SlideShare a Scribd company logo
A Study on Privacy Level in
Publishing Data of Smart Tap Network
The University of Tokyo

Esaki Laboratory

Tran Quoc Hoan 2014.03.18@Niigata
1
Outline
1. Background & Purpose

2. Related works

3. Proposal

4. Methodology

5. Result & Discussion

6. Conclusion
2
Background & Purpose
• Background

1. Smart tap & Big data

2. Privacy Preserving Data
Publishing (PPDP)

3. Difficulty in anonymising
time series data

• Research purpose

• Using entropy to quantify the
risk of publishing smart tap’s
data
Alice Bob Peter
Original

Dataset
Data 

Recipient
DataPublishingDataCollectionDataanonymise
Data 

Processor
3
Related works
1. Smart Metering & Privacy (Quinn, 2009)

2. Time series chaos analysis in physiology

• Approximate Entropy (Pincus, 1992)

• Bias effect (Ex. random noise)

• Sample Entropy (Richman, 2001)

• Avoiding of bias effect

• Difference from original entropy definition
4
15.556%
31.111%
46.667%
62.222%
Proposal(1): Privacy Level
• “Privacy level” = quantity of human activity
information in power consumption data (%)
Refrigerator 

(regularity)
Time points Time points Time points
power value power value power value
White-noise 

(irregularity)
Laptop 

(???)
Privacylevel
• Evaluation of regularity (entropy)
5
22.222%
44.444%
66.667%
88.889%
Proposal(2): Entropy rate
• Entropy Rate = Entropy(data)/Entropy(white-noise)
1
0
Privacy Level = EnRate
Entropy 

rate
Refrigerator 

(regularity)
White-noise 

(irregularity)
Laptop 

(???)
HRate
LRate
Time points Time points Time points
power value power value power value
Publish Safe
Publish Safe
6
Proposing Methodology
1. Decide parameters for entropy calculation 

• Time lag, m, r

2. Calculate entropy value, entropy rate

3. Decide LRate, HRate and privacy level
• Using Approximate Entropy (ApEn) & Sample Entropy (SaEn)
7
Parameters for entropy calculation
8
0
15
30
45
60
Ex. lag = 1, m=3
• Time series x[1], x[2], …, x[N]

• pattern i: (x[i],x[i+lag],…,x[i+(m-1)lag])

• m: number of data points in pattern

• lag: sampling interval in pattern

• dis(i,j)=max(|x[i+(p-1)lag]-x[j+(p-1)lag]|, p=0,m-1)

• r: dis(i,j) ≤ r → pattern i ∼ pattern j
pattern i j ki j ki
8
Entropy Calculation
• A(i): number of pattern k similar with pattern i ( k != i)

• B(i): number of pattern (k+lag) similar with pattern (i+lag)
Bias when A(i)=B(i)=0 (random noise)
ー ー
0
15
30
45
60
Time points
Ex. lag = 1, m=3
j ki
i+lag
j+lag k+lagi+lag
9
Setting time lag
First ACF zero-crossing lag = 7

ApEn = 1.223; SaEn = 0.944
First ACF zero-crossing lag = 198

ApEn = 1.299; SaEn = 1.457
10
Setting m, r
Choose m, r satisfy

95%Confidence Interval of
the Estimate ≤ 10%SaEn
White-noise Entropy
Choose m, r maximum ApEn
バイアス

領域
std: standard deviation
m=2,3

r=0,1->0.4
11
Evaluation
1. Learning data set (for setting m, r)

• Tracebase (tracebase.org) (138 devices)

• m=2,3; r=0.1→0.4

2. Evaluation data set

• IREF Building 2F-5F (136 devices, 5 weeks)
12
IREF 136 devs EnRate (5 weeks)
SaEnRate
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
ApEnRate
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Result (1)
m=2, r=0.2*standard deviation
13
Result (2)IREF Laptop EnRate (11 devs, 5 weeks)
SaEnRate
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
ApEnRate
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
HRate
LRate
LRate HRate
LRate = Mean - Standard Deviation

HRate = Mean + Standard Deviation
Warning
14
Discussion
1. Entropy is sensitive to data sets that include outliers

2. Relation between entropy and privacy of data

3. Future work

• Calculate entropy with meaning patterns

• Using entropy for other knowledge (device classification,
abnormal pattern detection,…)

• Privacy Preserving Protocol
15
Conclusion
1. Quantified the human activity
information included in smart-taps’ data

2. Applied entropy in physiology (ApEn,
SaEn) to power consumption data

3. Defined entropy rate to determine
privacy level of published power
consumption data
16
A Study on Privacy Level in
Publishing Data of Smart Tap Network
Esaki Laboratory

zoro@hongo.wide.ad.jp
Thank you for listening !
17
Backup slides
18
Demand and Supply
1. Demand Oriented Approach of Power Grid

