Biblio

Found 613 results

Filters: First Letter Of Last Name is Y  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X [Y] Z   [Show ALL]
Y
Y, Justindhas., Kumar, G. Anil, Chandrashekhar, A, Raman, R Raghu, Kumar, A. Ravi, S, Ashwini.  2022.  Internet of Things based Data Security Management using Three Level Cyber Security Policies. 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). :1–8.
The Internet of Things devices is rapidly becoming widespread, as are IoT services. Their achievement has not gone unnoticed, as threats as well as attacks towards IoT devices as well as services continue to grow. Cyber attacks are not unique to IoT, however as IoT becomes more ingrained in our lives as well as communities, it is imperative to step up as well as take cyber defense seriously. As a result, there is a genuine need to protect IoT, which necessitates a thorough understanding of the dangers and attacks against IoT infrastructure. The purpose of this study is to define threat types, as well as to assess and characterize intrusions and assaults against IoT devices as well as services
Y. Bao, M. Chen, Q. Zhu, T. wei, F. Mallet, T. Zhou.  2017.  Quantitative Performance Evaluation of Uncertainty-Aware Hybrid AADL Designs Using Statistical Model Checking. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. PP:1-1.
Y. Cao, J. Yang.  2015.  Towards Making Systems Forget with Machine Unlearning. 2015 IEEE Symposium on Security and Privacy. :463-480.
Today's systems produce a rapidly exploding amount of data, and the data further derives more data, forming a complex data propagation network that we call the data's lineage. There are many reasons that users want systems to forget certain data including its lineage. From a privacy perspective, users who become concerned with new privacy risks of a system often want the system to forget their data and lineage. From a security perspective, if an attacker pollutes an anomaly detector by injecting manually crafted data into the training data set, the detector must forget the injected data to regain security. From a usability perspective, a user can remove noise and incorrect entries so that a recommendation engine gives useful recommendations. Therefore, we envision forgetting systems, capable of forgetting certain data and their lineages, completely and quickly. This paper focuses on making learning systems forget, the process of which we call machine unlearning, or simply unlearning. We present a general, efficient unlearning approach by transforming learning algorithms used by a system into a summation form. To forget a training data sample, our approach simply updates a small number of summations – asymptotically faster than retraining from scratch. Our approach is general, because the summation form is from the statistical query learning in which many machine learning algorithms can be implemented. Our approach also applies to all stages of machine learning, including feature selection and modeling. Our evaluation, on four diverse learning systems and real-world workloads, shows that our approach is general, effective, fast, and easy to use.
Y. Cao, J. Yang.  2015.  "Towards Making Systems Forget with Machine Unlearning". 2015 IEEE Symposium on Security and Privacy. :463-480.

Today's systems produce a rapidly exploding amount of data, and the data further derives more data, forming a complex data propagation network that we call the data's lineage. There are many reasons that users want systems to forget certain data including its lineage. From a privacy perspective, users who become concerned with new privacy risks of a system often want the system to forget their data and lineage. From a security perspective, if an attacker pollutes an anomaly detector by injecting manually crafted data into the training data set, the detector must forget the injected data to regain security. From a usability perspective, a user can remove noise and incorrect entries so that a recommendation engine gives useful recommendations. Therefore, we envision forgetting systems, capable of forgetting certain data and their lineages, completely and quickly. This paper focuses on making learning systems forget, the process of which we call machine unlearning, or simply unlearning. We present a general, efficient unlearning approach by transforming learning algorithms used by a system into a summation form. To forget a training data sample, our approach simply updates a small number of summations – asymptotically faster than retraining from scratch. Our approach is general, because the summation form is from the statistical query learning in which many machine learning algorithms can be implemented. Our approach also applies to all stages of machine learning, including feature selection and modeling. Our evaluation, on four diverse learning systems and real-world workloads, shows that our approach is general, effective, fast, and easy to use.

Y. Cui, R. Kavasseri, S. Brahma.  2016.  Dynamic state estimation assisted posturing for generator out-of-step protection. 2016 IEEE Power and Energy Society General Meeting (PESGM). :1-5.
Y. Cui, R. Kavasseri.  2017.  Particle filter-based dual estimation for synchronous generators. IET Generation, Transmission Distribution. 11:1701-1708.
Y. Cui, R. G. Kavasseri, N. R. Chaudhuri.  2016.  Modeling and simulation of dynamic communication latency and data aggregation for wide-area applications. 2016 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). :1-6.
Y. Jiang, Y. Yang, H. Liu, H. Kong, M. Gu, J. Sun, L. Sha.  2016.  From Stateflow Simulation to Verified Implementation: A Verification Approach and A Real-Time Train Controller Design. 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). :1-11.
Y. Jiang, H. Liu, H. Kong, R. Wang, M. Hosseini, J. Sun, L. Sha.  2016.  Use Runtime Verification to Improve the Quality of Medical Care Practice. 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C). :112-121.
Y. Li, R.G.Sanfelice.  2016.  Results on Finite Time Stability for A Class of Hybrid Systems. Proceedings of the American Control Conference. :4263–4268.
Y. Li, S. Phillips, R. G. Sanfelice.  2016.  On Distributed Observers for Linear Time-invariant Systems Under Intermittent Information Constraints. Proceedings of 10th IFAC Symposium on Nonlinear Control Systems. :654–659.
Y. Li, R.G.Sanfelice.  2016.  A Decentralized Consensus Algorithm for Distributed State Observers with Robustness Guarantees. Proceedings of the American Control Conference. :1876–1881.
Y. Ma, G. Zhou, S. Lin, H. Chen.  2017.  RoFi: Rotation-aware WiFi Channel Feedback. IEEE Internet of Things Journal. PP:1-1.
Y. Ma, G. Zhou, S. Lin.  2017.  EliMO: Eliminating Channel Feedback from MIMO. 2017 IEEE International Conference on Smart Computing (SMARTCOMP). :1-8.
Y. Seifi, S. Suriadi, E. Foo, C. Boyd.  2014.  Security properties analysis in a TPM-based protocol. Int. J. of Security and Networks, 2014 Vol.9, No.2, pp.85 - 103.

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient.

Y. Tao, L. Ding, S. Wang, A. Ganz.  2017.  PERCEPT Indoor Wayfinding for Blind and Visually Impaired Users: Navigation Instructions Algorithm and Validation Framework. Int. Conf. Info. and Comm. Technologies for Aging Well and e-Health (ICT4AWE). :143–149.