首页 > 最新文献

2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)最新文献

英文 中文
Network Security Challenges in SDN Environments SDN环境下的网络安全挑战
Rolan Khalifa, Minar El-Aasser
Software Defined Networking (SDN) is a revolutionary networking architecture where it has a centralized controller since it separates the control plane and data plane of forwarding elements. In this way, SDN creates a flexible architecture that allows network devices to be configured quickly and easily. Openflow is now the most popular solution for implementing the SDN concept and providing significant flexibility in network flow routing. SDN is exposed to many security threats that will affect the performance of the network Network simulation is a simple and cost-effective technique to see how the network will perform under various operational conditions. The results of the simulation can be used to evaluate and analyze network performance under security threats. In this paper, the SDN scenario model will be developed in OMNeT++ using the INET framework and Openflow protocol. The developed SDN simulation model will be used to create a simulation setup to model security threats in SDN, where a Denial of Service attack (DoS) will be simulated on the Openflow switch and the Openflow controller.
软件定义网络(SDN)是一种革命性的网络架构,它将转发元素的控制平面和数据平面分离开来,具有一个集中的控制器。通过这种方式,SDN创建了一个灵活的架构,可以快速轻松地配置网络设备。Openflow是目前实现SDN概念的最流行的解决方案,它在网络流路由方面提供了极大的灵活性。SDN面临许多安全威胁,这些威胁将影响网络的性能。网络仿真是一种简单而经济的技术,可以查看网络在各种操作条件下的性能。仿真结果可用于评估和分析安全威胁下的网络性能。本文将使用INET框架和Openflow协议在omnet++中开发SDN场景模型。开发的SDN仿真模型将用于创建模拟SDN中的安全威胁的仿真设置,其中拒绝服务攻击(DoS)将在Openflow交换机和Openflow控制器上进行模拟。
{"title":"Network Security Challenges in SDN Environments","authors":"Rolan Khalifa, Minar El-Aasser","doi":"10.1109/ICCSPA55860.2022.10019074","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019074","url":null,"abstract":"Software Defined Networking (SDN) is a revolutionary networking architecture where it has a centralized controller since it separates the control plane and data plane of forwarding elements. In this way, SDN creates a flexible architecture that allows network devices to be configured quickly and easily. Openflow is now the most popular solution for implementing the SDN concept and providing significant flexibility in network flow routing. SDN is exposed to many security threats that will affect the performance of the network Network simulation is a simple and cost-effective technique to see how the network will perform under various operational conditions. The results of the simulation can be used to evaluate and analyze network performance under security threats. In this paper, the SDN scenario model will be developed in OMNeT++ using the INET framework and Openflow protocol. The developed SDN simulation model will be used to create a simulation setup to model security threats in SDN, where a Denial of Service attack (DoS) will be simulated on the Openflow switch and the Openflow controller.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Deep-learning/Fingerprinting for Indoor Positioning Based on IEEE P802.11az 基于IEEE P802.11az的混合深度学习/指纹室内定位
Nader G. Rihan, M. Abdelaziz, Samy S. Soliman
Many different technologies were proposed in the past few years for enhancing indoor positioning: WiFi, Radio Frequency Identification (RFID), Ultra Wide Band (UWB), and Bluetooth to mention some. This study followed the recent IEEE positioning standard (P802.11 az). The standard was developed to enhance indoor navigation by minimizing the consumption power with low hardware complexity. Therefore, this standard enables the usage of artificial intelligence algorithms with relatively high complexity. Also, the usage of this standard will enhance indoor localization and positioning for different commercial purposes. We proposed two methods: Time Of Arrival (TOA) and fingerprinting-deep learning, considering a simple Single Input-Single Input (SISO) system at five Gigahertz with the highest standard allowable bandwidth. The behavior of TOA had very low performance considering a realistic multi-path case. On the other hand, the deep learning algorithm achieved ultra-high indoor positioning resolution (around twelve centimeters). Although TOA is a technique that relies on a simple hardware algorithm relative to deep learning, this paper proved the failure of TOA in a simple indoor environment even using the latest IEEE positioning standard compared with the deep learning method.
