首页 > 最新文献

2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)最新文献

英文 中文
A Machine Learning-Based Error Model of Voltage-Scaled Circuits 基于机器学习的电压比例电路误差模型
Dongning Ma, Xun Jiao
Various approximation methods demonstrate the effectiveness of voltage scaling in digital circuits in order to explore the energy-error trade-off. An accurate error model is of critical importance for assessing the error behavior of voltage-scaled circuits and its effects on the application quality. However, existing error models of voltage-scaled circuits overlook the effects of input data and error rate disparity among different bits. To tackle this challenge, we propose a machine learning-based error model of voltage-scaled circuits that can predict the timing error rate for each output bit. We train this model using random forest methods with input features and output labels extracted from gate-level simulation. We evaluate the model accuracy on different circuits. Across all bit positions, voltage levels, and circuits, the model achieves on average a relative error of 1.06%. The model also achieves an average per-voltage Root Mean Square Error (RMSE) of 0.92% and per-bit RMSE of 1.02%. Exposing this error rate even up to the application level, the model can estimate the quality of an image processing application under voltage scaling with an average accuracy of 97.5%.
各种近似方法证明了数字电路中电压缩放的有效性,以探索能量误差权衡。准确的误差模型对于评估电压标度电路的误差特性及其对应用质量的影响至关重要。然而,现有的电压比例电路误差模型忽略了输入数据和不同位之间错误率差异的影响。为了应对这一挑战,我们提出了一种基于机器学习的电压比例电路误差模型,该模型可以预测每个输出位的定时错误率。我们使用随机森林方法训练该模型,并从门级仿真中提取输入特征和输出标签。我们在不同的电路上评估了模型的精度。在所有位位置、电压水平和电路中,该模型的平均相对误差为1.06%。该模型还实现了平均每电压均方根误差(RMSE)为0.92%和每比特RMSE为1.02%。将错误率暴露到应用级别,该模型可以估计电压缩放下图像处理应用的质量,平均精度为97.5%。
{"title":"A Machine Learning-Based Error Model of Voltage-Scaled Circuits","authors":"Dongning Ma, Xun Jiao","doi":"10.1109/dsn-s50200.2020.00046","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00046","url":null,"abstract":"Various approximation methods demonstrate the effectiveness of voltage scaling in digital circuits in order to explore the energy-error trade-off. An accurate error model is of critical importance for assessing the error behavior of voltage-scaled circuits and its effects on the application quality. However, existing error models of voltage-scaled circuits overlook the effects of input data and error rate disparity among different bits. To tackle this challenge, we propose a machine learning-based error model of voltage-scaled circuits that can predict the timing error rate for each output bit. We train this model using random forest methods with input features and output labels extracted from gate-level simulation. We evaluate the model accuracy on different circuits. Across all bit positions, voltage levels, and circuits, the model achieves on average a relative error of 1.06%. The model also achieves an average per-voltage Root Mean Square Error (RMSE) of 0.92% and per-bit RMSE of 1.02%. Exposing this error rate even up to the application level, the model can estimate the quality of an image processing application under voltage scaling with an average accuracy of 97.5%.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122055024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
What Exactly Determines the Type? Inferring Types with Context 到底是什么决定了它的类型?使用上下文推断类型
Ligeng Chen
Closed-source programs lack crucial information vital for code analysis because that information is stripped on compilation to achieve smaller executable size. Variable type information is fundamental in this process. In this paper, we implement a system called CATI (Context-Assisted Type Inference), which locates variables from stripped binaries and infers 19 types from variables. Experiments show that it infers variable type with 71.2% accuracy on unseen binaries.
