-
From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways
Authors:
Mengmeng Yang,
Youyang Qu,
Thilina Ranbaduge,
Chandra Thapa,
Nazatul Sultan,
Ming Ding,
Hajime Suzuki,
Wei Ni,
Sharif Abuadbba,
David Smith,
Paul Tyler,
Josef Pieprzyk,
Thierry Rakotoarivelo,
Xinlong Guan,
Sirine M'rabet
Abstract:
The vision for 6G aims to enhance network capabilities with faster data rates, near-zero latency, and higher capacity, supporting more connected devices and seamless experiences within an intelligent digital ecosystem where artificial intelligence (AI) plays a crucial role in network management and data analysis. This advancement seeks to enable immersive mixed-reality experiences, holographic com…
▽ More
The vision for 6G aims to enhance network capabilities with faster data rates, near-zero latency, and higher capacity, supporting more connected devices and seamless experiences within an intelligent digital ecosystem where artificial intelligence (AI) plays a crucial role in network management and data analysis. This advancement seeks to enable immersive mixed-reality experiences, holographic communications, and smart city infrastructures. However, the expansion of 6G raises critical security and privacy concerns, such as unauthorized access and data breaches. This is due to the increased integration of IoT devices, edge computing, and AI-driven analytics. This paper provides a comprehensive overview of 6G protocols, focusing on security and privacy, identifying risks, and presenting mitigation strategies. The survey examines current risk assessment frameworks and advocates for tailored 6G solutions. We further discuss industry visions, government projects, and standardization efforts to balance technological innovation with robust security and privacy measures.
△ Less
Submitted 3 October, 2024;
originally announced October 2024.
-
Crowdsourced data indicates broadband has a positive impact on local business creation
Authors:
Yifeng Philip Chen,
Edward J. Oughton,
Jakub Zagdanski,
Maggie Mo Jia,
Peter Tyler
Abstract:
Broadband connectivity is regarded as generally having a positive macroeconomic effect, but we lack evidence as to how it affects key economic activity metrics, such as firm creation, at a very local level. This analysis models the impact of broadband Next Generation Access (NGA) on new business creation at the local level over the 2011-2015 period in England, United Kingdom, using high-resolution…
▽ More
Broadband connectivity is regarded as generally having a positive macroeconomic effect, but we lack evidence as to how it affects key economic activity metrics, such as firm creation, at a very local level. This analysis models the impact of broadband Next Generation Access (NGA) on new business creation at the local level over the 2011-2015 period in England, United Kingdom, using high-resolution panel data. After controlling for a range of factors, we find that faster broadband speeds brought by NGA technologies have a positive effect on the rate of business growth. We find that in England between 2011-2015, on average a one percentage increase in download speeds is associated with a 0.0574 percentage point increase in the annual growth rate of business establishments. The primary hypothesised mechanism behind the estimated relationship is the enabling effect that faster broadband speeds have on innovative business models based on new digital technologies and services. Entrepreneurs either sought appropriate locations that offer high quality broadband infrastructure (contributing to new business establishment growth), or potentially enjoyed a competitive advantage (resulting in a higher survival rate). The findings of this study suggest that aspiring to reach universal high capacity broadband connectivity is economically desirable, especially as the costs of delivering such service decline.
△ Less
Submitted 28 August, 2023;
originally announced August 2023.