在过去的几年里,人们提出了许多不同的技术来增强室内定位:WiFi、射频识别(RFID)、超宽带(UWB)和蓝牙等等。这项研究遵循了最新的IEEE定位标准(P802.11 az)。该标准的开发是为了通过降低硬件复杂性来最小化功耗来增强室内导航。因此,该标准允许使用复杂度相对较高的人工智能算法。此外,该标准的使用将加强室内定位和定位,以满足不同的商业目的。我们提出了两种方法:到达时间(TOA)和指纹深度学习,考虑一个简单的单输入-单输入(SISO)系统在5千兆赫具有最高的标准允许带宽。考虑到实际的多路径情况,TOA行为的性能很低。另一方面,深度学习算法实现了超高的室内定位分辨率(约12厘米)。虽然相对于深度学习,TOA是一种依赖于简单硬件算法的技术,但本文证明了在简单的室内环境下,即使使用最新的IEEE定位标准,与深度学习方法相比,TOA也是失败的。
{"title":"A Hybrid Deep-learning/Fingerprinting for Indoor Positioning Based on IEEE P802.11az","authors":"Nader G. Rihan, M. Abdelaziz, Samy S. Soliman","doi":"10.1109/ICCSPA55860.2022.10019071","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019071","url":null,"abstract":"Many different technologies were proposed in the past few years for enhancing indoor positioning: WiFi, Radio Frequency Identification (RFID), Ultra Wide Band (UWB), and Bluetooth to mention some. This study followed the recent IEEE positioning standard (P802.11 az). The standard was developed to enhance indoor navigation by minimizing the consumption power with low hardware complexity. Therefore, this standard enables the usage of artificial intelligence algorithms with relatively high complexity. Also, the usage of this standard will enhance indoor localization and positioning for different commercial purposes. We proposed two methods: Time Of Arrival (TOA) and fingerprinting-deep learning, considering a simple Single Input-Single Input (SISO) system at five Gigahertz with the highest standard allowable bandwidth. The behavior of TOA had very low performance considering a realistic multi-path case. On the other hand, the deep learning algorithm achieved ultra-high indoor positioning resolution (around twelve centimeters). Although TOA is a technique that relies on a simple hardware algorithm relative to deep learning, this paper proved the failure of TOA in a simple indoor environment even using the latest IEEE positioning standard compared with the deep learning method.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130623693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Theft Cyberattacks Detection in Smart Grids Based on Machine Learning 基于机器学习的智能电网盗窃网络攻击检测
Abdelfatah Ali, M. Mokhtar, M. Shaaban
Electricity theft is a worldwide issue that adversely impacts companies and users. This issue disrupts the expansion of utility companies, produces electric dangers, and affects the high-level cost of electricity for users. The extensive penetration of advanced metering infrastructure networks gives a chance to identify theft cyberattacks by examining the collected data of the energy consumption from smart meters. This work presents a detection approach based on statistical and machine learning to measure theft confidence. An anomaly detection approach is adopted, in which, to detect suspicious data, a theft detection unit based on a fine tree regression model is constructed. Historical data of average load consumption per unit area, smart meter readings, and temperature are employed in the training stage of the proposed approach. The error between the true and estimated data is fitted by a probability density function to identify suspicious data and determine the theft confidence. Different electricity theft cyberattacks are studied to evaluate the efficacy of the developed approach. The obtained results demonstrate the effectiveness of the developed detection approach.
