Image encryption using elliptical curve cryptosytem with hill cipherkarthik kedarisetti
IMAGE ENCRYPTION-BTECH FINAL YEAR PROJECT ZEROTH REVIEW.
Image encryption is rapidly increased recently by the increasing use of the internet and communication
media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption
techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the
symmetric techniques, it has a simple structure and fast computations, but weak security because sender
and receiver need to use and share the same private key within a non-secure channels. A new image
encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed
in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its
security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption
and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret
key matrix with dimensions 4 4 will be used as an example in this study. Entropy, Peak Signal to Noise
Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image
encryption efficiency and compare the encrypted image with the original image to evaluate the performance
of the proposed encryption technique.
Information security is one of the most important issues in the
recent times. Elliptic Curve Cryptography (ECC) is one of the most
efficient public key cryptosystems that is secured against adversaries
because it is hard for them to find the secret key and solve
the elliptic curve discrete logarithm problem. Its strengthened
security also comes from the small key size that is used in it with
the same level of safety compared to the other cryptosystems like RSA(Rivest–Shamir–Adleman))
This document discusses graph sketching, which uses linear projections to preserve structural properties of graphs using small space. Some key points discussed include:
- Graph sketches can be used to check properties like connectivity, bipartiteness, and minimum spanning trees in pass-efficient streaming and distributed models.
- Connectivity can be checked using an O(n log^3 n)-size sketch by running algorithms in the sketch space in a homomorphic way.
- Graph sketches have applications in dynamic graph streams, distributed processing, and approximating cuts and metrics.
Lattice Based Cryptography - GGH CryptosystemVarun Janga
This document discusses lattice-based cryptography and the GGH cryptosystem. It provides an overview of lattices and their properties. The GGH cryptosystem is based on the closest vector problem in lattices. The private key is a good basis for a lattice, while the public key is a bad basis for the same lattice. The document describes the key generation process and analyzes attacks on the GGH cryptosystem such as the embedding attack and Nguyen's attack based on leaking remainders. It also discusses advantages and disadvantages of lattice-based cryptography.
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMAM Publications
The Hill cipher algorithm is one of the symmetrickey algorithms that have several advantages in data
encryption as well as decryptions. But, the inverse of the key matrix used for encrypting the plaintext does not always
exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involuntary matrix
generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to
find the inverse of the key matrix. The objective of this paper is to encrypt an text using a technique different from the
conventional Hill Cipher
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
This document discusses ring-based homomorphic encryption schemes and compares the efficiency of four schemes: BGV, FV, NTRU, and YASHE. The schemes are analyzed by measuring ciphertext size under varying parameters like plaintext modulus size and circuit depth. For small plaintext sizes, YASHE is most efficient, but BGV generally performs best as plaintext size increases. The analysis provides a starting point for comparing ring-based schemes but could be improved with a stricter security analysis.
https://telecombcn-dl.github.io/2017-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
Image encryption using elliptical curve cryptosytem with hill cipherkarthik kedarisetti
IMAGE ENCRYPTION-BTECH FINAL YEAR PROJECT ZEROTH REVIEW.
Image encryption is rapidly increased recently by the increasing use of the internet and communication
media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption
techniques are the suitable methods to protect images from attacks. Hill cipher algorithm is one of the
symmetric techniques, it has a simple structure and fast computations, but weak security because sender
and receiver need to use and share the same private key within a non-secure channels. A new image
encryption technique that combines Elliptic Curve Cryptosystem with Hill Cipher (ECCHC) has been proposed
in this paper to convert Hill cipher from symmetric technique to asymmetric one and increase its
security and efficiency and resist the hackers. Self-invertible key matrix is used to generate encryption
and decryption secret key. So, no need to find the inverse key matrix in the decryption process. A secret
key matrix with dimensions 4 4 will be used as an example in this study. Entropy, Peak Signal to Noise
Ratio (PSNR), and Unified Average Changing Intensity (UACI) will be used to assess the grayscale image
encryption efficiency and compare the encrypted image with the original image to evaluate the performance
of the proposed encryption technique.
Information security is one of the most important issues in the
recent times. Elliptic Curve Cryptography (ECC) is one of the most
efficient public key cryptosystems that is secured against adversaries
because it is hard for them to find the secret key and solve
the elliptic curve discrete logarithm problem. Its strengthened
security also comes from the small key size that is used in it with
the same level of safety compared to the other cryptosystems like RSA(Rivest–Shamir–Adleman))
This document discusses graph sketching, which uses linear projections to preserve structural properties of graphs using small space. Some key points discussed include:
- Graph sketches can be used to check properties like connectivity, bipartiteness, and minimum spanning trees in pass-efficient streaming and distributed models.
- Connectivity can be checked using an O(n log^3 n)-size sketch by running algorithms in the sketch space in a homomorphic way.
- Graph sketches have applications in dynamic graph streams, distributed processing, and approximating cuts and metrics.
Lattice Based Cryptography - GGH CryptosystemVarun Janga
This document discusses lattice-based cryptography and the GGH cryptosystem. It provides an overview of lattices and their properties. The GGH cryptosystem is based on the closest vector problem in lattices. The private key is a good basis for a lattice, while the public key is a bad basis for the same lattice. The document describes the key generation process and analyzes attacks on the GGH cryptosystem such as the embedding attack and Nguyen's attack based on leaking remainders. It also discusses advantages and disadvantages of lattice-based cryptography.
