首页 > 最新文献

2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Heterogeneous Computing and The Real-World Applications 异构计算和现实世界的应用
V. Bui, T. Pham, Huy Nguyen, Hoang Nhi Tran Gia, Tauheed Khan Mohd
In recent years, Graphics Processing Units (GPUs) in computational science have effectively driven the computing system to achieve higher computational power in various electronic devices. Combining with multi-core Central Processing Units (CPUs), the inevitable CPU-GPU integration is considered the new high-performance trend of the future. There have been multiple explorations on heterogeneous processing techniques, alongside the design of fused CPU and GPU chips. This survey paper will describe, summarize, and analyze some of the latest research from 2015 to map the techniques that can improve this computation hardware’s performance or energy efficiency. We then take a look at the collaborative CPU-GPU approaches with regards to runtime and applicability. We have certainty that this report can provide insights into the knowledge of CPU-GPU applications and help find future opportunities for these processors.
近年来,计算科学中的图形处理单元(Graphics Processing Units, gpu)有效地推动了计算系统在各种电子设备中实现更高的计算能力。与多核中央处理器(cpu)相结合,cpu和gpu不可避免的集成被认为是未来高性能的新趋势。除了融合CPU和GPU芯片的设计外,还对异构处理技术进行了多次探索。这篇调查报告将描述、总结和分析2015年以来的一些最新研究,以描绘可以提高计算硬件性能或能源效率的技术。然后,我们看看协同CPU-GPU方法在运行时和适用性方面。我们确信这份报告可以提供深入了解CPU-GPU应用程序的知识,并帮助找到这些处理器的未来机会。
{"title":"Heterogeneous Computing and The Real-World Applications","authors":"V. Bui, T. Pham, Huy Nguyen, Hoang Nhi Tran Gia, Tauheed Khan Mohd","doi":"10.1109/uemcon53757.2021.9666740","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666740","url":null,"abstract":"In recent years, Graphics Processing Units (GPUs) in computational science have effectively driven the computing system to achieve higher computational power in various electronic devices. Combining with multi-core Central Processing Units (CPUs), the inevitable CPU-GPU integration is considered the new high-performance trend of the future. There have been multiple explorations on heterogeneous processing techniques, alongside the design of fused CPU and GPU chips. This survey paper will describe, summarize, and analyze some of the latest research from 2015 to map the techniques that can improve this computation hardware’s performance or energy efficiency. We then take a look at the collaborative CPU-GPU approaches with regards to runtime and applicability. We have certainty that this report can provide insights into the knowledge of CPU-GPU applications and help find future opportunities for these processors.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Dynamic Task Offloading for Blockchain-enabled Virtual Wireless Networks 支持区块链的虚拟无线网络的节能动态任务卸载
Amani Alshaikhi, D. Rawat
The application of the blockchain technology in various fields has continued to grow exponentially. Besides, task offloading schemes are essential in the lessening of the quantity of consumed energy. These schemes are also needed for workload rate of systems during the transfer of tasks to the execution phase in the cloud or edge. Based on the need for a dynamic task offloading and allocation of resources for virtual wireless networks (VWNs), we have proposed an energy efficient dynamic task offloading scheme in VWNs that leverages the blockchain technology. The proposed approach chooses the online optimal computing place either on the mobile cloud computing (MCC) server or the mobile edge computing (MEC) server with the goal of reducing task response time and energy consumption. Communication and computation costs incurred by different kinds of applications are controlled by the Lyapunov optimization technique. Computing location for each task is chosen adaptively during the optimization without requiring extensive system information. Energy efficient approach achieves better offloading decisions with lower computational complexity as compared with traditional offloading techniques.
