Truth-finding is the fundamental technique for corroborating reports from multiple sources in both data integration and collective intelligent applications. Traditional truthfinding methods assume a single true value for each data item and therefore cannot deal will multiple true values (i.e., the multi-truth-finding problem). So far, the existing approaches handle the multi-truth-finding problem in the same way as the single-truth-finding problems. Unfortunately, the multi-truth-finding problem has its unique features, such as the involvement of sets of values in claims, different implications of inter-value mutual exclusion, and larger source profiles. Considering these features could provide new opportunities for obtaining more accurate truthfinding results. Based on this insight, we propose an integrated Bayesian approach to the multi-truth-finding problem, by taking these features into account. To improve the truth-finding efficiency, we reformulate the multi-truthfinding problem model based on the mappings between sources and (sets of) values. New mutual exclusive relations are defined to reflect the possible co-existence of multiple true values. A finer-grained copy detection method is also proposed to deal with sources with large profiles. The experimental results on three real-world datasets show the effectiveness of our approach.
Power systems usually employ bad data detection (BDD) to avoid faulty measurements caused by their anomalies, and hence can ensure the security of the state estimation of power systems. However, recently BDD has been found vulnerable to malicious data deception attacks submerged in big data. Such attacks can purposely craft sparse measurement values (i.e. attack vectors) to mislead power estimates, while not posing any anomalies to the BDD. Some related work has been proposed to emphasize this attack. In this paper, a new malicious data deception attack by considering a practical attacking situation is investigated, where the attacker has limited resources for corrupting measurements. In this case, attackers generate attack vectors with less sparsity to evade conventional BDD, while using a convex optimization method to balance the sparsity and magnitude of attack vectors. Accordingly, the effects of such an attack on operational costs and the risks of power systems are analysed in detail. Moreover, according to security evaluation for individual measurements, such attacks can be detected with high probability by just securing one critical measurement. Numerical simulations illustrate the effectiveness of the proposed new attack case and its detection method.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.