• Supply matches volatile demand

• Supply side is volatile as well

2. Bi-directional communication (Internet of Things)

• Anticipate future supply/demand

• Shape demand, supply-oriented

• Personal data is needed for effective demand side management
19
Risk of Privacy Abuse
20
Inference forward channel
Inference backward channel
By consumption patterns

• Appliance detection

• Use mode detection

• Behavior deduction
By demand response data

• Incentive sensitivity

• Customer preference
Household Managements

Data collectors
Ex. Behavior Patterns:

• Washing (10h-12h)

• TV (19h-23h)

• Out (12h-18h)
The Concept of EU for Privacy
21
Discriminator
Machine learning
x

Pseudonym
Consumption Data
non-identifying

information
identifying

information
Pseudonymization
Template Data
Source: “Privacy in the Smart Energy Grid”, 

Lecture at NII 2014-03-13, Prof. Gunter Muller
Service Feedback Loop
22
Household
Service Provider

Billing

Aggregation

Compliance Verification
Data collectors
• Bill

• Consumption Target
Consumption 

trace
(My research) 

Privacy level = (??)%
Query
Privacy Preserving

Protocol
$$$
Future work
Encryption
Service Provider

Billing

Aggregation

Compliance Verification
Service Provider

Billing

Aggregation

Compliance Verification
Privacy Preserving Query Scenario
23
Q1. How many people have energy consumption between 19h-20h which
is over the average ?
Q2. How many people have energy consumption between 19h-20h which
is over the average except Tanaka ?
None-privateQ1: 125, Q2: 124
Attacker

Detection
Privacy preservingQ1: 125, Q2: 127
Service

Provider
Data

Collectors
Evaluation System
Time series 

segmentation
Real Event

Mapping
Quantify

Privacy Level
24
Linkage Attack
in: 9h-10h, 13h-13h30

out: 10h-13h, 13h30-
in: 12h-14h, 16h-18h

out: 18h-
peak: 16h-18hCategorization
Alice Bob Peter
Third party

information
3 people in the room: Alice, Bob, Peter

Peter has printer, Alice has monitor, Bob has PC
Published

Data
Identify
25
Regularity in Time Series
• Linear method can’t solve problem => Nonlinear Analysis
Refrigerator data 

and its surrogate
ACF and periodgram
Time points
26
Entropy (1)
• Display time series data in phase-space 

y(m,t) = [x(t), x(t+lag), …, x(t+(m-1)lag)]
• Approximate Entropy (ApEn) and Sample Entropy (SaEn):
evaluate trajectory matching conditional probability
x(t+7)
x(t)
x(t)
x(t+7)
x(t+14)
m=2, lag=7 m=3, lag=7
27
Setting time lag
• Time lag = First zero-crossing of ACF
Dev Lag ApEn SaEn
Unknown 500 0.348 0.473
Refri 7 1.223 0.944
Laptop 198 1.299 1.457
Noise 2 3.025 3.247
28
Setting m, r (1)
29
• K_A, K_B : overlapped template matching patterns
number (pattern length m, m+1)
• 95% Confidence of SaEn
Setting m, r (2)
m=2, r=(0.1~0.4)std
training for parameters: tracebase dataset
30
Experiment
Data set Tracebase IREF
Smart tap type Plugwise Plugwise
Number of devices 138 136
Time range Variation 5 weeks
Sampling interval 1 s 2 mins
Usage Training for m, r Evaluation
Result
m=2,3
r=0.1~0.4 std
***
31
Result (1)
IREF : 136 devices, 5 weeks
32
Other knowledge from entropy rate (?)
Device classification & abnormal detection

More Related Content

What's hot

Object extraction from satellite imagery using deep learning
Object extraction from satellite imagery using deep learningObject extraction from satellite imagery using deep learning
Object extraction from satellite imagery using deep learning
Aly Abdelkareem
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
LEGATO project
 
Building a Better TSA Screening Algorithm
Building a Better TSA Screening AlgorithmBuilding a Better TSA Screening Algorithm
Building a Better TSA Screening Algorithm
Yvonne K. Matos
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
IJECEIAES
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
Leila_maleke
 
Modelling of wireless sensor networks for detection land and forest fire hotspot
Modelling of wireless sensor networks for detection land and forest fire hotspotModelling of wireless sensor networks for detection land and forest fire hotspot
Modelling of wireless sensor networks for detection land and forest fire hotspot
TELKOMNIKA JOURNAL
 
Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSN
IRJET Journal
 
Classical force fields as physics-based neural networks
Classical force fields as physics-based neural networksClassical force fields as physics-based neural networks
Classical force fields as physics-based neural networks
aimsnist
 
Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...
Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...
Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...
Chih-Chuan Cheng
 
Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...
Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...
Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...Fisnik Kraja
 
Neural network-based low-frequency data extrapolation
Neural network-based low-frequency data extrapolationNeural network-based low-frequency data extrapolation
Neural network-based low-frequency data extrapolation
Oleg Ovcharenko
 
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
Naoki Shibata
 
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless  Sensor NetworksAn Efficient top- k Query Processing in Distributed Wireless  Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
IJMER
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
Sachin MS
 
Isawel
IsawelIsawel
Isawel
Rita Pucci
 
Emotion recognition-from-multichannel-eeg-signal-using-2 d
Emotion recognition-from-multichannel-eeg-signal-using-2 dEmotion recognition-from-multichannel-eeg-signal-using-2 d
Emotion recognition-from-multichannel-eeg-signal-using-2 d
Syeda Umme Ayman Shoity
 
Transfer learning for low frequency extrapolation from shot gathers for FWI a...
Transfer learning for low frequency extrapolation from shot gathers for FWI a...Transfer learning for low frequency extrapolation from shot gathers for FWI a...
Transfer learning for low frequency extrapolation from shot gathers for FWI a...
Oleg Ovcharenko
 
NeuralProcessingofGeneralPurposeApproximatePrograms
NeuralProcessingofGeneralPurposeApproximateProgramsNeuralProcessingofGeneralPurposeApproximatePrograms
NeuralProcessingofGeneralPurposeApproximateProgramsMohid Nabil
 
Feasibility of moment tensor inversion for a single-well microseismic data us...
Feasibility of moment tensor inversion for a single-well microseismic data us...Feasibility of moment tensor inversion for a single-well microseismic data us...
Feasibility of moment tensor inversion for a single-well microseismic data us...
Oleg Ovcharenko
 
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction ChallengeESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
Francisco Zamora-Martinez
 

What's hot (20)

Object extraction from satellite imagery using deep learning
Object extraction from satellite imagery using deep learningObject extraction from satellite imagery using deep learning
Object extraction from satellite imagery using deep learning
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
 
Building a Better TSA Screening Algorithm
Building a Better TSA Screening AlgorithmBuilding a Better TSA Screening Algorithm
Building a Better TSA Screening Algorithm
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
 
Using wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest firesUsing wireless sensor networks for reliable forest fires
Using wireless sensor networks for reliable forest fires
 
Modelling of wireless sensor networks for detection land and forest fire hotspot
Modelling of wireless sensor networks for detection land and forest fire hotspotModelling of wireless sensor networks for detection land and forest fire hotspot
Modelling of wireless sensor networks for detection land and forest fire hotspot
 
Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSN
 
Classical force fields as physics-based neural networks
Classical force fields as physics-based neural networksClassical force fields as physics-based neural networks
Classical force fields as physics-based neural networks
 
Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...
Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...
Extend Your Journey: Considering Signal Strength and Fluctuation in Location-...
 
Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...
Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...
Performance Analysis and Optimizations of CAE Applications (Case Study: STAR_...
 
Neural network-based low-frequency data extrapolation
Neural network-based low-frequency data extrapolationNeural network-based low-frequency data extrapolation
Neural network-based low-frequency data extrapolation
 
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
 
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless  Sensor NetworksAn Efficient top- k Query Processing in Distributed Wireless  Sensor Networks
An Efficient top- k Query Processing in Distributed Wireless Sensor Networks
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
 
Isawel
IsawelIsawel
Isawel
 
Emotion recognition-from-multichannel-eeg-signal-using-2 d
Emotion recognition-from-multichannel-eeg-signal-using-2 dEmotion recognition-from-multichannel-eeg-signal-using-2 d
Emotion recognition-from-multichannel-eeg-signal-using-2 d
 
Transfer learning for low frequency extrapolation from shot gathers for FWI a...
Transfer learning for low frequency extrapolation from shot gathers for FWI a...Transfer learning for low frequency extrapolation from shot gathers for FWI a...
Transfer learning for low frequency extrapolation from shot gathers for FWI a...
 
NeuralProcessingofGeneralPurposeApproximatePrograms
NeuralProcessingofGeneralPurposeApproximateProgramsNeuralProcessingofGeneralPurposeApproximatePrograms
NeuralProcessingofGeneralPurposeApproximatePrograms
 
Feasibility of moment tensor inversion for a single-well microseismic data us...
Feasibility of moment tensor inversion for a single-well microseismic data us...Feasibility of moment tensor inversion for a single-well microseismic data us...
Feasibility of moment tensor inversion for a single-well microseismic data us...
 
