首页 > 最新文献

MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)最新文献

英文 中文
An investigation into the use of software defined networking controllers in aerial networks 软件定义网络控制器在空中网络中的应用研究
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170741
D. Anderson
Software Defined Networking (SDN) is rapidly gaining acceptance and use in terrestrial networks but little research has been done to apply it to aerial networks. This paper describes an investigation into five open-source controllers using a specific set of criteria based on the characteristics of these networks. A preliminary qualitative investigation compares the controllers based on their state handling and failure recovery mechanisms, resulting in the selection of two controllers for further investigation. Further quantitative tests were performed on these controllers to determine which was more suitable for deployment in an airborne environment. Key aspects such as controller failure recovery and the resultant generated traffic were analyzed and quantified. Due to the much lower bandwidth in aerial networks when compared to terrestrial networks, a low-bandwidth solution with high recovery speed and adaptability is required. This investigation takes these factors into account and gives insight into which open-source controller would be best as a starting point for use in this highly constrained environment.
软件定义网络(SDN)在地面网络中得到了迅速的认可和应用,但将其应用于空中网络的研究却很少。本文描述了对五个开源控制器的调查,使用一组基于这些网络特征的特定标准。初步的定性调查比较了基于状态处理和故障恢复机制的控制器,从而选择两个控制器进行进一步的调查。对这些控制器进行了进一步的定量测试,以确定哪种控制器更适合在空中环境中部署。对控制器故障恢复和由此产生的流量等关键方面进行了分析和量化。由于空中网络的带宽远低于地面网络,因此需要一种具有高恢复速度和适应性的低带宽解决方案。这项调查考虑了这些因素,并深入了解了在这种高度受限的环境中使用哪种开源控制器是最好的起点。
{"title":"An investigation into the use of software defined networking controllers in aerial networks","authors":"D. Anderson","doi":"10.1109/MILCOM.2017.8170741","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170741","url":null,"abstract":"Software Defined Networking (SDN) is rapidly gaining acceptance and use in terrestrial networks but little research has been done to apply it to aerial networks. This paper describes an investigation into five open-source controllers using a specific set of criteria based on the characteristics of these networks. A preliminary qualitative investigation compares the controllers based on their state handling and failure recovery mechanisms, resulting in the selection of two controllers for further investigation. Further quantitative tests were performed on these controllers to determine which was more suitable for deployment in an airborne environment. Key aspects such as controller failure recovery and the resultant generated traffic were analyzed and quantified. Due to the much lower bandwidth in aerial networks when compared to terrestrial networks, a low-bandwidth solution with high recovery speed and adaptability is required. This investigation takes these factors into account and gives insight into which open-source controller would be best as a starting point for use in this highly constrained environment.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131679860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Online learning with side information 在线学习附带信息
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170860
Xiao Xu, Sattar Vakili, Qing Zhao, A. Swami
An online learning problem with side information is considered. The problem is formulated as a graph structured stochastic Multi-Armed Bandit (MAB). Each node in the graph represents an arm in the bandit problem and an edge between two arms indicates closeness in their mean rewards. It is shown that such side information induces a Unit Interval Graph and several graph properties can be leveraged to achieve a sublinear regret in the number of arms while preserving the optimal logarithmic regret in time. A lower bound on regret is established and a hierarchical learning policy that is order optimal in terms of both the number of arms and the learning horizon is developed.
