98 research outputs found

    Differentially Private State Estimation in Distribution Networks with Smart Meters

    Full text link
    State estimation is routinely being performed in high-voltage power transmission grids in order to assist in operation and to detect faulty equipment. In low- and medium-voltage power distribution grids, on the other hand, few real-time measurements are traditionally available, and operation is often conducted based on predicted and historical data. Today, in many parts of the world, smart meters have been deployed at many customers, and their measurements could in principle be shared with the operators in real time to enable improved state estimation. However, customers may feel reluctance in doing so due to privacy concerns. We therefore propose state estimation schemes for a distribution grid model, which ensure differential privacy to the customers. In particular, the state estimation schemes optimize different performance criteria, and a trade-off between a lower bound on the estimation performance versus the customers' differential privacy is derived. The proposed framework is general enough to be applicable also to other distribution networks, such as water and gas networks

    Inferring Class Label Distribution of Training Data from Classifiers: An Accuracy-Augmented Meta-Classifier Attack

    Full text link
    Property inference attacks against machine learning (ML) models aim to infer properties of the training data that are unrelated to the primary task of the model, and have so far been formulated as binary decision problems, i.e., whether or not the training data have a certain property. However, in industrial and healthcare applications, the proportion of labels in the training data is quite often also considered sensitive information. In this paper we introduce a new type of property inference attack that unlike binary decision problems in literature, aim at inferring the class label distribution of the training data from parameters of ML classifier models. We propose a method based on \emph{shadow training} and a \emph{meta-classifier} trained on the parameters of the shadow classifiers augmented with the accuracy of the classifiers on auxiliary data. We evaluate the proposed approach for ML classifiers with fully connected neural network architectures. We find that the proposed \emph{meta-classifier} attack provides a maximum relative improvement of 52%52\% over state of the art.Comment: 12 pages, 2022 Trustworthy and Socially Responsible Machine Learning (TSRML 2022) co-located with NeurIPS 202

    Dynamic Migration of Real-Time Traffic Flows in SDN-Enabled Networks

    Get PDF
    In this paper, we investigate the problem of dynamic migration for realtime traffic flows, which consists in accommodating new flows at runtime in SDN-enabled networks. We show results for two algorithms that can calculate direct and indirect flow migrations at runtime. Numerical results obtained on a FatTree network topology show that flow migration is typically required for networks with a modest number of flows, while direct flow migration is possible in about 60% of the cases

    Extensión de funcionalidad en una red visual de procesamiento distribuido: inclusión de BRISK e implementación de un protocolo de retransmisiones

    Get PDF
    La extracción de características de una imagen se utiliza hoy en día para la búsqueda y clasificación de información presente en las imágenes. Esta extracción puede verse como una forma especial de reducción dimensional consistente en detectar y guardar puntos de interés contenidos en una imagen. Esta información es usada para compararla con la existente en una base de datos y poder reconocer un objeto o una persona dentro de la imagen. Así, la extracción de características de imágenes se emplea en multitud de aplicaciones: reconocimiento de objetos, reconocimiento facial, del tipo de movimiento, en seguimiento de un objeto en una secuencia de vídeo, etc. Existen muchos tipos de características posibles en una imagen. En este proyecto se trabaja con las características definidas como puntos de interés, con cómo se guarda ese punto de interés (descriptor) y con cómo se hace la comparación con la base de datos. El proyecto que se presenta parte de un sistema ya creado que realiza la extracción de características SURF de imágenes. Esta extracción se realiza de forma distribuida en varios nodos, de manera que se reparta la carga computacional. Uno de los nodos actúa como cámara, otro como conexión con el servidor (ordenador portátil) y los demás son nodos de procesamiento. Los nodos son los ordenadores de tamaño tarjeta de crédito BeagleBone Black, que se comunican entre ellos de forma inalámbrica utilizando la tecnología ZigBee. Las modificaciones llevadas a cabo en el sistema y que constituyen el trabajo y objetivo central del proyecto se dividen en dos partes. Por una parte, se quiere mejorar el sistema de extracción de características de imágenes, y por otra, se quiere optimizar los aspectos de transmisión del sistema. Para el primer caso, se va a modificar la arquitectura y la lógica del sistema para incluir otro tipo de características de imagen además de SURF; se va a optar por el sistema BRISK. Pudiendo elegir el usuario entre las dos propuestas, esto servirá para comparar las prestaciones de ambos sistemas de extracción de características y extraer conclusiones sobre su modo de funcionamiento. Para el segundo objetivo de optimización del sistema de transmisión, se va a implementar un protocolo de transmisión más fiable que evite las pérdidas de datos. Este protocolo estará basado en retransmisiones de paquetes perdidos, acknowledgements y timeouts, con el objetivo de evitar las pérdidas de paquetes, algo de lo que el sistema sufría. Además, esto permite un incremento en la velocidad garantizando una transmisión libre de pérdidas

    Proactive key dissemination-based fast authentication for in-motion inductive EV charging

    Get PDF
    Abstract-In-motion inductive charging, or dynamic charging, is an emerging technology that allows electric vehicles (EVs) to be charged while on the move. Accurate billing for dynamic EV charging requires secure communication between the EVs and the utility, and could potentially require the secure delivery of small messages from the EVs to the utility at a very high rate, which is infeasible with the currently available solutions. In this paper we propose Fast Authentication for Dynamic EV Charging (FADEC) designed to meet the communication needs of in-motion inductive EV charging. FADEC features fast signing and verification, low communication overhead, and fast hand-off authentication to support EV mobility. Our simulations show that compared with ECDSA mandated by 802.11p standard, FADEC reduces data delivery delay by up to 97%, increases the data delivery ratio by more than an order of magnitude and enables timely data delivery even in a resource constrained environment

    Spite Nominations to the United States Supreme Court: Herbert C. Hoover, Owen J. Roberts, and the Politics of Presidential Vengeance in Retrospect

    Get PDF
    Presidential revenge as a motivating force behind Supreme Court nominations is an ineluctable thread running through American judicial selection politics
    corecore