Vous êtes sur la page 1sur 6

2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance

and Smart Computing, IEEE International Conference on Intelligent Data and Security

Security-Aware Information Classications Using


Supervised Learning for Cloud-Based Cyber Risk
Management in Financial Big Data
Keke Gai1 , Meikang Qiu2 , Sam Adam Elnagdy3
1
Department of Computer Science, Pace University, New York, NY 10038, USA, kg71231w@pace.edu;
2
Department of Computer Science, Pace University, New York, NY 10038, USA, mqiu@pace.edu;
3
Department of Computer Science, Pace University, New York, NY, 10038, se85420n@pace.edu

AbstractWith the fast development of Web-based solu- switched based on the practical demands, which is delivered
tions, a variety of paradigms and platforms are emerging by the cloud vendors. This trend has empowered the means
as value creators or improvers in multiple industries. This of information sharing in the nancial industry with a quick
trend has also enable nancial rms to improve their business
processes and create new services. Sharing data between response to the markets [13][18].
nancial service institutions has become an option of achieving Despite many strong desire of using new techniques for
value enhancements. However, the concern of the privacy exchanging information, systems using Web-based solutions
information leakage has also arisen, which impacts on both still encounter a variety of interferences, such as disruptions,
nancial organizations and customers. It is important for
stakeholders in nancial services to be aware of the proper unauthorized alterations, and unexpected usage [19][21].
information classications, by which determining which infor- The core businesses of each nancial enterprise usually
mation can be shared between the nancial service institutions. consist of sensitive information, which need to be pro-
This paper focuses on this issue and proposes a new approach tected from any unanticipated operations or data retrievals.
that use combined supervised learning techniques to classify Moreover, classifying individual information or dataset is
the information in order to avoid releasing those information
that can be harmful for either nancial service providers insufcient since many associated data may contain sen-
or customers. The proposed model is entitled as Supervised sitive information [22][28]. Financial companies concern
lEarning-Based Secure Information Classication (SEB-SIC) about the data sharing since it is challenging to be aware
model, which is mainly supported by the proposed Decision of which information can be shared without triggering any
Tree-based Risk Prediction (DTRP) algorithm. The proposed harmful effects to both nancial service institutions and
scheme is a predictive mechanism that uses the historical data
as the training dataset. The performance of our proposed their customers [29][36]. Having an effective approach
mechanism has been assessed by the experimental evaluations. that can identify whether the target dataset can be securely
shared among nancial rms is an urgent issue, which needs
Index TermsCybersecurity insurance, supervised learning to be solved for dismissing the obstacle of executing the
technique, cloud computing, big data, risk management, cy- information exchanges.
bersecurity
To deal with this problem, we propose the Supervised
I. I NTRODUCTION lEarning-Based Secure Information Classication (SEB-
Contemporary nancial service institutions have an in- SIC) model, which is designed identify the datas shara-
creasing desire of using Web-related technologies to up- bilities among diverse nancial stakeholders. Our proposed
grade service qualities and facilitate new services. This model creates a secure mechanism that distinguishes data
development trend has been remarkably impacting on the for the purpose of protecting privacy information. This goal
industrial growth and new technologies implementations will be achieved by using supervised learning techniques to
[1][4]. As an emerging marketing paradigm, information predict whether the information sharing will be hazardous
sharing has become an important approach for nancial for any relevant parties. The prediction process will be
rms to enlarge their views and create values from multiple executed by the proposed algorithm, Decision Tree-based
perspectives. Cloud computing is an alternative platform Risk Prediction (DTRP) algorithm.
for nancial rms to exchange or share information in a Our DTRP algorithm uses decision tree technique to assist
scalable manner [5][12]. The system congurations can be nancial organizations to perceive when and which data can
be securely shared with other institutions. The determina-
M. Qiu is the corresponding author of this paper. Email address:
tions are based on the data labels and the purposes of data
mqiu@pace.edu.
This work is supported by NSF CNS-1457506 and NSF CNS- sharing. With using the training dataset, a deterministic label
1359557. (Prof. M. Qiu). will be generated to suggest the datas sharability level. The

