Quantifying location privacy
|
|
- Ella Chase
- 5 years ago
- Views:
Transcription
1 Sébastien Gambs Quantifying location privacy 1 Quantifying location privacy Sébastien Gambs Université de Rennes 1 - INRIA sgambs@irisa.fr 10 September 2013
2 Sébastien Gambs Quantifying location privacy 2
3 Sébastien Gambs Quantifying location privacy 3
4 Geolocation and privacy Geolocation associate a geographical location to an object such as a cell phone, a computer or a GPS-equipped vehicle. These objects are often personal and link to a particular individual (or a group of individuals such as a family). If disclose to unauthorized entities, these information can lead to a privacy breach in the same manner that the history of purchase of an individuals or his personal queries. Main goal: reconcile geolocation and privacy for applications which rely on the spatio-temporal data of individual. Sébastien Gambs Quantifying location privacy 4
5 1 AlsoSébastien sometimes Gambs called locational privacy. Quantifying location privacy 5 Geo-privacy Geo-privacy 1 seeks to prevent an unauthorized entity from learning the past, current and future location of an individual (Beresford et Stajano 03). Remark : the personal spatio-temporal data of an individual can play the role of quasi-identifiers. From the geolocated data of an individual, it is possible to infer : his home and place of work, his identity, his center of interests, his habits or a deviation from his usual behaviour. Privacy breach
6 Sébastien Gambs Quantifying location privacy 6 Geolocation, a new type of personal data (INRIA Alumni)
7 Sébastien Gambs Quantifying location privacy 7 Geolocated query
8 Sébastien Gambs Quantifying location privacy 8 Collaborative traffic monitoring
9 Sébastien Gambs Quantifying location privacy 9 Geosocial network
10 Sébastien Gambs Quantifying location privacy 10 Dimensions to take into account when designing a location privacy metric 1. Periodicity of location data : Continuous (the user regularly releases his position) or Sporadic (irregular samples of the user position). 2. Type of location data : GPS traces, Call data records, Contact traces. 3. Imprecision versus inaccuracy. 4. Geosanitization mechanisms Example: differential privacy for location data (cf. two previous talks).
11 Properties of a good location privacy model 1. The model should be realistic. It should capture realistic threats against location privacy. 2. The model should be quantifiable. It should be equipped with a privacy metric that can tell between two different situations, which one is the most harmful to privacy. 3. The model should be intuitive and comprehensible. It should help to reason on location privacy and how to achieve it. 4. The model should be testable/falsifiable. It should be possible to verify/disprove/test the limits of the guarantees provided by the model. Sébastien Gambs Quantifying location privacy 11
12 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 12
13 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 13 Limit of pseudonymity Replacing the name of a person by a pseudonym preservation of the privacy of this individual (Extract from an article from the New York Times, 6 August 2006) The same phenomenon is true for geolocated data. Example: if the granularity is too small, the pair home-work becomes unique for a large fraction of the population (Colle and Kartridge 09).
14 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 14 Inference attack Inference attack : the adversary takes as input a geolocated dataset (and possibly some background knowledge) and tries to infer some personal information regarding individuals contained in the dataset. Main challenge : to be able to give some privacy guarantees even against an adversary having some auxiliary knowledge. We may not even be able to model this a priori knowledge. Remark: maybe my data is private today but it may not be so in the future due to the public release of some other data.
15 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 15 Objective of inference attack Identification of important places, called Point of Interests (POI), characterizing the interests of an individual. Example: home, place of work, gymnasium, political headquarters, medical center,... Prediction of the movement patterns of an individual, such as his past, present and future locations. Linking the records of the same individual contained in the same dataset or in different datasets (either anonymized or under different pseudonyms). The linking disclosure risk measures the success probability of this attack. Discover social relations between individuals. Example: people that are in the vicinity of each other on a frequent basis.
16 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 16 Auxiliary knowledge The adversary can have auxiliary knowledge that may help him in conducting a privacy breach. Examples of auxiliary knowledge : presence of an individual within an anonymized dataset, partial knowledge of its attributes (such as home address or place of work), a model of his habits, knowledge of his social network, knowledge of the distribution of the attributes within the population, geographical knowledge of roads and relief,...
17 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 17 Identification of POIs through clustering algorithm Main idea : search for gaps in the mobility traces. Inference attack : 1. Delete all mobility traces in which the person is in movement. 2. Find gaps in the traces (significative stop periods that have last at least 10 or 20 minutes). 3. Keep the mobility trace just before and after the gap. 4. Run a clustering algorithm on the remaining traces in order to discover significant clusters. 5. Return as POI the median of each cluster. Validation issue : how to evaluate the quality of the POIs returned if we do not have access to a ground truth?