考虑了一个带有侧信息的在线学习问题。将该问题表述为图结构随机多臂强盗(MAB)问题。图中的每个节点表示强盗问题中的一个分支,两个分支之间的一条边表示它们的平均报酬接近。结果表明,这些边信息可以诱导出一个单位间隔图,并且可以利用几个图的性质来实现臂数的次线性遗憾,同时在时间上保持最优对数遗憾。建立了后悔度的下界,提出了在臂数和学习视界两方面都是序最优的分层学习策略。
{"title":"Online learning with side information","authors":"Xiao Xu, Sattar Vakili, Qing Zhao, A. Swami","doi":"10.1109/MILCOM.2017.8170860","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170860","url":null,"abstract":"An online learning problem with side information is considered. The problem is formulated as a graph structured stochastic Multi-Armed Bandit (MAB). Each node in the graph represents an arm in the bandit problem and an edge between two arms indicates closeness in their mean rewards. It is shown that such side information induces a Unit Interval Graph and several graph properties can be leveraged to achieve a sublinear regret in the number of arms while preserving the optimal logarithmic regret in time. A lower bound on regret is established and a hierarchical learning policy that is order optimal in terms of both the number of arms and the learning horizon is developed.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126556864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Joint network coding and backpressure algorithm for cognitive radio networks 认知无线网络的联合网络编码与背压算法
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170819
S. Soltani, Y. Sagduyu, Sean Scanlon, Yi Shi, Jason H. Li, Jared Feldman, J. Matyjas
This paper presents the joint design of network coding and backpressure algorithm for cognitive radio networks and its implementation with software-defined radios (SDRs) in a high fidelity network emulation testbed. The backpressure algorithm is known to provide throughput optimal solutions to joint routing and scheduling for dynamic packet traffic. This solution applies to cognitive radio networks with spectrum dynamics changing over time and space, and supports joint routing and spectrum access without any need for end-to-end path maintenance. The backpressure algorithm is extended to multicast traffic with network coding deployed over virtual queues that represent different flows per session and destination. This extension is supported with different methods to decode packets at destinations. In the absence of a common control channel, distributed coordination with local information exchange is used to support neighborhood discovery, spectrum sensing and channel estimation that are integrated with joint routing, channel access and network coding. Cognitive network functionalities are implemented with GNU Radio and Python modules for different network layers, and used with USRP N210 radios. Practical radio implementation issues are addressed in a distributed wireless network setting, where USRP N210 radios communicate with each other through RFnest, a high fidelity wireless network emulation tool. RFnest provides realistic physical channel environment by digitally controlling path loss, fading, delay, topology and mobility effects. Extensive emulation test results are provided to assess throughput, backlog and energy consumption and verify the SDR implementation of joint network coding and backpressure algorithm under realistic channel and radio hardware effects.
本文提出了认知无线网络的网络编码和背压算法的联合设计,并在高保真网络仿真试验台上与软件定义无线电(sdr)实现。背压算法为动态分组流量的联合路由和调度提供了吞吐量最优的解决方案。该方案适用于频谱随时间和空间动态变化的认知无线电网络,支持联合路由和频谱接入,无需端到端路径维护。将背压算法扩展到多播流量,在每个会话和目的地代表不同流的虚拟队列上部署网络编码。该扩展支持不同的方法来解码目的地的数据包。在没有公共控制信道的情况下,采用局部信息交换的分布式协调来支持与联合路由、信道接入和网络编码相结合的邻域发现、频谱感知和信道估计。认知网络功能是用GNU Radio和Python模块为不同的网络层实现的,并与USRP N210无线电一起使用。在分布式无线网络设置中解决了实际无线电实现问题,其中USRP N210无线电通过RFnest(高保真无线网络仿真工具)相互通信。RFnest通过数字控制路径损耗、衰落、延迟、拓扑和迁移效应,提供真实的物理信道环境。提供了大量的仿真测试结果,以评估吞吐量、积压和能耗,并验证了联合网络编码和背压算法在真实信道和无线电硬件效果下的SDR实现。
{"title":"Joint network coding and backpressure algorithm for cognitive radio networks","authors":"S. Soltani, Y. Sagduyu, Sean Scanlon, Yi Shi, Jason H. Li, Jared Feldman, J. Matyjas","doi":"10.1109/MILCOM.2017.8170819","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170819","url":null,"abstract":"This paper presents the joint design of network coding and backpressure algorithm for cognitive radio networks and its implementation with software-defined radios (SDRs) in a high fidelity network emulation testbed. The backpressure algorithm is known to provide throughput optimal solutions to joint routing and scheduling for dynamic packet traffic. This solution applies to cognitive radio networks with spectrum dynamics changing over time and space, and supports joint routing and spectrum access without any need for end-to-end