Skip to main content

Showing 1–4 of 4 results for author: Bouchenak, S

Searching in archive cs. Search in all archives.
.
  1. Enhancing Robustness of On-line Learning Models on Highly Noisy Data

    Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen

    Abstract: Classification algorithms have been widely adopted to detect anomalies for various systems, e.g., IoT, cloud and face recognition, under the common assumption that the data source is clean, i.e., features and labels are correctly set. However, data collected from the wild can be unreliable due to careless annotations or malicious data transformation for incorrect anomaly detection. In this paper,… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

    Comments: Published in IEEE Transactions on Dependable and Secure Computing. arXiv admin note: substantial text overlap with arXiv:1911.04383

  2. arXiv:1911.04383  [pdf, other

    cs.LG stat.ML

    RAD: On-line Anomaly Detection for Highly Unreliable Data

    Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen

    Abstract: Classification algorithms have been widely adopted to detect anomalies for various systems, e.g., IoT, cloud and face recognition, under the common assumption that the data source is clean, i.e., features and labels are correctly set. However, data collected from the wild can be unreliable due to careless annotations or malicious data transformation for incorrect anomaly detection. In this paper,… ▽ More

    Submitted 11 November, 2019; originally announced November 2019.

  3. CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions

    Authors: Rafael Pires, David Goltzsche, Sonia Ben Mokhtar, Sara Bouchenak, Antoine Boutet, Pascal Felber, RĂ¼diger Kapitza, Marcelo Pasin, Valerio Schiavoni

    Abstract: By regularly querying Web search engines, users (unconsciously) disclose large amounts of their personal data as part of their search queries, among which some might reveal sensitive information (e.g. health issues, sexual, political or religious preferences). Several solutions exist to allow users querying search engines while improving privacy protection. However, these solutions suffer from a n… ▽ More

    Submitted 27 July, 2018; v1 submitted 3 May, 2018; originally announced May 2018.

    Journal ref: 38th IEEE International Conference on Distributed Computing Systems (ICDCS 2018)

  4. arXiv:1611.00323  [pdf, other

    cs.SE cs.DC cs.NI eess.SY

    Self-Awareness of Cloud Applications

    Authors: Alexandru Iosup, Xiaoyun Zhu, Arif Merchant, Eva Kalyvianaki, Martina Maggio, Simon Spinner, Tarek Abdelzaher, Ole Mengshoel, Sara Bouchenak

    Abstract: Cloud applications today deliver an increasingly larger portion of the Information and Communication Technology (ICT) services. To address the scale, growth, and reliability of cloud applications, self-aware management and scheduling are becoming commonplace. How are they used in practice? In this chapter, we propose a conceptual framework for analyzing state-of-the-art self-awareness approaches u… ▽ More

    Submitted 1 November, 2016; originally announced November 2016.

    Comments: Overall: 40 pages, 1 figure, 135 references. Note: This is an extended survey. A much shorter, revised version of this material will be available in print, as part of a Springer book on "Self-Aware Computing". The book is due to appear in 2017

    MSC Class: 68N99; 68M14; 68M15 ACM Class: A.1; C.3; D.4.1; H.3.4; H.5.1; I.2.8; K.2