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction ChallengeESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
ESAI-CEU-UCH solution for American Epilepsy Society Seizure Prediction Challenge
 

Viewers also liked

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
Jonathan Ezor
 
protecting software innovations
protecting software innovationsprotecting software innovations
protecting software innovationswelcometofacebook
 
001 20151005 ranking_nodesingrowingnetwork
001 20151005 ranking_nodesingrowingnetwork001 20151005 ranking_nodesingrowingnetwork
001 20151005 ranking_nodesingrowingnetwork
Ha Phuong
 
Prediction io–final 2014-jp-handout
Prediction io–final 2014-jp-handoutPrediction io–final 2014-jp-handout
Prediction io–final 2014-jp-handout
Ha Phuong
 
002 20151019 interconnected_network
002 20151019 interconnected_network002 20151019 interconnected_network
002 20151019 interconnected_network
Ha Phuong
 
015_20160422 Controlling Synchronous Patterns In Complex Networks
015_20160422 Controlling Synchronous Patterns In Complex Networks015_20160422 Controlling Synchronous Patterns In Complex Networks
015_20160422 Controlling Synchronous Patterns In Complex Networks
Ha Phuong
 
005 20151130 adversary_networks
005 20151130 adversary_networks005 20151130 adversary_networks
005 20151130 adversary_networks
Ha Phuong
 
003 20151109 nn_faster_andfaster
003 20151109 nn_faster_andfaster003 20151109 nn_faster_andfaster
003 20151109 nn_faster_andfaster
Ha Phuong
 
004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics
004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics
004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics
Ha Phuong
 
Privacy (architectural behaviour)
Privacy (architectural behaviour)Privacy (architectural behaviour)
Privacy (architectural behaviour)
Anuoluwaposimi
 
PredictionIO – A Machine Learning Server in Scala – SF Scala
PredictionIO – A Machine Learning Server in Scala – SF ScalaPredictionIO – A Machine Learning Server in Scala – SF Scala
PredictionIO – A Machine Learning Server in Scala – SF Scala
predictionio
 

Viewers also liked (11)

Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
protecting software innovations
protecting software innovationsprotecting software innovations
protecting software innovations
 
001 20151005 ranking_nodesingrowingnetwork
001 20151005 ranking_nodesingrowingnetwork001 20151005 ranking_nodesingrowingnetwork
001 20151005 ranking_nodesingrowingnetwork
 
Prediction io–final 2014-jp-handout
Prediction io–final 2014-jp-handoutPrediction io–final 2014-jp-handout
Prediction io–final 2014-jp-handout
 
002 20151019 interconnected_network
002 20151019 interconnected_network002 20151019 interconnected_network
002 20151019 interconnected_network
 
015_20160422 Controlling Synchronous Patterns In Complex Networks
015_20160422 Controlling Synchronous Patterns In Complex Networks015_20160422 Controlling Synchronous Patterns In Complex Networks
015_20160422 Controlling Synchronous Patterns In Complex Networks
 
005 20151130 adversary_networks
005 20151130 adversary_networks005 20151130 adversary_networks
005 20151130 adversary_networks
 
003 20151109 nn_faster_andfaster
003 20151109 nn_faster_andfaster003 20151109 nn_faster_andfaster
003 20151109 nn_faster_andfaster
 
004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics
004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics
004 20151116 deep_unsupervisedlearningusingnonequlibriumthermodynamics
 
Privacy (architectural behaviour)
Privacy (architectural behaviour)Privacy (architectural behaviour)
Privacy (architectural behaviour)
 
PredictionIO – A Machine Learning Server in Scala – SF Scala
PredictionIO – A Machine Learning Server in Scala – SF ScalaPredictionIO – A Machine Learning Server in Scala – SF Scala
PredictionIO – A Machine Learning Server in Scala – SF Scala
 

Similar to A Study on Privacy Level in Publishing Data of Smart Tap Network

Efficient Online Evaluation of Big Data Stream Classifiers
Efficient Online Evaluation of Big Data Stream ClassifiersEfficient Online Evaluation of Big Data Stream Classifiers
Efficient Online Evaluation of Big Data Stream Classifiers
Albert Bifet
 
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
Salford Systems
 
Semantics in Sensor Networks
Semantics in Sensor NetworksSemantics in Sensor Networks
Semantics in Sensor Networks
Oscar Corcho
 
01-pengantar.pdf
01-pengantar.pdf01-pengantar.pdf
01-pengantar.pdf
ssuseradaf5f
 
Time-series forecasting of indoor temperature using pre-trained Deep Neural N...
Time-series forecasting of indoor temperature using pre-trained Deep Neural N...Time-series forecasting of indoor temperature using pre-trained Deep Neural N...
Time-series forecasting of indoor temperature using pre-trained Deep Neural N...
Francisco Zamora-Martinez
 