path maintenance. The backpressure algorithm is extended to multicast traffic with network coding deployed over virtual queues that represent different flows per session and destination. This extension is supported with different methods to decode packets at destinations. In the absence of a common control channel, distributed coordination with local information exchange is used to support neighborhood discovery, spectrum sensing and channel estimation that are integrated with joint routing, channel access and network coding. Cognitive network functionalities are implemented with GNU Radio and Python modules for different network layers, and used with USRP N210 radios. Practical radio implementation issues are addressed in a distributed wireless network setting, where USRP N210 radios communicate with each other through RFnest, a high fidelity wireless network emulation tool. RFnest provides realistic physical channel environment by digitally controlling path loss, fading, delay, topology and mobility effects. Extensive emulation test results are provided to assess throughput, backlog and energy consumption and verify the SDR implementation of joint network coding and backpressure algorithm under realistic channel and radio hardware effects.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A platform for evaluator-centric cybersecurity training and data acquisition 一个以评估人员为中心的网络安全培训和数据采集平台
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170768
Jaime C. Acosta, Joshua McKee, Alexander Fielder, S. Salamah
Empirical-based models for security technologies in the commercial and military domain, including those that focus on protection, detection, and broader risk analysis, leverage data captured from sensors on network-connected devices including gateways, routers, and host nodes. Lacking, however, are datasets that contain specific state observations and actions from the evaluator (red/blue teammer) workstation; we call this the inside-view. This is largely due to issues associated with data ownership, data classification, and the lack of integrated evaluator-centric data-collection mechanisms. To enable and promote creation of open datasets that capture the inside-view, we introduce a scalable platform that consists of two main elements. First, the emulation sandbox, or EmuBox, is an open-source and portable (i.e., it can execute on a laptop) solution for creating small-to medium-sized heterogeneous scenarios for evaluators to set up practice environments and competitions and to hone their skills. Second, the evaluatorcentric and extensible logger, ECEL, is a centralized management system that uses plugins for capturing and formatting evaluator data. We conclude the paper by providing a case study to demonstrate the setup and configuration of the platform along with a performance analysis.
商业和军事领域安全技术的基于经验的模型,包括那些专注于保护、检测和更广泛的风险分析的模型,利用从网络连接设备(包括网关、路由器和主机节点)上的传感器捕获的数据。然而,缺少包含评估者(红/蓝队员)工作站的特定状态观察和动作的数据集;我们称之为内景。这主要是由于与数据所有权、数据分类以及缺乏以评估者为中心的集成数据收集机制相关的问题。为了支持和促进捕获内部视图的开放数据集的创建,我们引入了一个可扩展的平台,该平台由两个主要元素组成。首先,仿真沙箱,或EmuBox,是一个开源和便携的(即,它可以在笔记本电脑上执行)解决方案,用于创建小型到中型的异构场景,供评估人员设置实践环境和比赛,并磨练他们的技能。其次,以评估器为中心的可扩展日志记录器ECEL是一个集中式管理系统,它使用插件来捕获和格式化评估器数据。我们通过提供一个案例研究来演示平台的设置和配置以及性能分析来结束本文。
{"title":"A platform for evaluator-centric cybersecurity training and data acquisition","authors":"Jaime C. Acosta, Joshua McKee, Alexander Fielder, S. Salamah","doi":"10.1109/MILCOM.2017.8170768","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170768","url":null,"abstract":"Empirical-based models for security technologies in the commercial and military domain, including those that focus on protection, detection, and broader risk analysis, leverage data captured from sensors on network-connected devices including gateways, routers, and host nodes. Lacking, however, are datasets that contain specific state observations and actions from the evaluator (red/blue teammer) workstation; we call this the inside-view. This is largely due to issues associated with data ownership, data classification, and the lack of integrated evaluator-centric data-collection mechanisms. To enable and promote creation of open datasets that capture the inside-view, we introduce a scalable platform that consists of two main elements. First, the emulation sandbox, or EmuBox, is an open-source and portable (i.e., it can execute on a laptop) solution for creating small-to medium-sized heterogeneous scenarios for evaluators to set up practice environments and competitions and to hone their skills. Second, the evaluatorcentric and extensible logger, ECEL, is a centralized management system that uses plugins for capturing and formatting evaluator data. We conclude the paper by providing a case study to demonstrate the setup and configuration of the platform along with a performance analysis.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance of edge windowing for OFDM under non-linear power amplifier effects 非线性功放效应下OFDM边缘加窗性能研究