闭源程序缺乏对代码分析至关重要的关键信息,因为这些信息在编译时被剥离,以实现更小的可执行文件大小。变量类型信息是这个过程的基础。在本文中,我们实现了一个称为CATI(上下文辅助类型推断)的系统,该系统从剥离的二进制文件中定位变量并从变量中推断出19种类型。实验表明,该算法对未见过的二进制数据的变量类型推断准确率为71.2%。
{"title":"What Exactly Determines the Type? Inferring Types with Context","authors":"Ligeng Chen","doi":"10.1109/dsn-s50200.2020.00038","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00038","url":null,"abstract":"Closed-source programs lack crucial information vital for code analysis because that information is stripped on compilation to achieve smaller executable size. Variable type information is fundamental in this process. In this paper, we implement a system called CATI (Context-Assisted Type Inference), which locates variables from stripped binaries and infers 19 types from variables. Experiments show that it infers variable type with 71.2% accuracy on unseen binaries.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Tutorials Chairs 来自教程主席的信息
S. Bagchi, François Taïani
range of from large-scale distributed systems and blockchains, to machine learning and security, cross-layer resilience tutorials delivered world-class a
从大规模分布式系统和区块链,到机器学习和安全,跨层弹性教程提供了世界一流的解决方案
{"title":"Message from the Tutorials Chairs","authors":"S. Bagchi, François Taïani","doi":"10.1109/dsn-s50200.2020.00009","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00009","url":null,"abstract":"range of from large-scale distributed systems and blockchains, to machine learning and security, cross-layer resilience tutorials delivered world-class a","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"62 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Remediations for Hardware Failures in Large-Scale Datacenters 预测大规模数据中心硬件故障的补救措施
Fred Lin, A. Davoli, I. Akbar, Sukumar Kalmanje, Leandro Silva, J. Stamford, Yanai S. Golany, Jim Piazza, S. Sankar
Large-scale service environments rely on autonomous systems for remediating hardware failures efficiently. In production, the autonomous system diagnoses hardware failures based on the rules that the subject matter experts put in the system. This process is increasingly complex given new types of failures and the increasing complexity in the hardware and software configurations. In this paper, we present a machine learning framework that predicts the required remediations for undiagnosed failures, based on the similar repair tickets closed in the past. We explain the methodology in detail for setting up a machine learning model, deploying it in a production environment, and monitoring its performance with the necessary metrics. We also demonstrate the prediction performance on some of the repair actions.
大规模服务环境依赖于自治系统来有效地修复硬件故障。在生产中,自治系统根据主题专家在系统中设置的规则诊断硬件故障。由于新的故障类型和硬件和软件配置的复杂性增加,这个过程变得越来越复杂。在本文中,我们提出了一个机器学习框架,该框架基于过去关闭的类似修理单来预测未诊断故障所需的修复。我们详细解释了建立机器学习模型的方法,将其部署到生产环境中,并使用必要的指标监控其性能。我们还演示了对一些修复动作的预测性能。
{"title":"Predicting Remediations for Hardware Failures in Large-Scale Datacenters","authors":"Fred Lin, A. Davoli, I. Akbar, Sukumar Kalmanje, Leandro Silva, J. Stamford, Yanai S. Golany, Jim Piazza, S. Sankar","doi":"10.1109/dsn-s50200.2020.00016","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00016","url":null,"abstract":"Large-scale service environments rely on autonomous systems for remediating hardware failures efficiently. In production, the autonomous system diagnoses hardware failures based on the rules that the subject matter experts put in the system. This process is increasingly complex given new types of failures and the increasing complexity in the hardware and software configurations. In this paper, we present a machine learning framework that predicts the required remediations for undiagnosed failures, based on the similar repair tickets closed in the past. We explain the methodology in detail for setting up a machine learning model, deploying it in a production environment, and monitoring its performance with the necessary metrics. We also demonstrate the prediction performance on some of the repair actions.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127645040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum - Practical Experience Report and Ongoing PhD Work 地理分布和矿池对区块链的影响:以太坊研究-实践经验报告和正在进行的博士工作
Paulo Silva
Given the large adoption and economical impact of permissionless blockchains, the complexity of the underlying systems and the adversarial environment in which they operate, it is fundamental to properly study and understand the emergent behavior and properties of these systems. We describe our experience on a detailed, one-month study of the Ethereum network from several geographically dispersed observation points. We leverage multiple geographic vantage points to assess the key pillars of Ethereum, namely geographical dispersion, network efficiency, blockchain efficiency and security, and the impact of mining pools. Among other new findings, we identify previously undocumented forms of selfish behavior and show that the prevalence of powerful mining pools exacerbates the geographical impact on block propagation delays. Furthermore, we provide a set of open measurement and processing tools, as well as the data set of the collected measurements, in order to promote further research on understanding permissionless blockchains.