区块链技术在各个领域的应用持续呈指数级增长。此外,任务卸载方案在减少消耗的能量方面是必不可少的。在将任务转移到云或边缘的执行阶段期间,系统的工作负载率也需要这些方案。基于虚拟无线网络(VWNs)对动态任务卸载和资源分配的需求,我们提出了一种利用区块链技术的虚拟无线网络节能动态任务卸载方案。该方法在移动云计算(MCC)服务器或移动边缘计算(MEC)服务器上选择在线最优计算位置,以减少任务响应时间和能耗。通过李亚普诺夫优化技术控制不同类型应用的通信和计算成本。在优化过程中自适应地选择每个任务的计算位置,而不需要大量的系统信息。与传统的卸载技术相比,节能方法能够以更低的计算复杂度实现更好的卸载决策。
{"title":"Energy Efficient Dynamic Task Offloading for Blockchain-enabled Virtual Wireless Networks","authors":"Amani Alshaikhi, D. Rawat","doi":"10.1109/uemcon53757.2021.9666519","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666519","url":null,"abstract":"The application of the blockchain technology in various fields has continued to grow exponentially. Besides, task offloading schemes are essential in the lessening of the quantity of consumed energy. These schemes are also needed for workload rate of systems during the transfer of tasks to the execution phase in the cloud or edge. Based on the need for a dynamic task offloading and allocation of resources for virtual wireless networks (VWNs), we have proposed an energy efficient dynamic task offloading scheme in VWNs that leverages the blockchain technology. The proposed approach chooses the online optimal computing place either on the mobile cloud computing (MCC) server or the mobile edge computing (MEC) server with the goal of reducing task response time and energy consumption. Communication and computation costs incurred by different kinds of applications are controlled by the Lyapunov optimization technique. Computing location for each task is chosen adaptively during the optimization without requiring extensive system information. Energy efficient approach achieves better offloading decisions with lower computational complexity as compared with traditional offloading techniques.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123846900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Automatic Smart Irrigation System 自动智能灌溉系统的设计与实现
Mohammad Taz Uddin, T. Chowdhury, R. Rahman
Groundwater & Surface water resources are decreasing all over the world including Bangladesh. Water resource management can be done in various ways. Traditionally, water management can be done by operators. However, sometimes it could result over-irrigation, increased electricity bills, water waste, and the crop can be damaged. In this paper, we have developed an intelligent irrigation system that will control the water dispensing to the crop smartly without any operator. There is a moisture sensor that will detect the soil moisture, and a rain sensor will detect rainfall to limit water use. The system can be used to manage groundwater as well as surface water without changing any existing traditional irrigation pumping equipment. This paper attempts low-cost Arduino-based irrigation devices, sensors, especially modern techniques implemented in irrigation systems and agriculture, such as intelligent irrigation systems.
包括孟加拉国在内的世界各地的地下水和地表水资源都在减少。水资源管理可以通过多种方式进行。传统上,水管理可以由运营商来完成。然而,有时它可能导致过度灌溉,增加电费,浪费水,并可能损害作物。在本文中,我们开发了一种智能灌溉系统,可以在没有任何操作人员的情况下智能地控制作物的供水。有一个湿度传感器可以检测土壤湿度,一个降雨传感器可以检测降雨量以限制用水。该系统可用于管理地下水和地表水,而无需改变任何现有的传统灌溉抽水设备。本文尝试将低成本的基于arduino的灌溉设备、传感器,特别是现代技术应用于灌溉系统和农业中,如智能灌溉系统。
{"title":"Design and Implementation of Automatic Smart Irrigation System","authors":"Mohammad Taz Uddin, T. Chowdhury, R. Rahman","doi":"10.1109/uemcon53757.2021.9666518","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666518","url":null,"abstract":"Groundwater & Surface water resources are decreasing all over the world including Bangladesh. Water resource management can be done in various ways. Traditionally, water management can be done by operators. However, sometimes it could result over-irrigation, increased electricity bills, water waste, and the crop can be damaged. In this paper, we have developed an intelligent irrigation system that will control the water dispensing to the crop smartly without any operator. There is a moisture sensor that will detect the soil moisture, and a rain sensor will detect rainfall to limit water use. The system can be used to manage groundwater as well as surface water without changing any existing traditional irrigation pumping equipment. This paper attempts low-cost Arduino-based irrigation devices, sensors, especially modern techniques implemented in irrigation systems and agriculture, such as intelligent irrigation systems.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122052645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Relation of Online Behavioral Response to Fake News Exposure and Detection Accuracy 网络行为反应与假新闻曝光与检测准确率的关系
Kevin Matthe Caramancion
Using a Fake News test consisting of mixed legitimate and misleading news headlines, this study investigated and explored how the behavioral responses of users (N=153) to false headlines are associated with their ability to detect content legitimacy. The behavioral responses were (a) report the content, (b) engage in debate/discussion, or (c) simply ignore it. The results revealed that the subjects who engaged in a discussion have higher detection accuracy than the mere reporters. The participants who simply ignored the deceptive content performed the poorest while those who performed both reporting and discussion registered with the highest accuracy. The intended target audience of this paper are information scientists, digital forensic professionals, communication experts, policymakers, and other scholars possibly seeking references on this subject.