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170720
Çağrı Göken, Onur Dizdar
Edge windowing is a windowing technique for Orthogonal Frequency Division Multiplexing (OFDM) signals based on the idea of using shorter cyclic prefix (CP) and longer window lengths at the edge subcarriers while keeping the symbol length fixed. In this study, we investigate the performance of OFDM signals with edge windowing under non-linear power amplifier (PA) effects by observing out-of-band (OOB) emission characteristics, average error vector magnitude (EVM) and coded block error rate (BLER) performance. We explore whether the possible gains over conventional windowing in the presence of PA is possible. We show that the edge windowing can still provide improvements over conventional windowing in terms of OOB emission suppression under various PA models at the expense of increased average EVM, whereas the channel coding substantially mitigates the performance loss due to inter-symbol and inter-carrier interference (ISI-ICI) effects arising as a result of shorter CP length at the edge subcarriers.
边缘加窗是一种用于正交频分复用(OFDM)信号的加窗技术,其思想是在保持符号长度不变的情况下,在边缘子载波上使用更短的循环前缀(CP)和更长的窗长。在本研究中,我们通过观察带外(OOB)发射特性、平均误差矢量幅度(EVM)和编码块错误率(BLER)性能,研究了带边加窗的OFDM信号在非线性功率放大器(PA)效应下的性能。我们探讨在PA存在的情况下,是否可能比传统窗口获得可能的增益。我们表明,在各种PA模型下,边缘加窗仍然可以在以增加平均EVM为代价的情况下,在抑制OOB发射方面比传统加窗有所改进,而信道编码则大大减轻了由于边缘子载波上CP长度较短而引起的符号间和载波间干扰(ISI-ICI)效应所造成的性能损失。
{"title":"Performance of edge windowing for OFDM under non-linear power amplifier effects","authors":"Çağrı Göken, Onur Dizdar","doi":"10.1109/MILCOM.2017.8170720","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170720","url":null,"abstract":"Edge windowing is a windowing technique for Orthogonal Frequency Division Multiplexing (OFDM) signals based on the idea of using shorter cyclic prefix (CP) and longer window lengths at the edge subcarriers while keeping the symbol length fixed. In this study, we investigate the performance of OFDM signals with edge windowing under non-linear power amplifier (PA) effects by observing out-of-band (OOB) emission characteristics, average error vector magnitude (EVM) and coded block error rate (BLER) performance. We explore whether the possible gains over conventional windowing in the presence of PA is possible. We show that the edge windowing can still provide improvements over conventional windowing in terms of OOB emission suppression under various PA models at the expense of increased average EVM, whereas the channel coding substantially mitigates the performance loss due to inter-symbol and inter-carrier interference (ISI-ICI) effects arising as a result of shorter CP length at the edge subcarriers.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114694308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indoor localization through trajectory tracking using neural networks 利用神经网络进行轨迹跟踪的室内定位
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170840
Mahi Abdelbar, R. Buehrer
Currently deployed wireless and cellular positioning techniques are optimized for outdoor operation and cannot provide highly accurate location information in indoor environments. Meanwhile, new applications and services for mobile devices, including the recent Enhanced 911 (E911), require accurate indoor location information up to the room/suite level. In this work, a new system for improving indoor localization of mobile users is presented by exploiting trajectory tracking techniques using neural networks (NNs). The motion trajectories of indoor mobile users are tracked using conventional positioning algorithms, then a NN is applied to identify the current room location of a mobile user based on the tracked motion trajectory. Simulation results show that the trajectory-based NN is able to provide indoor location information at the room level with much higher accuracy in different scenarios, with an enhancement of up to 49% in correct room identification, as compared to positioning techniques based only on a single-point location estimate. In addition, miss-classification of the NN system will result in selecting one of the immediate neighboring rooms instead with at least 30% probability.