Realtime, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Realtime, Non-Intrusive Evaluation of VoIP Using Genetic ProgrammingRealtime, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Realtime, Non-Intrusive Evaluation of VoIP Using Genetic Programming
adil raja
 
Predicting Human Count through Environmental Sensing in Closed Indoor Settings
Predicting Human Count through Environmental Sensing in Closed Indoor SettingsPredicting Human Count through Environmental Sensing in Closed Indoor Settings
Predicting Human Count through Environmental Sensing in Closed Indoor Settings
Tarik Reza Toha
 
The painful removal of tiling artefacts in hypersprectral data
The painful removal of tiling artefacts in hypersprectral dataThe painful removal of tiling artefacts in hypersprectral data
The painful removal of tiling artefacts in hypersprectral data
CSIRO
 
Big Data Challenges and Solutions
Big Data Challenges and SolutionsBig Data Challenges and Solutions
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
Vienna Data Science Group
 
Deep Learning for AI (3)
Deep Learning for AI (3)Deep Learning for AI (3)
Deep Learning for AI (3)
Dongheon Lee
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
bigdataviz_bay
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
Kato Mivule
 
Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...
Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...
Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...
cscpconf
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
csandit
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Data Works MD
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Seminar nov2017
Seminar nov2017Seminar nov2017
Seminar nov2017
Ahmed Youssef Ali Amer
 

Similar to A Study on Privacy Level in Publishing Data of Smart Tap Network (20)

Efficient Online Evaluation of Big Data Stream Classifiers
Efficient Online Evaluation of Big Data Stream ClassifiersEfficient Online Evaluation of Big Data Stream Classifiers
Efficient Online Evaluation of Big Data Stream Classifiers
 
ODVSML_Presentation
ODVSML_PresentationODVSML_Presentation
ODVSML_Presentation
 
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
A Hybrid Method of CART and Artificial Neural Network for Short Term Load For...
 
Semantics in Sensor Networks
Semantics in Sensor NetworksSemantics in Sensor Networks
Semantics in Sensor Networks
 
01-pengantar.pdf
01-pengantar.pdf01-pengantar.pdf
01-pengantar.pdf
 
Time-series forecasting of indoor temperature using pre-trained Deep Neural N...
Time-series forecasting of indoor temperature using pre-trained Deep Neural N...Time-series forecasting of indoor temperature using pre-trained Deep Neural N...
Time-series forecasting of indoor temperature using pre-trained Deep Neural N...
 
Realtime, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Realtime, Non-Intrusive Evaluation of VoIP Using Genetic ProgrammingRealtime, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Realtime, Non-Intrusive Evaluation of VoIP Using Genetic Programming
 
Predicting Human Count through Environmental Sensing in Closed Indoor Settings
Predicting Human Count through Environmental Sensing in Closed Indoor SettingsPredicting Human Count through Environmental Sensing in Closed Indoor Settings
Predicting Human Count through Environmental Sensing in Closed Indoor Settings
 
The painful removal of tiling artefacts in hypersprectral data
The painful removal of tiling artefacts in hypersprectral dataThe painful removal of tiling artefacts in hypersprectral data
The painful removal of tiling artefacts in hypersprectral data
 
Big Data Challenges and Solutions
Big Data Challenges and SolutionsBig Data Challenges and Solutions
Big Data Challenges and Solutions
 
rerngvit_phd_seminar
rerngvit_phd_seminarrerngvit_phd_seminar
rerngvit_phd_seminar
 
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
Wastian, Brunmeir - Data Analyses in Industrial Applications: From Predictive...
 
Deep Learning for AI (3)
Deep Learning for AI (3)Deep Learning for AI (3)
Deep Learning for AI (3)
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...
Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...
Neural Networks for High Performance Time-Delay Estimation and Acoustic Sourc...
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
 
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
Exploring Correlation Between Sentiment of Environmental Tweets and the Stock...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Seminar nov2017
Seminar nov2017Seminar nov2017
Seminar nov2017
 

More from Ha Phuong

QTML2021 UAP Quantum Feature Map
QTML2021 UAP Quantum Feature MapQTML2021 UAP Quantum Feature Map
QTML2021 UAP Quantum Feature Map
Ha Phuong
 
CCS2019-opological time-series analysis with delay-variant embedding
CCS2019-opological time-series analysis with delay-variant embeddingCCS2019-opological time-series analysis with delay-variant embedding
CCS2019-opological time-series analysis with delay-variant embedding
Ha Phuong
 