18 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 18 Identification of the house of a taxi (view from GEPETO, AINA 09)
19 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 19 Identification of the house of a taxi (view from GoogleMaps and StreetView)
20 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 20 Mobility Markov chain (TDP 11) Objective : to represent in a compact way the mobility behaviour of an individual. The states of the chain are POIs and a transitions represents the probability from moving from one POI to another. Construction : Remove all moving traces. From the resulting traces, extract the POIs by running a clustering algorithm. Label each trace with the corresponding POI and compute the transitions probabilities. Temporal variant of the model (DYNAM 11): decompose the time into slices, the label of a stage corresponds to POI/time slice.
21 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 21 Example of mobility Markov chain
22 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 22 Predicting the next location of an individual (MPM 12) Prediction technique : from the actual location, choose te transition leaving from this POI that has the highest probability and predicts the corresponding POI. Evaluation method : splitting of the mobility traces betweena training set and a testing set (50%-50%). The mobility Markov chain is learnt from the training set and his prediction rate is evaluated in the testing set. Variant of the method : to remember the n last visited states (instead of simply the current one). Example : a user has visited work and then supermarket, which POI is the one where the user will go?
23 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 23 Experimental results The prediction method was tested on 3 mobility datasets (synthetic, Phonetic, Geolife) with n varying between 1 and 3 (best prediction rate obtained for n = 2). Results : success rate of the prediction between 70 and 95%.
24 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 24 De-anonymization attack via MMC (TrustCom 13) Objective : find an individual in an anonymous geolocated database. Assumption : the adversary has been able to observe in the past the mobility of the some individuals present in the dataset. Main idea : to compute a distance metric between 2 MMCs quantifying the difference between two mobility behaviours.
25 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC Sébastien Gambs Quantifying location privacy 25 De-anonymization attack via MMC Design of different distance metrics (geometrical, topological, logical) between MMCs and different way to combine the predictors. Best de-anonymization rate : 45% (obtained by combining 2 predictors).
26 Inference attack Identification of POIs through clustering algorithm Understanding and predicting the mobility of an individual De-anonymization attack via MMC A generic framework for inference attack on location data Figure: Shokri, Theodorakopoulos, Le Boudec and Hubaux 11. Sébastien Gambs Quantifying location privacy 26
27 Sébastien Gambs Quantifying location privacy 27 Spatial cloacking l-diversity and t-closeness Unlinkability
28 Sébastien Gambs Quantifying location privacy 28 Sanitization Spatial cloacking l-diversity and t-closeness Unlinkability Sanitization : process increasing the uncertainty in the data in order to preserve privacy. Inherent trade-off between the desired level of privacy and the utility of the sanitized data. Typical application : public release of data. Examples drawn from the sanitization entry on Wikipedia
29 Sébastien Gambs Quantifying location privacy 29 k-anonymity Spatial cloacking l-diversity and t-closeness Unlinkability Often, finding the optimal way of sanitizing the data is a NP-hard problem. Example of sanitization method with guarantees : k-anonymity (Sweeney 02). Main idea : protect the privacy of an individual by blending him into the crowd. k-anonymisation : process which constructs a database processus (by suppression and generalization) in which each record is indistinguishable from at least k 1 other records. Guarantee : no individual can be targeted with a probability 1 over k 1, even for an adversary having auxiliary knowledge.
30 Sébastien Gambs Quantifying location privacy 30 Spatial cloacking l-diversity and t-closeness Unlinkability Spatial cloacking Spatial cloacking (Gruteser and Grunwald 03) : extension of the concept of k-anonymity to spatio-temporal data. Main idea : ensure that at each time step, each individual is located within an area that is shared by at least k 1 other individuals. Possible method : recursively split the space in areas of different sizes such that each area respects the property of k-anonymity.
31 Sébastien Gambs Quantifying location privacy 31 Illustration of spatial cloacking Spatial cloacking l-diversity and t-closeness Unlinkability Illustration of spatial cloacking for k = 3 (extrait de Gruteser et Grunwald 03).
32 Sébastien Gambs Quantifying location privacy 32 Spatial cloacking l-diversity and t-closeness Unlinkability Limits of geographical masks and spatial cloacking If the adversary has some geographical knowledge about the sanitized area, he can discard some hypothesies that are not really realistic. Example : if after a random perturbation the returned location is situated within an area difficult to reach such as river or a mountain the adversary can easily discard this hypothesis by considering instead the closes accessible area. Linkability risk : even if it is impossible to identify exactly an individual, it is sometimes possible to link the actions of a group of individuals. Example of inference : at each time step, I am able to follow the movement of one group from one area to another.
33 Sébastien Gambs Quantifying location privacy 33 Spatial cloacking l-diversity and t-closeness Unlinkability l-diversity and t-closeness (Location) l-diversity: guarantee than for each spatial area revealed, there is enough diversity in terms of semantics of the possible locations. Can be instantiated by an entropic measure. (Location) t-closeness: provides a stronger guarantee by requiring that the distribution of possible locations is close to the distribution of the whole population. Can be instantiated by a divergence on distributions such as Kullback-Leibler divergence (relative entropy). Complementary to the guarantee provided by k-anonymity.
