期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Outsourced Privacy-Preserving Anomaly Detection in Time Series of Multi-Party
1
作者 Chunkai Zhang Wei Zuo +2 位作者 Peng Yang Ye Li Xuan Wang 《China Communications》 SCIE CSCD 2022年第2期201-213,共13页
Anomaly detection has practical significance for finding unusual patterns in time series.However,most existing algorithms may lose some important information in time series presentation and have high time complexity.A... Anomaly detection has practical significance for finding unusual patterns in time series.However,most existing algorithms may lose some important information in time series presentation and have high time complexity.Another problem is that privacy-preserving was not taken into account in these algorithms.In this paper,we propose a new data structure named Interval Hash Table(IHTable)to capture more original information of time series and design a fast anomaly detection algorithm based on Interval Hash Table(ADIHT).The key insight of ADIHT is distributions of normal subsequences are always similar while distributions of anomaly subsequences are different and random by contrast.Furthermore,to make our proposed algorithm fit for anomaly detection under multiple participation,we propose a privacy-preserving anomaly detection scheme named OP-ADIHT based on ADIHT and homomorphic encryption.Compared with existing anomaly detection schemes with privacy-preserving,OP-ADIHT needs less communication cost and calculation cost.Security analysis of different circumstances also shows that OP-ADIHT will not leak the privacy information of participants.Extensive experiments results show that ADIHT can outperform most anomaly detection algorithms and perform close to the best results in terms of AUC-ROC,and ADIHT needs the least time. 展开更多
关键词 anomaly detection interval hash table PRIVACY-PRESERVING multiple participants
下载PDF
FUZZY PREFERENCES IN CONFLICTS 被引量:5
2
作者 Mubarak S.AL-MUTAIRI Keith W.HIPEL Mohamed S.KAMEL 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2008年第3期257-276,共20页
A systematic fuzzy approach is developed to model fuzziness and uncertainties in the preferences of decision makers involved in a conflict. This unique fuzzy preference formulation is used within the paradigm of the G... A systematic fuzzy approach is developed to model fuzziness and uncertainties in the preferences of decision makers involved in a conflict. This unique fuzzy preference formulation is used within the paradigm of the Graph Model for Conflict Resolution in which a given dispute is modeled in terms of decision makers, each decision maker's courses of actions or options, and each decision maker's preferences concerning the states or outcomes which could take place. In order to be able to determine the stability of each state for each decision maker and the possible equilibria or resolutions, a range of solution concepts describing potential human behavior under conflict are defined for use with fuzzy preferences. More specifically, strong and weak definitions of stability are provided for the solution concepts called Nash, general metarational, symmetric metarational, and sequential stability. To illustrate how these solution concepts can be conveniently used in practice, they are applied to a dispute over the contamination of an aquifer by a chemical company located in Elmira, Ontario, Canada. 展开更多
关键词 Environmental conflict fuzzy sets Graph Model for Conflict Resolution PREFERENCES multiple participants
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部