Lin Mines 0052E 11842.Pdf (8.644Mb)

Total Page:16

File Type:pdf, Size:1020Kb

Lin Mines 0052E 11842.Pdf (8.644Mb) PRIVACY AND SECURITY IN CROWDSENSING by Jian Lin c Copyright by Jian Lin, 2019 All Rights Reserved A thesis submitted to the Faculty and the Board of Trustees of the Colorado School of Mines in partial fulfillment of the requirements for the degree of Doctors of Philosophy (Computer Science). Golden, Colorado Date Signed: Jian Lin Signed: Dr. Dejun Yang Advisor Thesis Advisor Golden, Colorado Date Signed: Dr. Tracy Camp Professor and Head Department of Computer Science ii ABSTRACT The rapid proliferation of sensor-embedded devices has enabled crowdsensing, a new paradigm which effectively collects sensing data from pervasive users. However, both the openness of crowdsensing systems and the richness of users’ submitted data raise significant concerns for privacy and security. In this thesis, we aim to identify and solve privacy and security issues in crowdsensing. Specifically, we consider three important parts in crowdsens- ing: task allocation, incentive mechanisms, and truth discovery. In crowdsensing systems, task allocation is used to select a proper subset of users to perform tasks. Incentive mech- anisms are used to stimulate users to participate in the system. Truth discovery is used to aggregate data. We first analyze privacy issues in task allocation and incentive mecha- nisms raised by the inference attack in which a user is able to infer other users’ sensitive information according to published information. We propose two task allocation algorithms which defend against location-inference attack. To protect users’ bid privacy from inference attack, we propose two frameworks for privacy-preserving incentive mechanisms. Then, we analyze the security issues in incentive mechanisms and truth discovery raised by the Sybil attack in which a user illegitimately pretends to be multiple identities to gain benefits. To deter users from conducting a Sybil attack, we propose Sybil-proof incentive mechanisms for both offline and online scenarios. Additionally, we propose a Sybil-resistant truth discovery framework to diminish the impact of the Sybil attack on the aggregated data. Both simula- tion and experiment results show the effectiveness of the proposed works in solving privacy and security issues in crowdsensing. iii TABLE OF CONTENTS ABSTRACT ......................................... iii LISTOFFIGURES ..................................... ix LISTOFTABLES...................................... xi ACKNOWLEDGMENTS ..................................xii CHAPTER1 INTRODUCTION ...............................1 1.1 TaskAllocationinCrowdsensing . .....1 1.2 IncentiveMechanismsinCrowdsensing . ........2 1.3 TruthDiscoveryinCrowdsensing . ......3 1.4 PrivacyIssuesinCrowdsensing . ......3 1.4.1 PrivacyIssuesinTaskAllocation . ....3 1.4.2 Privacy Issues in Incentive Mechanisms . .......4 1.5 SecurityIssuesinCrowdsensing . .......4 1.5.1 Security Issues in Incentive Mechanisms . .......5 1.5.2 SecurityIssuesinTruthDiscovery. ......5 1.6 Contribution.................................... .6 1.7 ThesisOrganization.............................. ....7 CHAPTER2 RELATEDWORK ..............................8 2.1 PrivacyandSecurityinTaskAllocation . .......8 2.2 Privacy and Security in Incentive Mechanisms . .........10 2.3 PrivacyandSecurityinTruthDiscovery . ....... 11 iv CHAPTER 3 PRESERVING LOCATION PRIVACY IN TASK ALLOCATION . 13 3.1 Background .....................................13 3.2 ModelandProblemFormulation. .... 15 3.2.1 SystemModel................................ 15 3.2.2 AdversaryModel .............................. 15 3.2.3 ProblemFormulation. 19 3.3 OurApproach.................................... 21 3.3.1 DesignofPASTA.............................. 21 3.3.2 DesignofHeuristic ............................. 23 3.4 PerformanceEvaluation . 25 3.4.1 EvaluationSetup .............................. 25 3.4.2 ImpactoftheNumberofTasks . 26 3.4.3 ImpactoftheNumberofUsers . 28 3.4.4 ImpactofthePrivacyRequirement . 30 3.4.5 Impact of the Parameter ǫ .........................31 3.5 Conclusion...................................... 32 CHAPTER 4 PRESERVING BID PRIVACY IN INCENTIVE MECHANISMS . 33 4.1 Background .....................................33 4.2 ModelsandProblemFormulation . .... 