目前部署的无线和蜂窝定位技术针对室外操作进行了优化,无法在室内环境中提供高精度的位置信息。同时,针对移动设备的新应用和服务,包括最近的增强型911 (E911),需要精确到房间/套房级别的室内位置信息。在这项工作中,通过利用神经网络(nn)的轨迹跟踪技术,提出了一种新的系统来改善移动用户的室内定位。利用传统的定位算法对室内移动用户的运动轨迹进行跟踪,然后基于跟踪的运动轨迹,应用神经网络识别移动用户当前的房间位置。仿真结果表明,与仅基于单点位置估计的定位技术相比,基于轨迹的神经网络能够在不同场景下以更高的精度提供房间级别的室内位置信息,在正确的房间识别方面提高了49%。此外,NN系统的分类错误将导致以至少30%的概率选择一个紧邻的相邻房间。
{"title":"Indoor localization through trajectory tracking using neural networks","authors":"Mahi Abdelbar, R. Buehrer","doi":"10.1109/MILCOM.2017.8170840","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170840","url":null,"abstract":"Currently deployed wireless and cellular positioning techniques are optimized for outdoor operation and cannot provide highly accurate location information in indoor environments. Meanwhile, new applications and services for mobile devices, including the recent Enhanced 911 (E911), require accurate indoor location information up to the room/suite level. In this work, a new system for improving indoor localization of mobile users is presented by exploiting trajectory tracking techniques using neural networks (NNs). The motion trajectories of indoor mobile users are tracked using conventional positioning algorithms, then a NN is applied to identify the current room location of a mobile user based on the tracked motion trajectory. Simulation results show that the trajectory-based NN is able to provide indoor location information at the room level with much higher accuracy in different scenarios, with an enhancement of up to 49% in correct room identification, as compared to positioning techniques based only on a single-point location estimate. In addition, miss-classification of the NN system will result in selecting one of the immediate neighboring rooms instead with at least 30% probability.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evasion and causative attacks with adversarial deep learning 对抗性深度学习的规避和因果攻击
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170807
Yi Shi, Y. Sagduyu
This paper presents a novel approach to launch and defend against the causative and evasion attacks on machine learning classifiers. As the preliminary step, the adversary starts with an exploratory attack based on deep learning (DL) and builds a functionally equivalent classifier by polling the online target classifier with input data and observing the returned labels. Using this inferred classifier, the adversary can select samples according to their DL scores and feed them to the original classifier. In an evasion attack, the adversary feeds the target classifier with test data after selecting samples with DL scores that are close to the decision boundary to increase the chance that these samples are misclassified. In a causative attack, the adversary feeds the target classifier with training data after changing the labels of samples with DL scores that are far away from the decision boundary to reduce the reliability of the training process. Results obtained for text and image classification show that the proposed evasion and causative attacks can significantly increase the error during test and training phases, respectively. A defense strategy is presented to change a small number of labels of the original classifier to prevent its reliable inference by the adversary and its effective use in evasion and causative attacks. These findings identify new vulnerabilities of machine learning and demonstrate that a proactive defense mechanism can reduce the impact of the underlying attacks.
