Biblio

Found 19604 results

2018-06-04
2018-05-14
2018-06-04
2015-11-17
Zhenqi Huang, University of Illinois at Urbana-Champaign, Sayan Mitra, University of Illinois at Urbana-Champaign, Geir Dullerud, University of Illinois at Urbana-Champaign.  2012.  Differentially Private Iterative Synchronous Consensus. Workshop on Privacy in the Electronic Society (WPES 2012).

The iterative consensus problem requires a set of processes or agents with different initial values, to interact and update their states to eventually converge to a common value. Pro- tocols solving iterative consensus serve as building blocks in a variety of systems where distributed coordination is re- quired for load balancing, data aggregation, sensor fusion, filtering, and synchronization. In this paper, we introduce the private iterative consensus problem where agents are re- quired to converge while protecting the privacy of their ini- tial values from honest but curious adversaries. Protecting the initial states, in many applications, suffice to protect all subsequent states of the individual participants.

We adapt the notion of differential privacy in this setting of iterative computation. Next, we present (i) a server-based and (ii) a completely distributed randomized mechanism for solving differentially private iterative consensus with adver- saries who can observe the messages as well as the internal states of the server and a subset of the clients. Our analysis establishes the tradeoff between privacy and the accuracy.

2018-05-27
Qifen Dong, Li Yu, Wen-Zhan Song, Lang Tong, Shaojie Tang.  2012.  Distributed Demand and Response Algorithm for Optimizing Social-Welfare in Smart Grid. The 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS'12).
2015-01-12
Fulton, Nathan.  2012.  Domain Specific Security through Extensible Type Systems. SPLASH '12 Proceedings of the 3rd annual conference on Systems, programming, and applications: software for humanity.

Researchers interested in security often wish to introduce new primitives into a language. Extensible languages hold promise in such scenarios, but only if the extension mechanism is sufficiently safe and expressive. This paper describes several modifications to an extensible language motivated by end-to-end security concerns.

2018-06-04
2018-05-27
Gregory D. Castañón, André{-}Louis Caron, Venkatesh Saligrama, Pierre{-}Marc Jodoin.  2012.  Exploratory search of long surveillance videos. Proceedings of the 20th {ACM} Multimedia Conference, {MM} '12, Nara, Japan, October 29 - November 02, 2012. :309–318.
2017-02-10
Quanyan Zhu, University of Illinois at Urbana-Champaign, Tamer Başar, University of Illinois at Urbana-Champaign.  2012.  Game-Theoretic Methods for Distributed Management of Energy Resources in the Smart Grid.

The smart grid is an ever-growing complex dynamic system with multiple interleaved layers and a large number of interacting components. In this talk, we discuss how game-theoretic tools can be used as an analytical tool to understand strategic interactions at different layers of the system and between different decision-making entities for distributed management of energy resources. We first investigate the issue of integration of renewable energy resources into the power grid. We establish a game-theoretic framework for modeling the strategic behavior of buses that are connected to renewable energy resources, and study the Nash equilibrium solution of distributed power generation at each bus. Our framework uses a cross-layer approach, taking into account the economic factors as well as system stability issues at the physical layer. In the second part of the talk, we discuss the issue of integration of plug-in electric vehicles (PHEVs) for vehicle-to-grid (V2G) transactions on the smart grid. Electric vehicles will be capable of buying and selling energy from smart parking lots in the future. We propose a multi-resolution and multi-layer stochastic differential game framework to study the dynamic decision-making process among PHEVs. We analyze the stochastic game in a large-population regime and account for the multiple types of interactions in the grid. Using these two settings, we demonstrate that game theory is a versatile tool to address many fundamental and emerging issues in the smart grid.

Presented at the Eighth Annual Carnegie Mellon Conference on the Electricity Industry Data-Driven Sustainable Engergy Systems in Pittsburgh, PA, March 12-14, 2012.

2018-05-27
2015-01-12
Ur, Blase, Kelly, Patrick Gage, Komanduri, Saranga, Lee, Joel, Maass, Michael, Mazurek, Michelle, Passaro, Timothy, Shay, Richard, Vidas, Timothy, Bauer, Lujo et al..  2012.  How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation Security'12 Proceedings of the 21st USENIX conference on Security symposium.

To help users create stronger text-based passwords, many web sites have deployed password meters that provide visual feedback on password strength. Although these meters are in wide use, their effects on the security and usability of passwords have not been well studied.

We present a 2,931-subject study of password creation in the presence of 14 password meters. We found that meters with a variety of visual appearances led users to create longer passwords. However, significant increases in resistance to a password-cracking algorithm were only achieved using meters that scored passwords stringently. These stringent meters also led participants to include more digits, symbols, and uppercase letters.

Password meters also affected the act of password creation. Participants who saw stringent meters spent longer creating their password and were more likely to change their password while entering it, yet they were also more likely to find the password meter annoying. However, the most stringent meter and those without visual bars caused participants to place less importance on satisfying the meter. Participants who saw more lenient meters tried to fill the meter and were averse to choosing passwords a meter deemed "bad" or "poor." Our findings can serve as guidelines for administrators seeking to nudge users towards stronger passwords.

2018-05-11
Elmahdi, Ahmed, Taha, Ahmad F, Hui, Stefen, Żak, Stanislaw H.  2012.  A hybrid scheduling protocol to improve quality of service in networked control systems. Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on. :98–105.
2018-05-14
2018-05-27
Venkatesh Saligrama, Manqi Zhao.  2012.  Local Anomaly Detection. Proceedings of the Fifteenth International Conference on Artificial Intelligence and Statistics, {AISTATS} 2012, La Palma, Canary Islands, April 21-23, 2012. 22:969–983.
Joseph Wang, Venkatesh Saligrama.  2012.  Local Supervised Learning through Space Partitioning. Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held December 3-6, 2012, Lake Tahoe, Nevada, United States.. :91–99.
2018-05-23
Jiang, Zhihao, Pajic, Miroslav, Moarref, Salar, Alur, Rajeev, Mangharam, Rahul.  2012.  Modeling and Verification of a Dual Chamber Implantable Pacemaker. Proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. :188–203.
2018-05-27
Kirill Trapeznikov, Venkatesh Saligrama, David A. Castañón.  2012.  Multi-Stage Classifier Design. Proceedings of the 4th Asian Conference on Machine Learning, {ACML} 2012, Singapore, Singapore, November 4-6, 2012. 25:459–474.
Jing Qian, Venkatesh Saligrama.  2012.  New statistic in P-value estimation for anomaly detection. {IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor, MI, USA, August 5-8, 2012. :393–396.
Chun Lam Chan, Sidharth Jaggi, Venkatesh Saligrama, Samar Agnihotri.  2012.  Non-adaptive group testing: Explicit bounds and novel algorithms. Proceedings of the 2012 {IEEE} International Symposium on Information Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012. :1837–1841.