34 4.2.1 Single-bidModel .............................. 34 4.2.2 Multi-bidModel .............................. 35 4.2.3 ThreatModels ............................... 36 4.2.4 DesiredProperties ............................. 38 v 4.2.5 DesignObjective .............................. 40 4.3 OurApproach.................................... 41 4.3.1 DesignRationale .............................. 41 4.3.2 DesignofBidGuard............................. 41 4.3.3 DesignofBidGuard-M . 44 4.4 Analysis .......................................47 4.4.1 AnalysisofBidGuard............................ 47 4.4.2 AnalysisofBidGuard-M . 52 4.5 PerformanceEvaluation . 55 4.5.1 SimulationSetup .............................. 55 4.5.2 EvaluationofSocialCost. 56 4.5.3 EvaluationofTotalPayment. 59 4.5.4 EvaluationofPrivacyLeakage . 59 4.6 Conclusion...................................... 63 CHAPTER 5 DETERRING THE SYBIL ATTACK IN INCENTIVE MECHANISMS . 65 5.1 Background .....................................65 5.2 ModelandProblemFormulation. .... 65 5.2.1 OfflineScenario ............................... 66 5.2.2 OnlineScenario ............................... 68 5.2.3 ThreatModels ............................... 68 5.2.4 DesiredPropertiesandObjective . .... 74 5.3 OurApproach.................................... 75 5.3.1 DesignofSPIM-SandSPIM-M . 75 vi 5.3.2 DesignofSOSandSOM . 80 5.4 Analysis .......................................83 5.4.1 AnalysisofSPIM-SandSPIM-M . 84 5.4.2 AnalysisofSOSandSOM . 90 5.5 Performance Evaluation of SPIM-S and SPIM-M . ...... 95 5.5.1 EvaluationSetup .............................. 96 5.5.2 EvaluationofRunningTime. 96 5.5.3 EvaluationofTotalPayment. 97 5.5.4 EvaluationofPlatformUtility . 98 5.6 PerformanceEvaluationof SOSand SOM. .... 99 5.6.1 EvaluationSetup .............................. 99 5.6.2 EvaluationofTotalPayment. 99 5.6.3 EvaluationofPlatformUtility . 100 5.6.4 EvaluationofSybil-proofness . 101 5.7 Conclusion..................................... 102 CHAPTER 6 ALLEVIATING THE SYBIL ATTACK IN TRUTH DISCOVERY . 103 6.1 Background .................................... 103 6.1.1 TruthDiscovery.............................. 103 6.1.2 DeviceFingerprinting. 105 6.2 ModelandProblemFormulation. 106 6.2.1 SystemModel............................... 106 6.2.2 AdversaryModels............................. 107 6.3 OurApproach................................... 109 vii 6.3.1 DesignRationale ............................. 109 6.3.2 DesignofFramework . 109 6.3.3 DesignofAccountGroupingMethods. 111 6.4 Experiment .................................... 120 6.4.1 ExperimentalSetup............................ 121 6.4.2 EvaluationofAccountGrouping. 122 6.4.3 EvaluationofAccuracy. 124 6.5 Conclusion..................................... 127 CHAPTER7 CONCLUSION............................... 128 7.1 SummaryofResults ............................... 128 7.2 SummaryofPublications. 129 7.3 FutureResearchOpportunities. ..... 130 REFERENCESCITED .................................. 132 APPENDIX COPYRIGHTPERMISSION . 143 viii LIST OF FIGURES Figure 1.1 Three major components in crowdsensing and their privacy and securityissuesstudiedinthisthesis . ....2 Figure 3.1 Comparison between our work and existing works . ..........14 Figure3.2 Systemmodel ................................ 16 Figure 3.3 Example of location-inference attack via task overlap ........... 17 Figure 3.4 Example of location-inference attack via task sequence........... 18 Figure 3.5 Example of mix-zone-based task allocation . ...........19 Figure 3.6 GPS locations of the taxi drivers in Rome . .........25 Figure 3.7 Impact of m on PASTA, Heuristic,andPWSM . 27 Figure 3.8 Impact of n on PASTA, Heuristic,andPWSM . 29 Figure 3.9 Impact of n on HeuristicandPWSM . 30 Figure 3.10 Impact of k on PASTAand Heuristic . 31 Figure 3.11 Impact of ǫ on PASTA............................31 Figure 4.1 Impact of the number of sensing tasks on the social cost. (a) BidGuard. (b)BidGuard-M. ............................... 57 Figure 4.2 Impact of the number of users on the social cost. (a) BidGuard. (b) BidGuard-M................................... 57 Figure 4.3 Comparison of BidGuard, TRAC, DP-hSRC and OPT. (a) Impact of the number of sensing tasks. (b) Impact of the number of users. .....58 Figure 4.4 Impact of the number of sensing tasks on the total payment. (a) BidGuard.