-
Making the Most of Parallel Composition in Differential Privacy
Authors:
Josh Smith,
Hassan Jameel Asghar,
Gianpaolo Gioiosa,
Sirine Mrabet,
Serge Gaspers,
Paul Tyler
Abstract:
We show that the `optimal' use of the parallel composition theorem corresponds to finding the size of the largest subset of queries that `overlap' on the data domain, a quantity we call the \emph{maximum overlap} of the queries. It has previously been shown that a certain instance of this problem, formulated in terms of determining the sensitivity of the queries, is NP-hard, but also that it is po…
▽ More
We show that the `optimal' use of the parallel composition theorem corresponds to finding the size of the largest subset of queries that `overlap' on the data domain, a quantity we call the \emph{maximum overlap} of the queries. It has previously been shown that a certain instance of this problem, formulated in terms of determining the sensitivity of the queries, is NP-hard, but also that it is possible to use graph-theoretic algorithms, such as finding the maximum clique, to approximate query sensitivity. In this paper, we consider a significant generalization of the aforementioned instance which encompasses both a wider range of differentially private mechanisms and a broader class of queries. We show that for a particular class of predicate queries, determining if they are disjoint can be done in time polynomial in the number of attributes. For this class, we show that the maximum overlap problem remains NP-hard as a function of the number of queries. However, we show that efficient approximate solutions exist by relating maximum overlap to the clique and chromatic numbers of a certain graph determined by the queries. The link to chromatic number allows us to use more efficient approximate algorithms, which cannot be done for the clique number as it may underestimate the privacy budget. Our approach is defined in the general setting of $f$-differential privacy, which subsumes standard pure differential privacy and Gaussian differential privacy. We prove the parallel composition theorem for $f$-differential privacy. We evaluate our approach on synthetic and real-world data sets of queries. We show that the approach can scale to large domain sizes (up to $10^{20000}$), and that its application can reduce the noise added to query answers by up to 60\%.
△ Less
Submitted 19 September, 2021;
originally announced September 2021.
-
Evaluating the impact of next generation broadband on local business creation
Authors:
Philip Chen,
Edward J Oughton,
Pete Tyler,
Mo Jia,
Jakub Zagdanski
Abstract:
Basic broadband connectivity is regarded as generally having a positive macroeconomic effect. However, over the past decade there has been an emerging school of thought suggesting the impacts of upgrading to higher speed broadband have been overstated, potentially leading to the inefficient allocation of taxpayer-funded subsidies. In this analysis we model the impacts of Next Generation Access on…
▽ More
Basic broadband connectivity is regarded as generally having a positive macroeconomic effect. However, over the past decade there has been an emerging school of thought suggesting the impacts of upgrading to higher speed broadband have been overstated, potentially leading to the inefficient allocation of taxpayer-funded subsidies. In this analysis we model the impacts of Next Generation Access on new business creation using high-resolution panel data. After controlling for a range of factors, the results provide evidence of a small but significant negative impact of high-speed broadband on new business creation over the study period which we suggest could be due to two factors. Firstly, moving from basic to high-speed broadband provides few benefits to enable new businesses being formed. Secondly, strong price competition and market consolidation from online service providers (e.g. Amazon etc.) may be deterring new business start-ups. This analysis provides another piece of evidence to suggest that the economic impact of broadband is more nuanced than the debate has traditionally suggested. Our conjecture is that future policy decisions need to be more realistic about the potential economic impacts of broadband, including those effects that could be negative on the stock of local businesses and therefore the local tax base.
△ Less
Submitted 27 October, 2020;
originally announced October 2020.
-
A Corpus for Detecting High-Context Medical Conditions in Intensive Care Patient Notes Focusing on Frequently Readmitted Patients
Authors:
Edward T. Moseley,
Joy T. Wu,
Jonathan Welt,
John Foote,
Patrick D. Tyler,
David W. Grant,
Eric T. Carlson,
Sebastian Gehrmann,
Franck Dernoncourt,
Leo Anthony Celi
Abstract:
A crucial step within secondary analysis of electronic health records (EHRs) is to identify the patient cohort under investigation. While EHRs contain medical billing codes that aim to represent the conditions and treatments patients may have, much of the information is only present in the patient notes. Therefore, it is critical to develop robust algorithms to infer patients' conditions and treat…
▽ More
A crucial step within secondary analysis of electronic health records (EHRs) is to identify the patient cohort under investigation. While EHRs contain medical billing codes that aim to represent the conditions and treatments patients may have, much of the information is only present in the patient notes. Therefore, it is critical to develop robust algorithms to infer patients' conditions and treatments from their written notes. In this paper, we introduce a dataset for patient phenotyping, a task that is defined as the identification of whether a patient has a given medical condition (also referred to as clinical indication or phenotype) based on their patient note. Nursing Progress Notes and Discharge Summaries from the Intensive Care Unit of a large tertiary care hospital were manually annotated for the presence of several high-context phenotypes relevant to treatment and risk of re-hospitalization. This dataset contains 1102 Discharge Summaries and 1000 Nursing Progress Notes. Each Discharge Summary and Progress Note has been annotated by at least two expert human annotators (one clinical researcher and one resident physician). Annotated phenotypes include treatment non-adherence, chronic pain, advanced/metastatic cancer, as well as 10 other phenotypes. This dataset can be utilized for academic and industrial research in medicine and computer science, particularly within the field of medical natural language processing.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
On the Privacy of the Opal Data Release: A Response
Authors:
Hassan Jameel Asghar,
Paul Tyler,
Mohamed Ali Kaafar
Abstract:
This document is a response to a report from the University of Melbourne on the privacy of the Opal dataset release. The Opal dataset was released by Data61 (CSIRO) in conjunction with the Transport for New South Wales (TfNSW). The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail,…
▽ More
This document is a response to a report from the University of Melbourne on the privacy of the Opal dataset release. The Opal dataset was released by Data61 (CSIRO) in conjunction with the Transport for New South Wales (TfNSW). The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail, train and ferries. These taps are recorded through the smart ticketing system, known as Opal, available in the state of New South Wales, Australia.