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMAM Publications
The Hill cipher algorithm is one of the symmetrickey algorithms that have several advantages in data
encryption as well as decryptions. But, the inverse of the key matrix used for encrypting the plaintext does not always
exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involuntary matrix
generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to
find the inverse of the key matrix. The objective of this paper is to encrypt an text using a technique different from the
conventional Hill Cipher
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
This document discusses ring-based homomorphic encryption schemes and compares the efficiency of four schemes: BGV, FV, NTRU, and YASHE. The schemes are analyzed by measuring ciphertext size under varying parameters like plaintext modulus size and circuit depth. For small plaintext sizes, YASHE is most efficient, but BGV generally performs best as plaintext size increases. The analysis provides a starting point for comparing ring-based schemes but could be improved with a stricter security analysis.
https://telecombcn-dl.github.io/2017-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
This document discusses using graph theory and cryptography to securely transfer data. It begins by defining cryptography as the science of secret writing and techniques for hiding messages. It then proposes using a bipartite graph and encryption table to encrypt messages into a number sequence represented by the graph. Edges in the graph are assigned random weights. The receiving party decrypts by arranging the edge weights in order and matching them to the encryption table to recover the original message. Applications mentioned include protecting financial transactions and encrypting messages for braille.
1) The document proposes a technique called 6HOP that provides network-level protection for IoT devices by deriving ephemeral IPv6 addresses, ports, and keys from an initially shared secret between devices.
2) 6HOP aims to provide proactive security, network-level anonymity, privacy, and protection against denial-of-service attacks for IoT devices.
3) The security of the shared secret is analyzed, showing that brute-forcing the secret would require impractical hashing computations given the size of the IPv6 address space.
This document discusses homomorphic encryption and its types. It describes partially homomorphic encryption schemes like RSA, ElGamal and Paillier which allow either addition or multiplication on ciphertexts. Fully homomorphic encryption introduced by Craig Gentry in 2009 allows both addition and multiplication on encrypted data. The document outlines the key generation, encryption and decryption processes for RSA and ElGamal encryption schemes and explains how they demonstrate multiplicative homomorphism. It also briefly explains Paillier cryptosystem which exhibits additive homomorphism.
cryptography Application of linear algebra Sami Ullah
This document discusses the application of linear algebra in cryptography. It covers topics like encryption, decryption, and modular arithmetic. It provides examples of the Hill cipher, which is a polygraphic cipher that encrypts blocks of text. The document explains how to encrypt text using a Hill cipher by choosing a matrix, dividing text into pairs, converting to vectors, and multiplying with the matrix. It also describes how to decrypt by using the inverse matrix.
Enhancement and Analysis of Chaotic Image Encryption Algorithms cscpconf
The focus of this paper is to improve the level of security and secrecy provided by the chaotic
map based image encryption.An encryption algorithm based on the Logistic and the Henon
maps is proposed. The algorithm uses chaotic iteration to generate the encryption keys, and
then carries out the XOR and cyclic shift operations on the plain text to change the values of
image pixels. Chaotic Map Lattice based image encryption algorithm suggested by Pisarchik is
also examined which is based on Logistic map alone. In experiments, the corresponding results
showed the proposed method is a promising scheme for image encryption in terms of security
and secrecy. At the end, we show the results of a security analysis and a comparison of both
schemes
This document contains a 20 question mock exam for the GATE exam. It provides instructions that each question is worth 1 mark, unanswered questions receive 0 marks and incorrect answers receive negative marks. It then lists 20 multiple choice questions related to computer science topics like operating systems, algorithms, data structures, computer networks and formal languages. For each question there are 4 possible answer choices and space to write the answer.
The solution to the single-source shortest-path tree problem in graph theory. This slide was prepared for Design and Analysis of Algorithm Lab for B.Tech CSE 2nd Year 4th Semester.
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.
Elliptic curve cryptography is additional powerful than different methodology that gains countless attention within the industry and plays vital role within the world of CRYPTOGRAPHY. This paper explains the strategy of elliptic curve cryptography victimization matrix scrambling method. during this methodology of cryptography we have a tendency to initial rework the plain text to elliptic curve so victimization matrix scrambling methodology we have a tendency to encrypt/decrypt the message. This method keeps information safe from unwanted attack to our information.
This document provides an overview of the RSA algorithm for public-key cryptography. It explains that RSA relies on the difficulty of factoring large prime numbers. The algorithm involves each user generating a public/private key pair by selecting two large prime numbers p and q, computing the modulus N as p * q, and finding values for the encryption key e and decryption key d such that e * d = 1 mod φ(N), where φ(N) is Euler's totient function of N. A message M is encrypted by computing Me mod N and decrypted by computing Md mod N. The security of RSA depends on the difficulty of factoring the modulus N into its prime factors p and q without knowledge of φ(N
This document provides an overview of the RSA algorithm for public-key cryptography. It explains that RSA relies on the difficulty of factoring large prime numbers. The algorithm involves each user generating a public/private key pair by selecting two large prime numbers p and q, computing the modulus N as p * q, and finding values for the encryption key e and decryption key d such that e * d = 1 mod φ(N), where φ(N) is Euler's totient function of N. A message M is encrypted by computing Me mod N and decrypted by computing Md mod N. The security of RSA depends on the difficulty of factoring the modulus N into its prime factors p and q without knowledge of φ(N
This document discusses enhancing security in cloud storage using elliptic curve cryptography (ECC). It begins by outlining threats to data stored in the cloud, such as unauthorized access and reduced privacy. It then describes common security methods like encryption, authentication, and authorization. The document proceeds to explain the RSA algorithm for encryption and digital signatures. It subsequently provides details on how ECC generates cryptographic keys using elliptic curve theory, offering stronger security with smaller key sizes. ECC is thus more efficient for applications like mobile. The document concludes ECC is a secure and efficient alternative to RSA for key exchanges between certificate authorities and users.