(b)BidGuard-M. 59 Figure 4.5 Impact of the number of users on the total payment. ..........60 ix Figure 4.6 Impact of the number of sensing tasks on privacy leakage.. 61 Figure 4.7 Impact of the number of users on privacy leakage. ...........61 Figure 4.8 Impact of the ǫ onprivacyleakage.. 62 Figure4.9 Socialcostv.s. privacyleakage. .........63 Figure5.1 Onlinecrowdsensingsystem . ...... 66 Figure 5.2 Example showing MMT isnotSybil-proofinSMcase . 71 Figure 5.3 Example showing MSensing isnotSybil-proofinMMcase . 72 Figure5.4 Runningtime ................................ 97 Figure5.5 Totalpayment............................... 98 Figure5.6 Platformutility ............................ .... 98 Figure5.7 Totalpayment............................... 100 Figure5.8 Platformutility ............................ 101 Figure5.9 Sybil-proofness. .... 101 Figure 6.1 MEMS-based accelerometer and gyroscope . ........ 106 Figure6.2 ExampleofAG-FP ............................. 115 Figure6.3 ExampleofAG-TS ............................
Recommended publications
  • Chinese Music Reality Shows: a Case Study
    Chinese Music Reality Shows: A Case Study A Thesis Submitted to the Faculty of Drexel University by Zhengyuan Bi In partial fulfillment of the requirements for the degree of Master of Science in Television Management January 2017 ii © Copyright 2017 Zhengyuan Bi All Right Reserved. iii DEDICATION I dedicate this thesis to my family and my friends, with a special feeling of gratitude to my loving parents, my friends Queena Ai, Eileen Zhou and Lili Mao, and my former boss Kenny Lam. I will always appreciate their love and support! iv ACKNOWLEDGMENTS I would like to take this opportunity to thank my thesis advisor Philip Salas and Television Management Program Director Al Tedesco for their great support and guidance during my studies at Drexel University. I would also like to thank Katherine Houseman for her kind support and assistance. I truly appreciate their generous contribution to me and all the students. I would also like to thank all the faculty of Westphal College of Media Arts & Design, all the classmates that have studied with me for these two years. We are forever friends and the best wishes to each of you! v Table of Contents DEDICATION ………………………………………………………………………………..iii ACKNOWLEDGEMENTS…………………………………………………………………...iv ABSTRACT……………………………………………………………………………………vii Chapter 1: Introduction………………………………………………………………………..1 1.1 Introduction………………………………………………………………………………...3 1.2 Statement of the Problem…………………………………………….................................3 1.3 Background…………………………………………………………………………………4 1.4 Purpose of the study…………………………………………………………………….....5
    [Show full text]
  • Zhou-Master.Pdf (1.441Mb)
    Are You a Good Chinese Musician? The Ritual Transmission of Social Norms in a Chinese Reality Music Talent Show Miaowen Zhou Master’s Thesis in East Asian Culture and History (EAST4591 - 60 Credits) Department of Culture Studies and Oriental Languages UNIVERSITY OF OSLO Spring 2015 © Miaowen Zhou 2015 Are You a Good Chinese Musician? The Ritual Transmission of Social Norms of a Chinese Reality Music Talent Show http://www.duo.uio.no/ Trykk: Reprosentralen, Universitetet i Oslo II Abstract The sensational success of a Chinese reality music talent show, Super Girls’ Voice (SGV), in 2005 not only crowned many unknown Chinese girls/women with the hail of celebrity overnight, but also caused hot debates on many subjects including whether the show triggered cultural, even political democracy in China. 10 years have passed and China is in another heyday of reality music talent shows. However, the picture differs from before. For instance, not everybody can take part in it anymore. And the state television China Central Television (CCTV) joined the competition for market share. It actually became a competitive player of “reality” by claiming to find the best original and creative Chinese musicians whose voices CCTV previously avoided or oppressed. In this thesis, I will examine one CCTV show, The Song of China (SOC), in order to examine what the norms of good Chinese music and musicians are in the context of reality music talent shows. My work will hopefully give you some insights into the characteristics and the wider social and political influences of such reality music talent shows in the post-SGV era.
