11 research outputs found
Recommended from our members
Exploring resilient observability in traffic-monitoring sensor networks: A study of spatial-temporal vehicle patterns
Vehicle mobility generates dynamic and complex patterns that are associated with our day-to-day activities in cities. To reveal the spatial–temporal complexity of such patterns, digital techniques, such as traffic-monitoring sensors, provide promising data-driven tools for city managers and urban planners. Although a large number of studies have been dedicated to investigating the sensing power of the traffic-monitoring sensors, there is still a lack of exploration of the resilient performance of sensor networks when multiple sensor failures occur. In this paper, we reveal the dynamic patterns of vehicle mobility in Cambridge, UK, and subsequently, explore the resilience of the sensor networks. The observability is adopted as the overall performance indicator to depict the maximum number of vehicles captured by the deployed sensors in the study area. By aggregating the sensor networks according to weekday and weekend and simulating random sensor failures with different recovery strategies, we found that (1) the day-to-day vehicle mobility pattern in this case study is highly dynamic and decomposed journey durations follow a power-law distribution on the tail section; (2) such temporal variation significantly affects the observability of the sensor network, causing its overall resilience to vary with different recovery strategies. The simulation results further suggest that a corresponding prioritization for recovering the sensors from massive failures is required, rather than a static sequence determined by the first-fail–first-repair principle. For stakeholders and decision-makers, this study provides insightful implications for understanding city-scale vehicle mobility and the resilience of traffic-monitoring sensor networks.This research is supported by the Ove Arup Foundation (Digital Cities for Change) and was conducted at the Centre for Smart Infrastructure and Construction (CSIC) at the University of Cambridge
Robust Bayesian Regression Model of Centrality and Voltage Stability Index for Power Networks under Nodal Attack
This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordElectrical node centrality for the power networks is an essential parameter to identify the critical nodes under attack. Topological analysis is vital for evaluating the network robustness while electrical characteristics have to be considered to make the analysis consistent for realistic power networks. However, the capacity limit of the power network changes under various nodal attacks. It is essential to find the relationship between the loading margin limit of the power network with the node centrality features, so that appropriate measures can be considered to improve the robustness of the power networks. Thus, voltage stability index (VSI) is defined for every node, and its centrality features are modelled. Robust Bayesian regression is used to model the nodes responsible for a change in loading margin and causing grid blackout. The method has been validated on benchmark complex power networks like reduced Great Britain network, IEEE 57-bus and IEEE 118-bus systems
Analysis and Actions on Graph Data.
Graphs are commonly used for representing relations between entities and handling data processing in various research fields, especially in social, cyber and physical networks. Many data mining and inference tasks can be interpreted as certain actions on the associated graphs, including graph spectral decompositions, and insertions and removals of nodes or edges. For instance, the task of graph clustering is to group similar nodes on a graph, and it can be solved by graph spectral decompositions. The task of cyber attack is to find effective node or edge removals that lead to maximal disruption in network connectivity.
In this dissertation, we focus on the following topics in graph data analytics:
(1) Fundamental limits of spectral algorithms for graph clustering in single-layer and multilayer graphs.
(2) Efficient algorithms for actions on graphs, including graph spectral decompositions and insertions and removals of nodes or edges.
(3) Applications to deep community detection, event propagation in online social networks, and topological network resilience for cyber security.
For (1), we established fundamental principles governing the performance of graph clustering for both spectral clustering and spectral modularity methods, which play an important role in unsupervised learning and data science. The framework is then extended to multilayer graphs entailing heterogeneous connectivity information.
For (2), we developed efficient algorithms for large-scale graph data analytics with theoretical guarantees, and proposed theory-driven methods for automatic model order selection in graph clustering.
For (3), we proposed a disruptive method for discovering deep communities in graphs, developed a novel method for analyzing event propagation on Twitter, and devised effective graph-theoretic approaches against explicit and lateral attacks in cyber systems.PHDElectrical & Computer Eng PhDUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/135752/1/pinyu_1.pd
Towards Name Disambiguation: Relational, Streaming, and Privacy-Preserving Text Data
In the real world, our DNA is unique but many people share names. This phenomenon often causes erroneous aggregation of documents of multiple persons who are namesakes of one another. Such mistakes deteriorate the performance of document retrieval, web search, and more seriously, cause improper attribution of credit or blame in digital forensics. To resolve this issue, the name disambiguation task 1 is designed to partition the documents associated with a name reference such that each partition contains documents pertaining to a unique real-life person. Existing algorithms for this task mainly suffer from the following drawbacks. First, the majority of existing solutions substantially rely on feature engineering, such as biographical feature extraction, or construction of auxiliary features from Wikipedia. However, for many scenarios, such features may be costly to obtain or unavailable in privacy sensitive domains. Instead we solve the name disambiguation task in restricted setting by leveraging only the relational data in the form of anonymized graphs. Second, most of the existing works for this task operate in a batch mode, where all records to be disambiguated are initially available to the algorithm. However, more realistic settings require that the name disambiguation task should be performed in an online streaming fashion in order to identify records of new ambiguous entities having no preexisting records. Finally, we investigate the potential disclosure risk of textual features used in name disambiguation and propose several algorithms to tackle the task in a privacy-aware scenario. In summary, in this dissertation, we present a number of novel approaches to address name disambiguation tasks from the above three aspects independently, namely relational, streaming, and privacy preserving textual data