978-1-5090-2403-2/16 $31.00 2016 IEEE 197


DOI 10.1109/BigDataSecurity-HPSC-IDS.2016.66
algorithms executions are within our proposed architecture. A. Supervised Learning in Financial Risk Management
As one of the common tools in machine learning, super-
vised learning can be considered a group of techniques using
labeled training set that produce functions for data analyses,
such as classications and regressions. Executing this ap-
proach can assist to group target data into a few categories.
The performance improvement of using supervised learning
techniques has been addressed by many recent researches.
First, supervised learning techniques can improve the
classication performance by the advanced training set
Fig. 1: The three-layer architecture of the proposed SEB- congurations [37]. As the matter of fact, the classication
SIC model. generation is a challenging issue in practice since the model
highly depends on the training sets. Whether or not the
training set can accurately represent the features of the
Fig. 1 represents a high level architecture of our proposed target objects is complex when the analysis can be done
model. There are three layers in this architecture, including across multidisciplinary applications with multiple labeled
Financial Stakeholders (FSD), Security Manager (SMG), data [38]. One optimization has been proposed to utilize the
and Data Sharing (DSI) layers. FSD layer refers to a group shared tasks from multitask learning [39].
of nancial institutions that intend to share some data with Next, in the nancial industry, the companies use super-
each other for specic purposes. The DTRP algorithm will vised learning for predicting potential risks based on the
be implemented at SMG layer, in which ensures the data nancial history records [40], [41]. Financial rms intend
security before the data sharing is processed. DSI layer to use supervised learning technique to detect insecurity op-
represents a series of mechanisms of data sharing, such erations, decisions, or investments [42]. This approach can
as data transmissions, data storage, exchange channels, and prevent data from further loss once the unusual operations
data validation methods. are revealed. However, most prior researches have focused
Moreover, our research work is signicant for both re- on detecting improper behaviors in the system, instead of
searchers and practitioners in the nancial security domain. proactively protecting data from information leakage.
The main contributions of this paper are twofold: Moreover, many prior researches also addressed semi-
1) We propose a novel scheme that can secure data sharing supervised learning methods. For instance, a learning ap-
via executing information classications for increasing proach has been proposed for increasing the detection ratio
the security level of privacy protection. of the unknown objects in a video stream [43]. Another
2) Our model is a cloud-based solution that is a new problem was solved by using semi-supervised learning,
attempt aiming to improve the quality of risk manage- which was reducing the semantic gaps in image annotations
ment in the nancial industry. The proposed scheme [44]. Similarly, many prior researches have proved that
can be used as a reference for establishing an effective using semi-supervised learning can dramatically reduce the
cybersecurity insurance policy for nancial rms. error ratio, which can be used in searching, monitoring, and
supervising data or systems [45]. Nevertheless, most prior
The rest of this paper is organized by the following sec- explorations cannot be used to protect data before the data
tions. First, we accomplish a survey in the relevant domains are shared between organizations.
in Section II. Next, we represent the detailed descriptions
of our model in Section III. Furthermore, algorithms are B. Big Data Analytic Techniques
displayed in Section IV and the experimental congurations
Mass storage and Internet have also enabled nancial
as well as the evaluation results are given in Section V.
organizations to extract features from phenomenon, which
Finally, the conclusions are drawn in Section VI.
can assist enterprises to recognize the causes of the risks or
threats [46]. Cyber vulnerabilities can be detected through-
II. R ELATED W ORK out an analysis maneuver based on a large volume of data
[47]. The main benet of using big data in increasing
Using cloud-based approaches for empowering nancial information protection eld is that nancial service institu-
risk management is an alternative for current nancial tions can not only inspect structured data but also examine
service providers, which has been researched in recent unstructured data, by which unexpected actions may be
years. We focus on two dimensions in this section in order detected.
to provide sufcient research background and theoretically This advantage empowers the usage of multimedia and
support our proposed mechanism. Two dimensions include various applications across different operation platforms,
supervised learning and big data analytic techniques. such as data sciences, Internet-of-Thing (IoT), and cloud

