Three Branches of Negative Representation of Information: A Survey

Negative Representation of Information (NRI) is an emerging topic that is primarily inspired by the self-nonself discrimination paradigm of the biological immune system, and it is mainly used as an emerging technique for security and privacy. For the first time, this paper provides a survey of the models and algorithms that are based on Negative Representation of Information. Thus far, the NRI has three primary branches, namely, negative selection algorithms, negative databases, and negative surveys. The basic ideas, related algorithms, and applications of each branch are summarized as well as issues that need to be studied further.

[1]  Ran Liu,et al.  A fine-grained algorithm for generating hard-toreverse negative databases , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).

[2]  Shanyu Tang,et al.  An Efficient Approximation Method for Calculating Confidence Level of Negative Survey , 2015 .

[3]  Zhou Ji,et al.  V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..

[4]  Wenjian Luo,et al.  Fast searching optimal negative surveys , 2014 .

[5]  Stephanie Forrest,et al.  A Relational Algebra for Negative Databases , 2007 .

[6]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  David W. Corne,et al.  An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.

[8]  Walmir M. Caminhas,et al.  Design of an Artificial Immune System for fault detection: A Negative Selection Approach , 2010, Expert Syst. Appl..

[9]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[10]  Huey-Ming Lee,et al.  A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection , 2007, KES.

[11]  Ryan J. Halter,et al.  A wearable system that knows who wears it , 2014, MobiSys.

[12]  Ying Tan,et al.  A Hierarchical Artificial Immune Model for Virus Detection , 2009, 2009 International Conference on Computational Intelligence and Security.

[13]  J Timmis,et al.  An artificial immune system for data analysis. , 2000, Bio Systems.

[14]  Paul Helman,et al.  The Crossover Closure and Partial Match Detection , 2003, ICARIS.

[15]  D. Dasgupta,et al.  Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[16]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[17]  Riccardo Zecchina,et al.  Hiding solutions in random satisfiability problems: A statistical mechanics approach , 2001, Physical review letters.

[18]  Zhengjun Liu,et al.  An Improved Negative Selection Algorithm Based on Subspace Density Seeking , 2017, IEEE Access.

[19]  Zhou Ji,et al.  Applicability issues of the real-valued negative selection algorithms , 2006, GECCO.

[20]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[21]  Guangchen Ruan,et al.  Uninterrupted Approaches for Spam Detection Based on SVM and AIS , 2014 .

[22]  Wei Zhang,et al.  A Survey of artificial immune applications , 2010, Artificial Intelligence Review.

[23]  Ulrik Franke,et al.  Cyber situational awareness - A systematic review of the literature , 2014, Comput. Secur..

[24]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[25]  Maciej Liskiewicz,et al.  Negative selection algorithms without generating detectors , 2010, GECCO '10.

[26]  Víctor M. Guerrero,et al.  A Statistical Approach to Provide Individualized Privacy for Surveys , 2016, PloS one.

[27]  James Cannady,et al.  A Self-Adaptive Evolutionary Negative Selection Approach for Anomaly Detection , 2005 .

[28]  Cristopher Moore,et al.  Generating Hard Satisfiable Formulas by Hiding Solutions Deceptively , 2005, AAAI.

[29]  Senhua Yu,et al.  Conserved Self Pattern Recognition Algorithm , 2008, ICARIS.

[30]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[31]  Fernando Esponda,et al.  Everything That is Not Important: Negative Databases , 2008 .

[32]  Amiya Nayak,et al.  Network Fault Diagnosis: An Artificial Immune System Approach , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.

[33]  Rozaida Ghazali,et al.  Negative Selection Algorithm: A Survey on the Epistemology of Generating Detectors , 2013, DaEng.

[34]  Salah Al-Sharhan,et al.  ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .

[35]  Wenjian Luo,et al.  Estimating positive surveys from negative surveys , 2013 .

[36]  Stephanie Forrest,et al.  Reconstructing Spatial Distributions from Anonymized Locations , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.

[37]  Hao Jiang,et al.  Rating Credits of Online Merchants Using Negative Ranks , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.

[38]  Wenjian Luo,et al.  SvdNPD: a negative data publication method based on the sensitive value distribution , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).

[39]  Wenjian Luo,et al.  On the self representation based on the adaptive self radius , 2011, The Fourth International Workshop on Advanced Computational Intelligence.

[40]  Paul Helman,et al.  On-line Negative Databases , 2005, Int. J. Unconv. Comput..

[41]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[42]  Alireza Osareh,et al.  Distribution estimation based negative selection algorithm (DENSA) , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).