本文提出了一种针对机器学习分类器发起和防御原因攻击和逃避攻击的新方法。作为初步步骤,攻击者首先基于深度学习(DL)进行探索性攻击,并通过使用输入数据轮询在线目标分类器并观察返回的标签来构建功能等效的分类器。使用这个推断分类器,对手可以根据他们的DL分数选择样本,并将它们提供给原始分类器。在逃避攻击中,攻击者在选择DL分数接近决策边界的样本后,向目标分类器提供测试数据,以增加这些样本被错误分类的机会。在因果攻击中,攻击者在改变DL分数远离决策边界的样本标签后,向目标分类器提供训练数据,以降低训练过程的可靠性。在文本和图像分类中得到的结果表明,所提出的逃避攻击和因果攻击分别在测试和训练阶段显著增加了错误。提出了一种改变原始分类器的少量标签的防御策略,以防止对手对其进行可靠的推断,并有效地利用其进行逃避和因果攻击。这些发现确定了机器学习的新漏洞,并证明了主动防御机制可以减少潜在攻击的影响。
{"title":"Evasion and causative attacks with adversarial deep learning","authors":"Yi Shi, Y. Sagduyu","doi":"10.1109/MILCOM.2017.8170807","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170807","url":null,"abstract":"This paper presents a novel approach to launch and defend against the causative and evasion attacks on machine learning classifiers. As the preliminary step, the adversary starts with an exploratory attack based on deep learning (DL) and builds a functionally equivalent classifier by polling the online target classifier with input data and observing the returned labels. Using this inferred classifier, the adversary can select samples according to their DL scores and feed them to the original classifier. In an evasion attack, the adversary feeds the target classifier with test data after selecting samples with DL scores that are close to the decision boundary to increase the chance that these samples are misclassified. In a causative attack, the adversary feeds the target classifier with training data after changing the labels of samples with DL scores that are far away from the decision boundary to reduce the reliability of the training process. Results obtained for text and image classification show that the proposed evasion and causative attacks can significantly increase the error during test and training phases, respectively. A defense strategy is presented to change a small number of labels of the original classifier to prevent its reliable inference by the adversary and its effective use in evasion and causative attacks. These findings identify new vulnerabilities of machine learning and demonstrate that a proactive defense mechanism can reduce the impact of the underlying attacks.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"39 40","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113933959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Channel estimation for multi-way quantized distributed wireless relaying 多路量化分布式无线中继信道估计
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170735
Ahmad A. I. Ibrahim, Andrew C. Marcum, D. Love, J. Krogmeier
A key focus of wireless communications research is on solutions that catalyze broadband access everywhere at anytime. Relaying has been introduced as a solution to enable communication between users who suffer from poor channel conditions. Distributed relay networks are a special case where spatial diversity is obtained by using a relay consisting of many geographically dispersed nodes. Due to bandwidth constraints, distributed relay networks perform quantization at the relay nodes, and hence they are referred to as quantized distributed relay networks. In such systems, users transmit data simultaneously through the uplink to the relay nodes of the relay. Each node independently quantizes the observed signal to a few bits and broadcasts these bits through the band-limited downlink channel to the users. In this paper, we consider a multi-way quantized distributed relay network where the relay facilitates the communication between many users. For decoding purposes, we develop algorithms that can be employed by the users to estimate their uplink channels as well as the uplink channels observed by all other users when nodes perform simple sign quantization. A near maximum likelihood (nearML) channel estimator is derived. In addition, other sub-optimal estimators that are more computationally efficient than the nearML technique are also presented. Via simulation, we compare the performance of the proposed channel estimators.
