2,046 research outputs found

    Analysis of label noise in graph-based semi-supervised learning

    Full text link
    In machine learning, one must acquire labels to help supervise a model that will be able to generalize to unseen data. However, the labeling process can be tedious, long, costly, and error-prone. It is often the case that most of our data is unlabeled. Semi-supervised learning (SSL) alleviates that by making strong assumptions about the relation between the labels and the input data distribution. This paradigm has been successful in practice, but most SSL algorithms end up fully trusting the few available labels. In real life, both humans and automated systems are prone to mistakes; it is essential that our algorithms are able to work with labels that are both few and also unreliable. Our work aims to perform an extensive empirical evaluation of existing graph-based semi-supervised algorithms, like Gaussian Fields and Harmonic Functions, Local and Global Consistency, Laplacian Eigenmaps, Graph Transduction Through Alternating Minimization. To do that, we compare the accuracy of classifiers while varying the amount of labeled data and label noise for many different samples. Our results show that, if the dataset is consistent with SSL assumptions, we are able to detect the noisiest instances, although this gets harder when the number of available labels decreases. Also, the Laplacian Eigenmaps algorithm performed better than label propagation when the data came from high-dimensional clusters

    Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps

    Get PDF
    This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps. We perform static and dynamic analysis on 100 apps, downloaded at least 10M times, that request full network access. Our experiments show that, although prior work has drawn a lot of attention to SSL implementations on mobile platforms, several popular apps (32/100) accept all certificates and all hostnames, and four actually transmit sensitive data unencrypted. We set up an experimental testbed simulating man-in-the-middle attacks and find that many apps (up to 91% when the adversary has a certificate installed on the victim's device) are vulnerable, allowing the attacker to access sensitive information, including credentials, files, personal details, and credit card numbers. Finally, we provide a few recommendations to app developers and highlight several open research problems.Comment: A preliminary version of this paper appears in the Proceedings of ACM WiSec 2015. This is the full versio

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Information Security Synthesis in Online Universities

    Full text link
    Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure. To achieve information assurance the management of user privileges affected by events in the user's identity lifecycle needs to be the determining factor for access control. While the implementation of identity and access management systems makes this initiative feasible, it is the construction and maintenance of the infrastructure that makes it complex and challenging. The objective of this paper1 is to describe the complexities, propose a practical approach to building a foundation for consistent user experience and realizing security synthesis in online universities.Comment: 20 page

    Understanding performance measurement from a social systems perspective

    Get PDF
    This thesis was previously held under moratorium from 3 December 2019 to 3 December 2021.Performance measurement (PM) systems fail to predict organisational outcomes reliably because organisations face futures so inherently unknowable that it is impossible to comprehend the full range of potential outcomes open to them. Organisations are complex, adaptive, social systems whose distinctive activity is decision-making. They are heterogeneous entities whose capabilities, behaviours, and circumstances are unique, emerging from their histories and previous decisions. Organisational reality is a social construct delivered through practice. This thesis investigates whether considering PM from a social systems perspective improves PM’s effectiveness. The argument made is organisations connect through social systems and operate through practice with people, processes, and their interactions fundamental to how they perform. A middle-range management theory is presented aimed at making organisations the best they can be with the resources available to them and in the economic circumstances they find themselves. It does this by understanding and reconfiguring the organisation’s social system using a structured approach to optimise business processes and performance measures based on a combination of emergent behaviour and practice. Given the reality of radical uncertainty the focus is not on predicting outcomes but on uncovering the explanatory mechanisms behind events caused by specific managed improvement interventions. Understanding the behaviour of dynamically interacting components is done using realist evaluation based on social interactions, emergent powers and social intervention mechanisms. This approach changed behaviours and performance outcomes in case study organisations. The use of an ‘inside-out’ social systems perspective, coupled to critical realism with its focus on explanation, enabled the causal relationships of importance to be identified and the performance ‘black box’ to be opened up. This research contributes to closing the PMM theory-practice gap by proposing the performance focus needs to be on the social system rather than the measures, that is, on the ‘means’ rather than the ‘ends’. It also offers a competing theoretical framework to organisational control theory for PMM, one grounded in social systems and practice theory. The social systems perspective is not considered specific to PM and potentially can be applied to all other business processesPerformance measurement (PM) systems fail to predict organisational outcomes reliably because organisations face futures so inherently unknowable that it is impossible to comprehend the full range of potential outcomes open to them. Organisations are complex, adaptive, social systems whose distinctive activity is decision-making. They are heterogeneous entities whose capabilities, behaviours, and circumstances are unique, emerging from their histories and previous decisions. Organisational reality is a social construct delivered through practice. This thesis investigates whether considering PM from a social systems perspective improves PM’s effectiveness. The argument made is organisations connect through social systems and operate through practice with people, processes, and their interactions fundamental to how they perform. A middle-range management theory is presented aimed at making organisations the best they can be with the resources available to them and in the economic circumstances they find themselves. It does this by understanding and reconfiguring the organisation’s social system using a structured approach to optimise business processes and performance measures based on a combination of emergent behaviour and practice. Given the reality of radical uncertainty the focus is not on predicting outcomes but on uncovering the explanatory mechanisms behind events caused by specific managed improvement interventions. Understanding the behaviour of dynamically interacting components is done using realist evaluation based on social interactions, emergent powers and social intervention mechanisms. This approach changed behaviours and performance outcomes in case study organisations. The use of an ‘inside-out’ social systems perspective, coupled to critical realism with its focus on explanation, enabled the causal relationships of importance to be identified and the performance ‘black box’ to be opened up. This research contributes to closing the PMM theory-practice gap by proposing the performance focus needs to be on the social system rather than the measures, that is, on the ‘means’ rather than the ‘ends’. It also offers a competing theoretical framework to organisational control theory for PMM, one grounded in social systems and practice theory. The social systems perspective is not considered specific to PM and potentially can be applied to all other business processe
    • …
    corecore