problems related to probabilistic modeling, machine

More information

Data for Healthy Insights

Data for Healthy Insights Data for Healthy Insights South Carolina Association for Community Economic Development (SCACED) and MITRE Partnership Funded by the Robert Wood Johnson Foundation 2016 The MITRE Corporation. ALL RIGHTS

More information

A Comparison of Collaborative Filtering Methods for Medication Reconciliation

A Comparison of Collaborative Filtering Methods for Medication Reconciliation A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,

More information

Connecting Personal-scale Sensing and Networked Community Behavior to Infer Human Activities

Connecting Personal-scale Sensing and Networked Community Behavior to Infer Human Activities Connecting Personal-scale Sensing and Networked Community Behavior to Infer Human Activities Nicholas D. Lane, Li Pengyu, Lin Zhou, Feng Zhao Microsoft Research, Beijing University of Post and Telecommunications,

More information

Driving Cessation and HD

Driving Cessation and HD Driving Cessation and HD Arik Johnson, PsyD HDSA Center of Excellence at UCLA August 20, 2013 HDSA Caregivers Corner Webinar Disclaimers The presentation today is for informational use only The recommendations

More information

Issues in DMM Integrated Treatment: Bumps in the Road to Change. Rodolfo de Bernart, M.D. Andrea Landini, M.D.

Issues in DMM Integrated Treatment: Bumps in the Road to Change. Rodolfo de Bernart, M.D. Andrea Landini, M.D. Issues in DMM Integrated Treatment: Bumps in the Road to Change Rodolfo de Bernart, M.D. Andrea Landini, M.D. DMM Integrative Treatment is: the application of theory, assessment & clinical practice about

More information

Experimental Research in HCI. Alma Leora Culén University of Oslo, Department of Informatics, Design

Experimental Research in HCI. Alma Leora Culén University of Oslo, Department of Informatics, Design Experimental Research in HCI Alma Leora Culén University of Oslo, Department of Informatics, Design almira@ifi.uio.no INF2260/4060 1 Oslo, 15/09/16 Review Method Methodology Research methods are simply

More information

Application of Recursive Partitioning Methodology in Route Choice

Application of Recursive Partitioning Methodology in Route Choice Application of Recursive Partitioning Methodology in Route Choice Deepa M. J. Anu P. Alex Manju V. S. M.Tech student Assistant Professor Associate Professor College of Engineering Trivandrum 1 Abstract

More information

FMEA AND RPN NUMBERS. Failure Mode Severity Occurrence Detection RPN A B

FMEA AND RPN NUMBERS. Failure Mode Severity Occurrence Detection RPN A B FMEA AND RPN NUMBERS An important part of risk is to remember that risk is a vector: one aspect of risk is the severity of the effect of the event and the other aspect is the probability or frequency of

More information

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes Chapter 2 Knowledge Representation: Reasoning, Issues, and Acquisition Teaching Notes This chapter explains how knowledge is represented in artificial intelligence. The topic may be launched by introducing

More information

Research Methods in Human Computer Interaction by J. Lazar, J.H. Feng and H. Hochheiser (2010)

Research Methods in Human Computer Interaction by J. Lazar, J.H. Feng and H. Hochheiser (2010) Research Methods in Human Computer Interaction by J. Lazar, J.H. Feng and H. Hochheiser (2010) Example test questions PLUS ANSWERS Module Intelligent Interaction Design, 2016-2017 Below are example questions

More information

Event Classification and Relationship Labeling in Affiliation Networks

Event Classification and Relationship Labeling in Affiliation Networks Event Classification and Relationship Labeling in Affiliation Networks Abstract Many domains are best described as an affiliation network in which there are entities such as actors, events and organizations

More information

Loose Tweets: An Analysis of Privacy Leaks on Twitter

Loose Tweets: An Analysis of Privacy Leaks on Twitter Loose Tweets: An Analysis of Privacy Leaks on Twitter Huina Mao, Xin Shuai, Apu Kapadia WPES 2011 Presented by Luam C. Totti on May 9, 2012 Motivation 65 million tweets every day. How many contain sensitive