无线通信研究的一个关键焦点是促进随时随地宽带接入的解决方案。中继已经作为一种解决方案被引入,以使遭受恶劣信道条件的用户之间能够通信。分布式中继网络是一种特殊情况,通过使用由许多地理上分散的节点组成的中继来获得空间分集。由于带宽的限制,分布式中继网络在中继节点上进行量化,因此称为量化分布式中继网络。在这种系统中,用户通过上行链路同时向中继的中继节点传输数据。每个节点独立地将观测到的信号量化为几个比特,并通过带限下行信道将这些比特广播给用户。在本文中,我们考虑了一种多路量化分布式中继网络,其中中继便于许多用户之间的通信。为了解码的目的,我们开发了一种算法,当节点执行简单的符号量化时,用户可以使用该算法来估计他们的上行信道以及所有其他用户观察到的上行信道。导出了一个近最大似然信道估计器。此外,还提出了其他比近似机器学习技术计算效率更高的次优估计器。通过仿真,我们比较了所提出的信道估计器的性能。
{"title":"Channel estimation for multi-way quantized distributed wireless relaying","authors":"Ahmad A. I. Ibrahim, Andrew C. Marcum, D. Love, J. Krogmeier","doi":"10.1109/MILCOM.2017.8170735","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170735","url":null,"abstract":"A key focus of wireless communications research is on solutions that catalyze broadband access everywhere at anytime. Relaying has been introduced as a solution to enable communication between users who suffer from poor channel conditions. Distributed relay networks are a special case where spatial diversity is obtained by using a relay consisting of many geographically dispersed nodes. Due to bandwidth constraints, distributed relay networks perform quantization at the relay nodes, and hence they are referred to as quantized distributed relay networks. In such systems, users transmit data simultaneously through the uplink to the relay nodes of the relay. Each node independently quantizes the observed signal to a few bits and broadcasts these bits through the band-limited downlink channel to the users. In this paper, we consider a multi-way quantized distributed relay network where the relay facilitates the communication between many users. For decoding purposes, we develop algorithms that can be employed by the users to estimate their uplink channels as well as the uplink channels observed by all other users when nodes perform simple sign quantization. A near maximum likelihood (nearML) channel estimator is derived. In addition, other sub-optimal estimators that are more computationally efficient than the nearML technique are also presented. Via simulation, we compare the performance of the proposed channel estimators.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122909728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Defined Networks (SDNs) of RF Internet of Things (RIOTs) on Unmanned Aerial Systems (UASs) 无人机系统(UASs)射频物联网(暴乱)的软件定义网络(sdn)
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170864
W. Watson, Steve Huntsman, J. Dolan
The future of sensor systems is moving quickly to the realm of distributed multi-static RF Internet of Things (RIOTs). In this case, any single sensor is limited in its ability to generate useful information but the community of sensors, networked together, create the necessary information. Specifically, the ability to geolocate and track small Unmanned Aerial Systems (UASs) with a set of distributed multi-static mobile RIOTs, e.g. RIOTs on a swarm of UASs, will become more the norm than an anomaly. Optimally networked swarms of small, inexpensive, mobile, unmanned platforms outfitted with RIOTS into an effective sensor suite is a difficult task. In this paper, rather than treat each RIOT as an individual sensor managed individually by the local platform, we demonstrate techniques for creating Software Defined Networks (SDNs) of RIOTS organized at the RF pulse level providing the ability to perform novel methods of detecting, geolocating and tracking both active emitters and passive reflectors of RF signals in highly dynamic environments.