198
computing [48][50]. Cyber security inspectors can utilize individual data set transmissions but also the entire prior
multiple data analytic techniques to obtain unusual infor- shared data set.
mation or behaviors occurred in the system, such as super- Based on this cognition, we dene the problem as the PO-
vising images, investigating audios, assessing videos, and tential Data-sharing rIsk (PODI) Problem and the problem
examining texts. Moreover, using state-related techniques statement is given by Denition 1 as the following.
for identifying objects status is an effective approach for
Denition 1. Inputs include a labeled training set, T,
nding the relations between the observable factors [51].
consisting of n instances. Each instance Ii has m ordered
Next, in a big data manipulative environment, cyber
binary attributes that is associated with an output state
threats can take place when using the user-level side attacks
label, S. Each attribute A refers to whether or not this type
to expose information workow systems [52]. Multiple data
of data is shared. Each Si S refers to the information
retrieval channels provide adversaries with various opportu-
classication type. The output will be a decision tree, DT.
nities to invade users systems [53]. For instance, malicious
Our target problem is to identify each Si s type in infor-
attack can take place while the big data transmissions are
mation classication, which will be used for determining
monitored and interrupted. Adversaries can pretend to being
whether the information can be shared.
single or multiple normal users to spread harmful messages.
One of the solutions is to use data analytic tools to assess As mentioned in Denition 1, the main input is a train-
the operators of the system, such as clustering manipulative ing set from each rm, which will be used to generate
plots by using k-mean-based algorithms and identifying information classication criterion. We dene that there is
incidents relations with using associated rules [54], [55]. a labeled training set T that contains a group of instances
Moreover, some researchers attempted to increase the Ii that are associated with a few attributes as well as their
computing efciency of deploying big data techniques. One information classication type Si . In specic, there are m
of the research directions has been explored in enhancing ordered binary attributes in each instance and the binary
the performance of MapReduce, such as using the data attributes are aligned with one output state in T.
anonymization approach [56]. Meanwhile, prior research Moreover, the information classication needs to follow
also addressed the time-aware energy minimization by using the nancial privacy protection regulations, such as con-
dynamic programming [27]. dential, restricted, ofcial, or normal data. Financial enter-
In summary, being aware of harmful information sharing prises will dene which level of the information leakage
is still at its infancy stage in spite of many accomplished can be considered a harmful sharing. Assume that there
research work in vulnerability detections by using machine are x states for S, which has S = {S1 , S2 , . . . , Sx }. The
learning techniques. For contemporary nancial rms, gen- mathematical expression of the input D is given by Equation
erating an effective mechanism that can proactively prevent 1.
A A2 . . . Am S
risks is more important than threat detections, because any 1
threat occurrences can result in serious consequences. Our I1 A11 A12 . . . A1m S1
model concentrates on this reality and aims to protect I A21 A22 . . . A2m S2
D= 2 ...
(1)
nancial enterprises by identifying secure data sharing. The ... ... ... ...
following section represents our model and main concepts. In An1 An2 . . . Anm Sn

III. C ONCEPTS AND THE P ROPOSED M ODEL Where Aij {0, 1}, Si {S1 , S2 , . . . , Sx }.
Next, the main output is a decision tree DT, which
We present our proposed model, SEB-SIC, which aims will be used for identifying the risk level of data sharing.
to identify the potential risks of sharing data by using There are many well developed approaches for generating
supervised learning techniques. We select decision tree a decision tree, such as ID3 and C4.5 algorithms [57].
as the main technique for identifying the possible threats
because of its wide adoptability in predictions. This section B. Model Description
represents the dened main problem that we aim to solve We represent the main manipulative processes in our
as well as the explanations of the proposed model. proposed model. Fig. 2 illustrates the manipulative process
workow structure of SEB-SIC model. A training set is
A. Problem Formulation required for the purpose of the assessment, which is set on
Our model is designed to solve the data sharing security the cloud server. The generation of the training set can be
problem that usually take place in the normal data exchanges processed by using Monte Carlo simulation [58]. The cloud
without awarenesses. For instance, sharing users birthday vendors will regularly update the decision tree to involve
information individually will not affect privacy. However, continuous merging risks. As shown in the gure, there are
sharing users birthday information along with users infor- three main required phases before the decision tree is gen-
mation will be considered privacy leakage. Therefore, for erated. They are Information Classication Congurations,
protecting privacy, data sharing should concern not only Preprocess, and Attributes Extractions:

199
Fig. 2: Manipulative process workow structure of Supervised lEarning-Based Secure Information Classication (SEB-SIC)
model with main operational components.