[43]  Hao Jiang,et al.  On Location and Trace Privacy of the Moving Object Using the Negative Survey , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.

[44]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[45]  Dipankar Dasgupta,et al.  Immuno-inspired autonomic system for cyber defense , 2007, Inf. Secur. Tech. Rep..

[46]  Jonathan Timmis,et al.  Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.

[47]  Ran Liu,et al.  Negative Iris Recognition , 2018, IEEE Transactions on Dependable and Secure Computing.

[48]  Hao Jiang,et al.  On the Reconstruction Method For Negative Surveys with Application to Education Surveys , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.

[49]  Paul Helman,et al.  Enhancing Privacy through Negative Representations of Data , 2004 .

[50]  Lihua Yue,et al.  Reconstructing Positive Surveys from Negative Surveys with Background Knowledge , 2016, DMBD.

[51]  Hirotada Ohashi,et al.  A negative selection algorithm for classification and reduction of the noise effect , 2009, Appl. Soft Comput..

[52]  Ran Liu,et al.  Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).

[53]  Dipankar Dasgupta,et al.  Novelty detection in time series data using ideas from immunology , 1996 .

[54]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[55]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[56]  Takeshi Okamoto,et al.  Toward an artificial immune server against cyber attacks , 2016, Artificial Life and Robotics.

[57]  Pascal Bouvry,et al.  Immune anomaly detection enhanced with evolutionary paradigms , 2006, GECCO.

[58]  Yoshiteru Ishida Fully distributed diagnosis by PDP learning algorithm: towards immune network PDP model , 1990, 1990 IJCNN International Joint Conference on Neural Networks.

[59]  Ran Liu,et al.  Classifying and clustering in negative databases , 2013, Frontiers of Computer Science.

[60]  Benjamin Edwards,et al.  Enhancing privacy in participatory sensing applications with multidimensional data , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.

[61]  Jean-Yves Fourniols,et al.  Smart wearable systems: Current status and future challenges , 2012, Artif. Intell. Medicine.

[62]  Rogério de Lemos,et al.  Negative Selection: How to Generate Detectors , 2002 .

[63]  D. Wong,et al.  Negative Selection Algorithm for Aircraft Fault Detection , 2004, ICARIS.

[64]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[65]  Liu Xuepeng Immune PI control on PMSM speed regulating system , 2008, 2008 7th World Congress on Intelligent Control and Automation.

[66]  Dipankar Dasgupta,et al.  An Investigation of Negative Authentication Systems 1 , 2008 .

[67]  Fernando Esponda Negative Surveys , 2006 .

[68]  Surya P. N. Singh,et al.  Immunology-directed methods for distributed robotics: a novel immunity-based architecture for robust control and coordination , 2002, SPIE Optics East.

[69]  Paul Helman,et al.  Negative representations of information , 2009, International Journal of Information Security.

[70]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[71]  Dipankar Dasgupta,et al.  A biologically inspired password authentication system , 2009, CSIIRW '09.

[72]  Wenjian Luo,et al.  A Preliminary Study on Why Using the Nonself Detector Set for Anomaly Detection in Artificial Immune Systems , 2009, 2009 International Conference on Computational Intelligence and Security.

[73]  Alan S. Perelson,et al.  Probability of Self-Nonself Discrimination , 1992 .

[74]  Xin Wang,et al.  A Novel Negative Selection Algorithm with an Array of Partial Matching Lengths for Each Detector , 2006, PPSN.

[75]  Wenjian Luo,et al.  On the dependable level of the negative survey , 2014 .

[76]  Amelia Ritahani Ismail,et al.  An artifical immune systems for robot organisms , 2010 .

[77]  Cristopher Moore,et al.  Hiding Satisfying Assignments: Two Are Better than One , 2004, AAAI.

[78]  Y. Zhu,et al.  A Local-Concentration-Based Feature Extraction Approach for Spam Filtering , 2011, IEEE Transactions on Information Forensics and Security.

[79]  Hao Jiang,et al.  A Novel Negative Location Collection Method for Finding Aggregated Locations , 2018, IEEE Transactions on Intelligent Transportation Systems.

[80]  Julie Greensmith,et al.  Theoretical Formulation and Analysis of the Deterministic Dendritic Cell Algorithm , 2013, Biosyst..

[81]  Arijit Chaudhuri,et al.  Indirect Questioning in Sample Surveys , 2013 .

[82]  Gary G. Yen,et al.  Constrained Optimization Via Artificial Immune System , 2014, IEEE Transactions on Cybernetics.

[83]  Thad Starner The Challenges of Wearable Computing: Part 2 , 2001, IEEE Micro.

[84]  Claudia Eckert,et al.  An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.