34 Spatial cloacking l-diversity and t-closeness Unlinkability Mix-zone (Beresford and Stajano 03) Inspired from the Mix-nets of Chaum which are used for the anonymous communication of messages. Mix-zone : area of space where no observation are produced and such that a new pseudonym will be generated when a person leaves the area which is different from the one that this person had when entering. Main goal : make it more difficult to link the actions of an individual. Example : the laboratory can be a mix-zone where no measurement are performed while we are here. When we leave it, we will receive a different pseudonym from the one we had before entering. Privacy metric : probability of success of an adversary in reconstructing the path of an individual. Sébastien Gambs Quantifying location privacy 34
35 Illustration of mix-zone Spatial cloacking l-diversity and t-closeness Unlinkability Measures are taken in the application zone contrary to the mix zone (Beresford and Stajano 03). Alternative to provide unlinkability : anonymity + path confusion. Sébastien Gambs Quantifying location privacy 35
36 Sébastien Gambs Quantifying location privacy 36
37 Sébastien Gambs Quantifying location privacy 37 Towards a generic location privacy model Should be able to resist to most of the state of the art inference attacks. Should be equipped with a privacy parameter that can be changed to tune the privacy model. Should work despite strong adversary knowledge. Example: mobility model, social network. Possible direction: geo-indistinguishability + l diversity for semantics of location + unlinkability + evaluation of the privacy level through inference attacks.
38 Sébastien Gambs Quantifying location privacy 38 This is the end! Thanks for your attention. Questions?
Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version
Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences - Draft Version Gergely Acs, Claude Castelluccia, Daniel Le étayer 1 Introduction Anonymization is a critical
More informationBig Data Anonymisation Techniques
Big Data Anonymisation Techniues BIG DATA is Useful Analysis and publication of large datasets are essential to research and business Very useful to: predict flu improve transportation, Logistic improve
More informationA formal model of obfuscation and negotiation for location privacy
A formal model of obfuscation and negotiation for location privacy Matt Duckham and Lars Kulik University of Melbourne Victoria 3010, Australia Pervasive 2005: Matt Duckham and Lars Kulik May 10, 2005
More informationBayesian (Belief) Network Models,
Bayesian (Belief) Network Models, 2/10/03 & 2/12/03 Outline of This Lecture 1. Overview of the model 2. Bayes Probability and Rules of Inference Conditional Probabilities Priors and posteriors Joint distributions
More informationDriving forces of researchers mobility
Driving forces of researchers mobility Supplementary Information Floriana Gargiulo 1 and Timoteo Carletti 1 1 NaXys, University of Namur, Namur, Belgium 1 Data preprocessing The original database contains
More informationSchutz der Privatsphäre (WS15/16) Introduction to Privacy (Part 1)
You have zero privacy. Get over it. Scott McNealy, 1999 Privacy, k anonymity, and differential privacy Johann Christoph Freytag Humboldt-Universität zu Berlin 1 Is it always obvious? Is it always obvious
More informationBlend me in: Privacy-Preserving Input Generalization for Personalized Online Services. Alegria Baquero U. of California, Irvine
Blend me in: Privacy-Preserving Input Generalization for Personalized Online Services Alegria Baquero U. of California, Irvine Allan Schiffman CommerceNet Jeff Shrager CommerceNet & Stanford U. AMS@COMMERCE.NET
More informationFrom Mobile Phone Monitoring of Depressive States using GPS Traces Analysis to Data-Driven Behaviour Change Interventions
From Mobile Phone Monitoring of Depressive States using GPS Traces Analysis to Data-Driven Behaviour Change Interventions Luca Canzian Qascom Mirco Musolesi University College London Outline Motivation
More informationCHAPTER 5: PRODUCING DATA
CHAPTER 5: PRODUCING DATA 5.1: Designing Samples Exploratory data analysis seeks to what data say by using: These conclusions apply only to the we examine. To answer questions about some of individuals