Information Classication Congurations: At this Algorithm IV.1 Decision Tree-based Risk Prediction
phase, nancial rms need to dene the informa- (DTRP) Algorithm
tion classications, which may include condential, Require: T, A, S, I, T
restricted, ofcial, or normal data, as shown in the Ensure: SF inal
gure. 1: Input T, A, S, I
Preprocess: A few tasks need to be done at this phase. 2: if T then
Data sharing purposes need to be identied in order 3: Output
to clarify a few facts: between which organizations the 4: else if all variables in T refer to the same output
data will be shared, why the data need to be shared, information classication type Si then
what the relevant laws and regulations are, and what 5: Return a single node with the classication type
relationships are between the involved stakeholders. 6: end if
Attributes Extractions: Leverage privacy-oriented 7: if attributes A1 , A2 , . . . , Am then
searching method to list all sensitive data and their 8: for each Ai do
related data. Based on the history data usage, extract 9: Compute the InfoGain [57]
attribute entities from both secure and insecure 10: Select the maximum value of the InfoGain and
operations. choose this attribute as the root
Once these phases are accomplished by the nancial 11: end for
rms, a decision tree can be created by using the out- 12: Dividing T to generate new training sets
comes of the phases above. By cognizing the output state 13: end if
label, nancial companies can make rm decisions with 14: Repeat the process until the decision tree DT is created
the awarenesses of data sharings possible consequences. 15: Input T
The following section gives descriptions about the main 16: for all attributes in T do
algorithm used in our model. 17: if The values of all attributes in T have a match from
DT then
IV. A LGORITHMS
18: Return the corresponding SF inal
The purpose of DTRP algorithm is to produce a decision 19: else if There is no match then
tree that can be used to referee whether the data sharing 20: Return
combinations can be harmful for nancial enterprises or 21: end if
their customers. Since the generation of the decision tree is 22: end for
a well developed eld, our model can be achieved by many 23: Output SF inal
existing decision tree algorithms. The algorithm proposed
in this paper derive from ID3 algorithm, which shows the
main idea of the risk prediction methods. 3) Input the objective set. Search and determine whether
The inputs of our algorithm include the training set T and the objective sets attributes have a match in DT.
the objective set T . The output is the labels corresponding 4) Output the information classication label SF inal if
with the information classications. The pseudo codes of there is a match. Otherwise, output an empty set.
DTRP algorithm is given in Algorithm IV.1.
The main phases of our algorithm include: V. E XPERIMENT AND D ISCUSSIONS
1) Input the training set T as well as instances I, attributes We assessed our proposed scheme by simulations. The
A, and classication labels S main objective of the experimental evaluations was ex-
2) Generate decision tree DT by using the training set. amining the accuracy performance. A virtual training set

200
was generated to produce a decision tree. The target set 1) Generate an optimized decision tree generation algo-
was made, which consisted of the same attributes in the rithm that requires shorter computation time.
training set. Two assessment means were selected, including 2) The training set updates will be addressed in the
Precision and Recall. future work, by which an optimized mechanism for
establishing cyber incident data repository.
3) Efciency-aware approaches bridging up security man-
agers and cloud-based data sharing side will be ex-
plored, too. Our future work will improve this issue
from the perspective of cloud resource management.