Dijkstra's algorithm allows finding the shortest path between any two vertices in a graph. It works by overestimating the distance of each vertex from the starting point and then visiting neighbors to find shorter paths. The algorithm uses a greedy approach, finding the next best solution at each step. It maintains path distances in an array and maps each vertex to its predecessor in the shortest path. A priority queue is used to efficiently retrieve the closest vertex. The time complexity is O(E Log V) and space is O(V). Applications include social networks, maps, and telephone networks.
The document discusses the Hill cipher, a polygraphic cipher technique based on linear algebra. The Hill cipher operates on blocks of letters, using a secret key matrix to encrypt plaintext letters into ciphertext. It encrypts by multiplying blocks of plaintext letters by the key matrix, taking the result modulo 26. The corresponding decryption matrix is calculated from the encryption matrix and is used to decrypt by reversing the process. An example demonstrates encrypting and then decrypting the message "HELLO WORLD" using a 2x2 matrix.
This was a presentation done for the Techspace of IoT Asia 2017 oon 30th March 2017. This is an introductory session to introduce the concept of Long Short-Term Memory (LSTMs) for the prediction in Time Series. I also shared the Keras code to work out a simple Sin Wave example and a Household power consumption data to use for the predictions. The links for the code can be found in the presentation.
An introduction to Deep Learning concepts, with a simple yet complete neural network, CNNs, followed by rudimentary concepts of Keras and TensorFlow, and some simple code fragments.
This document outlines the units and questions for the Design & Analysis of Algorithm course. It covers topics like asymptotic notation, the master's theorem, binary search trees, dynamic programming, graph algorithms including BFS, MST, Dijkstra's algorithm and Floyd-Warshall algorithm, NP-completeness, approximation algorithms, and algorithm design techniques. The last submission date for the course is November 25th, 2014.
An introduction to Deep Learning (DL) concepts, starting with a simple yet complete neural network (no frameworks), followed by aspects of deep neural networks, such as back propagation, activation functions, CNNs, and the AUT theorem. Next, a quick introduction to TensorFlow and Tensorboard, and then some code samples with Scala and TensorFlow.
This document provides an overview and introduction to deep learning concepts including linear regression, activation functions, gradient descent, backpropagation, hyperparameters, convolutional neural networks (CNNs), recurrent neural networks (RNNs), and TensorFlow. It discusses clustering examples to illustrate neural networks, explores different activation functions and cost functions, and provides code examples of TensorFlow operations, constants, placeholders, and saving graphs.
Learning multifractal structure in large networks (Purdue ML Seminar)Austin Benson
This document discusses methods for modeling networks using multifractal network generators (MFNG). MFNG is a recursive model that samples nodes into categories at different levels to generate graphs. The document outlines techniques for estimating MFNG parameters from real networks using method of moments, describes challenges in sampling from MFNG efficiently, and shows MFNG can match properties of Twitter and citation networks.
Modelling the Clustering Coefficient of a Random graphGraph-TA
1) The document describes an algorithm for generating random graphs that have a specified degree distribution and average clustering coefficient.
2) The algorithm works by splitting the graph into communities and connecting nodes within and between communities with different probabilities to achieve the target average clustering coefficient.
3) An extended hypergeometric distribution is used to model the probability of connections for the highest degree node, and the expected clustering coefficient is set equal to the target value to determine the connection probabilities.
This document discusses using graph theory and cryptography to securely transfer data. It begins by defining cryptography as the science of secret writing and techniques for hiding messages. It then proposes using a bipartite graph and encryption table to encrypt messages into a number sequence represented by the graph. Edges in the graph are assigned random weights. The receiving party decrypts by arranging the edge weights in order and matching them to the encryption table to recover the original message. Applications mentioned include protecting financial transactions and encrypting messages for braille.
1) The document proposes a technique called 6HOP that provides network-level protection for IoT devices by deriving ephemeral IPv6 addresses, ports, and keys from an initially shared secret between devices.
2) 6HOP aims to provide proactive security, network-level anonymity, privacy, and protection against denial-of-service attacks for IoT devices.
3) The security of the shared secret is analyzed, showing that brute-forcing the secret would require impractical hashing computations given the size of the IPv6 address space.
This document discusses homomorphic encryption and its types. It describes partially homomorphic encryption schemes like RSA, ElGamal and Paillier which allow either addition or multiplication on ciphertexts. Fully homomorphic encryption introduced by Craig Gentry in 2009 allows both addition and multiplication on encrypted data. The document outlines the key generation, encryption and decryption processes for RSA and ElGamal encryption schemes and explains how they demonstrate multiplicative homomorphism. It also briefly explains Paillier cryptosystem which exhibits additive homomorphism.
cryptography Application of linear algebra Sami Ullah
This document discusses the application of linear algebra in cryptography. It covers topics like encryption, decryption, and modular arithmetic. It provides examples of the Hill cipher, which is a polygraphic cipher that encrypts blocks of text. The document explains how to encrypt text using a Hill cipher by choosing a matrix, dividing text into pairs, converting to vectors, and multiplying with the matrix. It also describes how to decrypt by using the inverse matrix.