△ Less
Submitted 24 May, 2017;
originally announced May 2017.
-
Differentially Private Release of Public Transport Data: The Opal Use Case
Authors:
Hassan Jameel Asghar,
Paul Tyler,
Mohamed Ali Kaafar
Abstract:
This document describes the application of a differentially private algorithm to release public transport usage data from Transport for New South Wales (TfNSW), Australia. The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail, train and ferries. These taps are recorded through the s…
▽ More
This document describes the application of a differentially private algorithm to release public transport usage data from Transport for New South Wales (TfNSW), Australia. The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail, train and ferries. These taps are recorded through the smart ticketing system, known as Opal, available in the state of New South Wales, Australia.
△ Less
Submitted 16 May, 2017;
originally announced May 2017.
-
Comparing Rule-Based and Deep Learning Models for Patient Phenotyping
Authors:
Sebastian Gehrmann,
Franck Dernoncourt,
Yeran Li,
Eric T. Carlson,
Joy T. Wu,
Jonathan Welt,
John Foote Jr.,
Edward T. Moseley,
David W. Grant,
Patrick D. Tyler,
Leo Anthony Celi
Abstract:
Objective: We investigate whether deep learning techniques for natural language processing (NLP) can be used efficiently for patient phenotyping. Patient phenotyping is a classification task for determining whether a patient has a medical condition, and is a crucial part of secondary analysis of healthcare data. We assess the performance of deep learning algorithms and compare them with classical…
▽ More
Objective: We investigate whether deep learning techniques for natural language processing (NLP) can be used efficiently for patient phenotyping. Patient phenotyping is a classification task for determining whether a patient has a medical condition, and is a crucial part of secondary analysis of healthcare data. We assess the performance of deep learning algorithms and compare them with classical NLP approaches.
Materials and Methods: We compare convolutional neural networks (CNNs), n-gram models, and approaches based on cTAKES that extract pre-defined medical concepts from clinical notes and use them to predict patient phenotypes. The performance is tested on 10 different phenotyping tasks using 1,610 discharge summaries extracted from the MIMIC-III database.
Results: CNNs outperform other phenotyping algorithms in all 10 tasks. The average F1-score of our model is 76 (PPV of 83, and sensitivity of 71) with our model having an F1-score up to 37 points higher than alternative approaches. We additionally assess the interpretability of our model by presenting a method that extracts the most salient phrases for a particular prediction.
Conclusion: We show that NLP methods based on deep learning improve the performance of patient phenotyping. Our CNN-based algorithm automatically learns the phrases associated with each patient phenotype. As such, it reduces the annotation complexity for clinical domain experts, who are normally required to develop task-specific annotation rules and identify relevant phrases. Our method performs well in terms of both performance and interpretability, which indicates that deep learning is an effective approach to patient phenotyping based on clinicians' notes.
△ Less
Submitted 25 March, 2017;
originally announced March 2017.