    [Show full text]
  • Acknowledgement to Reviewers of Cancers in 2018 Cancers Editorial Office MDPI, St
    Editorial Acknowledgement to Reviewers of Cancers in 2018 Cancers Editorial Office MDPI, St. Alban-Anlage 66, 4052 Basel, Switzerland Published: 9 January 2019 Rigorous peer-review is the corner-stone of high-quality academic publishing. The editorial team greatly appreciates the reviewers who contributed their knowledge and expertise to the journal’s editorial process over the past 12 months. In 2018, a total of 545 papers were published in the journal, with a median time to first decision of 18 days and a median time to publication of 38 days. The editors would like to express their sincere gratitude to the following reviewers for their cooperation and dedication in 2018: Aasen, Trond Al Tabaa, Yassine Abad, Catalina Alaimo, Alessandro Abbas, Tarek Alcantara, Marion Abburi, Chandrika Aldinucci, Donatella Abdel-Hakeem, Mohamed Alesutan, Ioana Abe, Takanori Alfredo, Addeo Abe, Hiroyuki Ali, Nawab Aberger, Fritz Aljabali, Alaa Abeywardana, Tharindumala Allan, Allison Accardi, Rosita Allegra, Eugenia Adamek, Agnieszka Allen, Steven P. Adamson, David Cory Almed, Nuzhat Adhikary, Amitava Aloraifi, Fatima Adibi, Mehrad Altomonte, Jennifer Adighibe, Omanma Amrutkar, Manoj Adriaenssens, Eric Andera, Ladislav Agarwal, Atin Anděra, Ladislav Agelaki, Sofia Andersen, Jens Rikardt Aggarwal, Bharat B. Andrews, Lesley Agodi, Antonella Angelova, Assia L. Agrawal, Swati Angelucci, Adriano Ahmad, Aamir Anguille, Sébastien Ahmed, Khalil Antonios, Giakountis Ahmed, Atique U. Apisarnthanarax, Smith Ahn, Yong Chan Apostolopoulos, Vasso Aidinis, Vassilis Arati, Sharma Akilov, Oleg E. Ardolino, Michele Cancers 2019, 11, 65; doi:10.3390/cancers11010065 www.mdpi.com/journal/cancers Cancers 2019, 11, 65 2 of 22 Arena, Sabrina Barrero, Maria J. Arlt, Alexander Barrott, Jared Arnold, Michelle Bartoszewska, Sylwia Aslam, Muhammad Basak, Debasish Aspenström, Pontus Bashkin, James K.