R EFERENCES
[1] M. Qiu, Z. Ming, J. Wang, L. Yang, and Y. Xiang. Enabling cloud
computing in emergency management systems. Cloud Computing,
IEEE, 1(4):6067, 2014.
[2] M. Qiu, Z. Chen, Z. Ming, X. Qin, and J. Niu. Energy-aware data
allocation with hybrid memory for mobile cloud systems. IEEE
Systems Journal, PP:110, 2014.
[3] K. Gai, M. Qiu, L. Tao, and Y. Zhu. Intrusion detection techniques
for mobile cloud computing in heterogeneous 5G. Security and
Fig. 3: Simulations for evaluating the accuracy performances Communication Networks, pages 110, 2015.
[4] K. Gai, M. Qiu, S. Jayaraman, and L. Tao. Ontology-based knowledge
representation for secure self-diagnosis in patient-centered telehealth
with cloud systems. In The 2nd IEEE International Conference on
Fig. 3 depicts comparisons of the accuracy performances Cyber Security and Cloud Computing, pages 98103, New York,
by processing 15 input objective data set. Based on the USA, 2015. IEEE.
illustration of the gure, our scheme had a better result in [5] M. Qiu, E. Sha, M. Liu, M. Lin, S. Hua, and L. Yang. Energy
Precision evaluations with an average of 79.28%. Mean- minimization with loop fusion and multi-functional-unit scheduling
for multidimensional DSP. J. of Parallel and Distributed Computing,
while, the average of the Recall assessment was around 68(4):443455, 2008.
65.64%. This result implied that our model could effectively [6] M. Qiu, M. Zhong, J. Li, K. Gai, and Z. Zong. Phase-change
predict most risks but it might cause extra computation memory optimization for green cloud with genetic algorithm. IEEE
Transactions on Computers, 64(12):3528 3540, 2015.
workload. [7] J. Li, M. Qiu, Z. Ming, G. Quan, X. Qin, and Z. Gu. Online
Based on the experimental results, current solution had optimization for scheduling preemptable tasks on IaaS cloud systems.
been proved as an effective approach for predicting the se- Journal of Parallel and Distributed Computing, 72(5):666677, 2012.
[8] M. Qiu, Z. Chen, and M. Liu. Low-power low-latency data allocation
curity level for the data sharing inquiries. A few limitations for hybrid scratch-pad memory. IEEE Embedded Systems Letters,
also existed: 6:6972, 2014.
1) Evaluations were done in the experimental environment [9] K. Gai. A review of leveraging private cloud computing in nancial
service institutions: Value propositions and current performances.
so that real-world assessments would be required for Intl J. of Computer Applications, 95(3):4044, 2014.
testing the practical performances. [10] K. Gai and S. Li. Towards cloud computing: a literature review on
2) The computation workload would be heavy when the cloud computing and its development trends. In 2012 Fourth Intl
Conf. on Multimedia Information Networking and Security, pages
data volume became large. 142146, Nanjing, China, 2012.
We will address these issues in our future work, which is [11] K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong. Dynamic energy-aware
cloudlet-based mobile cloud computing model for green computing.
also described in Section VI. Journal of Network and Computer Applications, 59:4654, 2016.
[12] Y. Li, W. Dai, Z. Ming, and M. Qiu. Privacy protection for preventing
VI. C ONCLUSIONS AND F UTURE W ORK data over-collection in smart city. IEEE Transactions on Computers,
In this paper, we utilized decision tree techniques to pre- PP:1, 2015.
[13] K. Gai and A. Steenkamp. A feasibility study of Platform-as-a-
dict the potential risks of the data sharing between nancial Service using cloud computing for a global service organization.
service institutions. We aimed to reduce the chances of Journal of Information System Applied Research, 7:2842, 2014.
privacy leakage when multiple datasets were shared. The [14] H. Yin and K. Gai. An empirical study on preprocessing high-
proposed model was entitled as SEB-SIC that was supported dimensional class-imbalanced data for classication. In The IEEE
International Symposium on Big Data Security on Cloud, pages
by our proposed DTRP algorithm. Our experimental evalu- 13141319, New York, USA, 2015.
ations had proved that our scheme could perform good in [15] K. Gai, M. Qiu, H. Zhao, and W. Dai. Anti-counterfeit schema using
Precision examinations but additional computation workload monte carlo simulation for e-commerce in cloud systems. In The
2nd IEEE International Conference on Cyber Security and Cloud
might be caused. Computing, pages 7479, New York, USA, 2015. IEEE.
Meanwhile, our current research is an opening for ex- [16] K. Gai, M. Qiu, B. Thuraisingham, and L. Tao. Proactive attribute-
ploring supervised learning techniques in identifying secure based secure data schema for mobile cloud in nancial industry. In
The IEEE International Symposium on Big Data Security on Cloud;
data sharing between nancial enterprises. Future work will 17th IEEE International Conference on High Performance Computing
focus on the following dimensions: and Communications, pages 13321337, New York, USA, 2015.