鉴于无许可区块链的广泛采用和经济影响,底层系统的复杂性及其运行的敌对环境,正确研究和理解这些系统的紧急行为和属性是至关重要的。我们从几个地理上分散的观察点对以太坊网络进行了为期一个月的详细研究,描述了我们的经验。我们利用多个地理优势来评估以太坊的关键支柱,即地理分散,网络效率,区块链效率和安全性,以及矿池的影响。在其他新发现中,我们确定了以前未记录的自私行为形式,并表明强大矿池的盛行加剧了对区块传播延迟的地理影响。此外,我们提供了一套开放的测量和处理工具,以及收集到的测量数据集,以促进对理解无权限区块链的进一步研究。
{"title":"Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum - Practical Experience Report and Ongoing PhD Work","authors":"Paulo Silva","doi":"10.1109/dsn-s50200.2020.00039","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00039","url":null,"abstract":"Given the large adoption and economical impact of permissionless blockchains, the complexity of the underlying systems and the adversarial environment in which they operate, it is fundamental to properly study and understand the emergent behavior and properties of these systems. We describe our experience on a detailed, one-month study of the Ethereum network from several geographically dispersed observation points. We leverage multiple geographic vantage points to assess the key pillars of Ethereum, namely geographical dispersion, network efficiency, blockchain efficiency and security, and the impact of mining pools. Among other new findings, we identify previously undocumented forms of selfish behavior and show that the prevalence of powerful mining pools exacerbates the geographical impact on block propagation delays. Furthermore, we provide a set of open measurement and processing tools, as well as the data set of the collected measurements, in order to promote further research on understanding permissionless blockchains.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127665490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance-Aware Wi-Fi Problem Diagnosis and Mitigation through Peer-to-Peer Data Sharing 通过点对点数据共享进行性能感知Wi-Fi问题诊断和缓解
Nathan D. Mickulicz, P. Narasimhan
Large-scale, high-density Wi-Fi networks use hundreds of access points to serve thousands of closely-packed users within a large physical space, such as within a stadium or arena. It is difficult to predict when and where problems will occur in these Wi-Fi networks, due to the constant movement of mobile devices within the network and the constantly-changing workload as users switch between applications. In this paper, we describe a unique approach to detecting, diagnosing, and mitigating problems in Wi-Fi networks using Wi-Fi performance data collected from mobile devices and shared between nearby peers. Our approach draws upon 3 years of production performance data that we have collected from 35 production mobile applications used in 25 professional and collegiate sports venues in the US. We also present an evaluation of the effectiveness of our diagnostic and mitigation approach in a real-world high-density Wi-Fi environment, showing that our approach outperforms standard driver-based problem detection and mitigation on several common Wi-Fi faults.
大规模高密度Wi-Fi网络使用数百个接入点为大型物理空间(如体育场或竞技场)内的数千名紧密排列的用户提供服务。由于网络中移动设备的不断移动以及用户在应用程序之间切换时工作负载的不断变化,很难预测这些Wi-Fi网络何时何地会出现问题。在本文中,我们描述了一种独特的方法来检测、诊断和减轻Wi-Fi网络中的问题,该方法使用从移动设备收集的Wi-Fi性能数据,并在附近的对等体之间共享。我们的方法借鉴了3年的生产性能数据,这些数据是从美国25个专业和大学体育场馆使用的35个生产移动应用程序中收集的。我们还在真实的高密度Wi-Fi环境中对我们的诊断和缓解方法的有效性进行了评估,表明我们的方法在几种常见Wi-Fi故障上优于基于驱动程序的标准问题检测和缓解方法。
{"title":"Performance-Aware Wi-Fi Problem Diagnosis and Mitigation through Peer-to-Peer Data Sharing","authors":"Nathan D. Mickulicz, P. Narasimhan","doi":"10.1109/DSN-S50200.2020.00020","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00020","url":null,"abstract":"Large-scale, high-density Wi-Fi networks use hundreds of access points to serve thousands of closely-packed users within a large physical space, such as within a stadium or arena. It is difficult to predict when and where problems will occur in these Wi-Fi networks, due to the constant movement of mobile devices within the network and the constantly-changing workload as users switch between applications. In this paper, we describe a unique approach to detecting, diagnosing, and mitigating problems in Wi-Fi networks using Wi-Fi performance data collected from mobile devices and shared between nearby peers. Our approach draws upon 3 years of production performance data that we have collected from 35 production mobile applications used in 25 professional and collegiate sports venues in the US. We also present an evaluation of the effectiveness of our diagnostic and mitigation approach in a real-world high-density Wi-Fi environment, showing that our approach outperforms standard driver-based problem detection and mitigation on several common Wi-Fi faults.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128989648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robustness Inside Out Testing 健壮性测试
Deborah S. Katz, Milda Zizyte, Casidhe Hutchison, David Guttendorf, Patrick E. Lanigan, Eric Sample, P. Koopman, Michael D. Wagner, Claire Le Goues
Robustness testing is an important technique to reveal defects and vulnerabilities in software, especially software for Unmanned Autonomous Systems (UAS). We present Robustness Inside Out Testing (RIOT) as a technique directed at finding failures in autonomy systems that are able to be activated from external interfaces. The technique consists of four main steps: unit-level robustness testing, generalization, permeability analysis, and activation. Each of these steps yields a valuable deliverable in the testing process, and, when applied in succession, expands a unit-level bug to an external interface. RIOT has the following advantages over traditional robustness testing: it finds faults faster, it can find faults missed by traditional approaches, it identifies faults that can be triggered from inputs at an external interface, and it produces useful artifacts to aid in fault diagnosis and repair. In this paper, we outline each step of the RIOT process and provide an example of RIOT finding a bug on a real system that would not have been discovered using existing techniques.
