15,659 research outputs found

    Adversarial Removal of Demographic Attributes from Text Data

    Full text link
    Recent advances in Representation Learning and Adversarial Training seem to succeed in removing unwanted features from the learned representation. We show that demographic information of authors is encoded in -- and can be recovered from -- the intermediate representations learned by text-based neural classifiers. The implication is that decisions of classifiers trained on textual data are not agnostic to -- and likely condition on -- demographic attributes. When attempting to remove such demographic information using adversarial training, we find that while the adversarial component achieves chance-level development-set accuracy during training, a post-hoc classifier, trained on the encoded sentences from the first part, still manages to reach substantially higher classification accuracies on the same data. This behavior is consistent across several tasks, demographic properties and datasets. We explore several techniques to improve the effectiveness of the adversarial component. Our main conclusion is a cautionary one: do not rely on the adversarial training to achieve invariant representation to sensitive features

    A Broad Evaluation of the Tor English Content Ecosystem

    Full text link
    Tor is among most well-known dark net in the world. It has noble uses, including as a platform for free speech and information dissemination under the guise of true anonymity, but may be culturally better known as a conduit for criminal activity and as a platform to market illicit goods and data. Past studies on the content of Tor support this notion, but were carried out by targeting popular domains likely to contain illicit content. A survey of past studies may thus not yield a complete evaluation of the content and use of Tor. This work addresses this gap by presenting a broad evaluation of the content of the English Tor ecosystem. We perform a comprehensive crawl of the Tor dark web and, through topic and network analysis, characterize the types of information and services hosted across a broad swath of Tor domains and their hyperlink relational structure. We recover nine domain types defined by the information or service they host and, among other findings, unveil how some types of domains intentionally silo themselves from the rest of Tor. We also present measurements that (regrettably) suggest how marketplaces of illegal drugs and services do emerge as the dominant type of Tor domain. Our study is the product of crawling over 1 million pages from 20,000 Tor seed addresses, yielding a collection of over 150,000 Tor pages. We make a dataset of the intend to make the domain structure publicly available as a dataset at https://github.com/wsu-wacs/TorEnglishContent.Comment: 11 page

    Airtightness of buildings — towards higher performance: Final Report — Domestic Sector Airtightness

    Get PDF
    This report constitutes milestone D11 — Final Report — Domestic Sector Airtightness of the Communities and Local Government/ODPM Project reference CI 61/6/16 (BD2429) Airtightness of Buildings — Towards Higher Performance (Borland and Bell, 2003). This report presents the overall conclusions and key messages obtained from the project through design assessments, construction observations, discussions with developers and pressurisation test results. It also summarises discussion on the airtight performance of current UK housing, the implementation and impact of current and future legislation, and identifies potential areas for future work

    Risks and remedies in e-learning system

    Full text link
    One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher Education. Undoubtedly, the three main entities of E-Learning system can be considered as Student, Teacher & Controlling Authority and there will be different level, but a good E-Learning system needs total integrity among all entities in every level. Apart from integrity enforcement, security enforcement in the whole system is the other crucial way to organize the it. As internet is the backbone of the entire system which is inherently insecure, during transaction of message in E-Learning system, hackers attack by utilising different loopholes of technology. So different security measures are required to be imposed on the system. In this paper, emphasis is given on different risks called e-risks and their remedies called e-remedies to build trust in the minds of all participants of E-Learning system

    Evaluating the impact of an enhanced energy performance standard on load-bearing masonry domestic construction: Understanding the gap between designed and real performance: lessons from Stamford Brook.