本研究使用由合法和误导性新闻标题混合组成的假新闻测试,调查并探讨了用户(N=153)对虚假标题的行为反应与他们检测内容合法性的能力之间的关系。行为反应是(a)报告内容,(b)参与辩论/讨论,或(c)简单地忽略它。结果表明,参与讨论的被试比单纯的报道者具有更高的检测准确率。直接忽略欺骗性内容的参与者表现最差,而同时进行报告和讨论的参与者登记的准确性最高。本文的目标受众是信息科学家、数字法医专业人员、通信专家、政策制定者和其他可能寻求这一主题参考的学者。
{"title":"The Relation of Online Behavioral Response to Fake News Exposure and Detection Accuracy","authors":"Kevin Matthe Caramancion","doi":"10.1109/UEMCON53757.2021.9666642","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666642","url":null,"abstract":"Using a Fake News test consisting of mixed legitimate and misleading news headlines, this study investigated and explored how the behavioral responses of users (N=153) to false headlines are associated with their ability to detect content legitimacy. The behavioral responses were (a) report the content, (b) engage in debate/discussion, or (c) simply ignore it. The results revealed that the subjects who engaged in a discussion have higher detection accuracy than the mere reporters. The participants who simply ignored the deceptive content performed the poorest while those who performed both reporting and discussion registered with the highest accuracy. The intended target audience of this paper are information scientists, digital forensic professionals, communication experts, policymakers, and other scholars possibly seeking references on this subject.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving Localization using Enclaves 使用enclave的隐私保护定位
Arslan Khan, Joseph I. Choi, D. Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, J. Shea, T. Wong
Localization is one form of cooperative spectrum sensing that lets multiple sensors work together to estimate the location of a target transmitter. However, the requisite exchange of spectrum measurements leads to exposure of the physical location of participating sensors. Furthermore, in some cases, a compromised participant can reveal the sensitive characteristics of all participants. Accordingly, a lack of sufficient guarantees about data handling discourages such devices from working together. In this paper, we provide the missing data protections by processing spectrum measurements within attestable containers or enclaves. Enclaves provide runtime memory integrity and confidentiality using hardware extensions and have been used to secure various applications [1]–[8]. We use these enclave features as building blocks for new privacy-preserving particle filter protocols that minimize disruption of the spectrum sensing ecosystem. We then instantiate this enclave using ARM TrustZone and Intel SGX, and we show that enclave-based particle filter protocols incur minimal overhead (adding 16 milliseconds of processing to the measurement processing function when using SGX versus unprotected computation) and can be deployed on resource-constrained platforms that support TrustZone (incurring only a 1.01x increase in processing time when doubling particle count from 10,000 to 20,000), whereas cryptographically-based approaches suffer from multiple orders of magnitude higher costs. We effectively deploy enclaves in a distributed environment, dramatically improving current data handling techniques. To our best knowledge, this is the first work to demonstrate privacy-preserving localization in a multi-party environment with reasonable overhead.