More information

VIDEO SALIENCY INCORPORATING SPATIOTEMPORAL CUES AND UNCERTAINTY WEIGHTING

VIDEO SALIENCY INCORPORATING SPATIOTEMPORAL CUES AND UNCERTAINTY WEIGHTING VIDEO SALIENCY INCORPORATING SPATIOTEMPORAL CUES AND UNCERTAINTY WEIGHTING Yuming Fang, Zhou Wang 2, Weisi Lin School of Computer Engineering, Nanyang Technological University, Singapore 2 Department of

More information

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression

More information

PODS FORUM GUIDELINES

PODS FORUM GUIDELINES PODS FORUM GUIDELINES SUMMARY 1. The purpose of the Forum is to equip, strengthen and support its members in coping with dissociative symptoms. The ethos of the Forum is about promoting recovery and wellbeing.

More information

Classification of Synapses Using Spatial Protein Data

Classification of Synapses Using Spatial Protein Data Classification of Synapses Using Spatial Protein Data Jenny Chen and Micol Marchetti-Bowick CS229 Final Project December 11, 2009 1 MOTIVATION Many human neurological and cognitive disorders are caused

More information

This article, the last in a 4-part series on philosophical problems

This article, the last in a 4-part series on philosophical problems GUEST ARTICLE Philosophical Issues in Medicine and Psychiatry, Part IV James Lake, MD This article, the last in a 4-part series on philosophical problems in conventional and integrative medicine, focuses

More information

Identification of Tissue Independent Cancer Driver Genes

Identification of Tissue Independent Cancer Driver Genes Identification of Tissue Independent Cancer Driver Genes Alexandros Manolakos, Idoia Ochoa, Kartik Venkat Supervisor: Olivier Gevaert Abstract Identification of genomic patterns in tumors is an important

More information

Nature and significance of the local problem

Nature and significance of the local problem Revised Standards for Quality Improvement Reporting Excellence (SQUIRE 2.0) September 15, 2015 Text Section and Item Section or Item Description Name The SQUIRE guidelines provide a framework for reporting

More information

Computer Science 101 Project 2: Predator Prey Model

Computer Science 101 Project 2: Predator Prey Model Computer Science 101 Project 2: Predator Prey Model Real-life situations usually are complicated and difficult to model exactly because of the large number of variables present in real systems. Computer

More information

Agent-Based Models. Maksudul Alam, Wei Wang

Agent-Based Models. Maksudul Alam, Wei Wang Agent-Based Models Maksudul Alam, Wei Wang Outline Literature Review about Agent-Based model Modeling disease outbreaks in realistic urban social Networks EpiSimdemics: an Efficient Algorithm for Simulating

More information

Lecture 4: Research Approaches

Lecture 4: Research Approaches Lecture 4: Research Approaches Lecture Objectives Theories in research Research design approaches ú Experimental vs. non-experimental ú Cross-sectional and longitudinal ú Descriptive approaches How to

More information

Glossary of Research Terms Compiled by Dr Emma Rowden and David Litting (UTS Library)

Glossary of Research Terms Compiled by Dr Emma Rowden and David Litting (UTS Library) Glossary of Research Terms Compiled by Dr Emma Rowden and David Litting (UTS Library) Applied Research Applied research refers to the use of social science inquiry methods to solve concrete and practical

More information

Handout 1: Introduction to the Research Process and Study Design STAT 335 Fall 2016

Handout 1: Introduction to the Research Process and Study Design STAT 335 Fall 2016 DESIGNING OBSERVATIONAL STUDIES As we have discussed, for the purpose of establishing cause-and-effect relationships, observational studies have a distinct disadvantage in comparison to randomized comparative

More information

Enumerative and Analytic Studies. Description versus prediction

Enumerative and Analytic Studies. Description versus prediction Quality Digest, July 9, 2018 Manuscript 334 Description versus prediction The ultimate purpose for collecting data is to take action. In some cases the action taken will depend upon a description of what

More information

A Bayesian Network Model of Knowledge-Based Authentication

A Bayesian Network Model of Knowledge-Based Authentication Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication

More information

English summary Modus Via. Fine-tuning geographical offender profiling.