Enhancement and Analysis of Chaotic Image Encryption Algorithms cscpconf
The focus of this paper is to improve the level of security and secrecy provided by the chaotic
map based image encryption.An encryption algorithm based on the Logistic and the Henon
maps is proposed. The algorithm uses chaotic iteration to generate the encryption keys, and
then carries out the XOR and cyclic shift operations on the plain text to change the values of
image pixels. Chaotic Map Lattice based image encryption algorithm suggested by Pisarchik is
also examined which is based on Logistic map alone. In experiments, the corresponding results
showed the proposed method is a promising scheme for image encryption in terms of security
and secrecy. At the end, we show the results of a security analysis and a comparison of both
schemes
This document contains a 20 question mock exam for the GATE exam. It provides instructions that each question is worth 1 mark, unanswered questions receive 0 marks and incorrect answers receive negative marks. It then lists 20 multiple choice questions related to computer science topics like operating systems, algorithms, data structures, computer networks and formal languages. For each question there are 4 possible answer choices and space to write the answer.
The solution to the single-source shortest-path tree problem in graph theory. This slide was prepared for Design and Analysis of Algorithm Lab for B.Tech CSE 2nd Year 4th Semester.
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.
Elliptic curve cryptography is additional powerful than different methodology that gains countless attention within the industry and plays vital role within the world of CRYPTOGRAPHY. This paper explains the strategy of elliptic curve cryptography victimization matrix scrambling method. during this methodology of cryptography we have a tendency to initial rework the plain text to elliptic curve so victimization matrix scrambling methodology we have a tendency to encrypt/decrypt the message. This method keeps information safe from unwanted attack to our information.
This document provides an overview of the RSA algorithm for public-key cryptography. It explains that RSA relies on the difficulty of factoring large prime numbers. The algorithm involves each user generating a public/private key pair by selecting two large prime numbers p and q, computing the modulus N as p * q, and finding values for the encryption key e and decryption key d such that e * d = 1 mod φ(N), where φ(N) is Euler's totient function of N. A message M is encrypted by computing Me mod N and decrypted by computing Md mod N. The security of RSA depends on the difficulty of factoring the modulus N into its prime factors p and q without knowledge of φ(N
This document provides an overview of the RSA algorithm for public-key cryptography. It explains that RSA relies on the difficulty of factoring large prime numbers. The algorithm involves each user generating a public/private key pair by selecting two large prime numbers p and q, computing the modulus N as p * q, and finding values for the encryption key e and decryption key d such that e * d = 1 mod φ(N), where φ(N) is Euler's totient function of N. A message M is encrypted by computing Me mod N and decrypted by computing Md mod N. The security of RSA depends on the difficulty of factoring the modulus N into its prime factors p and q without knowledge of φ(N
This document discusses enhancing security in cloud storage using elliptic curve cryptography (ECC). It begins by outlining threats to data stored in the cloud, such as unauthorized access and reduced privacy. It then describes common security methods like encryption, authentication, and authorization. The document proceeds to explain the RSA algorithm for encryption and digital signatures. It subsequently provides details on how ECC generates cryptographic keys using elliptic curve theory, offering stronger security with smaller key sizes. ECC is thus more efficient for applications like mobile. The document concludes ECC is a secure and efficient alternative to RSA for key exchanges between certificate authorities and users.
Dijkstra's algorithm allows finding the shortest path between any two vertices in a graph. It works by overestimating the distance of each vertex from the starting point and then visiting neighbors to find shorter paths. The algorithm uses a greedy approach, finding the next best solution at each step. It maintains path distances in an array and maps each vertex to its predecessor in the shortest path. A priority queue is used to efficiently retrieve the closest vertex. The time complexity is O(E Log V) and space is O(V). Applications include social networks, maps, and telephone networks.
The document discusses the Hill cipher, a polygraphic cipher technique based on linear algebra. The Hill cipher operates on blocks of letters, using a secret key matrix to encrypt plaintext letters into ciphertext. It encrypts by multiplying blocks of plaintext letters by the key matrix, taking the result modulo 26. The corresponding decryption matrix is calculated from the encryption matrix and is used to decrypt by reversing the process. An example demonstrates encrypting and then decrypting the message "HELLO WORLD" using a 2x2 matrix.
This was a presentation done for the Techspace of IoT Asia 2017 oon 30th March 2017. This is an introductory session to introduce the concept of Long Short-Term Memory (LSTMs) for the prediction in Time Series. I also shared the Keras code to work out a simple Sin Wave example and a Household power consumption data to use for the predictions. The links for the code can be found in the presentation.
An introduction to Deep Learning concepts, with a simple yet complete neural network, CNNs, followed by rudimentary concepts of Keras and TensorFlow, and some simple code fragments.
This document outlines the units and questions for the Design & Analysis of Algorithm course. It covers topics like asymptotic notation, the master's theorem, binary search trees, dynamic programming, graph algorithms including BFS, MST, Dijkstra's algorithm and Floyd-Warshall algorithm, NP-completeness, approximation algorithms, and algorithm design techniques. The last submission date for the course is November 25th, 2014.