    Get PDF
    This report is aimed at those with interests in the procurement, design and construction of new dwellings both now and in the coming years as the Government’s increasingly stringent targets for low and zero carbon housing approach. It conveys the results of a research project, carried out between 2001 and 2008, that was designed to evaluate the extent to which low carbon housing standards can be achieved in the context of a large commercial housing development. The research was led by Leeds Metropolitan University in collaboration with University College London and was based on the Stamford Brook development in Altrincham, Cheshire. The project partners were the National Trust, Redrow and Taylor Wimpey and some 60 percent of the planned 700 dwelling development has been completed up to June 2008. As the UK house building industry and its suppliers grapple with the challenges of achieving zero carbon housing by 2016, the lessons arising from this project are timely and of considerable value. Stamford Brook has demonstrated that designing masonry dwellings to achieve an enhanced energy standard is feasible and that a number of innovative approaches, particularly in the area of airtightness, can be successful. The dwellings, as built, exceed the Building Regulations requirements in force at the time but tests on the completed dwellings and longer term monitoring of performance has shown that, overall, energy consumption and carbon emissions, under standard occupancy, are around 20 to 25 percent higher than design predictions. In the case of heat loss, the discrepancy can be much higher. The report contains much evidence of considerable potential but points out that realising the design potential requires a fundamental reappraisal of processes within the industry from design and construction to the relationship with its supply chain and the development of the workforce. The researchers conclude that, even when builders try hard, current mainstream technical and organisational practices together with industry cultures present barriers to consistent delivery of low and zero carbon performance. They suggest that the underlying reasons for this are deeply embedded at all levels of the house building industry. They point out also that without fundamental change in processes and cultures, technological innovations, whether they be based on traditional construction or modern methods are unlikely to reach their full potential. The report sets out a series of wide ranging implications for new housing in the UK, which are given in Chapter 14 and concludes by firmly declaring that cooperation between government, developers, supply chains, educators and researchers will be crucial to improvement. The recommendations in this report are already being put into practice by the researchers at Leeds Metropolitan University and University College London in their teaching and in further research projects. The implications of the work have been discussed across the industry at a series of workshops undertaken in 2008 as part of the LowCarb4Real project (see http://www.leedsmet.ac.uk/as/cebe/projects/lowcarb4real/index.htm). In addition, the learning is having an impact on the work of the developers (Redrow and Taylor Wimpey) who, with remarkable foresight and enthusiasm, hosted the project. This report seeks to make the findings more widely available and is offered for consideration by everyone who has a part to play in making low and zero carbon housing a reality

    Routes for breaching and protecting genetic privacy

    Full text link
    We are entering the era of ubiquitous genetic information for research, clinical care, and personal curiosity. Sharing these datasets is vital for rapid progress in understanding the genetic basis of human diseases. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.Comment: Draft for comment

    Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

    Get PDF
    In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild. In particular, we focus on four popular obfuscation approaches: identifier renaming, string encryption, Java reflection, and packing. To obtain the meaningful statistical results, we designed efficient and lightweight detection models for each obfuscation technique and applied them to our massive APK datasets (collected from Google Play, multiple third-party markets, and malware databases). We have learned several interesting facts from the result. For example, malware authors use string encryption more frequently, and more apps on third-party markets than Google Play are packed. We are also interested in the explanation of each finding. Therefore we carry out in-depth code analysis on some Android apps after sampling. We believe our study will help developers select the most suitable obfuscation approach, and in the meantime help researchers improve code analysis systems in the right direction

    To develop an efficient variable speed compressor motor system

    Get PDF
    This research presents a proposed new method of improving the energy efficiency of a Variable Speed Drive (VSD) for induction motors. The principles of VSD are reviewed with emphasis on the efficiency and power losses associated with the operation of the variable speed compressor motor drive, particularly at low speed operation.The efficiency of induction motor when operated at rated speed and load torque is high. However at low load operation, application of the induction motor at rated flux will cause the iron losses to increase excessively, hence its efficiency will reduce dramatically. To improve this efficiency, it is essential to obtain the flux level that minimizes the total motor losses. This technique is known as an efficiency or energy optimization control method. In practice, typical of the compressor load does not require high dynamic response, therefore improvement of the efficiency optimization control that is proposed in this research is based on scalar control model.In this research, development of a new neural network controller for efficiency optimization control is proposed. The controller is designed to generate both voltage and frequency reference signals imultaneously. To achieve a robust controller from variation of motor parameters, a real-time or on-line learning algorithm based on a second order optimization Levenberg-Marquardt is employed. The simulation of the proposed controller for variable speed compressor is presented. The results obtained clearly show that the efficiency at low speed is significant increased. Besides that the speed of the motor can be maintained. Furthermore, the controller is also robust to the motor parameters variation. The simulation results are also verified by experiment
    • …
    corecore