    [Show full text]
  • "Du Shiniang Sinks Her Jewel Box in Anger": a Story to Defend Folk
    "Du Shiniang Sinks Her Jewel Box in Anger": A Story to Defend Folk Literature Presented to the Faculty of the Department of East Asian Languages and Cultures Bryn Mawr College In partial fulfillment of the requirement for the degree of Bachelors of Arts By Binglei Yan Advisor: Professor Shiamin Kwa Bryn Mawr, Pennsylvania December 2015 Abstract This thesis takes a look at one of the short stories in Feng Menglong's Sanyan collection, "Du Shiniang Sinks Her Jewel Box in Anger." Written during the late Ming dynasty, the story has been typically analyzed by present-day scholars as a political allegory or as a lesson to teach qing, a term which translated alternately as "passions," "love," or "romantic sentiments" in English. Based on the background that the archaic elite literature was advocated through the Ming literary movement called "the restoration of the past" and Feng Menglong, as a follower of key anti-archaists like Wang Yanming, Li Zhi, and Yuan Hongdao, emphasized authentic feelings and spontaneity in literature, this thesis argues that in "Du Shiniang Sinks Her Jewel Box in Anger," Feng Menglong metaphorically defended folk literature by defending Du Shiniang. Through examining the ways in which Feng Menglong praised the courtesan Du Shiniang's spontaneous and sincere nature that embodied in her xia (chivalry) and qing characteristics in the story, it becomes clear that Feng Menglong advocated folk literature as what should be extolled in the late Ming. The thesis concludes by recommending that this Feng Menglong's story is possibly a forerunner of a growing genre in the Qing dynasty which makes it worth for further researches.
    [Show full text]
  • China Pop Love, Patriotism and the State in China’S Music Sphere
    115 CHINA POP LOVE, PATRIOTISM AND THE STATE IN CHINA’S MUSIC SPHERE ANDREAS STEEN Popular culture in China is highly dynamic, involving individuals and private companies, both local and international, as well as state-governed institutions. The mass media and new communication technologies naturally play an impor- tant role in production, selection and dissemination, while also increasing in- teraction with international trends and standards. Sheldon H. Lu underscores popular culture’s importance in today’s China by emphasizing that it is “a dein- ing characteristic of Chinese postmodernity”.1 To him, three factors are crucial, namely it’s potential to undermine the censorship and “hard-line” cultural he- gemony of the Chinese Communist Party (CCP), its rise as a “major player in the commodiication process,” and “its sugar-coated apoliticism, [which] paciies the masses and represses the memory of China’s political reality” (ibid.). Popular cul- ture, therefore, is the battleground of various ideologies, forces and interests. Its ambivalent and complex entanglement with politics, society and the musical in- dustry is also addressed in the work of other scholars, such as Kevin Latham, who expresses that “understanding Chinese popular culture very often requires care- ful attention to how precisely the state is involved in and related to forms of social and cultural activity and practices. Popular culture does not exist outside of or in contrast to the state but very often in a constant and evolving dialogue with it.”2 This article looks at both conlicts and dialogue in the realm of popular music and attempts to lay out the main contours of China’s current popular music scene.
    [Show full text]
  • Poster Session Schedule
    AAAI Poster Session Schedule AAAI-21 Poster Sessions will be held during the following times, February 4-7: 8:45 AM – 10:30 AM 4:45 PM – 6:30 PM 12:45 AM – 2:30 AM Posters have been assigned to two (2) poster sessions each day, according to the following Scheme: 4-Feb 08:45 AM - 10:30 AM AB-D1-R1 + AB-D1-R2 + BC-D1-R1 + BC-D1-R2 4-Feb 04:45 PM - 06:30 PM AC-D1-R1 + AC-D1-R2 + BC-D1-R1 + BC-D1-R2 5-Feb 12:45 AM - 02:30 AM AB-D1-R1 + AB-D1-R2 + AC-D1-R1 + AC-D1-R2 5-Feb 08:45 AM - 10:30 AM AB-D2-R1 + AB-D2-R2 + BC-D2-R1 + BC-D2-R2 5-Feb 04:45 PM - 06:30 PM AC-D2-R1 + AC-D2-R2 + BC-D2-R1 + BC-D2-R2 6-Feb 12:45 AM - 02:30 AM AB-D2-R1 + AB-D2-R2 + AC-D2-R1 + AC-D2-R2 6-Feb 08:45 AM - 10:30 AM AB-D3-R1 + AB-D3-R2 + BC-D3-R1 + BC-D3-R2 6-Feb 04:45 PM - 06:30 PM AC-D3-R1 + AC-D3-R2 + BC-D3-R1 + BC-D3-R2 7-Feb 12:45 AM - 02:30 AM AB-D3-R1 + AB-D3-R2 + AC-D3-R1 + AC-D3-R2 7-Feb 08:45 AM - 10:30 AM AB-D4-R1 + AB-D4-R2 + BC-D4-R1 + BC-D4-R2 7-Feb 04:45 PM - 06:30 PM AC-D4-R1 + AC-D4-R2 + BC-D4-R1 + BC-D4-R2 8-Feb 12:45 AM - 02:30 AM AB-D4-R1 + AB-D4-R2 + AC-D4-R1 + AC-D4-R2 Within each session, posters are grouped according to subject clusters.