定位是协同频谱感知的一种形式,它允许多个传感器一起工作来估计目标发射机的位置。然而,必要的频谱测量交换导致参与传感器的物理位置暴露。此外,在某些情况下,一个受损的参与者可以揭示所有参与者的敏感特征。因此,缺乏对数据处理的充分保证阻碍了这些设备一起工作。在本文中,我们通过在可证明的容器或飞地内处理频谱测量来提供缺失的数据保护。enclave使用硬件扩展提供运行时内存完整性和机密性,并已用于保护各种应用程序[1]-[8]。我们使用这些enclave特征作为新的隐私保护粒子滤波协议的构建块,以最大限度地减少对频谱传感生态系统的破坏。然后,我们使用ARM TrustZone和Intel SGX实例化了这个enclave,我们证明了基于enclave的粒子滤波协议会产生最小的开销(使用SGX与不受保护的计算相比,在测量处理函数中增加16毫秒的处理时间),并且可以部署在支持TrustZone的资源受限平台上(当粒子计数从10,000增加到20,000时,处理时间仅增加1.01倍)。而基于密码学的方法的成本要高出多个数量级。我们在分布式环境中有效地部署了enclave,极大地改进了当前的数据处理技术。据我们所知,这是第一个在合理开销的多方环境中演示隐私保护本地化的工作。
{"title":"Privacy-Preserving Localization using Enclaves","authors":"Arslan Khan, Joseph I. Choi, D. Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, J. Shea, T. Wong","doi":"10.1109/uemcon53757.2021.9666706","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666706","url":null,"abstract":"Localization is one form of cooperative spectrum sensing that lets multiple sensors work together to estimate the location of a target transmitter. However, the requisite exchange of spectrum measurements leads to exposure of the physical location of participating sensors. Furthermore, in some cases, a compromised participant can reveal the sensitive characteristics of all participants. Accordingly, a lack of sufficient guarantees about data handling discourages such devices from working together. In this paper, we provide the missing data protections by processing spectrum measurements within attestable containers or enclaves. Enclaves provide runtime memory integrity and confidentiality using hardware extensions and have been used to secure various applications [1]–[8]. We use these enclave features as building blocks for new privacy-preserving particle filter protocols that minimize disruption of the spectrum sensing ecosystem. We then instantiate this enclave using ARM TrustZone and Intel SGX, and we show that enclave-based particle filter protocols incur minimal overhead (adding 16 milliseconds of processing to the measurement processing function when using SGX versus unprotected computation) and can be deployed on resource-constrained platforms that support TrustZone (incurring only a 1.01x increase in processing time when doubling particle count from 10,000 to 20,000), whereas cryptographically-based approaches suffer from multiple orders of magnitude higher costs. We effectively deploy enclaves in a distributed environment, dramatically improving current data handling techniques. To our best knowledge, this is the first work to demonstrate privacy-preserving localization in a multi-party environment with reasonable overhead.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115206237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Web and Mobile Based Smart Online Healthcare System 基于Web和移动的智能在线医疗系统的开发
Mohammad Monirujjaman Khan, Rahat Anwar, Farhan Amar Tanve, Dewan Shakil, Manas Banik, S. Gupta
Health care system is one of the fundamental parts of society. This paper presents the development of web and smartphone applications for the people of Bangladesh where both patients and doctors can register and patients can have medical treatment via video calling. Using the developed web and smartphone applications, patients can register via their phone number, store information concerning their health, search available doctors, send text messages or make video calls to the available doctors, set alarm to take medicine on time and complete payment through online. Doctors can also register to the system where the verification to ensure the authenticity of the information provided by the doctor is handled manually. The doctors can view a patient’s medical history whenever a patient makes contact through text or video call and provide treatment accordingly. The system has been deployed and verified. The applications provide a faster and enhanced way to get treatment and will ensure the availability of treatments in remote areas. The system will help to spread health care services nationwide and provide doctors with the opportunity to help to improve the health conditions of the citizens of Bangladesh.