SIAM-AG21-Topological Persistence Machine of Phase Transition
SIAM-AG21-Topological Persistence Machine of Phase TransitionSIAM-AG21-Topological Persistence Machine of Phase Transition
SIAM-AG21-Topological Persistence Machine of Phase Transition
Ha Phuong
 
018 20160902 Machine Learning Framework for Analysis of Transport through Com...
018 20160902 Machine Learning Framework for Analysis of Transport through Com...018 20160902 Machine Learning Framework for Analysis of Transport through Com...
018 20160902 Machine Learning Framework for Analysis of Transport through Com...
Ha Phuong
 
017_20160826 Thermodynamics Of Stochastic Turing Machines
017_20160826 Thermodynamics Of Stochastic Turing Machines017_20160826 Thermodynamics Of Stochastic Turing Machines
017_20160826 Thermodynamics Of Stochastic Turing Machines
Ha Phuong
 
016_20160722 Molecular Circuits For Dynamic Noise Filtering
016_20160722 Molecular Circuits For Dynamic Noise Filtering016_20160722 Molecular Circuits For Dynamic Noise Filtering
016_20160722 Molecular Circuits For Dynamic Noise Filtering
Ha Phuong
 
Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)
Ha Phuong
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)
Ha Phuong
 
013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility
Ha Phuong
 
011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_map011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_map
Ha Phuong
 
010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian Process010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian Process
Ha Phuong
 
009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain Networks009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain Networks
Ha Phuong
 
PRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling MethodPRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling Method
Ha Phuong
 
Approximate Inference (Chapter 10, PRML Reading)
Approximate Inference (Chapter 10, PRML Reading)Approximate Inference (Chapter 10, PRML Reading)
Approximate Inference (Chapter 10, PRML Reading)
Ha Phuong
 
008 20151221 Return of Frustrating Easy Domain Adaptation
008 20151221 Return of Frustrating Easy Domain Adaptation008 20151221 Return of Frustrating Easy Domain Adaptation
008 20151221 Return of Frustrating Easy Domain Adaptation
Ha Phuong
 
007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics
007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics
007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics
Ha Phuong
 
006 20151207 draws - Deep Recurrent Attentive Writer
006 20151207 draws - Deep Recurrent Attentive Writer006 20151207 draws - Deep Recurrent Attentive Writer
006 20151207 draws - Deep Recurrent Attentive Writer
Ha Phuong
 
Deep Learning And Business Models (VNITC 2015-09-13)
Deep Learning And Business Models (VNITC 2015-09-13)Deep Learning And Business Models (VNITC 2015-09-13)
Deep Learning And Business Models (VNITC 2015-09-13)
Ha Phuong
 

More from Ha Phuong (18)

QTML2021 UAP Quantum Feature Map
QTML2021 UAP Quantum Feature MapQTML2021 UAP Quantum Feature Map
QTML2021 UAP Quantum Feature Map
 
CCS2019-opological time-series analysis with delay-variant embedding
CCS2019-opological time-series analysis with delay-variant embeddingCCS2019-opological time-series analysis with delay-variant embedding
CCS2019-opological time-series analysis with delay-variant embedding
 
SIAM-AG21-Topological Persistence Machine of Phase Transition
SIAM-AG21-Topological Persistence Machine of Phase TransitionSIAM-AG21-Topological Persistence Machine of Phase Transition
SIAM-AG21-Topological Persistence Machine of Phase Transition
 
018 20160902 Machine Learning Framework for Analysis of Transport through Com...
018 20160902 Machine Learning Framework for Analysis of Transport through Com...018 20160902 Machine Learning Framework for Analysis of Transport through Com...
018 20160902 Machine Learning Framework for Analysis of Transport through Com...
 
017_20160826 Thermodynamics Of Stochastic Turing Machines
017_20160826 Thermodynamics Of Stochastic Turing Machines017_20160826 Thermodynamics Of Stochastic Turing Machines
017_20160826 Thermodynamics Of Stochastic Turing Machines
 
016_20160722 Molecular Circuits For Dynamic Noise Filtering
016_20160722 Molecular Circuits For Dynamic Noise Filtering016_20160722 Molecular Circuits For Dynamic Noise Filtering
016_20160722 Molecular Circuits For Dynamic Noise Filtering
 
Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)
 
013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility
 
011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_map011_20160321_Topological_data_analysis_of_contagion_map
011_20160321_Topological_data_analysis_of_contagion_map
 
010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian Process010_20160216_Variational Gaussian Process
010_20160216_Variational Gaussian Process
 
009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain Networks009_20150201_Structural Inference for Uncertain Networks
009_20150201_Structural Inference for Uncertain Networks
 
PRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling MethodPRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling Method
 
