Skip to main content

Showing 1–5 of 5 results for author: Johnstone, M

Searching in archive cs. Search in all archives.
.
  1. Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms

    Authors: Qi An, Patryk Szewczyk, Michael N Johnstone, James ** Kang

    Abstract: Patients are often encouraged to make use of wearable devices for remote collection and monitoring of health data. This adoption of wearables results in a significant increase in the volume of data collected and transmitted. The battery life of the devices is then quickly diminished due to the high processing requirements of the devices. Given the importance attached to medical data, it is imperat… ▽ More

    Submitted 15 January, 2022; originally announced January 2022.

    Comments: 8 pages, 18 fingures

  2. arXiv:2107.02362  [pdf

    cs.CR

    A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation

    Authors: Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael N. Johnstone, Wencheng Yang

    Abstract: Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imper… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: 14 pages

  3. RAIDER: Reinforcement-aided Spear Phishing Detector

    Authors: Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone

    Abstract: Spear Phishing is a harmful cyber-attack facing business and individuals worldwide. Considerable research has been conducted recently into the use of Machine Learning (ML) techniques to detect spear-phishing emails. ML-based solutions may suffer from zero-day attacks; unseen attacks unaccounted for in the training data. As new attacks emerge, classifiers trained on older data are unable to detect… ▽ More

    Submitted 3 January, 2023; v1 submitted 16 May, 2021; originally announced May 2021.

    Comments: 16 pages

    Journal ref: International Conference on Network and System Security, 2022

  4. arXiv:1406.0267  [pdf, ps, other

    math.ST cs.IT

    Joint density of eigenvalues in spiked multivariate models

    Authors: Prathapasinghe Dharmawansa, Iain M. Johnstone

    Abstract: The classical methods of multivariate analysis are based on the eigenvalues of one or two sample covariance matrices. In many applications of these methods, for example to high dimensional data, it is natural to consider alternative hypotheses which are a low rank departure from the null hypothesis. For rank one alternatives, this note provides a representation for the joint eigenvalue density in… ▽ More

    Submitted 14 June, 2014; v1 submitted 2 June, 2014; originally announced June 2014.

  5. arXiv:1206.1187  [pdf, ps, other

    cs.MS cs.DC math.NA math.PR

    Parallel random variates generator for GPUs based on normal numbers

    Authors: Gleb Beliakov, Michael Johnstone, Doug Creighton, Tim Wilkin

    Abstract: Pseudorandom number generators are required for many computational tasks, such as stochastic modelling and simulation. This paper investigates the serial CPU and parallel GPU implementation of a Linear Congruential Generator based on the binary representation of the normal number $α_{2,3}$. We adapted two methods of modular reduction which allowed us to perform most operations in 64-bit integer ar… ▽ More

    Submitted 22 June, 2012; v1 submitted 6 June, 2012; originally announced June 2012.

    Comments: preprint, 18 pages

    MSC Class: 11K45; 65C10; 65Y05; 68W10