More informationKnock Knock, Who s There? Membership Inference on Aggregate Location Data
Knock Knock, Who s There? Membership Inference on Aggregate Location Data Apostolos Pyrgelis University College London apostolos.pyrgelis.14@ucl.ac.uk Carmela Troncoso IMDEA Software Institute carmela.troncoso@imdea.org
More informationMeasuring Focused Attention Using Fixation Inner-Density
Measuring Focused Attention Using Fixation Inner-Density Wen Liu, Mina Shojaeizadeh, Soussan Djamasbi, Andrew C. Trapp User Experience & Decision Making Research Laboratory, Worcester Polytechnic Institute
More informationChallenges in Big Data Analytics. Izabela Moise, Evangelos Pournaras, Dirk Helbing
Challenges in Big Data Analytics Izabela Moise, Evangelos Pournaras, Dirk Helbing Izabela Moise, Evangelos Pournaras, Dirk Helbing 1 Big Data - Big Value There is a big data revolution. But it is not the
More informationTemporal Analysis of Online Social Graph by Home Location
Temporal Analysis of Online Social Graph by Home Location Shiori Hironaka Mitsuo Yoshida Kyoji Umemura Toyohashi University of Technology Aichi, Japan s143369@edu.tut.ac.jp, yoshida@cs.tut.ac.jp, umemura@tut.jp
More informationActions in the Eye: Dynamic Gaze Datasets and Learnt Saliency Models for Visual Recognition
Actions in the Eye: Dynamic Gaze Datasets and Learnt Saliency Models for Visual Recognition Stefan Mathe, Cristian Sminchisescu Presented by Mit Shah Motivation Current Computer Vision Annotations subjectively
More informationHigh-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany
High-level Vision Bernd Neumann Slides for the course in WS 2004/05 Faculty of Informatics Hamburg University Germany neumann@informatik.uni-hamburg.de http://kogs-www.informatik.uni-hamburg.de 1 Contents
More informationAnnotating If Authors of Tweets are Located in the Locations They Tweet About
Annotating If Authors of Tweets are Located in the Locations They Tweet About Vivek Doudagiri, Alakananda Vempala and Eduardo Blanco Human Intelligence and Language Technologies Lab University of North
More informationPythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL SAL. Lee W. Wagenhals Alexander H. Levis
Pythia WEB ENABLED TIMED INFLUENCE NET MODELING TOOL Lee W. Wagenhals Alexander H. Levis ,@gmu.edu Adversary Behavioral Modeling Maxwell AFB, Montgomery AL March 8-9, 2007 1 Outline Pythia
More informationCISC453 Winter Probabilistic Reasoning Part B: AIMA3e Ch
CISC453 Winter 2010 Probabilistic Reasoning Part B: AIMA3e Ch 14.5-14.8 Overview 2 a roundup of approaches from AIMA3e 14.5-14.8 14.5 a survey of approximate methods alternatives to the direct computing
More informationAnalysis A step in the research process that involves describing and then making inferences based on a set of data.
1 Appendix 1:. Definitions of important terms. Additionality The difference between the value of an outcome after the implementation of a policy, and its value in a counterfactual scenario in which the
More informationLearning Navigational Maps by Observing the Movement of Crowds
Learning Navigational Maps by Observing the Movement of Crowds Simon T. O Callaghan Australia, NSW s.ocallaghan@acfr.usyd.edu.au Surya P. N. Singh Australia, NSW spns@acfr.usyd.edu.au Fabio T. Ramos Australia,
More informationEnhancing Privacy and Utility with Noisy Minimax Filter
Enhancing Privacy and Utility with Noisy Minimax Filter Jihun Hamm Dept. Computer Science and Engineering The Ohio State University Syntactic anonymity Privacy measures for database release k-anonymity
More informationLecture 01 Analysis of Animal Populations: Theory and Scientific Process
1 of 1 Lecture 01 Analysis of Animal Populations: Theory and Scientific Process Motivation 1. Review the basic theory of animal population dynamics 2. Lay the foundation for the analysis of animal populations
More informationOutline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper?
Outline A Critique of Software Defect Prediction Models Norman E. Fenton Dongfeng Zhu What s inside this paper? What kind of new technique was developed in this paper? Research area of this technique?
More informationTITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS)
TITLE: A Data-Driven Approach to Patient Risk Stratification for Acute Respiratory Distress Syndrome (ARDS) AUTHORS: Tejas Prahlad INTRODUCTION Acute Respiratory Distress Syndrome (ARDS) is a condition
More informationEric Horvitz Microsoft Research. PerCom 2011 Seattle, WA
Eric Horvitz Microsoft Research PerCom 2011 Seattle, WA What might we learn about human behavior and of world phenomena from logs of the activities of people? How can we harness data about people while
More informationThe State of the Art in Indicator Research
International Society for Quality-of-Life Studies (ISQOLS) The State of the Art in Indicator Research Filomena Maggino filomena.maggino@unifi.it The State of the Art in Indicator Research I 1. Developing
More informationA Framework for Conceptualizing, Representing, and Analyzing Distributed Interaction. Dan Suthers
1 A Framework for Conceptualizing, Representing, and Analyzing Distributed Interaction Dan Suthers Work undertaken with Nathan Dwyer, Richard Medina and Ravi Vatrapu Funded in part by the U.S. National
More informationDeveloping and Testing Hypotheses Kuba Glazek, Ph.D. Methodology Expert National Center for Academic and Dissertation Excellence Los Angeles
Developing and Testing Hypotheses Kuba Glazek, Ph.D. Methodology Expert National Center for Academic and Dissertation Excellence Los Angeles NATIONAL CENTER FOR ACADEMIC & DISSERTATION EXCELLENCE Overview
More informationFrom where does the content of a certain geo-communication come? semiotics in web-based geo-communication Brodersen, Lars
Downloaded from vbn.aau.dk on: april 02, 2019 Aalborg Universitet From where does the content of a certain geo-communication come? semiotics in web-based geo-communication Brodersen, Lars Published in:
More informationHBML: A Representation Language for Quantitative Behavioral Models in the Human Terrain
HBML: A Representation Language for Quantitative Behavioral Models in the Human Terrain Nils F. Sandell, Robert Savell David Twardowski, George Cybenko Conference on Social Computing, Behavioral Modeling,
More informationNeuroinformatics. Ilmari Kurki, Urs Köster, Jukka Perkiö, (Shohei Shimizu) Interdisciplinary and interdepartmental
Neuroinformatics Aapo Hyvärinen, still Academy Research Fellow for a while Post-docs: Patrik Hoyer and Jarmo Hurri + possibly international post-docs PhD students Ilmari Kurki, Urs Köster, Jukka Perkiö,
More information"Preparedness and Personal Awareness" - Albert Timen
For The Everyday Civilian The reality of Terrorism and Terror threats around us is not new, neither a surprising actuality, yet still the wave of events ranging from "Lone wolf" Active Shooter to a combined
More informationA Model Officer: An Agent-based Model of Policing
A Model Officer: An Agent-based Model of Policing Sarah Wise* 1 and Tao Cheng 1 Department of Civil, Environmental, and Geomatic Engineering University College London November 7, 2014 Summary The way police
More informationA Common-Sense Framework for Assessing Information-Based Counterterrorist Programs
A Common-Sense Framework for Assessing Information-Based Counterterrorist Programs Fred H. Cate Distinguished Professor and Director Center for Applied Cybersecurity Research, Indiana University Herbert
More informationSupporting Effective PrEP Pill Taking and Providing HIV Risk Reduction Counselling.
Supporting Effective PrEP Pill Taking and Providing HIV Risk Reduction Counselling bbrown@anovahealth.co.za Outline 1. Integrating PrEP into standard HIV risk reduction practices 2. Strategies to Support
More informationSearching for Temporal Patterns in AmI Sensor Data
Searching for Temporal Patterns in AmI Sensor Data Romain Tavenard 1,2, Albert A. Salah 1, Eric J. Pauwels 1 1 Centrum voor Wiskunde en Informatica, CWI Amsterdam, The Netherlands 2 IRISA/ENS de Cachan,
More informationBrendan O Connor,
Some slides on Paul and Dredze, 2012. Discovering Health Topics in Social Media Using Topic Models. PLOS ONE. http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0103408 Brendan O Connor,
More informationBackground paper number 5
Background paper number 5 Assessing the quality and coverage of surveillance data in the UK: how is it done and how can HPA help to develop the Task Force framework for assessment of surveillance data,
More informationPlease take time to read this document carefully. It forms part of the agreement between you and your counsellor and Insight Counselling.
Informed Consent Please take time to read this document carefully. It forms part of the agreement between you and your counsellor and Insight Counselling. AGREEMENT FOR COUNSELLING SERVICES CONDUCTED BY
More informationHow to use research to lead your clinical decision
] 6 How to use research to lead your clinical decision ASK ACQUIRE ANALYZE ANSWER APPLY ASSESS making.] Phil Page PhD, PT, ATC, CSCS, FACSM 1) ASK What is your question? Be very specific in what you want
More informationAnalyzing Spammers Social Networks for Fun and Profit
Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin Guofei Gu Texas A&M University Analyzing Spammers Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Presentation:
More informationGuaranteeing AI Robustness against Deception (GARD)
Guaranteeing AI Robustness against Deception (GARD) Dr. Hava Siegelmann I2O Proposers Day Brief 6 February 2019 Ground Rules Purpose of this briefing Discuss program objectives and structure BAA takes
More informationProfiling Drivers Risky Behaviour Towards All Road Users
Profiling Drivers Risky Behaviour Towards All Road Users Adrian B. Ellison, Stephen Greaves & Rhonda Daniels Institute of Transport and Logistics Studies The University of Sydney ACRS Conference, 10 August
More informationMeasuring impact. William Parienté UC Louvain J PAL Europe. povertyactionlab.org
Measuring impact William Parienté UC Louvain J PAL Europe povertyactionlab.org Course overview 1. What is evaluation? 2. Measuring impact 3. Why randomize? 4. How to randomize 5. Sampling and Sample Size
More informationCrime Research in Geography
Crime Research in Geography Resource allocation: we helped design the police Basic Command Unit families for the national resource allocation formula in the 1990s. More recently been advising West Yorkshire
More informationPolitical Science 15, Winter 2014 Final Review
Political Science 15, Winter 2014 Final Review The major topics covered in class are listed below. You should also take a look at the readings listed on the class website. Studying Politics Scientifically
More informationWhat Triggers Human Remembering of Events?
