scholarly journals Toward a Comparison of Classical and New Privacy Mechanism

Entropy ◽  
2021 ◽  
Vol 23 (4) ◽  
pp. 467
Author(s):  
Daniel Heredia-Ductram ◽  
Miguel Nunez-del-Prado ◽  
Hugo Alatrista-Salas

In the last decades, the development of interconnectivity, pervasive systems, citizen sensors, and Big Data technologies allowed us to gather many data from different sources worldwide. This phenomenon has raised privacy concerns around the globe, compelling states to enforce data protection laws. In parallel, privacy-enhancing techniques have emerged to meet regulation requirements allowing companies and researchers to exploit individual data in a privacy-aware way. Thus, data curators need to find the most suitable algorithms to meet a required trade-off between utility and privacy. This crucial task could take a lot of time since there is a lack of benchmarks on privacy techniques. To fill this gap, we compare classical approaches of privacy techniques like Statistical Disclosure Control and Differential Privacy techniques to more recent techniques such as Generative Adversarial Networks and Machine Learning Copies using an entire commercial database in the current effort. The obtained results allow us to show the evolution of privacy techniques and depict new uses of the privacy-aware Machine Learning techniques.

Author(s):  
Ly Vu ◽  
Quang Uy Nguyen

Machine learning-based intrusion detection hasbecome more popular in the research community thanks to itscapability in discovering unknown attacks. To develop a gooddetection model for an intrusion detection system (IDS) usingmachine learning, a great number of attack and normal datasamples are required in the learning process. While normaldata can be relatively easy to collect, attack data is muchrarer and harder to gather. Subsequently, IDS datasets areoften dominated by normal data and machine learning modelstrained on those imbalanced datasets are ineffective in detect-ing attacks. In this paper, we propose a novel solution to thisproblem by using generative adversarial networks to generatesynthesized attack data for IDS. The synthesized attacks aremerged with the original data to form the augmented dataset.Three popular machine learning techniques are trained on theaugmented dataset. The experiments conducted on the threecommon IDS datasets and one our own dataset show thatmachine learning algorithms achieve better performance whentrained on the augmented dataset of the generative adversarialnetworks compared to those trained on the original datasetand other sampling techniques. The visualization techniquewas also used to analyze the properties of the synthesizeddata of the generative adversarial networks and the others.


2020 ◽  
Vol 8 (6) ◽  
pp. 2992-2998

The present conventional sources of energy have been rapidly decreasing. There is an ever-increasing demand of energy which can be fulfilled only by taking into consideration, alternative sources of energy that are also environment friendly. For integrating the renewable energy source such as Solar PV with the grid, several factors must be kept in mind for ensuring the health of the grid. In the past, this task was effectively handled with different computational algorithms such as Ant Colony, Particle Swarm Optimization. But with the advent of Big Data technologies and Machine learning techniques, this task is handled even more effectively. This paper will review different studies in which Artificial Intelligence will be used to make effective decisions regarding the load demand, optimal sizing and positioning of Solar PV energy generating stations.


2021 ◽  
Author(s):  
Amin Heyrani Nobari ◽  
Muhammad Fathy Rashad ◽  
Faez Ahmed

Abstract Modern machine learning techniques, such as deep neural networks, are transforming many disciplines ranging from image recognition to language understanding, by uncovering patterns in big data and making accurate predictions. They have also shown promising results for synthesizing new designs, which is crucial for creating products and enabling innovation. Generative models, including generative adversarial networks (GANs), have proven to be effective for design synthesis with applications ranging from product design to metamaterial design. These automated computational design methods can support human designers, who typically create designs by a time-consuming process of iteratively exploring ideas using experience and heuristics. However, there are still challenges remaining in automatically synthesizing ‘creative’ designs. GAN models, however, are not capable of generating unique designs, a key to innovation and a major gap in AI-based design automation applications. This paper proposes an automated method, named CreativeGAN, for generating novel designs. It does so by identifying components that make a design unique and modifying a GAN model such that it becomes more likely to generate designs with identified unique components. The method combines state-of-art novelty detection, segmentation, novelty localization, rewriting, and generative models for creative design synthesis. Using a dataset of bicycle designs, we demonstrate that the method can create new bicycle designs with unique frames and handles, and generalize rare novelties to a broad set of designs. Our automated method requires no human intervention and demonstrates a way to rethink creative design synthesis and exploration. For details and code used in this paper please refer to http://decode.mit.edu/projects/creativegan/.


Author(s):  
Bryan Jordan

The vastness of chemical-space constrains traditional drug-discovery methods to the organic laws that are guiding the chemistry involved in filtering through candidates. Leveraging computing with machine-learning to intelligently generate compounds that meet a wide range of objectives can bring significant gains in time and effort needed to filter through a broad range of candidates. This paper details how the use of Generative-Adversarial-Networks, novel machine learning techniques to format the training dataset and the use of quantum computing offer new ways to expedite drug-discovery.


2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Rafał Kozik ◽  
Marek Pawlicki ◽  
Michał Choraś

The recent advancements of malevolent techniques have caused a situation where the traditional signature-based approach to cyberattack detection is rendered ineffective. Currently, new, improved, potent solutions incorporating Big Data technologies, effective distributed machine learning, and algorithms countering data imbalance problem are needed. Therefore, the major contribution of this paper is the proposal of the cost-sensitive distributed machine learning approach for cybersecurity. In particular, we proposed to use and implemented cost-sensitive distributed machine learning by means of distributed Extreme Learning Machines (ELM), distributed Random Forest, and Distributed Random Boosted-Trees to detect botnets. The system’s concept and architecture are based on the Big Data processing framework with data mining and machine learning techniques. In practical terms in this paper, as a use case, we consider the problem of botnet detection by means of analysing the data in form of NetFlows. The reported results are promising and show that the proposed system can be considered as a useful tool for the improvement of cybersecurity.