鲁棒性测试是发现软件缺陷和漏洞的一项重要技术,尤其是无人自主系统(UAS)软件。我们提出健壮性内外测试(RIOT)作为一种技术,旨在发现能够从外部接口激活的自治系统中的故障。该技术包括四个主要步骤:单元级鲁棒性测试、泛化、渗透率分析和激活。这些步骤中的每一个都在测试过程中产生有价值的可交付成果,并且,当连续应用时,将单元级错误扩展到外部接口。与传统的健壮性测试相比,RIOT具有以下优点:它可以更快地发现故障,它可以发现传统方法遗漏的故障,它可以识别可以从外部接口输入触发的故障,并且它产生有用的工件来帮助故障诊断和修复。在本文中,我们概述了RIOT过程的每个步骤,并提供了一个RIOT在使用现有技术无法发现的真实系统上发现bug的示例。
{"title":"Robustness Inside Out Testing","authors":"Deborah S. Katz, Milda Zizyte, Casidhe Hutchison, David Guttendorf, Patrick E. Lanigan, Eric Sample, P. Koopman, Michael D. Wagner, Claire Le Goues","doi":"10.1109/DSN-S50200.2020.00013","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00013","url":null,"abstract":"Robustness testing is an important technique to reveal defects and vulnerabilities in software, especially software for Unmanned Autonomous Systems (UAS). We present Robustness Inside Out Testing (RIOT) as a technique directed at finding failures in autonomy systems that are able to be activated from external interfaces. The technique consists of four main steps: unit-level robustness testing, generalization, permeability analysis, and activation. Each of these steps yields a valuable deliverable in the testing process, and, when applied in succession, expands a unit-level bug to an external interface. RIOT has the following advantages over traditional robustness testing: it finds faults faster, it can find faults missed by traditional approaches, it identifies faults that can be triggered from inputs at an external interface, and it produces useful artifacts to aid in fault diagnosis and repair. In this paper, we outline each step of the RIOT process and provide an example of RIOT finding a bug on a real system that would not have been discovered using existing techniques.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130111023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reliability Analysis of Edge Scenarios Using Pedestrian Mobility 基于行人移动性的边缘场景可靠性分析
Kshitiz Goel, Abhishek Bhaumick, D. Kaushal, S. Bagchi
Edge computing is actively being adopted by various organizations and applications owing to its bandwidth saving and faster response times. However, this is accompanied by its own set of reliability issues and serves as an excellent target for optimizations and analysis. Our work analyzes the effect of mobile clients on task failure rates and proposes a low overhead location and network congestion aware optimization. In this paper, we discuss our motivations, provide details about the dataset, present some statistical analysis, and propose an improved mobile-side edge selection policy.