卫生保健系统是社会的基本组成部分之一。本文介绍了孟加拉国人民的网络和智能手机应用程序的开发,患者和医生都可以注册,患者可以通过视频通话进行医疗。通过开发的网络和智能手机应用程序,患者可以通过他们的电话号码注册,存储有关他们健康的信息,搜索可用的医生,向可用的医生发送短信或视频电话,设置闹钟按时服药,并通过在线完成付款。医生也可以注册到该系统,在该系统中,验证以确保医生提供的信息的真实性是由人工处理的。只要患者通过短信或视频通话联系,医生就可以查看患者的病史,并提供相应的治疗。已完成系统部署和验证。这些应用程序提供了一种更快、更有效的治疗方式,并将确保偏远地区获得治疗。该系统将有助于在全国范围内推广医疗保健服务,并为医生提供帮助改善孟加拉国公民健康状况的机会。
{"title":"Development of Web and Mobile Based Smart Online Healthcare System","authors":"Mohammad Monirujjaman Khan, Rahat Anwar, Farhan Amar Tanve, Dewan Shakil, Manas Banik, S. Gupta","doi":"10.1109/uemcon53757.2021.9666657","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666657","url":null,"abstract":"Health care system is one of the fundamental parts of society. This paper presents the development of web and smartphone applications for the people of Bangladesh where both patients and doctors can register and patients can have medical treatment via video calling. Using the developed web and smartphone applications, patients can register via their phone number, store information concerning their health, search available doctors, send text messages or make video calls to the available doctors, set alarm to take medicine on time and complete payment through online. Doctors can also register to the system where the verification to ensure the authenticity of the information provided by the doctor is handled manually. The doctors can view a patient’s medical history whenever a patient makes contact through text or video call and provide treatment accordingly. The system has been deployed and verified. The applications provide a faster and enhanced way to get treatment and will ensure the availability of treatments in remote areas. The system will help to spread health care services nationwide and provide doctors with the opportunity to help to improve the health conditions of the citizens of Bangladesh.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demystifying Black-box Learning Models of Rumor Detection from Social Media Posts 从社交媒体帖子中解密谣言检测的黑箱学习模型
Faiza Tafannum, Mir Nafis Sharear Shopnil, Anika Salsabil, Navid Ahmed, Md. Golam Rabiul Alam, Md. Tanzim Reza
Social media and its users are vulnerable to the spread of rumors, therefore, protecting users from the spread of rumors is extremely important. For this reason, we propose a novel approach for rumor detection in social media that consists of multiple robust models: XGBoost Classifier, Support Vector Machine, Random Forest Classifier, Extra Tree Classifier, Decision Tree Classifier, a hybrid model, deep learning models-LSTM and BERT. For evaluation, two datasets are used. These artificial intelligence algorithms are often referred to as "Blackbox" where data go in the box and predictions come out of the box but what is happening inside the box frequently remains cloudy. Although, there have been several works on detecting fake news, the number of works regarding rumor detection is still limited and the models used in the existing works do not explain their decision-making process. We take models with higher accuracy to illustrate which feature of the data contributes the most for a post to have been predicted as a rumor or a non-rumor by the models to explain the opaque process happening inside the black-box models. Our hybrid model achieves an accuracy of 93.22% and 82.49%, while LSTM provides 99.81%, 98.41% and BERT provides 99.62%, 94.80% accuracy scores on the COVID19 Fake News and the concatenation of Twitter15 and Twitter16 datasets respectively.
社交媒体及其用户极易受到谣言传播的影响,因此保护用户不受谣言传播的影响极为重要。因此,我们提出了一种新的社交媒体谣言检测方法,该方法由多个鲁棒模型组成:XGBoost分类器、支持向量机、随机森林分类器、额外树分类器、决策树分类器、混合模型、深度学习模型- lstm和BERT。为了进行评估,使用了两个数据集。这些人工智能算法通常被称为“黑盒子”,即数据放在盒子里,预测从盒子里出来,但盒子里发生的事情往往是不确定的。虽然已经有一些关于假新闻检测的工作,但是关于谣言检测的工作数量仍然有限,现有工作中使用的模型并不能解释他们的决策过程。我们采用更高精度的模型来说明数据的哪个特征对模型预测为谣言或非谣言的帖子贡献最大,以解释黑箱模型中发生的不透明过程。我们的混合模型在covid - 19假新闻和Twitter15和Twitter16数据集的拼接上分别获得了93.22%和82.49%的准确率,而LSTM和BERT分别提供了99.81%、98.41%和99.62%、94.80%的准确率分数。