电力盗窃是一个全球性的问题,对公司和用户造成了不利影响。这一问题扰乱了公用事业公司的扩张,产生了电力危险,并影响了用户的高电价。先进计量基础设施网络的广泛渗透,为通过检查从智能电表收集的能耗数据来识别盗窃网络攻击提供了机会。这项工作提出了一种基于统计和机器学习的检测方法来测量盗窃信心。采用异常检测方法,构建基于精细树回归模型的盗窃检测单元,对可疑数据进行检测。在该方法的训练阶段,采用了单位面积平均负荷消耗、智能电表读数和温度的历史数据。通过概率密度函数拟合真实数据与估计数据之间的误差,识别可疑数据,确定盗窃置信度。研究了不同的电力盗窃网络攻击,以评估所开发方法的有效性。所得结果证明了所开发的检测方法的有效性。
{"title":"Theft Cyberattacks Detection in Smart Grids Based on Machine Learning","authors":"Abdelfatah Ali, M. Mokhtar, M. Shaaban","doi":"10.1109/ICCSPA55860.2022.10019036","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019036","url":null,"abstract":"Electricity theft is a worldwide issue that adversely impacts companies and users. This issue disrupts the expansion of utility companies, produces electric dangers, and affects the high-level cost of electricity for users. The extensive penetration of advanced metering infrastructure networks gives a chance to identify theft cyberattacks by examining the collected data of the energy consumption from smart meters. This work presents a detection approach based on statistical and machine learning to measure theft confidence. An anomaly detection approach is adopted, in which, to detect suspicious data, a theft detection unit based on a fine tree regression model is constructed. Historical data of average load consumption per unit area, smart meter readings, and temperature are employed in the training stage of the proposed approach. The error between the true and estimated data is fitted by a probability density function to identify suspicious data and determine the theft confidence. Different electricity theft cyberattacks are studied to evaluate the efficacy of the developed approach. The obtained results demonstrate the effectiveness of the developed detection approach.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130670500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Leveraging Semi-Connected Devices To Enhance Federated Learning 利用半连接设备增强联邦学习
Hend K. Gedawy, Khaled A. Harras, A. Erbad
Federated Learning (FL) was introduced to over-come traditional Machine Learning data privacy concerns, and thus, enable us to gain access to more data. Data owners, clients, are orchestrated by a central FL-server to train data locally and only share their model weights. FL approaches have mainly relied on Cloud and/or Edge to aggregate these model weights and propagate training knowledge across clients. However, several issues hinder the scalability of these approaches, especially in communication-challenged environments. In this paper, we propose a novel semi-distributed system to improve FL training accuracy and time, as well as resource-efficiency at the clients. We leverage co-located clusters of high-end IoT devices, known as FemtoClouds, to propagate training knowledge beyond the Edge. We only leverage Edge/Cloud opportunistically to prop-agate knowledge across FemtoCloud pools. Our evaluation shows that our semi-distributed FemtoClouds system achieves competitive accuracy to state-of-the-art FL approaches, with up to 95% time savings and up to 84% energy savings.
引入联邦学习(FL)是为了克服传统机器学习数据隐私问题,从而使我们能够访问更多数据。数据所有者,即客户端,由中央fl服务器编排,在本地训练数据,并仅共享其模型权重。FL方法主要依赖于云和/或边缘来聚合这些模型权重,并在客户端之间传播训练知识。然而,有几个问题阻碍了这些方法的可伸缩性,特别是在通信困难的环境中。在本文中,我们提出了一种新的半分布式系统,以提高FL训练的准确性和时间,以及客户端的资源效率。我们利用位于同一位置的高端物联网设备集群(称为FemtoClouds),将培训知识传播到边缘之外。我们只利用边缘/云机会在FemtoCloud池中传播知识。我们的评估表明,我们的半分布式FemtoClouds系统达到了与最先进的FL方法相比具有竞争力的精度,节省了高达95%的时间和高达84%的能源。
{"title":"Leveraging Semi-Connected Devices To Enhance Federated Learning","authors":"Hend K. Gedawy, Khaled A. Harras, A. Erbad","doi":"10.1109/ICCSPA55860.2022.10019249","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019249","url":null,"abstract":"Federated Learning (FL) was introduced to over-come traditional Machine Learning data privacy concerns, and thus, enable us to gain access to more data. Data owners, clients, are orchestrated by a central FL-server to train data locally and only share their model weights. FL approaches have mainly relied on Cloud and/or Edge to aggregate these model weights and propagate training knowledge across clients. However, several issues hinder the scalability of these approaches, especially in communication-challenged environments. In this paper, we propose a novel semi-distributed system to improve FL training accuracy and time, as well as resource-efficiency at the clients. We leverage co-located clusters of high-end IoT devices, known as FemtoClouds, to propagate training knowledge beyond the Edge. We only leverage Edge/Cloud opportunistically to prop-agate knowledge across FemtoCloud pools. Our evaluation shows that our semi-distributed FemtoClouds system achieves competitive accuracy to state-of-the-art FL approaches, with up to 95% time savings and up to 84% energy savings.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSFL: Dynamic Sparsification for Federated Learning 联邦学习的动态稀疏化
