More and more portable intelligent devices are connected to the Internet in recent years. A way to effectively use the isolated cyber data without involving privacy and realize the cyber intrusion anomaly detection on...
详细信息
ISBN:
(纸本)9798350395716;9798350395709
More and more portable intelligent devices are connected to the Internet in recent years. A way to effectively use the isolated cyber data without involving privacy and realize the cyber intrusion anomaly detection on the portable intelligent devices with relatively limited hardware storage resources and computing power is worth exploring. In this paper, we propose a framework of federated anomaly detection, which enables the device effectively detect the anomaly by sharing the parameters of the federated model in a fully distributed fashion. We formulate the model training problem as a distributed robust optimization problem and subsequently devise an efficient algorithm for it. Experimental studies have also been carried out to reveal the superior performance of the proposed framework and underscore the significant benefits of federated anomaly detection.
Rapid technological advancement has revolutionized the acquisition, processing, and storage of personal data, with notable data breaches from significant corporations emphasizing the value of data and the need for enh...
详细信息
ISBN:
(纸本)9798350361261;9798350361278
Rapid technological advancement has revolutionized the acquisition, processing, and storage of personal data, with notable data breaches from significant corporations emphasizing the value of data and the need for enhanced privacy protection. This has led to a global focus on individual privacy by enacting privacy-centric laws. The healthcare sector, known for its data sensitivity, presents distinct challenges necessitating stringent privacy protocols. The healthcare sector, known for its data sensitivity, presents distinct challenges necessitating stringent privacy protocols. Thus, there is a critical need for robust data privacy measures, including (pseudo)anonymization, to address this shift. This paper introduces a tailored multilevel (pseudo)anonymization architecture designed for healthcare data, capable of ensuring secure data handling and precise anonymization across various sources, even in a (pseudo)anonymized state. The proposed architecture was developed as a proof of concept and underwent thorough evaluation through a series of experiments. The outcomes are encouraging by showcasing effectiveness in achieving accurate anonymization, secure data and supporting re-identification when essential for individual security.
This study aims to develop an AI prediction system for watersheds, utilizing data from Sri Lanka and Vietnam in collaboration with overseas researchers. Initially, a foundational AI prediction system will be construct...
详细信息
The concept of a learning healthcare system (LHS) envisions a self-improving network where multimodal data from patient care are continuously analyzed to enhance future healthcare outcomes. However, realizing this vis...
详细信息
The Industrial Internet of Things(IIoT) plays a vital role as a fundamental technology supporting intelligent manufacturing. Existing IIoT platform adopts cloud-edge design, the centralized cloud stores a large amount...
详细信息
ISBN:
(纸本)9798350309461
The Industrial Internet of Things(IIoT) plays a vital role as a fundamental technology supporting intelligent manufacturing. Existing IIoT platform adopts cloud-edge design, the centralized cloud stores a large amount of sensitive data, which is vulnerable to attack and faces the risk of single point of failure. As a distributed system, blockchain enables secure and robust IIoT systems. Therefore, this paper builds a blockchain-based IIoT platform to store the data in IIoT into the blockchain and ensure security through a decentralized and distributed consensus mechanism. However, the existing blockchain platforms have low throughput and cannot meet the demand of high concurrent data processing. To solve this problem, this paper designs a dual data compression optimization scheme, which can effectively reduce the size of the transaction and improve the transaction processing speed. This scheme provides an effective solution for promoting the deep application of blockchain and IIoT.
In the context of the current big data era, while high-quality big data models continue to evolve and update, the source of data training has long remained in its original state. Many enterprises commonly adopt real-w...
详细信息
ISBN:
(纸本)9798350375084;9798350375077
In the context of the current big data era, while high-quality big data models continue to evolve and update, the source of data training has long remained in its original state. Many enterprises commonly adopt real-world data as the basis for training, with the main acquisition methods relying on manual or machine annotation. This singular approach possesses significant limitations. Firstly, the data production cycle is long, as the generation of training data requires time accumulation. Secondly, data privacy is difficult to overcome, as training data often contains sensitive information, whose usage is strictly restricted. Lastly, the data screening process consumes significant human and material resources. To address these challenges, this paper delves into the potential feasibility of generating data through code, aiming to provide a novel dataacquisition strategy that overcomes the limitations of traditional methods and enhances the efficiency and effectiveness of big data model training.
In the context of contemporary digitalization, the remote oversight and management of substation apparatus via programmable logic controllers (PLCs) and supervisory control and dataacquisition (SCADA) systems has tra...
详细信息
The field of data Science is experiencing rapid growth and presents numerous opportunities and applications. However, a significant gender disparity remains in female's representation within the field, particularl...
详细信息
Collecting consistent human demonstrations has been a problematic issue in the field of a learning from demonstration. This paper presents a twin dual-arm robot testbed to collect human demonstration data while perfor...
详细信息
The objective of detecting and counting people using the CCTV camera on the footpath is to facilitate and reduce the time required to count the number of people traveling in pedestrian areas without having to actually...
详细信息
暂无评论