[85]  Emma Hart,et al.  An improved immune inspired hyper-heuristic for combinatorial optimisation problems , 2014, GECCO.

[86]  Henri Pierreval,et al.  Fault detection, diagnosis and recovery using Artificial Immune Systems: A review , 2015, Eng. Appl. Artif. Intell..

[87]  Kaoru Sezaki,et al.  Limited Negative Surveys: Privacy-preserving participatory sensing , 2012, 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET).

[88]  Fernando José Von Zuben,et al.  Learning and optimization using the clonal selection principle , 2002, IEEE Trans. Evol. Comput..

[89]  Wenjian Luo,et al.  PTS-RNSA: A Novel Detector Generation Algorithm for Real-Valued Negative Selection Algorithm , 2009, 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.

[90]  Dong Li,et al.  Negative selection algorithm with constant detectors for anomaly detection , 2015, Appl. Soft Comput..

[91]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[92]  Cyril Onwubiko,et al.  Functional requirements of situational awareness in computer network security , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.

[93]  Dipankar Dasgupta,et al.  A Survey of Recent Works in Artificial Immune Systems , 2016 .

[94]  Vincenzo Cutello,et al.  An Immune Algorithm for Protein Structure Prediction on Lattice Models , 2007, IEEE Transactions on Evolutionary Computation.

[95]  Wenjian Luo,et al.  Real-Valued Negative Databases , 2013, ECAL.

[96]  Ran Liu,et al.  Negative Survey-Based Privacy Protection of Cloud Data , 2015, ICSI.

[97]  Zhou Ji,et al.  Augmented negative selection algorithm with variable-coverage detectors , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[98]  Dipankar Dasgupta,et al.  Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[99]  Fernando Niño,et al.  Recent Advances in Artificial Immune Systems: Models and Applications , 2011, Appl. Soft Comput..

[100]  Paul Helman,et al.  On-line Negative Databases , 2004, Int. J. Unconv. Comput..

[101]  Ran Liu,et al.  Hiding multiple solutions in a hard 3-SAT formula , 2015, Data Knowl. Eng..

[102]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[103]  P. Helman,et al.  A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[104]  Fabio A. González,et al.  The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.

[105]  Maoguo Gong,et al.  An efficient negative selection algorithm with further training for anomaly detection , 2012, Knowl. Based Syst..

[106]  Zhang-Zan Jin,et al.  Survey of negative selection algorithms , 2013 .

[107]  Jonathan Timmis,et al.  A modified Dendritic Cell Algorithm for on-line error detection in robotic systems , 2009, 2009 IEEE Congress on Evolutionary Computation.

[108]  Bart Selman,et al.  Local search strategies for satisfiability testing , 1993, Cliques, Coloring, and Satisfiability.

[109]  Paul Helman,et al.  Protecting data privacy through hard-to-reverse negative databases , 2007, International Journal of Information Security.

[110]  Ali Selamat,et al.  Improved email spam detection model with negative selection algorithm and particle swarm optimization , 2014, Appl. Soft Comput..

[111]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[112]  Akihiko Ohsuga,et al.  Privacy Preservation for Participatory Sensing Applications , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[113]  Víctor M. Guerrero,et al.  Surveys with negative questions for sensitive items , 2009 .

[114]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[115]  Stephanie Forrest,et al.  Anonymous Data Collection in Sensor Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[116]  Guilherme Costa Silva,et al.  Immune inspired Fault Detection and Diagnosis: A fuzzy-based approach of the negative selection algorithm and participatory clustering , 2012, Expert Syst. Appl..

[117]  Sharad Malik,et al.  Zchaff2004: An Efficient SAT Solver , 2004, SAT (Selected Papers.

[118]  Mario G. Perhinschi,et al.  Structured non-self approach for aircraft failure identification within a fault tolerance architecture , 2016 .

[119]  Dipankar Dasgupta,et al.  Artificial immune systems in industrial applications , 1999, Proceedings of the Second International Conference on Intelligent Processing and Manufacturing of Materials. IPMM'99 (Cat. No.99EX296).

[120]  Ran Liu,et al.  A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[121]  Ran Liu,et al.  Experimental analyses of the K-hidden algorithm , 2017, Eng. Appl. Artif. Intell..

[122]  Hugues Bersini,et al.  Hints for Adaptive Problem Solving Gleaned from Immune Networks , 1990, PPSN.

[123]  Lars Kulik,et al.  Privacy-aware collection of aggregate spatial data , 2011, Data Knowl. Eng..

[124]  Ying Tan,et al.  A Virus Detection System Based on Artificial Immune System , 2009, 2009 International Conference on Computational Intelligence and Security.