Mahdi Beitollahi, Mingrui Liu, Ning Lu
Federated Learning (FL) is considered the key, enabling approach for privacy-preserving, distributed machine learning (ML) systems. FL requires the periodic transmission of ML models from users to the server. Therefore, communication via resource-constrained networks is currently a fundamental bottleneck in FL, which is restricting the ML model complexity and user participation. One of the notable trends to reduce the communication cost of FL systems is gradient compression, in which techniques in the form of sparsification are utilized. However, these methods utilize a single compression rate for all users and do not consider communication heterogeneity in a real-world FL system. Therefore, these methods are bottlenecked by the worst communication capacity across users. Further, sparsification methods are non-adaptive and do not utilize the redundant, similar information across users' ML models for compression. In this paper, we introduce a novel Dynamic Sparsification for Federated Learning (DSFL) approach that enables users to compress their local models based on their communication capacity at each iteration by using two novel sparsification methods: layer-wise similarity sparsification (LSS) and extended top- $K$ sparsification. LSS enables DSFL to utilize the global redundant information in users' models by using the Centralized Kernel Alignment (CKA) similarity for sparsification. The extended top-$K$ model sparsification method empowers DSFL to accommodate the heterogeneous communication capacity of user devices by allowing different values of sparsification rate $K$ for each user at each iteration. Our extensive experimental results11All code and experiments are publicly available at: https://github.com/mahdibeit/DSFL. on three datasets show that DSFL has a faster convergence rate than fixed sparsification, and as the communication heterogeneity increases, this gap increases. Further, our thorough experimental investigations uncover the similarities of user models across the FL system.
联邦学习(FL)被认为是保护隐私、分布式机器学习(ML)系统的关键方法。FL需要定期将ML模型从用户传输到服务器。因此,通过资源受限的网络进行通信是目前FL的一个基本瓶颈,它限制了ML模型的复杂性和用户参与。降低FL系统通信成本的一个显著趋势是梯度压缩,其中使用了以稀疏化形式的技术。然而,这些方法对所有用户使用单一压缩率,并且不考虑真实FL系统中的通信异构性。因此,这些方法受到用户间最差通信容量的瓶颈。此外,稀疏化方法是非自适应的,不会利用用户ML模型中的冗余、相似信息进行压缩。在本文中,我们介绍了一种新的用于联邦学习的动态稀疏化(DSFL)方法,该方法使用户能够使用两种新的稀疏化方法:分层相似稀疏化(LSS)和扩展的top- K稀疏化,从而根据每次迭代的通信容量压缩他们的局部模型。LSS通过集中式内核对齐(CKA)相似性进行稀疏化,使DSFL能够利用用户模型中的全局冗余信息。扩展的top-$K$模型稀疏化方法允许每个用户在每次迭代中使用不同的稀疏化率$K$值,从而使DSFL能够适应用户设备的异构通信容量。我们广泛的实验结果11所有的代码和实验都是公开的:https://github.com/mahdibeit/DSFL。结果表明,DSFL比固定稀疏化具有更快的收敛速度,并且随着通信异构性的增加,这种差距也在增加。此外,我们彻底的实验调查揭示了整个FL系统中用户模型的相似性。
{"title":"DSFL: Dynamic Sparsification for Federated Learning","authors":"Mahdi Beitollahi, Mingrui Liu, Ning Lu","doi":"10.1109/ICCSPA55860.2022.10019204","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019204","url":null,"abstract":"Federated Learning (FL) is considered the key, enabling approach for privacy-preserving, distributed machine learning (ML) systems. FL requires the periodic transmission of ML models from users to the server. Therefore, communication via resource-constrained networks is currently a fundamental bottleneck in FL, which is restricting the ML model complexity and user participation. One of the notable trends to reduce the communication cost of FL systems is gradient compression, in which techniques in the form of sparsification are utilized. However, these methods utilize a single compression rate for all users and do not consider communication heterogeneity in a real-world FL system. Therefore, these methods are bottlenecked by the worst communication capacity across users. Further, sparsification methods are non-adaptive and do not utilize the redundant, similar information across users' ML models for compression. In this paper, we introduce a novel Dynamic Sparsification for Federated Learning (DSFL) approach that enables users to compress their local models based on their communication capacity at each iteration by using two novel sparsification methods: layer-wise similarity sparsification (LSS) and extended top- $K$ sparsification. LSS enables DSFL to utilize the global redundant information in users' models by using the Centralized Kernel Alignment (CKA) similarity for sparsification. The extended top-$K$ model sparsification method empowers DSFL to accommodate the heterogeneous communication capacity of user devices by allowing different values of sparsification rate $K$ for each user at each iteration. Our extensive experimental results11All code and experiments are publicly available at: https://github.com/mahdibeit/DSFL. on three datasets show that DSFL has a faster convergence rate than fixed sparsification, and as the communication heterogeneity increases, this gap increases. Further, our thorough experimental investigations uncover the similarities of user models across the FL system.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generic Real Time Autoencoder-Based Lossy Image Compression 一种通用的实时自编码器有损图像压缩