What Triggers Human Remembering of Events? Large-Scale Analysis of Collective Memory in Wikipedia Nattiya Kanhabua, Tu Ngoc Nguyen and Claudia Niederée L3S Research Center, Hannover, Germany Concise Preservation
More informationMotivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience.
Outline: Motivation. What s the attention mechanism? Soft attention vs. Hard attention. Attention in Machine translation. Attention in Image captioning. State-of-the-art. 1 Motivation: Attention: Focusing
More informationIntroduction to Machine Learning. Katherine Heller Deep Learning Summer School 2018
Introduction to Machine Learning Katherine Heller Deep Learning Summer School 2018 Outline Kinds of machine learning Linear regression Regularization Bayesian methods Logistic Regression Why we do this
More informationLecture #4: Overabundance Analysis and Class Discovery
236632 Topics in Microarray Data nalysis Winter 2004-5 November 15, 2004 Lecture #4: Overabundance nalysis and Class Discovery Lecturer: Doron Lipson Scribes: Itai Sharon & Tomer Shiran 1 Differentially
More informationPIB Ch. 18 Sequence Memory for Prediction, Inference, and Behavior. Jeff Hawkins, Dileep George, and Jamie Niemasik Presented by Jiseob Kim
PIB Ch. 18 Sequence Memory for Prediction, Inference, and Behavior Jeff Hawkins, Dileep George, and Jamie Niemasik Presented by Jiseob Kim Quiz Briefly describe the neural activities of minicolumn in the
More informationGenetic Testing Program for Huntington s Disease
Genetic Testing Program for Huntington s Disease Genetic testing for the Huntington s Disease (HD) gene expansion became possible in 1993. This test can be used to confirm the diagnosis in someone who
More informationPGT: Measuring Mobility Relationship using Personal, Global and Temporal Factors
PGT: using Personal, Global and Temporal Factors Hongjian Wang, Zhenhui Li, Wang-Chien Lee Penn State University ICDM 2014 Shenzhen Measure the mobility relationship strength Given trajectories of two
More informationIntroduction to Applied Research in Economics
Introduction to Applied Research in Economics Dr. Kamiljon T. Akramov IFPRI, Washington, DC, USA Regional Training Course on Applied Econometric Analysis June 12-23, 2017, WIUT, Tashkent, Uzbekistan Why
More informationWhere you stop is who you are: understanding people s activities by places visited
BMI'10 38 Karlsruhe, September 21th, 2010 Where you stop is who you are: understanding people s activities by places visited Laura Spinsanti, 1 Fabrizio Celli, 1, Chiara Renso 2 1 EPFL, Lausanne, Switzerland
More informationEstimation of the severity of traffic conflicts in naturalistic driving studies. Omar Bagdadi
Estimation of the severity of traffic conflicts in naturalistic driving studies Omar Bagdadi Aim Development of a method to estimate the severity of traffic conflicts in naturalistic driving studies, NDS.
More informationFriendFinder: A Privacy Aware Grid Based Location Service
FriendFinder: A Privacy Aware Grid Based Location Service Ove Andersen Laurynas Siksnys Jeppe R. Thomsen Aalborg University Department of Computer Science Selma Lagerløfs Vej 300, DK-9220 Aalborg Ø Denmark
More informationMyWindFit Member Analytics Portal
Member Analytics Portal The member section of is a private and personalized cloud database that contains the detailed records of all your activity. It also contains an analysis package that enables you
More informationEER Assurance Criteria & Assertions IAASB Main Agenda (June 2018)
Definition EER Assurance Criteria & Assertions Criteria & Assertions guidance skeleton Agenda Item 4-B Suitability of Criteria 1. Criteria specify both: the nature and scope of the topics and related resources
More informationStatement of research interest
Statement of research interest Milos Hauskrecht My primary field of research interest is Artificial Intelligence (AI). Within AI, I am interested in problems related to probabilistic modeling, machine
More informationData for Healthy Insights
Data for Healthy Insights South Carolina Association for Community Economic Development (SCACED) and MITRE Partnership Funded by the Robert Wood Johnson Foundation 2016 The MITRE Corporation. ALL RIGHTS
More informationA Comparison of Collaborative Filtering Methods for Medication Reconciliation
A Comparison of Collaborative Filtering Methods for Medication Reconciliation Huanian Zheng, Rema Padman, Daniel B. Neill The H. John Heinz III College, Carnegie Mellon University, Pittsburgh, PA, 15213,
More informationConnecting Personal-scale Sensing and Networked Community Behavior to Infer Human Activities
Connecting Personal-scale Sensing and Networked Community Behavior to Infer Human Activities Nicholas D. Lane, Li Pengyu, Lin Zhou, Feng Zhao Microsoft Research, Beijing University of Post and Telecommunications,
More informationDriving Cessation and HD
Driving Cessation and HD Arik Johnson, PsyD HDSA Center of Excellence at UCLA August 20, 2013 HDSA Caregivers Corner Webinar Disclaimers The presentation today is for informational use only The recommendations
More informationIssues in DMM Integrated Treatment: Bumps in the Road to Change. Rodolfo de Bernart, M.D. Andrea Landini, M.D.