传感器系统的未来正迅速向分布式多静态射频物联网(暴动)领域发展。在这种情况下,任何单个传感器产生有用信息的能力都是有限的,但是传感器社区,联网在一起,创造必要的信息。具体来说,使用一组分布式多静态移动暴乱(例如,一群无人机上的暴乱)对小型无人机系统(UASs)进行地理定位和跟踪的能力将成为常态,而不是异常。将一群小型的、廉价的、移动的、无人驾驶的平台最佳地联网,并将其装备成一个有效的传感器套件是一项艰巨的任务。在本文中,我们不是将每个RIOT视为由本地平台单独管理的单个传感器,而是展示了创建在RF脉冲水平组织的骚乱的软件定义网络(sdn)的技术,提供了在高度动态环境中执行检测,定位和跟踪RF信号的主动发射器和被动反射器的新方法的能力。
{"title":"Software Defined Networks (SDNs) of RF Internet of Things (RIOTs) on Unmanned Aerial Systems (UASs)","authors":"W. Watson, Steve Huntsman, J. Dolan","doi":"10.1109/MILCOM.2017.8170864","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170864","url":null,"abstract":"The future of sensor systems is moving quickly to the realm of distributed multi-static RF Internet of Things (RIOTs). In this case, any single sensor is limited in its ability to generate useful information but the community of sensors, networked together, create the necessary information. Specifically, the ability to geolocate and track small Unmanned Aerial Systems (UASs) with a set of distributed multi-static mobile RIOTs, e.g. RIOTs on a swarm of UASs, will become more the norm than an anomaly. Optimally networked swarms of small, inexpensive, mobile, unmanned platforms outfitted with RIOTS into an effective sensor suite is a difficult task. In this paper, rather than treat each RIOT as an individual sensor managed individually by the local platform, we demonstrate techniques for creating Software Defined Networks (SDNs) of RIOTS organized at the RF pulse level providing the ability to perform novel methods of detecting, geolocating and tracking both active emitters and passive reflectors of RF signals in highly dynamic environments.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spatial modulation based on reconfigurable antennas — A new air interface for the IoT 基于可重构天线的空间调制--物联网的新空中接口
Pub Date : 2017-10-01 DOI: 10.1109/MILCOM.2017.8170856
M. Renzo
The emerging market of the Internet of Things (IoT) requires new energy-efficient and low-complexity Multiple-Input-Multiple-Output (MIMO-) aided radio access technologies. This trend will have a profound impact on both the theory and practice of future communication networks, which will not be purely optimized for approaching the attainable capacity anymore, but will explicitly include the energy efficiency for the design and optimization of the entire protocol stack. In this paper, we discuss a recently introduced modulation scheme for IoT applications, which leverages the concepts of Reconfigurable Antennas (RecAnts) and Spatial Modulation (SM). RecAnt-SM constitutes a promising new air interface in the context of MIMO-aided transmission, which can be beneficially invoked for the design of medium-throughput, low-complexity and energy-efficient communication systems by relying on a limited number of RF chains and the flexibility of simple RecAnt designs.
新兴的物联网(IoT)市场需要新型高能效、低复杂度的多输入多输出(MIMO)辅助无线接入技术。这一趋势将对未来通信网络的理论和实践产生深远影响,未来的通信网络将不再单纯为接近可达到的容量而优化,而是将能效明确纳入整个协议栈的设计和优化中。在本文中,我们将讨论最近针对物联网应用推出的一种调制方案,该方案利用了可重构天线(RecAnts)和空间调制(SM)的概念。RecAnt-SM 是 MIMO 辅助传输背景下一种前景广阔的新空中接口,通过依赖数量有限的射频链和简单 RecAnt 设计的灵活性,可用于设计中等吞吐量、低复杂度和高能效的通信系统。
{"title":"Spatial modulation based on reconfigurable antennas — A new air interface for the IoT","authors":"M. Renzo","doi":"10.1109/MILCOM.2017.8170856","DOIUrl":"https://doi.org/10.1109/MILCOM.2017.8170856","url":null,"abstract":"The emerging market of the Internet of Things (IoT) requires new energy-efficient and low-complexity Multiple-Input-Multiple-Output (MIMO-) aided radio access technologies. This trend will have a profound impact on both the theory and practice of future communication networks, which will not be purely optimized for approaching the attainable capacity anymore, but will explicitly include the energy efficiency for the design and optimization of the entire protocol stack. In this paper, we discuss a recently introduced modulation scheme for IoT applications, which leverages the concepts of Reconfigurable Antennas (RecAnts) and Spatial Modulation (SM). RecAnt-SM constitutes a promising new air interface in the context of MIMO-aided transmission, which can be beneficially invoked for the design of medium-throughput, low-complexity and energy-efficient communication systems by relying on a limited number of RF chains and the flexibility of simple RecAnt designs.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126636585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1