边缘计算因其节省带宽和更快的响应时间而被各种组织和应用程序积极采用。然而,这也伴随着其自身的可靠性问题,并可作为优化和分析的绝佳目标。我们的工作分析了移动客户端对任务失败率的影响,并提出了低开销的位置和网络拥塞感知优化。在本文中,我们讨论了我们的动机,提供了数据集的细节,提出了一些统计分析,并提出了一个改进的移动端边缘选择策略。
{"title":"Reliability Analysis of Edge Scenarios Using Pedestrian Mobility","authors":"Kshitiz Goel, Abhishek Bhaumick, D. Kaushal, S. Bagchi","doi":"10.1109/dsn-s50200.2020.00033","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00033","url":null,"abstract":"Edge computing is actively being adopted by various organizations and applications owing to its bandwidth saving and faster response times. However, this is accompanied by its own set of reliability issues and serves as an excellent target for optimizations and analysis. Our work analyzes the effect of mobile clients on task failure rates and proposes a low overhead location and network congestion aware optimization. In this paper, we discuss our motivations, provide details about the dataset, present some statistical analysis, and propose an improved mobile-side edge selection policy.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neuraltran: Optimal Data Transformation for Privacy-Preserving Machine Learning by Leveraging Neural Networks Neuraltran:利用神经网络进行隐私保护机器学习的最佳数据转换
Changchang Liu, Wei-Han Lee, S. Calo
In this work, we develop a new data transformation technique to mediate privacy-preserving access to data while achieving machine learning (ML) tasks. Specifically, we first leverage mutual information in information theory to quantify the utility-providing information (corresponding to any ML task) and the privacy information (could be arbitrary information specified by the users). We further convert the optimization of utility-privacy tradeoff into training a novel neural network (named as NeuralTran) which consists of three modules: transformation module, utility module and privacy module. NeuralTran can be leveraged to automatically transform the input data to ensure that only utility-providing information is kept while the private information is removed. Through extensive experiments on real world datasets, we show the effectiveness of NeuralTran in balancing utility and privacy as well as its advantages over previous approaches.
在这项工作中,我们开发了一种新的数据转换技术,在实现机器学习(ML)任务的同时,调解对数据的隐私保护访问。具体来说,我们首先利用信息论中的互信息来量化效用——提供信息(对应于任何ML任务)和隐私信息(可以是用户指定的任意信息)。我们进一步将效用-隐私权衡的优化转化为训练一个新的神经网络(命名为NeuralTran),该网络由三个模块组成:转换模块、效用模块和隐私模块。可以利用NeuralTran自动转换输入数据,以确保在删除私有信息时只保留实用程序提供的信息。通过对真实世界数据集的大量实验,我们展示了NeuralTran在平衡效用和隐私方面的有效性,以及它相对于以前方法的优势。
{"title":"Neuraltran: Optimal Data Transformation for Privacy-Preserving Machine Learning by Leveraging Neural Networks","authors":"Changchang Liu, Wei-Han Lee, S. Calo","doi":"10.1109/DSN-S50200.2020.00018","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00018","url":null,"abstract":"In this work, we develop a new data transformation technique to mediate privacy-preserving access to data while achieving machine learning (ML) tasks. Specifically, we first leverage mutual information in information theory to quantify the utility-providing information (corresponding to any ML task) and the privacy information (could be arbitrary information specified by the users). We further convert the optimization of utility-privacy tradeoff into training a novel neural network (named as NeuralTran) which consists of three modules: transformation module, utility module and privacy module. NeuralTran can be leveraged to automatically transform the input data to ensure that only utility-providing information is kept while the private information is removed. Through extensive experiments on real world datasets, we show the effectiveness of NeuralTran in balancing utility and privacy as well as its advantages over previous approaches.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133253519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT 故障树分析:用MaxSAT识别最大概率最小割集
Martín Barrère, C. Hankin
In this paper, we present a novel MaxSAT-based technique to compute Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We model the MPMCS problem as a Weighted Partial MaxSAT problem and solve it using a parallel SAT-solving architecture. The results obtained with our open source tool indicate that the approach is effective and efficient.
本文提出了一种基于maxsat的故障树最大概率最小割集(mpmcs)计算方法。我们将MPMCS问题建模为加权偏MaxSAT问题,并使用并行sat求解架构来求解。使用我们的开源工具获得的结果表明,该方法是有效和高效的。
{"title":"Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT","authors":"Martín Barrère, C. Hankin","doi":"10.1109/dsn-s50200.2020.00029","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00029","url":null,"abstract":"In this paper, we present a novel MaxSAT-based technique to compute Maximum Probability Minimal Cut Sets (MPMCSs) in fault trees. We model the MPMCS problem as a Weighted Partial MaxSAT problem and solve it using a parallel SAT-solving architecture. The results obtained with our open source tool indicate that the approach is effective and efficient.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1