56,623 research outputs found

    Estimating similarity among collaboration contributions

    Full text link

    Privacy-Friendly Collaboration for Cyber Threat Mitigation

    Full text link
    Sharing of security data across organizational boundaries has often been advocated as a promising way to enhance cyber threat mitigation. However, collaborative security faces a number of important challenges, including privacy, trust, and liability concerns with the potential disclosure of sensitive data. In this paper, we focus on data sharing for predictive blacklisting, i.e., forecasting attack sources based on past attack information. We propose a novel privacy-enhanced data sharing approach in which organizations estimate collaboration benefits without disclosing their datasets, organize into coalitions of allied organizations, and securely share data within these coalitions. We study how different partner selection strategies affect prediction accuracy by experimenting on a real-world dataset of 2 billion IP addresses and observe up to a 105% prediction improvement.Comment: This paper has been withdrawn as it has been superseded by arXiv:1502.0533

    Controlled Data Sharing for Collaborative Predictive Blacklisting

    Get PDF
    Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges. In this paper, we investigate whether collaborative threat mitigation can be realized via a controlled data sharing approach, whereby organizations make informed decisions as to whether or not, and how much, to share. Using appropriate cryptographic tools, entities can estimate the benefits of collaboration and agree on what to share in a privacy-preserving way, without having to disclose their datasets. We focus on collaborative predictive blacklisting, i.e., forecasting attack sources based on one's logs and those contributed by other organizations. We study the impact of different sharing strategies by experimenting on a real-world dataset of two billion suspicious IP addresses collected from Dshield over two months. We find that controlled data sharing yields up to 105% accuracy improvement on average, while also reducing the false positive rate.Comment: A preliminary version of this paper appears in DIMVA 2015. This is the full version. arXiv admin note: substantial text overlap with arXiv:1403.212

    Pseudo-scalar Higgs boson production at N3^3LOA_{\text{A}}+N3^3LL′^\prime

    Get PDF
    We consider the production of a pseudo-scalar particle AA at the LHC, and present accurate theoretical predictions for its inclusive cross section in gluon fusion. The prediction is based on combining fixed-order perturbation theory and all-order threshold resummation. At fixed order we include the exact next-to-next-to-leading order (NNLO) plus an approximate next-to-next-to-next-to-leading order (N3^3LOA_{\rm A}) which is based on the recent computation at this order for the scalar case. We then add threshold resummation at next-to-next-to-next-to leading logarithmic accuracy (N3^3LL′^\prime). Various forms of threshold resummation are considered, differing by the treatment of subleading terms, allowing a robust estimate of the theoretical uncertainties due to missing higher orders. With particular attention to pseudo-scalar masses of 200200 GeV and 750750 GeV, we also observe that perturbative convergence is much improved when resummation is included. Additionally, results obtained with threshold resummation in direct QCD are compared with analogous results as computed in soft-collinear effective theory, which turn out to be in good agreement. We provide precise predictions for pseudo-scalar inclusive cross section at 1313 TeV LHC for a wide range of masses. The results are available through updated versions of the public codes ggHiggs and TROLL.Comment: 14 pages, 7 figures, 1 table. Now includes a more precise assessment of the uncertainty on the approximate N3LO. Final version accepted by EPJ

    Who\'s Who in Patents. A Bayesian approach

    Get PDF
    This paper proposes a bayesian methodology to treat the who’s who problem arising in individual level data sets such as patent data. We assess the usefullness of this methodology on the set of all French inventors appearing on EPO applications from 1978 to 2003.Patents, homonymy, Bayes rule

    Competitive Collaboration: Joint Unsupervised Learning of Depth, Camera Motion, Optical Flow and Motion Segmentation

    Full text link
    We address the unsupervised learning of several interconnected problems in low-level vision: single view depth prediction, camera motion estimation, optical flow, and segmentation of a video into the static scene and moving regions. Our key insight is that these four fundamental vision problems are coupled through geometric constraints. Consequently, learning to solve them together simplifies the problem because the solutions can reinforce each other. We go beyond previous work by exploiting geometry more explicitly and segmenting the scene into static and moving regions. To that end, we introduce Competitive Collaboration, a framework that facilitates the coordinated training of multiple specialized neural networks to solve complex problems. Competitive Collaboration works much like expectation-maximization, but with neural networks that act as both competitors to explain pixels that correspond to static or moving regions, and as collaborators through a moderator that assigns pixels to be either static or independently moving. Our novel method integrates all these problems in a common framework and simultaneously reasons about the segmentation of the scene into moving objects and the static background, the camera motion, depth of the static scene structure, and the optical flow of moving objects. Our model is trained without any supervision and achieves state-of-the-art performance among joint unsupervised methods on all sub-problems.Comment: CVPR 201
    • …
    corecore