Yinan Shan

  • Citations Per Year
Learn More
Private information retrieval enables the sensitive data to be obtained only if the data authorizers allow the data receivers to access to the data. Sometimes the owners are of a group and there is no need for all members to authorize the receivers. Moreover, the right to authorize could be unequal for different authorizers in the group. In this paper, we(More)
The theme of this paper is that anomaly detection splits into two parts: developing the right features, and then feeding these features into a statistical system that detects anomalies in the features. Most literature on anomaly detection focuses on the second part. Our goal is to illustrate the importance of the first part. We do this with two real-life(More)
  • 1