Approximate Inference (Chapter 10, PRML Reading)
Approximate Inference (Chapter 10, PRML Reading)Approximate Inference (Chapter 10, PRML Reading)
Approximate Inference (Chapter 10, PRML Reading)
 
008 20151221 Return of Frustrating Easy Domain Adaptation
008 20151221 Return of Frustrating Easy Domain Adaptation008 20151221 Return of Frustrating Easy Domain Adaptation
008 20151221 Return of Frustrating Easy Domain Adaptation
 
007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics
007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics
007 20151214 Deep Unsupervised Learning using Nonequlibrium Thermodynamics
 
006 20151207 draws - Deep Recurrent Attentive Writer
006 20151207 draws - Deep Recurrent Attentive Writer006 20151207 draws - Deep Recurrent Attentive Writer
006 20151207 draws - Deep Recurrent Attentive Writer
 
Deep Learning And Business Models (VNITC 2015-09-13)
Deep Learning And Business Models (VNITC 2015-09-13)Deep Learning And Business Models (VNITC 2015-09-13)
Deep Learning And Business Models (VNITC 2015-09-13)
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 

A Study on Privacy Level in Publishing Data of Smart Tap Network

  • 1. A Study on Privacy Level in Publishing Data of Smart Tap Network The University of Tokyo Esaki Laboratory Tran Quoc Hoan 2014.03.18@Niigata 1
  • 2. Outline 1. Background & Purpose 2. Related works 3. Proposal 4. Methodology 5. Result & Discussion 6. Conclusion 2
  • 3. Background & Purpose • Background 1. Smart tap & Big data 2. Privacy Preserving Data Publishing (PPDP) 3. Difficulty in anonymising time series data • Research purpose • Using entropy to quantify the risk of publishing smart tap’s data Alice Bob Peter Original Dataset Data Recipient DataPublishingDataCollectionDataanonymise Data Processor 3
  • 4. Related works 1. Smart Metering & Privacy (Quinn, 2009) 2. Time series chaos analysis in physiology • Approximate Entropy (Pincus, 1992) • Bias effect (Ex. random noise) • Sample Entropy (Richman, 2001) • Avoiding of bias effect • Difference from original entropy definition 4
  • 5. 15.556% 31.111% 46.667% 62.222% Proposal(1): Privacy Level • “Privacy level” = quantity of human activity information in power consumption data (%) Refrigerator (regularity) Time points Time points Time points power value power value power value White-noise (irregularity) Laptop (???) Privacylevel • Evaluation of regularity (entropy) 5
  • 6. 22.222% 44.444% 66.667% 88.889% Proposal(2): Entropy rate • Entropy Rate = Entropy(data)/Entropy(white-noise) 1 0 Privacy Level = EnRate Entropy rate Refrigerator (regularity) White-noise (irregularity) Laptop (???) HRate LRate Time points Time points Time points power value power value power value Publish Safe Publish Safe 6
  • 7. Proposing Methodology 1. Decide parameters for entropy calculation • Time lag, m, r 2. Calculate entropy value, entropy rate 3. Decide LRate, HRate and privacy level • Using Approximate Entropy (ApEn) & Sample Entropy (SaEn) 7
  • 8. Parameters for entropy calculation 8 0 15 30 45 60 Ex. lag = 1, m=3 • Time series x[1], x[2], …, x[N] • pattern i: (x[i],x[i+lag],…,x[i+(m-1)lag]) • m: number of data points in pattern • lag: sampling interval in pattern • dis(i,j)=max(|x[i+(p-1)lag]-x[j+(p-1)lag]|, p=0,m-1) • r: dis(i,j) ≤ r → pattern i ∼ pattern j pattern i j ki j ki 8
  • 9. Entropy Calculation • A(i): number of pattern k similar with pattern i ( k != i) • B(i): number of pattern (k+lag) similar with pattern (i+lag) Bias when A(i)=B(i)=0 (random noise) ー ー 0 15 30 45 60 Time points Ex. lag = 1, m=3 j ki i+lag j+lag k+lagi+lag 9
  • 10. Setting time lag First ACF zero-crossing lag = 7 ApEn = 1.223; SaEn = 0.944 First ACF zero-crossing lag = 198 ApEn = 1.299; SaEn = 1.457 10
  • 11. Setting m, r Choose m, r satisfy 95%Confidence Interval of the Estimate ≤ 10%SaEn White-noise Entropy Choose m, r maximum ApEn バイアス 領域 std: standard deviation m=2,3 r=0,1->0.4 11
  • 12. Evaluation 1. Learning data set (for setting m, r) • Tracebase (tracebase.org) (138 devices) • m=2,3; r=0.1→0.4 2. Evaluation data set • IREF Building 2F-5F (136 devices, 5 weeks) 12
  • 13. IREF 136 devs EnRate (5 weeks) SaEnRate 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 ApEnRate 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Result (1) m=2, r=0.2*standard deviation 13
