Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Multi‑View Clustering For Multi‑Omics Data Using Unifed Embedding, Mohammed Hasanuzzaman, Sayantan Mitra, Sriparna Saha Aug 2020

Multi‑View Clustering For Multi‑Omics Data Using Unifed Embedding, Mohammed Hasanuzzaman, Sayantan Mitra, Sriparna Saha

Department of Computer Science Publications

In real world applications, data sets are often comprised of multiple views, which provide consensus and complementary information to each other. Embedding learning is an effective strategy for nearest neighbour search and dimensionality reduction in large data sets. This paper attempts to learn a unified probability distribution of the points across different views and generates a unified embedding in a low-dimensional space to optimally preserve neighbourhood identity. Probability distributions generated for each point for each view are combined by conflation method to create a single unified distribution. The goal is to approximate this unified distribution as much as possible when …


Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs …