大数据系统综述

李学龙, 龚海刚 - 2015 - ir.opt.ac.cn
摘要随着科学, 技术和工程的迅猛发展, 近20 年来, 许多领域(如光学观测, 光学监控, 健康医护,
传感器, 用户数据, 互联网和金融公司以及供应链系统) 都产生了海量的数据(更恰当的描述或许 …

Workload characterization: A survey revisited

MC Calzarossa, L Massari, D Tessera - ACM Computing Surveys (CSUR …, 2016 - dl.acm.org
Workload characterization is a well-established discipline that plays a key role in many
performance engineering studies. The large-scale social behavior inherent in the …

Detection of malicious social bots: A survey and a refined taxonomy

M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …

Big data: A survey

M Chen, S Mao, Y Liu - Mobile networks and applications, 2014 - Springer
In this paper, we review the background and state-of-the-art of big data. We first introduce
the general background of big data and review related technologies, such as could …

Toward scalable systems for big data analytics: A technology tutorial

H Hu, Y Wen, TS Chua, X Li - IEEE access, 2014 - ieeexplore.ieee.org
Recent technological advancements have led to a deluge of data from distinctive domains
(eg, health care and scientific sensors, user-generated data, Internet and financial …

Generating synthetic decentralized social graphs with local differential privacy

Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren - Proceedings of the 2017 …, 2017 - dl.acm.org
A large amount of valuable information resides in decentralized social graphs, where no
entity has access to the complete graph structure. Instead, each user maintains locally a …

{AttriGuard}: A practical defense against attribute inference attacks via adversarial machine learning

J Jia, NZ Gong - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Users in various web and mobile applications are vulnerable to attribute inference attacks, in
which an attacker leverages a machine learning classifier to infer a target user's private …

[PDF][PDF] Dependence makes you vulnberable: Differential privacy under dependent tuples.

C Liu, S Chakraborty, P Mittal - NDSS, 2016 - princeton.edu
Differential privacy (DP) is a widely accepted mathematical framework for protecting data
privacy. Simply stated, it guarantees that the distribution of query results changes only …

Attacking graph-based classification via manipulating the graph structure

B Wang, NZ Gong - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
Graph-based classification methods are widely used for security analytics. Roughly
speaking, graph-based classification methods include collective classification and graph …

Speedup graph processing by graph ordering

H Wei, JX Yu, C Lu, X Lin - … of the 2016 International Conference on …, 2016 - dl.acm.org
The CPU cache performance is one of the key issues to efficiency in database systems. It is
reported that cache miss latency takes a half of the execution time in database systems. To …