2021 ◽  
Author(s):  
Raj chaganti ◽  
vinayakumar R ◽  
Mamoun Alazab ◽  
Tuan Pham

<div>Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage sophisticated techniques such as signature-based or anomaly-based, machine learning techniques. The well-known file formats Portable Executable (PE) for Windows and Executable and Linkable Format (ELF) for Linux based operating system are used for malware analysis and the malware detection capabilities of these files has been well advanced for real time detection. But the malware payload hiding in multimedia like cover images using steganography detection has been a challenge for enterprises, as these are rarely seen and usually act as a stager in sophisticated attacks. In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and the review of the stegomalware (malware payload hiding in images) targeting enterprises with cyberattacks current status. We present the stegomalware history, generation tools, file format specification description. Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including the Deep Learning opportunities and challenges in stegomalware generation and detection are presented based on our findings.</div>


Author(s):  
Farzaneh Shoeleh ◽  
Mohammad Mehdi Yadollahi ◽  
Masoud Asadpour

Abstract There is an implicit assumption in machine learning techniques that each new task has no relation to the tasks previously learned. Therefore, tasks are often addressed independently. However, in some domains, particularly reinforcement learning (RL), this assumption is often incorrect because tasks in the same or similar domain tend to be related. In other words, even though tasks are quite different in their specifics, they may have general similarities, such as shared skills, making them related. In this paper, a novel domain adaptation-based method using adversarial networks is proposed to do transfer learning in RL problems. Our proposed method incorporates skills previously learned from source task to speed up learning on a new target task by providing generalization not only within a task but also across different, but related tasks. The experimental results indicate the effectiveness of our method in dealing with RL problems.


2021 ◽  
Author(s):  
Raj chaganti ◽  
vinayakumar R ◽  
Mamoun Alazab ◽  
Tuan Pham

<div>Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage sophisticated techniques such as signature-based or anomaly-based, machine learning techniques. The well-known file formats Portable Executable (PE) for Windows and Executable and Linkable Format (ELF) for Linux based operating system are used for malware analysis and the malware detection capabilities of these files has been well advanced for real time detection. But the malware payload hiding in multimedia like cover images using steganography detection has been a challenge for enterprises, as these are rarely seen and usually act as a stager in sophisticated attacks. In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and the review of the stegomalware (malware payload hiding in images) targeting enterprises with cyberattacks current status. We present the stegomalware history, generation tools, file format specification description. Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including the Deep Learning opportunities and challenges in stegomalware generation and detection are presented based on our findings.</div>


2021 ◽  
Author(s):  
Ali Q. Saeed ◽  
Siti Norul Huda Sheikh Abdullah ◽  
Jemaima Che-Hamzah ◽  
Ahmad Tarmizi Abdul Ghani

BACKGROUND Glaucoma means irreversible blindness. Globally, it is the second retinal disease leading to blindness, just preceded by the cataract. Therefore, there is a great need to avoid the silent growth of such disease using the recently developed Generative Adversarial Networks(GANs). OBJECTIVE This paper aims to introduce GAN technology for the diagnosis of eye disorders, particularly glaucoma. This paper illustrates deep adversarial learning as a potential diagnostic tool and the challenges involved in its implementation. This study describes and analyzes many of the pitfalls and problems that researchers will need to overcome in order to implement this kind of technology. METHODS To organize this review comprehensively, we used the keywords: ("Glaucoma", "optic disc", "blood vessels") and ("receptive field", "loss function", "GAN", "Generative Adversarial Network", "Deep learning", "CNN", "convolutional neural network" OR encoder), in different variations to gather all the relevant articles from five highly reputed databases: IEEE Xplore, Web of Science, Scopus, Science Direct, and Pubmed. These libraries broadly cover technical and medical literature. For the latest five years of publications, we only included those within that period. Researchers who used OCT or visual fields in their work were excluded. However, papers that used 2D images were included. A large-scale systematic analysis was performed, then a summary was generated. The study was conducted between March 2020 and November 2020. RESULTS We found 59 articles after a comprehensive survey of the literature. Among 59 articles, 29 present actual attempts to synthesize images and provide accurate segmentation/classification using single/multiple landmarks or share certain experiences. Twenty-nine journal articles discuss recent advances in generative adversarial networks, practical experiments, and analytical studies of retinal disease. CONCLUSIONS Recent deep learning technique, namely generative adversarial network, has shown encouraging retinal disease detection performance. Although this methodology involves an extensive computing budget and optimization process, it saturates the greedy nature of deep learning techniques by synthesizing images and solves major medical issues. There is no existing systematic review paper on retinal disease utilizing generative adversarial networks to the extent of our knowledge. Two paper sets were reported; the first involves surveys on the recent development of GANs or overviews of papers reported in the literature applying machine learning techniques on retinal diseases. While in the second group, researchers have sought to establish and enhance the detection process through generating as real as possible synthetic images with the assistance of GANs. This paper contributes to this research field by offering a thorough analysis of existing works, highlighting current limitations, and suggesting alternatives to support other researchers and participants to improve further and strengthen future work. Finally, the new directions of this research have been identified.


Sign in / Sign up

Export Citation Format

Share Document