English summary Modus Via. Fine-tuning geographical offender profiling. English summary Modus Via. Fine-tuning geographical offender profiling. When an offender goes out to commit a crime, say a burglary, he needs a target location to commit that crime. The offender will most

More information

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Okan Turkes, Hans Scholten, and Paul Havinga Dept. of Computer Engineering, Pervasive Systems University of

More information

Lab 2: Investigating Variation Across Spatial Scales

Lab 2: Investigating Variation Across Spatial Scales Lab 2: Investigating Variation Across Spatial Scales What are scales and variation in a biological context? The world around us displays incredible diversity across many scales. Today s lab investigates

More information

Footprint Tracker: Supporting diary studies with lifelogging

Footprint Tracker: Supporting diary studies with lifelogging Footprint Tracker: Supporting diary studies with lifelogging Rúben Gouveia rubahfgouveia@gmail.com Evangelos Karapanos e.karapanos@gmail.com 1 using diary studies to understand how technology is used in

More information

New methods for collecting evidence

New methods for collecting evidence Objective Monitoring of the Obesogenic Behaviour and the Role of the Local Environment New methods for collecting evidence Anastasios Delopoulos Multimedia Understanding Group Information Processing Laboratory

More information

Outbreak investigation

Outbreak investigation Outbreak investigation Dr. Marius Masiulis FAO international consultant, State Food and Veterinary Service of Lithuania Regional Workshop on FMD and other TADs Yur'evets, Vladimir, Russian Federation 29/11/2017-30/11/2017

More information

Supplementary Materials for

Supplementary Materials for advances.sciencemag.org/cgi/content/full/3/2/e1602024/dc1 Supplementary Materials for Combining contact tracing with targeted indoor residual spraying significantly reduces dengue transmission Gonzalo

More information

What is Science 2009 What is science?

What is Science 2009 What is science? What is science? The question we want to address is seemingly simple, but turns out to be quite difficult to answer: what is science? It is reasonable to ask such a question since this is a book/course

More information

Towards Open Set Deep Networks: Supplemental

Towards Open Set Deep Networks: Supplemental Towards Open Set Deep Networks: Supplemental Abhijit Bendale*, Terrance E. Boult University of Colorado at Colorado Springs {abendale,tboult}@vast.uccs.edu In this supplement, we provide we provide additional

More information

Contributions to Brain MRI Processing and Analysis

Contributions to Brain MRI Processing and Analysis Contributions to Brain MRI Processing and Analysis Dissertation presented to the Department of Computer Science and Artificial Intelligence By María Teresa García Sebastián PhD Advisor: Prof. Manuel Graña

More information

Texting4Health Conference February 29, InSTEDD Proprietary Level I

Texting4Health Conference February 29, InSTEDD Proprietary Level I Texting4Health Conference February 29, 2008 InSTEDD Proprietary Level I that you will help build a global system to detect each new disease or disaster as quickly as it emerges Specificity Urge frequent

More information

Learning from Online Health Communities. Noémie Elhadad

Learning from Online Health Communities. Noémie Elhadad Learning from Online Health Communities Noémie Elhadad noemie@dbmi.columbia.edu Apps/tools for health consumers & patients iphone health apps A (not social) tracking tool xkcd.com Online Health Communities

More information

The Standard Theory of Conscious Perception

The Standard Theory of Conscious Perception The Standard Theory of Conscious Perception C. D. Jennings Department of Philosophy Boston University Pacific APA 2012 Outline 1 Introduction Motivation Background 2 Setting up the Problem Working Definitions

More information

An Attentional Framework for 3D Object Discovery

An Attentional Framework for 3D Object Discovery An Attentional Framework for 3D Object Discovery Germán Martín García and Simone Frintrop Cognitive Vision Group Institute of Computer Science III University of Bonn, Germany Saliency Computation Saliency

More information