Abdelrahman Tawfik, Shehab Hosny, Sara Hisham, Ali Amr Farouk, Doha Mustafa, Samaa Abdel Moaty, A. Gamal, Khaled Salah
Multimedia compression is a fundamental and significant research topic in the industrial field in the past several decades attempting to improve compression techniques. It is always a trade-off between size and quality where the growth rate of image, audio and video data is far beyond the improvement of the compression ratios achieved so far. Here, we are aiming to explore the potential of neural networks to achieve data compression, making use of multilayer neural networks providing a more efficient solution. In this paper, we present a lossy compression architecture, which utilizes the advantages of convolutional autoencoder (CAE) to replace the conventional transforms. Experimental results demonstrate that our method outperforms traditional coding algorithms, by achieving better compression ratios over the related work.
多媒体压缩是近几十年来工业领域的一个基础性和重要的研究课题,它试图改进压缩技术。在图像、音频和视频数据的增长速度远远超过迄今为止所取得的压缩比的改进的情况下,它总是在大小和质量之间进行权衡。在这里,我们的目标是探索神经网络实现数据压缩的潜力,利用多层神经网络提供更有效的解决方案。在本文中,我们提出了一种有损压缩架构,它利用卷积自编码器(CAE)的优点来取代传统的变换。实验结果表明,我们的方法优于传统的编码算法,在相关工作中获得了更好的压缩比。
{"title":"A Generic Real Time Autoencoder-Based Lossy Image Compression","authors":"Abdelrahman Tawfik, Shehab Hosny, Sara Hisham, Ali Amr Farouk, Doha Mustafa, Samaa Abdel Moaty, A. Gamal, Khaled Salah","doi":"10.1109/ICCSPA55860.2022.10019047","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019047","url":null,"abstract":"Multimedia compression is a fundamental and significant research topic in the industrial field in the past several decades attempting to improve compression techniques. It is always a trade-off between size and quality where the growth rate of image, audio and video data is far beyond the improvement of the compression ratios achieved so far. Here, we are aiming to explore the potential of neural networks to achieve data compression, making use of multilayer neural networks providing a more efficient solution. In this paper, we present a lossy compression architecture, which utilizes the advantages of convolutional autoencoder (CAE) to replace the conventional transforms. Experimental results demonstrate that our method outperforms traditional coding algorithms, by achieving better compression ratios over the related work.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114692651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Seamless device handover for pervasive speech communication 无缝设备切换无处不在的语音通信
Vijaya Nirmala Mitnala, M. Reed, Ian Kegel, J. Bicknell
Sustained growth in the smart speaker market has helped establish high quality, far-field speech communications as a viable alternative to the handset. Seamless handover offers a simple but effective way of improving the far-field communication experience by automatically switching to the best available device regardless of where a user is located. While the basic concept of seamless handover has been proven in a lab environment, this paper proposes two significant enhancements: reduction in media disruption during handover by introducing a parallel session on multiple devices through session initiation protocol (SIP) call forking; and, coherence-based signal processing to more accurately determine the most suitable device for the user. The solution proposed uses the magnitude square coherence (MSC) and results verified through simulation and real datasets show it has excellent performance. However, the raw MSC is found to have high variation due to room effects, consequently this work shows that a smoothing predictor is needed to significantly reduce the extraneous transitions that would otherwise be subjectively poor. Unlike a purely location based approach, the proposed solution selects the best smart device without any environment specific calibration making it ideal for straightforward deployment of a pervasive speech application that uses smart speakers.