    [Show full text]
  • A Critical Anaysis of Identity, Media, and Popular Music in the Voice Of
    WHOSE VOICE?: A CRITICAL ANALYSIS OF IDENTITY, MEDIA, AND POPULAR MUSIC IN THE VOICE OF CHINA Xinxin Jiang A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2018 Committee: Alberto González, Advisor Angela Ahlgren Graduate Faculty Representative Katherine Meizel Becca Cragin © 2018 Xinxin Jiang All Rights Reserved iii ABSTRACT Alberto González, Advisor This manuscript explores the relationships among identity, media, and popular music in Chinese society through an examination of a televised singing competition franchise, The Voice of China. I attempt to understand what role popular culture, in the form of a contemporary popular cultural product, plays in Chinese people’s everyday life and how the show is a site where Chinese people articulate, interrogate and negotiate aspects of identity. I provide a textual analysis to interpret the meaningful details of each episode while employing a critical-cultural approach to understand the socio-historical contexts and the online discourse that are conducive to the uniqueness of the international franchise. More specifically, I examine how societal discourses on the blind audition and the voting systems of the show reveal growing public awareness of and concern with issues of equity and fairness in the cultural arena of traditional aesthetic standards as well as the societal arena of electoral politics. I also explore how the show reinforces the ruling Party’s appropriations of nationalism in a sophisticated way to highlight a unified and supreme national voice, how it reflects both a loosening grip of the central government on gender representation and a growing social leniency toward gender diversity, and finally how the voice diversity was constructed by individuals who are in possession of or in need of various forms of social capital and who are from geographically diverse and economically disparate social backgrounds.
    [Show full text]
  • Notice of Names of Persons Appearing to Be Owners of Abandoned Property
    NOTICE OF NAMES OF PERSONS APPEARING TO BE OWNERS OF ABANDONED PROPERTY Pursuant to Chapter 523A, Hawaii Revised Statutes, and based upon reports filed with the Director of Finance, State of Hawaii, the names of persons appearing to be the owners of abandoned property are listed in this notice. The term, abandoned property, refers to personal property such as: dormant savings and checking accounts, shares of stock, uncashed payroll checks, uncashed dividend checks, deposits held by utilities, insurance and medical refunds, and safe deposit box contents that, in most cases, have remained inactive for a period of at least 5 years. Abandoned property, as used in this context, has no reference to real estate. Reported owner names are separated by county: Honolulu; Kauai; Maui; Hawaii. Reported owner names appear in alphabetical order together with their last known address. A reported owner can be listed: last name, first name, middle initial or first name, middle initial, last name or by business name. Owners whose names include a suffix, such as Jr., Sr., III, should search for the suffix following their last name, first name or middle initial. Searches for names should include all possible variations. OWNERS OF PROPERTY PRESUMED ABANDONED SHOULD CONTACT THE UNCLAIMED PROPERTY PROGRAM TO CLAIM THEIR PROPERTY Information regarding claiming unclaimed property may be obtained by visiting: http://budget.hawaii.gov/finance/unclaimedproperty/owner-information/. Information concerning the description of the listed property may be obtained by calling the Unclaimed Property Program, Monday – Friday, 7:45 am - 4:30 pm, except State holidays at: (808) 586-1589. If you are calling from the islands of Kauai, Maui or Hawaii, the toll-free numbers are: Kauai 274-3141 Maui 984-2400 Hawaii 974-4000 After calling the local number, enter the extension number: 61589.
