scholarly journals Anomaly Mining - Past, Present and Future

Author(s):  
Leman Akoglu

Anomaly mining is an important problem that finds numerous applications in various real world do- mains such as environmental monitoring, cybersecurity, finance, healthcare and medicine, to name a few. In this article, I focus on two areas, (1) point-cloud and (2) graph-based anomaly mining. I aim to present a broad view of each area, and discuss classes of main research problems, recent trends and future directions. I conclude with key take-aways and overarching open problems. Disclaimer. I try to provide an overview of past and recent trends in both areas within 4 pages. Undoubtedly, these are my personal view of the trends, which can be organized differently. For brevity, I omit all technical details and refer to corresponding papers. Again, due to space limit, it is not possible to include all (even most relevant) references, but a few representative examples.

Impact ◽  
2019 ◽  
Vol 2019 (10) ◽  
pp. 30-32
Author(s):  
Tomoyuki Morimae

In cloud quantum computing, a classical client delegate quantum computing to a remote quantum server. An important property of cloud quantum computing is the verifiability: the client can check the integrity of the server. Whether such a classical verification of quantum computing is possible or not is one of the most important open problems in quantum computing. We tackle this problem from the view point of quantum interactive proof systems. Dr Tomoyuki Morimae is part of the Quantum Information Group at the Yukawa Institute for Theoretical Physics at Kyoto University, Japan. He leads a team which is concerned with two main research subjects: quantum supremacy and the verification of quantum computing.


2021 ◽  
Vol 54 (6) ◽  
pp. 1-35
Author(s):  
Ninareh Mehrabi ◽  
Fred Morstatter ◽  
Nripsuta Saxena ◽  
Kristina Lerman ◽  
Aram Galstyan

With the widespread use of artificial intelligence (AI) systems and applications in our everyday lives, accounting for fairness has gained significant importance in designing and engineering of such systems. AI systems can be used in many sensitive environments to make important and life-changing decisions; thus, it is crucial to ensure that these decisions do not reflect discriminatory behavior toward certain groups or populations. More recently some work has been developed in traditional machine learning and deep learning that address such challenges in different subdomains. With the commercialization of these systems, researchers are becoming more aware of the biases that these applications can contain and are attempting to address them. In this survey, we investigated different real-world applications that have shown biases in various ways, and we listed different sources of biases that can affect AI applications. We then created a taxonomy for fairness definitions that machine learning researchers have defined to avoid the existing bias in AI systems. In addition to that, we examined different domains and subdomains in AI showing what researchers have observed with regard to unfair outcomes in the state-of-the-art methods and ways they have tried to address them. There are still many future directions and solutions that can be taken to mitigate the problem of bias in AI systems. We are hoping that this survey will motivate researchers to tackle these issues in the near future by observing existing work in their respective fields.


2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


2019 ◽  
Vol 8 (1) ◽  
pp. 50-67
Author(s):  
Lukasz Damurski ◽  
Jacek Pluta ◽  
Jerzy Ładysz ◽  
Magdalena Mayer-Wydra

Services originally developed as natural concentrations of human activity, reflecting the Christallerian hierarchy of central places. Today, those natural mechanisms are challenged by strong competition from online facilities. More and more services are offered by the internet and this affects the traditional ‘bricks-and-mortar' urban development. In this article, the main research problems of the inter-relatedness of real and virtual environments are defined in the context of urban neighbourhood service centres. The process of conversion from offline services into online ones is treated as a canvas for building a comprehensive research model for studying the development of the contemporary urban services sector in the local scale. Particular research questions and hypotheses are formulated and followed by a set of methods for further empirical research.


2018 ◽  
Vol 03 (04) ◽  
pp. 1850001 ◽  
Author(s):  
Gisele Bortolaz Guedes ◽  
Lucas Barboza Zattar Paganin ◽  
Milton Borsato

Global instability can be seen as a reflection of the increasing demand for natural resources and the reduction of personnel expenditures. Yet, this is often associated with industrial systems, whose main objectives are to increase productive capacity and reduce costs. This scenario identifies the need for changes in strategy establishment in the organization’s operation mode focusing on sustainable development. Industrial ecosystems, through the symbiotic relationship of industries, aim to achieve sustainability goals. Material flow mapping is essential for the construction of these industrial ecosystems. Hence, the present paper carries out a structured literature review process in order to identify the state of the art and the research opportunities on material flow mapping and industrial ecosystems. For the accomplishment of this research, the methodological procedure called Knowledge Development Process — Constructivist (ProKnow-C) was adopted. The bibliographic portfolio is represented by 35 articles of the research theme. Throughout the bibliometric analysis, a statistical analysis of the articles that compose the portfolio is presented. In the systemic analysis, the main research problems, the means of solving them and the detected opportunities about this research theme are identified. Finally, conclusions and recommendations for future research are presented.


2021 ◽  
Vol 46 (1) ◽  
pp. 3-10
Author(s):  
Burcu Gürbüz ◽  
Gerhard-Wilhelm Weber

AbstractThis special issue of the Foundations of Computing and Decision Sciences, titled ”Numerical Techniques Meet with OR”, is devoted to the numerical techniques and their applications in real-world phenomena. The special issue and its editorial present numerical algorithms as they meet with different research topics such as, e.g., from operational research, supply chain management, geometrical structures and Covid-19 effects on financial applications. Besides, the special issue covers instructional information about numerical techniques which are useful for OR research problems and real-world applications on such issues.


2013 ◽  
Vol 22 (2) ◽  
pp. 275-275

This discussion of Dagmar Herzog's Sexuality in Europe (2011) continues our new series of book fora. Herzog's new overview of changing European sexual mores and behaviour offers a jumping-off point for our panellists to discuss recent trends and future directions in the history of sexuality in twentieth-century Europe, East and West. Jeffrey Weeks (London South Bank University), Franz Eder (University of Vienna), Daniel Healey (University of Reading) and Victoria Harris (University of Birmingham) give their responses, and Herzog replies.


Author(s):  
Aditya Upadrasta ◽  
Catherine Stanton ◽  
Colin Hill ◽  
Gerald F. Fitzgerald ◽  
R. Paul Ross

Sign in / Sign up

Export Citation Format

Share Document