智能扬声器市场的持续增长帮助建立了高质量的远场语音通信,作为手机的可行替代品。无缝切换提供了一种简单而有效的方式来改善远场通信体验,无论用户位于何处,都可以自动切换到最佳可用设备。虽然无缝切换的基本概念已经在实验室环境中得到了验证,但本文提出了两个重要的改进:通过会话发起协议(SIP)呼叫分叉在多个设备上引入并行会话来减少切换期间的媒体中断;并且,基于相干的信号处理可以更准确地确定最适合用户的器件。该方案采用幅度平方相干性(MSC),仿真和实际数据验证了该方案的性能。然而,由于房间效应,发现原始的MSC具有很高的变化,因此这项工作表明,需要一个平滑预测器来显着减少无关的过渡,否则主观上会很差。与纯粹基于位置的方法不同,所提出的解决方案选择了最佳的智能设备,而无需任何特定环境的校准,这使得它非常适合使用智能扬声器的普及语音应用程序的直接部署。
{"title":"Seamless device handover for pervasive speech communication","authors":"Vijaya Nirmala Mitnala, M. Reed, Ian Kegel, J. Bicknell","doi":"10.1109/ICCSPA55860.2022.10018978","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10018978","url":null,"abstract":"Sustained growth in the smart speaker market has helped establish high quality, far-field speech communications as a viable alternative to the handset. Seamless handover offers a simple but effective way of improving the far-field communication experience by automatically switching to the best available device regardless of where a user is located. While the basic concept of seamless handover has been proven in a lab environment, this paper proposes two significant enhancements: reduction in media disruption during handover by introducing a parallel session on multiple devices through session initiation protocol (SIP) call forking; and, coherence-based signal processing to more accurately determine the most suitable device for the user. The solution proposed uses the magnitude square coherence (MSC) and results verified through simulation and real datasets show it has excellent performance. However, the raw MSC is found to have high variation due to room effects, consequently this work shows that a smoothing predictor is needed to significantly reduce the extraneous transitions that would otherwise be subjectively poor. Unlike a purely location based approach, the proposed solution selects the best smart device without any environment specific calibration making it ideal for straightforward deployment of a pervasive speech application that uses smart speakers.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120890903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-tuned LSTM-Based Model for Efficient Honeypot-Based Network Intrusion Detection System in Smart Grid Networks 基于lstm的智能电网高效蜜罐网络入侵检测模型
A. Albaseer, M. Abdallah
Honeypot is considered a powerful complement to the Network Intrusion Detection System (NIDS) in smart grid (SG) systems, which minimizes the workload of NIDSs while providing access to information about the attacker's actions. This assists in further tracing the attack surface and, in return, enables the NIDSs to prevent such behaviors. Machine learning (ML) has recently attracted considerable attention in the SG security domain as a stringent technique for designing and implementing algorithms to predict security threats. However, large data sets collected by honeypots require more effort for faster response, real-time processing, and decision-making, especially for limited resources SG's devices. Thus, this paper proposes an approach to address this challenge, including feature extraction, oversampling and weak label combinations. We demonstrate that all classic ML algorithms cannot maintain the desired performance level when reducing the number of selected features (i.e., using only 25% of the features). As a result, we resort to the Deep Learning approach and propose an LSTM-based model that outperforms the state-of-the-art in terms of accuracy, precision, recall, and f1-score. We conduct extensive simulations using a realistic dataset that includes large log files. The proposed approach can employ just 25% of the features from each collected network packet while attaining 99.8% testing accuracy with a 13% improvement compared to the benchmarks.