An introduction to Deep Learning (DL) concepts, starting with a simple yet complete neural network (no frameworks), followed by aspects of deep neural networks, such as back propagation, activation functions, CNNs, and the AUT theorem. Next, a quick introduction to TensorFlow and Tensorboard, and then some code samples with Scala and TensorFlow.
This document provides an overview and introduction to deep learning concepts including linear regression, activation functions, gradient descent, backpropagation, hyperparameters, convolutional neural networks (CNNs), recurrent neural networks (RNNs), and TensorFlow. It discusses clustering examples to illustrate neural networks, explores different activation functions and cost functions, and provides code examples of TensorFlow operations, constants, placeholders, and saving graphs.
Learning multifractal structure in large networks (Purdue ML Seminar)Austin Benson
This document discusses methods for modeling networks using multifractal network generators (MFNG). MFNG is a recursive model that samples nodes into categories at different levels to generate graphs. The document outlines techniques for estimating MFNG parameters from real networks using method of moments, describes challenges in sampling from MFNG efficiently, and shows MFNG can match properties of Twitter and citation networks.
Modelling the Clustering Coefficient of a Random graphGraph-TA
1) The document describes an algorithm for generating random graphs that have a specified degree distribution and average clustering coefficient.
2) The algorithm works by splitting the graph into communities and connecting nodes within and between communities with different probabilities to achieve the target average clustering coefficient.
3) An extended hypergeometric distribution is used to model the probability of connections for the highest degree node, and the expected clustering coefficient is set equal to the target value to determine the connection probabilities.
https://telecombcn-dl.github.io/2018-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
Fuzzy c means clustering protocol for wireless sensor networksmourya chandra
This document discusses clustering techniques for wireless sensor networks. It describes hierarchical routing protocols that involve clustering sensor nodes into cluster heads and non-cluster heads. It then explains fuzzy c-means clustering, which allows data points to belong to multiple clusters to different degrees, unlike hard clustering methods. Finally, it proposes using fuzzy c-means clustering as an energy-efficient routing protocol for wireless sensor networks due to its ability to handle uncertain or incomplete data.
This document is a seminar report on the K-Means clustering algorithm submitted by Gaurav Handa. It includes an introduction that discusses the importance of data mining and describes K-Means clustering. It also includes chapters that analyze and plan the implementation of K-Means, describe the algorithm and its flowchart, discuss limitations, and provide examples of implementing K-Means using graphs and Java code. The report was submitted in partial fulfillment of seminar requirements and includes acknowledgements and certificates.
Ecc cipher processor based on knapsack algorithmAlexander Decker
This document describes a method for encrypting messages using Elliptic Curve Cryptography (ECC) combined with the knapsack algorithm. It begins by explaining the basics of ECC, including defining elliptic curves over a finite field and describing point addition and doubling operations. It then presents algorithms for the full encryption/decryption process. The process involves first transforming the message into points on an elliptic curve, then applying the knapsack algorithm to further encrypt the ECC-encrypted message before transmission. Decryption reverses these steps to recover the original message. The combination of ECC and knapsack encryption is presented as an innovation that provides increased security over traditional ECC alone.
This paper proposes a (k,n) threshold scheme for dividing a secret data D into n pieces in such a way that D can be reconstructed from any k pieces, but k-1 pieces reveal no information about D. The scheme uses polynomial interpolation: a random polynomial q(x) of degree k-1 is chosen where q(0)=D, and the pieces are D1=q(1), ..., Dn=q(n). Given any k pieces, q(x) can be interpolated; with k-1 pieces, all possible values of D are equally likely. This threshold scheme enables robust secret sharing and key management even if half the pieces are destroyed or k-1 are exposed.
A simple framework for contrastive learning of visual representationsDevansh16
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99
If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money.
Check out my other articles on Medium. : https://rb.gy/zn1aiu
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels.
Comments: ICML'2020. Code and pretrained models at this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Cite as: arXiv:2002.05709 [cs.LG]
(or arXiv:2002.05709v3 [cs.LG] for this version)
Submission history
From: Ting Chen [view email]
[v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB)
[v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB)
[v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
An Efficient Method of Partitioning High Volumes of Multidimensional Data for...IJERA Editor
An optimal data partitioning in parallel/distributed implementation of clustering algorithms is a necessary
computation as it ensures independent task completion, fair distribution, less number of affected points and
better & faster merging. Though partitioning using Kd-Tree is being conventionally used in academia, it suffers
from performance drenches and bias (non equal distribution) as dimensionality of data increases and hence is
not suitable for practical use in industry where dimensionality can be of order of 100’s to 1000’s. To address
these issues we propose two new partitioning techniques using existing mathematical models & study their
feasibility, performance (bias and partitioning speed) & possible variants in choosing initial seeds. First method
uses an n-dimensional hashed grid based approach which is based on mapping the points in space to a set of
cubes which hashes the points. Second method uses a tree of voronoi planes where each plane corresponds to a
partition. We found that grid based approach was computationally impractical, while using a tree of voronoi
planes (using scalable K-Means++ initial seeds) drastically outperformed the Kd-tree tree method as
dimensionality increased.
