skip to main content


This content will become publicly available on August 1, 2024

Title: Supervised Machine Learning Approaches for Leak Localization in Water Distribution Systems: Impact of Complexities of Leak Characteristics
Award ID(s):
1919228
NSF-PAR ID:
10437290
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Journal of Water Resources Planning and Management
Volume:
149
Issue:
8
ISSN:
0733-9496
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The migration to electronic health records (EHR) in the healthcare industry has raised issues with respect to security and privacy. One issue that has become a concern for healthcare providers, insurance companies, and pharmacies is patient health information (PHI) leaks because PHI leaks can lead to violation of privacy laws, which protect the privacy of individuals’ identifiable health information, potentially resulting in a healthcare crisis. This study explores the issue of PHI leaks from an access control viewpoint. We utilize access control policies and PHI leak scenarios derived from semi structured interviews with four healthcare practitioners and use the lens of activity theory to articulate the design of an access control model for detecting and mitigating PHI leaks. Subsequently, we follow up with a prototype as a proof of concept. 
    more » « less
  2. null (Ed.)
    Abstract The southward-flowing deep limb of the Atlantic meridional overturning circulation is composed of both the deep western boundary current (DWBC) and interior pathways. The latter are fed by “leakiness” from the DWBC in the Newfoundland Basin. However, the cause of this leakiness has not yet been explored mechanistically. Here the statistics and dynamics of the DWBC leakiness in the Newfoundland Basin are explored using two float datasets and a high-resolution numerical model. The float leakiness around Flemish Cap is found to be concentrated in several areas (hot spots) that are collocated with bathymetric curvature and steepening. Numerical particle advection experiments reveal that the Lagrangian mean velocity is offshore at these hot spots, while Lagrangian variability is minimal locally. Furthermore, model Eulerian mean streamlines separate from the DWBC to the interior at the leakiness hot spots. This suggests that the leakiness of Lagrangian particles is primarily accomplished by an Eulerian mean flow across isobaths, though eddies serve to transfer around 50% of the Lagrangian particles to the leakiness hot spots via chaotic advection, and rectified eddy transport accounts for around 50% of the offshore flow along the southern face of Flemish Cap. Analysis of the model’s energy and potential vorticity budgets suggests that the flow is baroclinically unstable after separation, but that the resulting eddies induce modest modifications of the mean potential vorticity along streamlines. These results suggest that mean uncompensated leakiness occurs mostly through inertial separation, for which a scaling analysis is presented. Implications for leakiness of other major boundary current systems are discussed. 
    more » « less
  3. Increasingly, more and more mobile applications (apps for short) are using the cloud as the back-end, in particular the cloud APIs, for data storage, data analytics, message notification, and monitoring. Unfortunately, we have recently witnessed massive data leaks from the cloud, ranging from personally identifiable information to corporate secrets. In this paper, we seek to understand why such significant leaks occur and design tools to automatically identify them. To our surprise, our study reveals that lack of authentication, misuse of various keys (e.g., normal user keys and superuser keys) in authentication, or misconfiguration of user permissions in authorization are the root causes. Then, we design a set of automated program analysis techniques including obfuscation-resilient cloud API identification and string value analysis, and implement them in a tool called LeakScope to identify the potential data leakage vulnerabilities from mobile apps based on how the cloud APIs are used. Our evaluation with over 1.6 million mobile apps from the Google Play Store has uncovered 15, 098 app servers managed by mainstream cloud providers such as Amazon, Google, and Microsoft that are subject to data leakage attacks. We have made responsible disclosure to each of the cloud service providers, and they have all confirmed the vulnerabilities we have identified and are actively working with the mobile app developers to patch their vulnerable services. 
    more » « less