蜜罐被认为是智能电网(SG)系统中网络入侵检测系统(NIDS)的强大补充,它可以最大限度地减少NIDS的工作负载,同时提供对攻击者行为信息的访问。这有助于进一步跟踪攻击面,反过来使nids能够阻止此类行为。机器学习(ML)作为一种设计和实现预测安全威胁的算法的严格技术,最近在SG安全领域引起了相当大的关注。然而,蜜罐收集的大数据集需要更多的精力来实现更快的响应、实时处理和决策,特别是对于资源有限的SG设备。因此,本文提出了一种解决这一挑战的方法,包括特征提取、过采样和弱标签组合。我们证明,当减少所选特征的数量(即仅使用25%的特征)时,所有经典ML算法都无法保持所需的性能水平。因此,我们采用深度学习方法并提出了一种基于lstm的模型,该模型在准确性、精度、召回率和f1-score方面优于最先进的模型。我们使用包含大型日志文件的真实数据集进行了广泛的模拟。所提出的方法可以从每个收集的网络数据包中只使用25%的特征,同时达到99.8%的测试准确率,与基准测试相比提高了13%。
{"title":"Fine-tuned LSTM-Based Model for Efficient Honeypot-Based Network Intrusion Detection System in Smart Grid Networks","authors":"A. Albaseer, M. Abdallah","doi":"10.1109/ICCSPA55860.2022.10019245","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019245","url":null,"abstract":"Honeypot is considered a powerful complement to the Network Intrusion Detection System (NIDS) in smart grid (SG) systems, which minimizes the workload of NIDSs while providing access to information about the attacker's actions. This assists in further tracing the attack surface and, in return, enables the NIDSs to prevent such behaviors. Machine learning (ML) has recently attracted considerable attention in the SG security domain as a stringent technique for designing and implementing algorithms to predict security threats. However, large data sets collected by honeypots require more effort for faster response, real-time processing, and decision-making, especially for limited resources SG's devices. Thus, this paper proposes an approach to address this challenge, including feature extraction, oversampling and weak label combinations. We demonstrate that all classic ML algorithms cannot maintain the desired performance level when reducing the number of selected features (i.e., using only 25% of the features). As a result, we resort to the Deep Learning approach and propose an LSTM-based model that outperforms the state-of-the-art in terms of accuracy, precision, recall, and f1-score. We conduct extensive simulations using a realistic dataset that includes large log files. The proposed approach can employ just 25% of the features from each collected network packet while attaining 99.8% testing accuracy with a 13% improvement compared to the benchmarks.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123271149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Hardware Accelerator For Lossless Data Compression 一种高效的无损数据压缩硬件加速器
Adel Mahmoud, Samuel Medhat, Mark Maged, Othman Mohamed, Reham Karam, Khaled Salah, M. El-Kharashi
Data compression is a trending field that is used in data storage and data transmission systems. Lossy compression means that data cannot be completely retrieved while in lossless compression the compressed data must be reconstructed exactly. Lossless data compression is used in compressing binary files, telemetry data and high-fidelity medical and scientific images where details are crucial. There is no generic compression algorithm that gives best compression ratio on all data pattern. In this paper, we propose a hybrid lossless hardware architecture that compresses most of data patterns such as repeated data, Gaussian distribution data and images. A profiling-before-compressing and then choosing the right compression hardware is proposed. The proposed design is a highly parallelized architecture that can compress/decompress 64 bytes/cycle with minor overhead. Moreover, it provides high compression ratio on small block sizes as well as large ones.