Issues in DMM Integrated Treatment: Bumps in the Road to Change Rodolfo de Bernart, M.D. Andrea Landini, M.D. DMM Integrative Treatment is: the application of theory, assessment & clinical practice about
More informationExperimental Research in HCI. Alma Leora Culén University of Oslo, Department of Informatics, Design
Experimental Research in HCI Alma Leora Culén University of Oslo, Department of Informatics, Design almira@ifi.uio.no INF2260/4060 1 Oslo, 15/09/16 Review Method Methodology Research methods are simply
More informationApplication of Recursive Partitioning Methodology in Route Choice
Application of Recursive Partitioning Methodology in Route Choice Deepa M. J. Anu P. Alex Manju V. S. M.Tech student Assistant Professor Associate Professor College of Engineering Trivandrum 1 Abstract
More informationFMEA AND RPN NUMBERS. Failure Mode Severity Occurrence Detection RPN A B
FMEA AND RPN NUMBERS An important part of risk is to remember that risk is a vector: one aspect of risk is the severity of the effect of the event and the other aspect is the probability or frequency of
More informationChapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes
Chapter 2 Knowledge Representation: Reasoning, Issues, and Acquisition Teaching Notes This chapter explains how knowledge is represented in artificial intelligence. The topic may be launched by introducing
More informationResearch Methods in Human Computer Interaction by J. Lazar, J.H. Feng and H. Hochheiser (2010)
Research Methods in Human Computer Interaction by J. Lazar, J.H. Feng and H. Hochheiser (2010) Example test questions PLUS ANSWERS Module Intelligent Interaction Design, 2016-2017 Below are example questions
More informationEvent Classification and Relationship Labeling in Affiliation Networks
Event Classification and Relationship Labeling in Affiliation Networks Abstract Many domains are best described as an affiliation network in which there are entities such as actors, events and organizations
More informationLoose Tweets: An Analysis of Privacy Leaks on Twitter
Loose Tweets: An Analysis of Privacy Leaks on Twitter Huina Mao, Xin Shuai, Apu Kapadia WPES 2011 Presented by Luam C. Totti on May 9, 2012 Motivation 65 million tweets every day. How many contain sensitive
More informationVIDEO SALIENCY INCORPORATING SPATIOTEMPORAL CUES AND UNCERTAINTY WEIGHTING
VIDEO SALIENCY INCORPORATING SPATIOTEMPORAL CUES AND UNCERTAINTY WEIGHTING Yuming Fang, Zhou Wang 2, Weisi Lin School of Computer Engineering, Nanyang Technological University, Singapore 2 Department of
More informationUsing Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s
Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression
More informationPODS FORUM GUIDELINES
PODS FORUM GUIDELINES SUMMARY 1. The purpose of the Forum is to equip, strengthen and support its members in coping with dissociative symptoms. The ethos of the Forum is about promoting recovery and wellbeing.