{"title":"Demystifying Black-box Learning Models of Rumor Detection from Social Media Posts","authors":"Faiza Tafannum, Mir Nafis Sharear Shopnil, Anika Salsabil, Navid Ahmed, Md. Golam Rabiul Alam, Md. Tanzim Reza","doi":"10.1109/uemcon53757.2021.9666567","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666567","url":null,"abstract":"Social media and its users are vulnerable to the spread of rumors, therefore, protecting users from the spread of rumors is extremely important. For this reason, we propose a novel approach for rumor detection in social media that consists of multiple robust models: XGBoost Classifier, Support Vector Machine, Random Forest Classifier, Extra Tree Classifier, Decision Tree Classifier, a hybrid model, deep learning models-LSTM and BERT. For evaluation, two datasets are used. These artificial intelligence algorithms are often referred to as \"Blackbox\" where data go in the box and predictions come out of the box but what is happening inside the box frequently remains cloudy. Although, there have been several works on detecting fake news, the number of works regarding rumor detection is still limited and the models used in the existing works do not explain their decision-making process. We take models with higher accuracy to illustrate which feature of the data contributes the most for a post to have been predicted as a rumor or a non-rumor by the models to explain the opaque process happening inside the black-box models. Our hybrid model achieves an accuracy of 93.22% and 82.49%, while LSTM provides 99.81%, 98.41% and BERT provides 99.62%, 94.80% accuracy scores on the COVID19 Fake News and the concatenation of Twitter15 and Twitter16 datasets respectively.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129443522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secret Key Steganography: improve security level of LSB algorithm 密钥隐写:提高LSB算法的安全水平
Ahmed Imad Hammoodi Al-Jarah, J. Ortega-Arjona
Internet has revolutionized the way people share information, store data, communicate, learn, and do business. Internet has been used for information transmission; this has changed in the last decade. Today, governments, businesses and individuals are increasingly relying on-line applications; the need to secure data exchange over the Internet and store it on the cloud has gained more importance. Data security aims to keep information safe by using cryptography and/or steganography. Steganography is a suitable candidate for keeping information safe, hiding the existence of data itself inside another medium. The Least Significant Bit (LSB) algorithm is one of the most common techniques to hide secret messages in an image. The main problem with LSB is knowing whether such an image has a secret message inside, making it easy to retrieve it by collecting the least significant bit from the steg-image. This paper presents an attempt to improve the security level of the LSB algorithm by using a secret steganography key. The proposed algorithm SKLSB is encoding the secret key from the cover image, encodes the secret message using the secret key, embedding it to the cover image. Even if attackers know about the steganography, they cannot know about the secret key. The SKLSB algorithm helps to get a higher and better level of security, useful for keeping sensitive, relevant, and important information stored. The results regarding this paper are compared with LSB algorithm regarding its Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) values aiming to show this method is more secure and does not affect the image imperceptibility.
互联网彻底改变了人们分享信息、存储数据、交流、学习和做生意的方式。利用互联网进行信息传递;这种情况在过去十年中发生了变化。如今,政府、企业和个人越来越依赖在线申请;保护互联网上的数据交换并将其存储在云上的需求变得更加重要。数据安全的目的是通过使用加密技术和/或隐写技术来保证信息安全。隐写术是保证信息安全的合适选择,它将数据本身的存在隐藏在另一种介质中。最低有效位(LSB)算法是在图像中隐藏秘密消息的最常用技术之一。LSB的主要问题是知道这样的图像内部是否有秘密消息,从而通过从图像中收集最低有效位来轻松检索它。本文提出了一种利用隐写密钥提高LSB算法安全水平的尝试。本文提出的算法SKLSB是从封面图像中提取密钥进行编码,使用密钥对秘密信息进行编码,并将其嵌入到封面图像中。即使攻击者知道隐写术,他们也不可能知道秘钥。SKLSB算法有助于获得更高、更好的安全级别,对于保存敏感、相关和重要的信息非常有用。本文的结果与LSB算法的均方误差(MSE)和峰值信噪比(PSNR)值进行了比较,旨在表明该方法更安全,不影响图像的不可感知性。
{"title":"Secret Key Steganography: improve security level of LSB algorithm","authors":"Ahmed Imad Hammoodi Al-Jarah, J. Ortega-Arjona","doi":"10.1109/UEMCON53757.2021.9666569","DOIUrl":"https://doi.org/10.1109/UEMCON53757.2021.9666569","url":null,"abstract":"Internet has revolutionized the way people share information, store data, communicate, learn, and do business. Internet has been used for information transmission; this has changed in the last decade. Today, governments, businesses and individuals are increasingly relying on-line applications; the need to secure data exchange over the Internet and store it on the cloud has gained more importance. Data security aims to keep information safe by using cryptography and/or