The document is a laboratory manual for the course "Computer Graphics & Multimedia" that includes experiments on various computer graphics and multimedia topics. It contains an introduction, list of experiments, and details of the experiments. Some key experiments include implementing algorithms for line drawing, circle drawing, and applying transformations like translation, scaling and rotation. The objectives are to introduce basic computer graphics concepts and algorithms, and expose students to 2D and 3D graphics as well as multimedia formats and applications.
This document introduces a generalized method for constructing sub-quadratic complexity multipliers for finite fields of characteristic 2. It begins by reintroducing the Winograd short convolution algorithm in the context of polynomial multiplication. It then presents a recursive construction technique that extends any d-point multiplier into an n=dk-point multiplier with sub-quadratic area and logarithmic delay complexity. Several new constructions are obtained using this technique, one of which is identical to the Karatsuba multiplier. The techniques aim to develop bit-parallel multipliers with better time and/or space complexity than the traditional quadratic complexity approaches.
A NOVEL (K,N) SECRET SHARING SCHEME FROM QUADRATIC RESIDUES FOR GRAYSCALE IMAGESIJNSA Journal
A new grayscale image encryption algorithm based on , threshold secret sharing is proposed. The scheme allows a secret image to be transformed into n shares, where any shares can be used to reconstruct the secret image, while the knowledge of 1 or fewer shares leaves no sufficient information about the secret image and it becomes hard to decrypt the transmitted image. In the proposed scheme, the pixels of the secret image are first permuted and then encrypted by using quadratic residues. In the final stage, the encrypted image is shared into n shadow images using polynomials of Shamir scheme. The proposed scheme is provably secure and the experimental results shows that the scheme performs well while maintaining high levels of quality in the reconstructed image.
Jiawei Han, Micheline Kamber and Jian Pei
Data Mining: Concepts and Techniques, 3rd ed.
The Morgan Kaufmann Series in Data Management Systems
Morgan Kaufmann Publishers, July 2011. ISBN 978-0123814791
On Optimization of Network-coded Scalable Multimedia Service MulticastingAndrea Tassi
In the near future, the delivery of multimedia multicast services over next-generation networks is likely to become one of the main pillars of future cellular networks. In this extended abstract, we address the issue of efficiently multicasting layered video services by defining a novel optimization paradigm that is based on an Unequal Error Protection implementation of Random Linear Network Coding, and aims to ensure target service coverages by using a limited amount of radio resources.
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to
be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such
devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most
commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells
Equation Cryptography) has been proposed based on Pells equation: x
2 − D ∗ y
2 ≡ 1 (mod p). It is shown that scalar
multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm
Problem - computing the private key from the public key - in PEC is at least as hard as that of ECC.
Tensor Spectral Clustering is an algorithm that generalizes graph partitioning and spectral clustering methods to account for higher-order network structures. It defines a new objective function called motif conductance that measures how partitions cut motifs like triangles in addition to edges. The algorithm represents a tensor of higher-order random walk transitions as a matrix and computes eigenvectors to find a partition that minimizes the number of motifs cut, allowing networks to be clustered based on higher-order connectivity patterns. Experiments on synthetic and real networks show it can discover meaningful partitions by accounting for motifs that capture important structural relationships.
Similar to Learning multifractal structure in large networks (KDD 2014) (20)
Spectral embeddings and evolving networksAustin Benson
Spectral embeddings provide a fundamental approach for many machine learning tasks but are challenging for dynamic networks that change over time. The authors develop improved methods for maintaining spectral embeddings on evolving networks by (1) incrementally updating embeddings with small perturbations, (2) measuring convergence to speed computations, and (3) proposing a new dynamic graph model to test algorithms. They formalize these ideas with perturbation theory and algorithms that warm-start iterative solvers using the previous embedding.
Computational Frameworks for Higher-order Network Data AnalysisAustin Benson
1. The document discusses computational frameworks for analyzing higher-order network data, where interactions can involve more than two nodes. Real-world systems often involve higher-order interactions that are reduced to pairwise connections.
2. The author presents several datasets involving higher-order interactions and shows that predicting the formation of new higher-order connections is similar to link prediction but considers groups of nodes rather than individual links. Structural properties like edge density and tie strength influence the likelihood of simplicial closure.
3. Models are proposed to score open simplices based on structural features and predict which will transition to closed simplices. Accounting for higher-order structure provides new insights beyond traditional network analysis of pairwise connections.
Higher-order link prediction and other hypergraph modelingAustin Benson
Higher-order link prediction and other hypergraph modeling can better model real-world systems composed of higher-order interactions that are often reduced to pairwise ones. Hypergraphs allow the modeling of interactions between more than two nodes, like groups of people collaborating, multiple recipients of emails, students gathering in groups, and drug compounds made of several substances.
Hypergraph Cuts with General Splitting FunctionsAustin Benson
The document discusses joint work on hypergraph cuts with Cornell researchers Nate Veldt and Jon Kleinberg. It presents at the SIAM MDS 2020 conference on Pattern Analysis for Networks and Network Generalizations. The work aims to generalize graph minimum s-t cuts to hypergraphs by minimizing a cut function subject to constraints.
Simplicial closure & higher-order link predictionAustin Benson
The document discusses higher-order link prediction in networks. It summarizes previous work representing higher-order interactions as tensors, hypergraphs, etc. It then proposes evaluating models of higher-order data using "higher-order link prediction" to predict which groups of more than two nodes will interact based on past data. The authors analyze dynamics of triadic closure in several real-world networks and propose methods to predict closure based on structural properties like edge weights.
