Browse Articles

Differential privacy in machine learning for traffic forecasting

Vinay et al. | Dec 21, 2022

Differential privacy in machine learning for traffic forecasting

In this paper, we measured the privacy budgets and utilities of different differentially private mechanisms combined with different machine learning models that forecast traffic congestion at future timestamps. We expected the ANNs combined with the Staircase mechanism to perform the best with every value in the privacy budget range, especially with the medium high values of the privacy budget. In this study, we used the Autoregressive Integrated Moving Average (ARIMA) and neural network models to forecast and then added differentially private Laplacian, Gaussian, and Staircase noise to our datasets. We tested two real traffic congestion datasets, experimented with the different models, and examined their utility for different privacy budgets. We found that a favorable combination for this application was neural networks with the Staircase mechanism. Our findings identify the optimal models when dealing with tricky time series forecasting and can be used in non-traffic applications like disease tracking and population growth.

Read More...

An improved video fingerprinting attack on users of the Tor network

Srikanth et al. | Mar 31, 2022

An improved video fingerprinting attack on users of the Tor network

The Tor network allows individuals to secure their online identities by encrypting their traffic, however it is vulnerable to fingerprinting attacks that threaten users' online privacy. In this paper, the authors develop a new video fingerprinting model to explore how well video streaming can be fingerprinted in Tor. They found that their model could distinguish which one of 50 videos a user was hypothetically watching on the Tor network with 85% accuracy, demonstrating that video fingerprinting is a serious threat to the privacy of Tor users.

Read More...

The influence of purpose-of-use on information overload in online social networking

Agarkar et al. | Nov 01, 2022

The influence of purpose-of-use on information overload in online social networking

Here, seeking to understand the effects of social media in relation to social media fatigue and/or overload in recent years, the authors used various linear models to assess the results of a survey of 27 respondents. Their results showed that increased duration of use of social media did not necessarily lead to fatigue, suggesting that quality may be more important than quantity. They also considered the purpose of an individual's social media usage as well as their engagement behavior during the COVID-19 pandemic.

Read More...

The effect of the pandemic on the behavior of junior high school students

Kong Grisius et al. | May 01, 2023

The effect of the pandemic on the behavior of junior high school students
Image credit: Chris Montgomery

Here, seeking to understand how the COVID-19 pandemic affected the social interactions of junior high school students, the authors surveyed students, teachers, and parents. Contrary to their initial hypotheses, the authors found positive correlation between increased virtual contact during social isolation and in-person conflict and disregard for social norms after the pandemic. While the authors identified the limitations of their study, they suggest that further research into the effect of online interactions is becoming increasingly important.

Read More...

COVID 19 and the perceived impacts on adolescents’ and young adults’ mental health: A quantitative survey

Kumar et al. | Jul 31, 2023

COVID 19 and the perceived impacts on adolescents’ and young adults’ mental health: A quantitative survey
Image credit: Nick Fewings

Here, recognizing the effects of the COVID-19 pandemic on young peoples' mental health and wellbeing the authors used an online survey which included the short General Health Questionnaire (GHQ-12) to probe 102 young adults. Overall they found that young adults perceived the pandemic to be detrimental to many areas of their wellbeing, with females and those aged 18-19 and 22-23 reporting to be the most significantly impacted.

Read More...

Impact of study partner status and group membership on commitment device effectiveness among college students

Gupta et al. | Jun 03, 2022

Impact of study partner status and group membership on commitment device effectiveness among college students

Here seeking to identify a possible solution to procrastination among college students, the authors used an online experiment that involved the random assignment of study partners that they shared their study time goal with. These partners were classified by status and group membership. The authors found that status and group membership did not significantly affect the likelihood of college students achieving their committed goals, and also suggest the potential of soft commitment devices that take advantage of social relationships to reduce procrastination.

Read More...

Sex differences in confidence and memory

Primack et al. | Oct 25, 2021

Sex differences in confidence and memory

In this work, the authors sought to provide an original experiment to investigate the conflict over whether males or females tend to exhibit greater accuracy or confidence in their memories. By using an online portal to obtain a convenience sample, the authors found that their results suggest that though males tend to be more confident regarding their memories, they may in fact remember fewer details. The authors suggest that these findings merit further research before making systematic changes regarding crime scene recall settings.

Read More...

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

Zhang et al. | Jul 19, 2020

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

In this study, the authors develop an architecture to implement in a cloud-based database used by law firms to ensure confidentiality, availability, and integrity of attorney documents while maintaining greater efficiency than traditional encryption algorithms. They assessed whether the architecture satisfies necessary criteria and tested the overall file sizes the architecture could process. The authors found that their system was able to handle larger file sizes and fit engineering criteria. This study presents a valuable new tool that can be used to ensure law firms have adequate security as they shift to using cloud-based storage systems for their files.

Read More...

Search Articles

Search articles by title, author name, or tags

Clear all filters

Popular Tags

Browse by school level