201
[17] M. Qiu, K. Gai, B. Thuraisingham, L. Tao, and H. Zhao. Proactive [37] A. Prest, C. Schmid, and V. Ferrari. Weakly supervised learning
user-centric secure data scheme using attribute-based semantic access of interactions between humans and objects. Pattern Analysis and
controls for mobile clouds in nancial industry. Future Generation Machine Intelligence, IEEE Transactions on, 34(3):601614, 2012.
Computer Systems, PP:1, 2016. [38] L. Zhang, Y. Gao, Y. Xia, K. Lu, J. Shen, and R. Ji. Representative
[18] K. Gai and A. Steenkamp. Feasibility of a Platform-as-a-Service discovery of structure cues for weakly-supervised image segmenta-
implementation using cloud computing for a global service organi- tion. IEEE Transactions on Multimedia, 16(2):470479, 2014.
zation. In Proceedings of the Conference for Information Systems [39] Y. Luo, D. Tao, B. Geng, C. Xu, and S. Maybank. Manifold
Applied Research, volume 2167, page 1508, 2013. regularized multitask learning for semi-supervised multilabel image
[19] H. Liang and K. Gai. Internet-based anti-counterfeiting pattern with classication. IEEE Transactions on Image Processing, 22(2):523
using big data in china. In The IEEE International Symposium on Big 536, 2013.
Data Security on Cloud, pages 13871392, New York, USA, 2015. [40] W. Lin, Y. Hu, and C. Tsai. Machine learning in nancial crisis
[20] H. Jean-Baptiste, L. Tao, K. Gai, and M. Qiu. Understanding model prediction: a survey. IEEE Transactions on Systems, Man, and
risk management - model rationalization in nancial industry. In The Cybernetics, Part C: Applications and Reviews, 42(4):421436, 2012.
2nd IEEE International Conference on Cyber Security and Cloud [41] G. Kou, Y. Peng, and G. Wang. Evaluation of clustering algorithms
Computing, pages 301306, New York, USA, 2015. IEEE. for nancial risk analysis using MCDM methods. Information
[21] H. Jean-Baptiste, L. Tao, M. Qiu, and K. Gai. Model risk management Sciences, 275:112, 2014.
systems-back-end, middleware, front-end and analytics. In The [42] V. Behbood, J. Lu, and G. Zhang. Fuzzy renement domain
2nd IEEE International Conference on Cyber Security and Cloud adaptation for long term prediction in banking ecosystem. IEEE
Computing, pages 312316, New York, USA, 2015. IEEE. Transactions on Industrial Informatics, 10(2):16371646, 2014.
[22] J. Peng, Y. Dai, Y. Rao, X. Zhi, and M. Qiu. Modeling for CPU- [43] Z. Kalal, K. Mikolajczyk, and J. Matas. Tracking-learning-detection.
intensive applications in cloud computing. In IEEE 17th International IEEE Transactions on Pattern Analysis and Machine Intelligence,
Conference on High Performance Computing and Communications, 34(7):14091422, 2012.
pages 2025. IEEE, 2015. [44] J. Tang, Z. Zha, D. Tao, and T. Chua. Semantic-gap-oriented active
[23] H. Zhao, M. Qiu, K. Gai, J. Li, and X. He. Maintainable mobile learning for multilabel image annotation. IEEE Transactions on
model using pre-cache technology for high performance android Image Processing, 21(4):23542360, 2012.
system. In The 2nd IEEE International Conference on Cyber Security [45] J. Wang, S. Kumar, and S. Chang. Semi-supervised hashing for large-
and Cloud Computing, pages 175180, New York, USA, 2015. IEEE. scale search. IEEE Transactions on Pattern Analysis and Machine
[24] S. Chaisiri, B. Lee, and D. Niyato. Optimization of resource Intelligence, 34(12):23932406, 2012.
provisioning cost in cloud computing. IEEE Transactions on Services [46] X. Wu, X. Zhu, G. Wu, and W. Ding. Data mining with big data.
Computing, 5(2):164177, 2012. IEEE Transactions on Knowledge and Data Engineering, 26(1):97
[25] R. Xu, H. Dai, Z. Jia, M. Qiu, and B. Wang. A piecewise geometry 107, 2014.
method for optimizing the motion planning of data mule in tele-health [47] Y. Zhang, M. Qiu, C. Tsai, M. Hassan, and A. Alamri. Health-
wireless sensor networks. Wireless Networks, 20(7):18391858, 2014. CPS: Healthcare cyber-physical system assisted by cloud and big
[26] H. Zhao, M. Chen, M. Qiu, K. Gai, and M. Liu. A novel pre-cache data. IEEE Systems Journal, PP(99):18, 2015.
schema for high performance Android system. Future Generation [48] L. Xu, W. He, and S. Li. Internet of things in industries: A survey.