    [Show full text]
  • AAAI-21 Accepted Paper List.1.29.21
    AAAI-21 Accepted Papers — Main Technical Track Main Track (The list of accepted appers for the Special Track on AI for Social Impact appears at the end of this document, beginning on page 121.) 4: Multi-Domain Multi-Task Rehearsal for Lifelong Learning Fan Lyu, Shuai Wang, Wei Feng, Zihan Ye, Fuyuan Hu, Song Wang 26: EfficientDeRain: Learning Pixel-Wise Dilation Filtering for High-Efficiency Single-Image Deraining Qing Guo, Jingyang Sun, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Wei Feng, Yang Liu, Jianjun Zhao 36: Understanding Deformable Alignment in Video Super-Resolution KelVin C.K. Chan, Xintao Wang, Ke Yu, Chao Dong, Chen Change Loy 38: A SAT-Based Resolution of Lam's Problem Curtis Bright, KeVin Cheung, Brett SteVens, Ilias Kotsireas, Vijay Ganesh 39: Nearest Neighbor Classifier Embedded Network for ActiVe Learning Fang Wan, Tianning Yuan, Mengying Fu, Xiangyang Ji, Qingming Huang, Qixiang Ye 43: Shape-Pose Ambiguity in Learning 3D Reconstruction from Images Yunjie Wu, Zhengxing Sun, Youcheng Song, Yunhan Sun, YiJie Zhong, Jinlong Shi 44: Why AdVersarial Interaction Creates Non-Homogeneous Patterns: A Pseudo-Reaction-Diffusion Model for Turing Instability Litu Rout 63: Building Interpretable Interaction Trees for Deep NLP Models Die Zhang, HuiLin Zhou, Xiaoyi Bao, Da Huo, Ruizhao Chen, Hao Zhang, Xu Cheng, Mengyue Wu, Quanshi Zhang 67: ReVisiting Dominance Pruning in Decoupled Search Daniel Gnad 68: Meta-Transfer Learning for Low-Resource AbstractiVe Summarization Yi-Syuan Chen, Hong-Han Shuai 69: Structured Co-Reference Graph Attention
    [Show full text]
  • Chengdu, China 18
    2010 4th International Conference on Bioinformatics and Biomedical Engineering (iCBBE 2010) Chengdu, China 18 – 20 June 2010 Volume 1 Pages 1-509 IEEE Catalog Number: CFP1029C-PRT ISBN: 978-1-4244-4712-1 1/14 TABLE OF CONTENTS SIMULATION AND ANALYSIS OF THE NETWORK MODEL OF THE QUORUM SENSING PROCESS DURING BIOFILM CREATION ....................................................................................................................................................................1 Ruixuan Zhao, Mingzhi Mao A CELLULAR AUTOMATON MODEL FOR THE TRANSMISSION DYNAMICS OF SCHISTOSOMIASIS................................5 Yun Liu, Kai Chu, Xiaoli Xu, Haiwei Wu, Cheng Wan THREE-DIMENSIONAL NUMERICAL MODELING FOR WIND-DRIVEN CIRCULATION AND POLLUTANT TRANSPORT IN A LARGE-SCALE LAKE .......................................................................................................................9 Zhuo Zhang, Zhi-Yao Song MULTI-TISSUE TETRAHEDRAL MESH GENERATION FROM MEDICAL IMAGES..................................................................16 Ping Hu, Hui Chen, Wen Wu, Pheng-Ann Heng NUCLEOTIDE FLUCTUATION ANALYSIS OF DIM-LIGHT VISION RHODOPSIN GENE AND MRNA SEQUENCES IN VERTEBRATES ...............................................................................................................................................................20 Todd Holden, Ni. Gadura, E. Cheung, J. Rada, P. Schneider, G. Tremberger Jr., D. Sunil, D. Lieberman, T. Cheung EXTRACTING BIOMARKER INFORMATION APPLYING NATURAL LANGUAGE PROCESSING AND MACHINE
    [Show full text]
  • Author Index (Print)
    PHYSICAL REVIEW B VOLUME 54, NUMBER 8 15 AUGUST 1996-II Cumulative Author Index All authors of papers published so far in the current volume are listed alphabetically with the issue and page numbers following the dash. A more complete index, with the full title and authors listed with each ®rst author's name, is published in the last issue of the volume. A cumulative author and subject index covering Physical Review A through E and Physical Review Letters is published annually under separate cover. Abdel-Hady, Afaf—͑6͒ 3851 Andrade, J. S., Jr.—͑6͒ 3910 Baldereschi, A.—͑8͒ 5691 Abd-Elmeguid, M. M.—͑2͒ R800 Andraka, B.—͑1͒ 48 Balestrino, G.—͑5͒ 3628 Abkemeier, Kristin M.—͑4͒ 2723 Andre´, Jean-Marie—͑4͒ 2381 Balev, O. G.—͑7͒ 4863 Abrikosov, I. A.—͑5͒ 3380 Andres, H. P.—͑6͒ 3830 Ball, James—͑5͒ 3499 Abromeit, Christian—͑5͒ 3142 Andrieu, S.—͑4͒ 2822 Ballabh, T. K.—͑6͒ 3926 Abstreiter, Gerhard—͑3͒ 1922 Anisimov, V. I.—͑7͒ 4387; ͑8͒ 5309 Ballone, P.—͑7͒ 5097 Abukawa, T.—͑7͒ 4456 Anlage, Steven M.—͑5͒ 3508 Balooch, M.—͑7͒ 5029 Acevedo, R.—͑6͒ 3976 Annett, James F.—͑4͒ R2271 Baltensperger, W.—͑1͒ 59 Anthony, T. R.—͑2͒ 920; ͑6͒ 3989 Adachi, Hirohiko—͑7͒ 4604 Bandler, S. R.—͑1͒ 534 Antisari, M. Vittori—͑1͒ 441 Adams, J. S.—͑1͒ 534 Bando, Y.—͑2͒ R756 Antonov, V. N.—͑6͒ R3706 Adams, James B.—͑4͒ 2910 Bandyopadhyay, S.—͑8͒ 5712, 5721 Antropov, V. P.—͑2͒ 1019 Adler, Joan—͑1͒ 364; ͑5͒ 2996 Bansil, A.—͑8͒ 5453 Anwand, W.—͑4͒ 2512; ͑5͒ 3084 Adroja, D.
    [Show full text]
  • <I>Russula Brunneovinacea
    MYCOTAXON ISSN (print) 0093-4666 (online) 2154-8889 Mycotaxon, Ltd. ©2017 October–December 2017—Volume 132, pp. 789–797 https://doi.org/10.5248/132.789 Russula brunneovinacea sp. nov., from northeastern China Xu-Meng Jiang 1, 2, Yang-Kun Li 1, Jun-Feng Liang 1*& Jian-Rong Wu 2 1 Research Institute of Tropical Forestry, Chinese Academy of Forestry Guangzhou, 510520, P. R. China 2 Southwest Forestry University, Kunming 650224, P.R. China * Correspondence to: [email protected] Abstract—Russula brunneovinacea is described as a new species from northeastern China. It is characterized by its deep brownish vinaceous to Etruscan red or Kaiser brown pileus with a slightly depressed center, incurved margin with striate, Naples Yellow context that dries with a greyish tinge, subglobose to broadly ellipsoid basidiospores with an amyloid plage and isolated warts that are connected at base or in ridges warts but do not form a reticulum. The new species is supported by ITS phylogenetic analyses and tentatively placed in Russula subsect. Integroidinae based on morphological analyses. Key words—macrofungi, Russulaceae, taxonomy Introduction Russula Pers. (Russulaceae, Russulales, Basidiomycota) was erected by Persoon (1796) and with a worldwide distribution (Kirk et al. 2008). The genus, which is ectomycorrhizal, includes many important edibles such as R. griseocarnosa, popular in China and Southeast Asia (Wang et al. 2009, Li et al. 2010, Zhao et al. 2015) as well as poisonous species such as R. emetica (Schaeff.) Pers. and R. subnigricans Hongo (Miller & Buyck 2002, Yang & Piepenbring 2004, Li et al. 2015). Russula subsect. Integroidinae (Romagn.) Bon was validated by Bon (1986), based on R.
    [Show full text]