56,623 research outputs found
Privacy-Friendly Collaboration for Cyber Threat Mitigation
Sharing of security data across organizational boundaries has often been
advocated as a promising way to enhance cyber threat mitigation. However,
collaborative security faces a number of important challenges, including
privacy, trust, and liability concerns with the potential disclosure of
sensitive data. In this paper, we focus on data sharing for predictive
blacklisting, i.e., forecasting attack sources based on past attack
information. We propose a novel privacy-enhanced data sharing approach in which
organizations estimate collaboration benefits without disclosing their
datasets, organize into coalitions of allied organizations, and securely share
data within these coalitions. We study how different partner selection
strategies affect prediction accuracy by experimenting on a real-world dataset
of 2 billion IP addresses and observe up to a 105% prediction improvement.Comment: This paper has been withdrawn as it has been superseded by
arXiv:1502.0533
Controlled Data Sharing for Collaborative Predictive Blacklisting
Although sharing data across organizations is often advocated as a promising
way to enhance cybersecurity, collaborative initiatives are rarely put into
practice owing to confidentiality, trust, and liability challenges. In this
paper, we investigate whether collaborative threat mitigation can be realized
via a controlled data sharing approach, whereby organizations make informed
decisions as to whether or not, and how much, to share. Using appropriate
cryptographic tools, entities can estimate the benefits of collaboration and
agree on what to share in a privacy-preserving way, without having to disclose
their datasets. We focus on collaborative predictive blacklisting, i.e.,
forecasting attack sources based on one's logs and those contributed by other
organizations. We study the impact of different sharing strategies by
experimenting on a real-world dataset of two billion suspicious IP addresses
collected from Dshield over two months. We find that controlled data sharing
yields up to 105% accuracy improvement on average, while also reducing the
false positive rate.Comment: A preliminary version of this paper appears in DIMVA 2015. This is
the full version. arXiv admin note: substantial text overlap with
arXiv:1403.212
Pseudo-scalar Higgs boson production at NLO+NLL
We consider the production of a pseudo-scalar particle at the LHC, and
present accurate theoretical predictions for its inclusive cross section in
gluon fusion. The prediction is based on combining fixed-order perturbation
theory and all-order threshold resummation. At fixed order we include the exact
next-to-next-to-leading order (NNLO) plus an approximate
next-to-next-to-next-to-leading order (NLO) which is based on the
recent computation at this order for the scalar case. We then add threshold
resummation at next-to-next-to-next-to leading logarithmic accuracy
(NLL). Various forms of threshold resummation are considered,
differing by the treatment of subleading terms, allowing a robust estimate of
the theoretical uncertainties due to missing higher orders. With particular
attention to pseudo-scalar masses of GeV and GeV, we also observe
that perturbative convergence is much improved when resummation is included.
Additionally, results obtained with threshold resummation in direct QCD are
compared with analogous results as computed in soft-collinear effective theory,
which turn out to be in good agreement. We provide precise predictions for
pseudo-scalar inclusive cross section at TeV LHC for a wide range of
masses. The results are available through updated versions of the public codes
ggHiggs and TROLL.Comment: 14 pages, 7 figures, 1 table. Now includes a more precise assessment
of the uncertainty on the approximate N3LO. Final version accepted by EPJ
Who\'s Who in Patents. A Bayesian approach
This paper proposes a bayesian methodology to treat the who’s who problem arising in individual level data sets such as patent data. We assess the usefullness of this methodology on the set of all French inventors appearing on EPO applications from 1978 to 2003.Patents, homonymy, Bayes rule
Competitive Collaboration: Joint Unsupervised Learning of Depth, Camera Motion, Optical Flow and Motion Segmentation
We address the unsupervised learning of several interconnected problems in
low-level vision: single view depth prediction, camera motion estimation,
optical flow, and segmentation of a video into the static scene and moving
regions. Our key insight is that these four fundamental vision problems are
coupled through geometric constraints. Consequently, learning to solve them
together simplifies the problem because the solutions can reinforce each other.
We go beyond previous work by exploiting geometry more explicitly and
segmenting the scene into static and moving regions. To that end, we introduce
Competitive Collaboration, a framework that facilitates the coordinated
training of multiple specialized neural networks to solve complex problems.
Competitive Collaboration works much like expectation-maximization, but with
neural networks that act as both competitors to explain pixels that correspond
to static or moving regions, and as collaborators through a moderator that
assigns pixels to be either static or independently moving. Our novel method
integrates all these problems in a common framework and simultaneously reasons
about the segmentation of the scene into moving objects and the static
background, the camera motion, depth of the static scene structure, and the
optical flow of moving objects. Our model is trained without any supervision
and achieves state-of-the-art performance among joint unsupervised methods on
all sub-problems.Comment: CVPR 201
- …