Three hypergraph eigenvector centralitiesAustin Benson
Three hypergraph eigenvector centralities are proposed to measure the importance of nodes in complex systems modeled as hypergraphs. Hypergraphs generalize graphs by allowing edges to connect any number of nodes. The proposed centralities are adaptations of the standard graph eigenvector centrality to hypergraphs. They measure a node's centrality based on 1) the centralities of its neighbors, 2) being positive values, and 3) being the principal eigenvector of the hypergraph adjacency matrix.
The document discusses different models for how social networks grow over time, including preferential attachment and fitness models. It proposes using discrete choice theory as a way to model network growth, which allows incorporating covariates and flexible modeling. The approach is statistically rigorous and allows easy incorporation of new models and effects compared to traditional static network models.
Link prediction in networks with core-fringe structureAustin Benson
1. The document discusses link prediction in networks with a core-fringe structure. It examines how including connections from fringe nodes affects the performance of link prediction algorithms on the core nodes.
2. An experiment was conducted where a link prediction algorithm was run multiple times, each time including more fringe nodes and connections in order to measure the effect on link prediction accuracy for the core nodes.
3. The results showed that including more information from the fringe helped improve the link prediction performance on the core nodes.
This document discusses research on modeling and predicting higher-order interactions in networks beyond pairwise connections. The researchers collected datasets containing time-stamped groups or "simplices" of nodes and analyzed properties like triangle closure. They propose "higher-order link prediction" to predict which new simplices will form based on structural features like edge weights between nodes. Scoring functions were tested and averages of edge weights often performed well, differing from classical link prediction methods.
This document summarizes a talk about higher-order link prediction in networks. It discusses organizational principles of systems with higher-order interactions, how they evolve over time through simplicial closure events, and how insights can be used to create effective higher-order link prediction methods. Key points include that simplicial closure depends on the structure and strength of ties in the projected graph, and this closure process is similar for 3 and 4 nodes.
Random spatial network models for core-periphery structureAustin Benson
The document proposes a random spatial network model for generating networks with core-periphery structure. The model assigns each node u a weight e^θu and the probability of an edge between nodes u and v is proportional to e^θu + e^θv. This generates networks where high-weight nodes in the "core" have many connections and low-weight "periphery" nodes have few connections.
Random spatial network models for core-periphery structure.Austin Benson
The document proposes a random spatial network model for generating networks with core-periphery structure. The model assigns each node u a weight e^θu and the probability of an edge between nodes u and v is proportional to e^θu + e^θv. This leads to dense connections between high-weight core nodes and sparser connections between core and low-weight peripheral nodes.
Simplicial closure & higher-order link predictionAustin Benson
This document discusses higher-order link prediction and simplicial closure as ways to analyze and model higher-order interactions in network data. It summarizes that networks can be viewed as weighted projected graphs where simplices "fill in" structures, and that new simplices and closed triangles tend to form through trajectories of nodes reaching "simplicial closure events". It proposes evaluating models of higher-order structure through higher-order link prediction, predicting the formation of new simplices.
Simplicial closure and simplicial diffusionsAustin Benson
This document summarizes research on modeling higher-order interactions in network data using simplicial complexes. It finds that most real-world network datasets exhibit a mixture of closed and open triangles, with the fraction varying by domain. A simple probabilistic model can account for this variation. The document proposes that groups of nodes go through trajectories of interactions until reaching a "simplicial closure event" where a new simplex is formed, analogous to triangle closure. It evaluates models' ability to predict such closures using a framework of "higher-order link prediction". Key indicators of closure are edge density and tie strength between nodes.
Sampling methods for counting temporal motifsAustin Benson
The document summarizes research on developing scalable algorithms for counting temporal network motifs in real-time from high-throughput temporal network data streams. It discusses existing methods being insufficient and the problem of not having algorithms that can analyze modern temporal network datasets at fine time scales and high frequencies. It also briefly introduces the idea of using parallel sampling to speed up motif counting algorithms and enable analysis of very large temporal networks.
The document discusses three perspectives on predicting sets of items rather than single items. It describes how sets are common in data such as team formations, medical codes, and online purchases. It then discusses three specific approaches to set prediction: (1) predicting which sets an individual will interact with based on their history, (2) modeling sequences of sets using a generative model, and (3) understanding characteristics of set-based data like subsets and repeats. Applications include prediction, analysis, and simulation.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Learning multifractal structure in large networks (KDD 2014)
1. Learning Multifractal Structure in Large Networks
Austin Benson, Carlos Riquelme, Sven Schmit
Stanford University
f arbenson, rikel, schmit g @ stanford.edu
Knowledge Discovery and Data Mining (KDD)
August 26, 2014
2. Setting
We want a simple, scalable method to model networks and generate
random (undirected) graphs
I Looking for graph generators that can mimic real world graph
structure
{ Power law degree distribution,
{ High clustering coecient, etc.
I Many models have been proposed, starting with Erdos-Renyi graphs
I Relatively recent models: SKG [Leskovec et al. 2010], BTER
[Seshadhri et al. 2012], TCL [Pfeier et al. 2012]
I In 2011 Palla et al. introduce multifractal network generators,
`generalizing' SKG
2
3. Our contributions
We propose methods to make MFNG a feasible framework to model large
networks
3
4. Our contributions
We propose methods to make MFNG a feasible framework to model large
networks
I First, we give an intuitive theoretical result that opens the door to
scalable estimation
I We show how we can
5. t MFNG to graphs using mehod of moments
estimation, with runtime independent of the size of the graph
I We develop a fast heuristic for sampling MFNG
I We demonstrate the ectiveness of our approach in synthetic and
real world settings.