Computer Systems, 2015. IEEE Transactions on Industrial Informatics, 10(4):22332243, 2014.
[27] M. Qiu, Z. Ming, J. Li, , S. Liu, B. Wang, and Z. Lu. Three-phase [49] D. Hodges, S. Creese, G. Neil, S. Stevenage, S. Black, H. Meadows,
time-aware energy minimization with DVFS and unrolling for chip S. Creese, D. Hodges, H. He, W. Pike, et al. Cyber warfare: A
multiprocessors. J. of Syst. Architecture, 58(10):439445, 2012. multidisciplinary analysis. IEEE Transactions on Pattern Analysis
[28] K. Thakur, M. Qiu, K. Gai., and M. Ali. An investigation on cyber and Machine Intelligence, 57:12101213, 2013.
security threats and security models. In The 2nd IEEE International [50] S. Kandel, A. Paepcke, J. Hellerstein, and J. Heer. Enterprise data
Conference on Cyber Security and Cloud Computing, pages 307311, analysis and visualization: An interview study. IEEE Transactions
New York, USA, 2015. IEEE. on Visualization and Computer Graphics, 18(12):29172926, 2012.
[29] J. Niu, Y. Gao, M. Qiu, and Z. Ming. Selecting proper wireless [51] J. Wang, M. Qiu, and B. Guo. High reliable real-time bandwidth
network interfaces for user experience enhancement with guaran- scheduling for virtual machines with hidden Markov predicting in
teed probability. Journal of Parallel and Distributed Computing, telehealth platform. Future Generation Computer Systems, 49:68
72(12):15651575, 2012. 76, 2015.
[30] J. Li, M. Qiu, J. Niu, L. Yang, Y. Zhu, and Z. Ming. Thermal-aware [52] J. Wang, M. Qiu, B. Guo, Y. Shen, and Q. Li. User-level side channel
task scheduling in 3D chip multiprocessor with real-time constrained attack on workow system in data-center. In 2015 IEEE 17th Intl
workloads. ACM Trans. on Embedded Computing Systems (TECS), Conf. on High Performance Computing and Communications, pages
12(2):24, 2013. 14301435, New York, NY, USA, 2015. IEEE.
[31] K. Gai, Z. Du, M. Qiu, and H. Zhao. Efciency-aware workload [53] D. Jckle, F. Fischer, T. Schreck, and D. Keim. Temporal MDS plots
optimizations of heterogenous cloud computing for capacity planning for analysis of multivariate data. IEEE Transactions on Visualization
in nancial industry. In The 2nd IEEE International Conference on and Computer Graphics, 22(1):141150, 2016.
Cyber Security and Cloud Computing, pages 16, New York, USA, [54] G. Singh, A. Patrick, and L. Rajpoot. A clustering based intrusion
2015. IEEE. detection system for storage area network. International Journal of
[32] D. Qi, M. Liu, M. Qiu, and S. Zhang. Exponential synchronization Computer Applications, 88(9), 2014.
of general discrete-time chaotic neural networks with or without time [55] P. Dhanke, S. Chahware, and P. Mishra. A review paper on
delays. IEEE Trans. on Neural Networks, 21(8):13581365, 2010. autonomous network security for unsupervised detection of network
[33] J. Li, Z. Ming, M. Qiu, G. Quan, X. Qin, and T. Chen. Resource attacks. International Journal of Advanced Electronics and Commu-
allocation robustness in multi-core embedded systems with inaccurate nication Systems, 3(3), 2014.
information. Journal of Systems Architecture, 57(9):840849, 2011. [56] X. Zhang, L. Yang, C. Liu, and J. Chen. A scalable two-phase top-
[34] M. Qiu, Z. Ming, J. Li, J. Liu, G. Quan, and Y. Zhu. Informer homed down specialization approach for data anonymization using MapRe-
routing fault tolerance mechanism for wireless sensor networks. duce on cloud. IEEE Transactions on Parallel and Distributed
Journal of Systems Architecture, 59(4):260270, 2013. Systems, 25(2):363373, 2014.
[35] G. Wu, H. Zhang, M. Qiu, Z. Ming, J. Li, and X. Qin. A [57] S. Cha and C. Tappert. A genetic algorithm for constructing compact
decentralized approach for mining event correlations in distributed binary decision trees. Journal of Pattern Recognition Research,
system monitoring. Journal of parallel and Distributed Computing, 4(1):113, 2009.
73(3):330340, 2013. [58] M. Qiu, D. Cao, H. Su, and K. Gai. Data transfer minimization for
[36] K. Gai. A report about suggestions on developing e-learning in china. nancial derivative pricing using Monte Carlo simulation with GPU
In 2010 International Conference on E-Business and E-Government, in 5G. International Journal of Communication Systems, 2015.
pages 609613. IEEE, 2010.

202

Vous aimerez peut-être aussi