  • 14. Result (2)IREF Laptop EnRate (11 devs, 5 weeks) SaEnRate 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 ApEnRate 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 HRate LRate LRate HRate LRate = Mean - Standard Deviation HRate = Mean + Standard Deviation Warning 14
  • 15. Discussion 1. Entropy is sensitive to data sets that include outliers 2. Relation between entropy and privacy of data 3. Future work • Calculate entropy with meaning patterns • Using entropy for other knowledge (device classification, abnormal pattern detection,…) • Privacy Preserving Protocol 15
  • 16. Conclusion 1. Quantified the human activity information included in smart-taps’ data 2. Applied entropy in physiology (ApEn, SaEn) to power consumption data 3. Defined entropy rate to determine privacy level of published power consumption data 16
  • 17. A Study on Privacy Level in Publishing Data of Smart Tap Network Esaki Laboratory zoro@hongo.wide.ad.jp Thank you for listening ! 17
  • 19. Demand and Supply 1. Demand Oriented Approach of Power Grid • Supply matches volatile demand • Supply side is volatile as well 2. Bi-directional communication (Internet of Things) • Anticipate future supply/demand • Shape demand, supply-oriented • Personal data is needed for effective demand side management 19
  • 20. Risk of Privacy Abuse 20 Inference forward channel Inference backward channel By consumption patterns • Appliance detection • Use mode detection • Behavior deduction By demand response data • Incentive sensitivity • Customer preference Household Managements Data collectors Ex. Behavior Patterns: • Washing (10h-12h) • TV (19h-23h) • Out (12h-18h)
  • 21. The Concept of EU for Privacy 21 Discriminator Machine learning x Pseudonym Consumption Data non-identifying information identifying information Pseudonymization Template Data Source: “Privacy in the Smart Energy Grid”, Lecture at NII 2014-03-13, Prof. Gunter Muller
  • 22. Service Feedback Loop 22 Household Service Provider Billing Aggregation Compliance Verification Data collectors • Bill • Consumption Target Consumption trace (My research) Privacy level = (??)% Query Privacy Preserving Protocol $$$ Future work Encryption Service Provider Billing Aggregation Compliance Verification Service Provider Billing Aggregation Compliance Verification
  • 23. Privacy Preserving Query Scenario 23 Q1. How many people have energy consumption between 19h-20h which is over the average ? Q2. How many people have energy consumption between 19h-20h which is over the average except Tanaka ? None-privateQ1: 125, Q2: 124 Attacker Detection Privacy preservingQ1: 125, Q2: 127 Service Provider Data Collectors
  • 24. Evaluation System Time series segmentation Real Event Mapping Quantify Privacy Level 24
  • 25. Linkage Attack in: 9h-10h, 13h-13h30 out: 10h-13h, 13h30- in: 12h-14h, 16h-18h out: 18h- peak: 16h-18hCategorization Alice Bob Peter Third party information 3 people in the room: Alice, Bob, Peter Peter has printer, Alice has monitor, Bob has PC Published Data Identify 25
  • 26. Regularity in Time Series • Linear method can’t solve problem => Nonlinear Analysis Refrigerator data and its surrogate ACF and periodgram Time points 26
  • 27. Entropy (1) • Display time series data in phase-space 
 y(m,t) = [x(t), x(t+lag), …, x(t+(m-1)lag)] • Approximate Entropy (ApEn) and Sample Entropy (SaEn): evaluate trajectory matching conditional probability x(t+7) x(t) x(t) x(t+7) x(t+14) m=2, lag=7 m=3, lag=7 27
  • 28. Setting time lag • Time lag = First zero-crossing of ACF Dev Lag ApEn SaEn Unknown 500 0.348 0.473 Refri 7 1.223 0.944 Laptop 198 1.299 1.457 Noise 2 3.025 3.247 28
  • 29. Setting m, r (1) 29 • K_A, K_B : overlapped template matching patterns number (pattern length m, m+1) • 95% Confidence of SaEn
  • 30. Setting m, r (2) m=2, r=(0.1~0.4)std training for parameters: tracebase dataset 30
  • 31. Experiment Data set Tracebase IREF Smart tap type Plugwise Plugwise Number of devices 138 136 Time range Variation 5 weeks Sampling interval 1 s 2 mins Usage Training for m, r Evaluation Result m=2,3 r=0.1~0.4 std *** 31
  • 32. Result (1) IREF : 136 devices, 5 weeks 32
  • 33. Other knowledge from entropy rate (?) Device classification & abnormal detection