3
6. An introduction to Multifractal Network Generators
(MFNG)
Ingredients
I Number of nodes: n
I Number of categories: m with speci
7. ed lenghts li
I Number of recursive levels: k logm(n)
I Probabilities of edges between nodes, based on categories, stored in
matrix P 2 [0; 1]mm
4
9. rst: k = 1
I Begin with a line: [0; 1]
I Divide the line in m intervals (or categories) with lengths
l1; l2; : : : ; lm
I Sample nodes on the line according to a uniform distribution: this
gives every node a category
x2
x3
c1 c2
x1
0 1
5
10. From line to square
c1 c2
x3
c2
x2
c1
x1
x2
x3
x1
pc1;c1
pc2;c2
pc1;c2
pc1;c2
I For any two nodes u 2 ci; v 2 cj , add an edge with probability
according to pci;cj
6
14. nd categories
of nodes in the next layer
x2
x3
c1 c2
x1
0 1
x1
x2
0 c1 c2 1
Now add an edge between nodes by multiplying probabilities
corresponding to categories in each layer.
In the above two layer example
I node x1 has categories (c1; c1),
I node x2 has categories (c1; c2), and
I node x3 has categories (c2; c2)
And hence, we add edge (x1; x2) with probability pc1;c1pc1;c2 .
7
15. Expanding the recursion
So we can get a full probabilistic adjacency matrix Q 2 [0; 1]mkmk
by
expanding all recursive levels
Problem: Q grows fast with k. Dicult to do inference.
Intuitively, we should not have to do this.
8
16. Main theoretical result
Consider sampling k graphs from a MFNG with 1 recursive level, and
construct a new graph G
by taking the intersection over graphs:
H1 H2 H3 G
Then G
has same distribution as a graph G generated from a MFNG
with k recursive levels.
9
17. Computing expected number of edges is easy
p11 p12
p22
xi
xj
p13
p23
p33
`1 `2 `3
Prob((u; v) 2 E) = p =
X3
i=1
X3
j=1
`i`jpij ; E fjEjg =
n
2
pk
So computing p is O(m2) instead of O(m2k).
10
18. Computing moments of certain subgraphs is easy
With above theory, we can easily compute the expected number of...
I edges, wedges, 3-stars, 4-stars ...
I triangles, 4-cliques...
S2 S3 S4 K3 K4
11
19. We can learn multifractal structure quickly
Method of moments:
1. Count number of wedges, 3-stars, triangles, 4-cliques, etc. in
network of interest
2. Try to
20. nd parameters such that the expected values, E[Fi], match
the empirical counts, fi
minimize
P;`;r
X
i
jfi E[Fi]j
fi
subject to 0 pij = pji 1; 1 i j c
0 `i 1; 1 i c
Xm
i=1
`i = 1
Key idea: Once we have the counts (fi), this optimization routine is
independent of the size of the graph.
12
21. Method of moments recovers small synthetic graphs
Original MFNG, Single sample, Recovered MFNG
jV j m k `1 `2 p11 p12 p22
Original 6,000 2 10 0.25 0.75 0.59 0.43 0.78
Recovered 6,000 2 9 0.2728 0.7272 0.5431 0.4101 0.7593
13
22. Twitter network
edges wedges 3−stars 4−stars triangles4−cliques
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
0
Expected / empirical
Twitter
MFNG−2
MFNG−3
SKG MoM
KronFit
104
103
102
101
100 101 102 103 104
Degree
100
Number of nodes
Twitter
real
MFNG (m=2)
MFNG (m=3)
Comparison against a method of moments for Stochastic Kronecker
Graphs [Gleich and Owen 2012] and KronFit [Leskovec et al. 2010]
14
23. Citation network
edges wedges 3−stars 4−stars triangles4−cliques
2
1.5
1
0.5
0
Expected / empirical
Citation
MFNG−2
MFNG−3
SKG MoM
KronFit
104
103
102
101
100 101 102 103
Degree
100
Number of nodes
Citation
real
MFNG (m=2)
MFNG (m=3)
I Triangles and 4-cliques are again matched in expectation.
I We employ noisy SKG strategy [Seshadhri et al. 2013] to dampen
the degree distribution.
15
24. Fast sampling is challenging
I Naive way:
ip a coin for each O(n2), while we would like O(jEj)
I Idea from SKG:
25. x number of edges and then use `ball-dropping'
I Problem for MFNG: many nodes can fall into a single box, we have
to ensure we still sample enough edges from that box
p11 p12
p22
p12
16
26. Conclusion
We proposed methods to make MFNG a feasible framework to model
large networks
I First, we give an intuitive theoretical result that opens the door to
scalable estimation
I We show how we can
27. t MFNG parameters to arbitrarily largh
graphs using mehod of moments estimation
I We develop a fast heuristic for sampling MFNG
I We demonstrate the ectiveness of our approach in synthetic and
real world settings
17
28. Learning Multifractal Structure in Large Networks
Questions?
I Austin Benson: arbenson@stanford.edu
I Carlos Riquelme: rikel@stanford.edu
I Sven Schmit: schmit@stanford.edu
18