More informationClassification of Synapses Using Spatial Protein Data
Classification of Synapses Using Spatial Protein Data Jenny Chen and Micol Marchetti-Bowick CS229 Final Project December 11, 2009 1 MOTIVATION Many human neurological and cognitive disorders are caused
More informationThis article, the last in a 4-part series on philosophical problems
GUEST ARTICLE Philosophical Issues in Medicine and Psychiatry, Part IV James Lake, MD This article, the last in a 4-part series on philosophical problems in conventional and integrative medicine, focuses
More informationIdentification of Tissue Independent Cancer Driver Genes
Identification of Tissue Independent Cancer Driver Genes Alexandros Manolakos, Idoia Ochoa, Kartik Venkat Supervisor: Olivier Gevaert Abstract Identification of genomic patterns in tumors is an important
More informationNature and significance of the local problem
Revised Standards for Quality Improvement Reporting Excellence (SQUIRE 2.0) September 15, 2015 Text Section and Item Section or Item Description Name The SQUIRE guidelines provide a framework for reporting
More informationComputer Science 101 Project 2: Predator Prey Model
Computer Science 101 Project 2: Predator Prey Model Real-life situations usually are complicated and difficult to model exactly because of the large number of variables present in real systems. Computer
More informationAgent-Based Models. Maksudul Alam, Wei Wang
Agent-Based Models Maksudul Alam, Wei Wang Outline Literature Review about Agent-Based model Modeling disease outbreaks in realistic urban social Networks EpiSimdemics: an Efficient Algorithm for Simulating
More informationLecture 4: Research Approaches
Lecture 4: Research Approaches Lecture Objectives Theories in research Research design approaches ú Experimental vs. non-experimental ú Cross-sectional and longitudinal ú Descriptive approaches How to
More informationGlossary of Research Terms Compiled by Dr Emma Rowden and David Litting (UTS Library)
Glossary of Research Terms Compiled by Dr Emma Rowden and David Litting (UTS Library) Applied Research Applied research refers to the use of social science inquiry methods to solve concrete and practical
More informationHandout 1: Introduction to the Research Process and Study Design STAT 335 Fall 2016
DESIGNING OBSERVATIONAL STUDIES As we have discussed, for the purpose of establishing cause-and-effect relationships, observational studies have a distinct disadvantage in comparison to randomized comparative
More informationEnumerative and Analytic Studies. Description versus prediction
Quality Digest, July 9, 2018 Manuscript 334 Description versus prediction The ultimate purpose for collecting data is to take action. In some cases the action taken will depend upon a description of what
More informationA Bayesian Network Model of Knowledge-Based Authentication
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 A Bayesian Network Model of Knowledge-Based Authentication
More informationEnglish summary Modus Via. Fine-tuning geographical offender profiling.
English summary Modus Via. Fine-tuning geographical offender profiling. When an offender goes out to commit a crime, say a burglary, he needs a target location to commit that crime. The offender will most
More informationIntrospection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks
Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Okan Turkes, Hans Scholten, and Paul Havinga Dept. of Computer Engineering, Pervasive Systems University of
More informationLab 2: Investigating Variation Across Spatial Scales
Lab 2: Investigating Variation Across Spatial Scales What are scales and variation in a biological context? The world around us displays incredible diversity across many scales. Today s lab investigates
More informationFootprint Tracker: Supporting diary studies with lifelogging
Footprint Tracker: Supporting diary studies with lifelogging Rúben Gouveia rubahfgouveia@gmail.com Evangelos Karapanos e.karapanos@gmail.com 1 using diary studies to understand how technology is used in
More informationNew methods for collecting evidence
Objective Monitoring of the Obesogenic Behaviour and the Role of the Local Environment New methods for collecting evidence Anastasios Delopoulos Multimedia Understanding Group Information Processing Laboratory
More informationOutbreak investigation
Outbreak investigation Dr. Marius Masiulis FAO international consultant, State Food and Veterinary Service of Lithuania Regional Workshop on FMD and other TADs Yur'evets, Vladimir, Russian Federation 29/11/2017-30/11/2017
More informationSupplementary Materials for
advances.sciencemag.org/cgi/content/full/3/2/e1602024/dc1 Supplementary Materials for Combining contact tracing with targeted indoor residual spraying significantly reduces dengue transmission Gonzalo
More informationWhat is Science 2009 What is science?
What is science? The question we want to address is seemingly simple, but turns out to be quite difficult to answer: what is science? It is reasonable to ask such a question since this is a book/course
More informationTowards Open Set Deep Networks: Supplemental
Towards Open Set Deep Networks: Supplemental Abhijit Bendale*, Terrance E. Boult University of Colorado at Colorado Springs {abendale,tboult}@vast.uccs.edu In this supplement, we provide we provide additional
More informationContributions to Brain MRI Processing and Analysis
Contributions to Brain MRI Processing and Analysis Dissertation presented to the Department of Computer Science and Artificial Intelligence By María Teresa García Sebastián PhD Advisor: Prof. Manuel Graña
More informationTexting4Health Conference February 29, InSTEDD Proprietary Level I
Texting4Health Conference February 29, 2008 InSTEDD Proprietary Level I that you will help build a global system to detect each new disease or disaster as quickly as it emerges Specificity Urge frequent
More informationLearning from Online Health Communities. Noémie Elhadad
Learning from Online Health Communities Noémie Elhadad noemie@dbmi.columbia.edu Apps/tools for health consumers & patients iphone health apps A (not social) tracking tool xkcd.com Online Health Communities
More informationThe Standard Theory of Conscious Perception
The Standard Theory of Conscious Perception C. D. Jennings Department of Philosophy Boston University Pacific APA 2012 Outline 1 Introduction Motivation Background 2 Setting up the Problem Working Definitions
More informationAn Attentional Framework for 3D Object Discovery
An Attentional Framework for 3D Object Discovery Germán Martín García and Simone Frintrop Cognitive Vision Group Institute of Computer Science III University of Bonn, Germany Saliency Computation Saliency
More information