数据压缩是应用于数据存储和数据传输系统的一个新兴领域。有损压缩意味着不能完全检索数据,而无损压缩必须精确地重构压缩后的数据。无损数据压缩用于压缩二进制文件、遥测数据和高保真医学和科学图像,其中细节至关重要。没有一种通用的压缩算法能对所有的数据模式给出最佳的压缩比。在本文中,我们提出了一种混合无损硬件架构,它可以压缩重复数据、高斯分布数据和图像等大多数数据模式。提出了一种压缩前分析方法,然后选择合适的压缩硬件。提出的设计是一个高度并行的架构,可以压缩/解压缩64字节/周期,开销很小。此外,它在小块大小和大块大小上都提供高压缩比。
{"title":"An Efficient Hardware Accelerator For Lossless Data Compression","authors":"Adel Mahmoud, Samuel Medhat, Mark Maged, Othman Mohamed, Reham Karam, Khaled Salah, M. El-Kharashi","doi":"10.1109/ICCSPA55860.2022.10019048","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019048","url":null,"abstract":"Data compression is a trending field that is used in data storage and data transmission systems. Lossy compression means that data cannot be completely retrieved while in lossless compression the compressed data must be reconstructed exactly. Lossless data compression is used in compressing binary files, telemetry data and high-fidelity medical and scientific images where details are crucial. There is no generic compression algorithm that gives best compression ratio on all data pattern. In this paper, we propose a hybrid lossless hardware architecture that compresses most of data patterns such as repeated data, Gaussian distribution data and images. A profiling-before-compressing and then choosing the right compression hardware is proposed. The proposed design is a highly parallelized architecture that can compress/decompress 64 bytes/cycle with minor overhead. Moreover, it provides high compression ratio on small block sizes as well as large ones.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Based Design of mmWave Compact Array Antenna for 5G Communications 基于机器学习的5G毫米波紧凑型阵列天线设计
N. K. Mallat, A. Jafarieh, M. Nouri, H. Behroozi
Wider impedance bandwidth (IBW), and lower latency rate than older mobile communication systems possess are required for fifth-generation (5G) mobile communication systems. Furthermore, with respect to the high operation frequency of 5G systems, a high released gain is necessary to compensate for the high path loss on these frequencies. With respect to the requirements mentioned above, millimeter-wave (MMW) antennas seem to be a good solution for 5G applications. The low wavelength of MMW frequency bands, makes it practical to use large array antennas for massive multi input multi-output (MIMO) 5G systems with high gain. The high number of design variables of antennas makes an optimum antenna harder to design. Using machine learning (ML) approaches, however, alleviates this challenge. However, most ML approaches entail high computational complexity. Therefore, surrogate-based optimization (SBO) approaches must be used to handle the high computational complexity of ML approaches.
第五代(5G)移动通信系统需要比旧的移动通信系统拥有更宽的阻抗带宽(IBW)和更低的延迟率。此外,对于5G系统的高工作频率,需要高释放增益来补偿这些频率上的高路径损耗。就上述需求而言,毫米波(MMW)天线似乎是5G应用的一个很好的解决方案。毫米波频段的低波长使得在具有高增益的大规模多输入多输出(MIMO) 5G系统中使用大型阵列天线变得切实可行。天线的大量设计变量使得优化天线的设计变得更加困难。然而,使用机器学习(ML)方法可以缓解这一挑战。然而,大多数机器学习方法需要很高的计算复杂度。因此,必须使用基于代理的优化(SBO)方法来处理ML方法的高计算复杂度。
{"title":"A Machine Learning Based Design of mmWave Compact Array Antenna for 5G Communications","authors":"N. K. Mallat, A. Jafarieh, M. Nouri, H. Behroozi","doi":"10.1109/ICCSPA55860.2022.10019147","DOIUrl":"https://doi.org/10.1109/ICCSPA55860.2022.10019147","url":null,"abstract":"Wider impedance bandwidth (IBW), and lower latency rate than older mobile communication systems possess are required for fifth-generation (5G) mobile communication systems. Furthermore, with respect to the high operation frequency of 5G systems, a high released gain is necessary to compensate for the high path loss on these frequencies. With respect to the requirements mentioned above, millimeter-wave (MMW) antennas seem to be a good solution for 5G applications. The low wavelength of MMW frequency bands, makes it practical to use large array antennas for massive multi input multi-output (MIMO) 5G systems with high gain. The high number of design variables of antennas makes an optimum antenna harder to design. Using machine learning (ML) approaches, however, alleviates this challenge. However, most ML approaches entail high computational complexity. Therefore, surrogate-based optimization (SBO) approaches must be used to handle the high computational complexity of ML approaches.","PeriodicalId":106639,"journal":{"name":"2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1