steganography. Steganography is a suitable candidate for keeping information safe, hiding the existence of data itself inside another medium. The Least Significant Bit (LSB) algorithm is one of the most common techniques to hide secret messages in an image. The main problem with LSB is knowing whether such an image has a secret message inside, making it easy to retrieve it by collecting the least significant bit from the steg-image. This paper presents an attempt to improve the security level of the LSB algorithm by using a secret steganography key. The proposed algorithm SKLSB is encoding the secret key from the cover image, encodes the secret message using the secret key, embedding it to the cover image. Even if attackers know about the steganography, they cannot know about the secret key. The SKLSB algorithm helps to get a higher and better level of security, useful for keeping sensitive, relevant, and important information stored. The results regarding this paper are compared with LSB algorithm regarding its Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) values aiming to show this method is more secure and does not affect the image imperceptibility.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"5 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of Blockchain& IoT in Precision Farming: Exploration, Scope and Security Challenges 区块链和物联网在精准农业中的整合:探索、范围和安全挑战
I. Kaushik, N. Prakash, Anurag Jain
Internet of things (IoT) plays a major role in every field. It helps in transforming the way with the use of sensors, edge devices and its infrastructure. As sensors are major source of information gathering which is stored on the cloud and relevant information is being retrieved. Information is passed at various levels of IoT ecosystem, which takes security into consideration. With the growth of interconnected devices, data security is becoming increasingly complex. The necessity arising for building a secure and smart structure leads in combining blockchain technology with IoT based system in precision agriculture. With the use of blockchain, traditional methods utilized for collecting and sharing agriculture data are replaced with transparent, reliable and decentralized data storage methods. This combined approach helps us in maintaining an autonomous precise agriculture system and managing in more secure and optimized ways. This paper presents a comprehensive approach on highlighting the importance of integrating blockchain technology with smart agriculture. This paper also proposes novel approach to blockchain models which are used as alternate solutions for challenges faced by IoT based smart agriculture. Various sub sectors like food supply chain, livestock grazing, and crops overseeing are also managed using blockchain platform. Later section of the paper focuses on open challenges and issues while developing blockchain based IoT system used in precision farming.
物联网(IoT)在各个领域都发挥着重要作用。它有助于通过使用传感器、边缘设备及其基础设施来改变方式。由于传感器是信息收集的主要来源,这些信息存储在云中,相关信息正在被检索。信息在物联网生态系统的各个层面传递,这也考虑到了安全性。随着互联设备的不断增多,数据安全变得越来越复杂。构建安全和智能结构的必要性导致了将区块链技术与基于物联网的精准农业系统相结合。随着区块链的使用,用于收集和共享农业数据的传统方法被透明、可靠和分散的数据存储方法所取代。这种综合方法有助于我们维持一个自主的精准农业系统,并以更安全和优化的方式进行管理。本文提出了一种全面的方法来强调将区块链技术与智能农业相结合的重要性。本文还提出了区块链模型的新方法,作为基于物联网的智能农业面临的挑战的替代解决方案。食品供应链、牲畜放牧和作物监管等各个子行业也使用区块链平台进行管理。本文的后面部分重点介绍了在开发用于精准农业的基于区块链的物联网系统时面临的公开挑战和问题。
{"title":"Integration of Blockchain& IoT in Precision Farming: Exploration, Scope and Security Challenges","authors":"I. Kaushik, N. Prakash, Anurag Jain","doi":"10.1109/uemcon53757.2021.9666554","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666554","url":null,"abstract":"Internet of things (IoT) plays a major role in every field. It helps in transforming the way with the use of sensors, edge devices and its infrastructure. As sensors are major source of information gathering which is stored on the cloud and relevant information is being retrieved. Information is passed at various levels of IoT ecosystem, which takes security into consideration. With the growth of interconnected devices, data security is becoming increasingly complex. The necessity arising for building a secure and smart structure leads in combining blockchain technology with IoT based system in precision agriculture. With the use of blockchain, traditional methods utilized for collecting and sharing agriculture data are replaced with transparent, reliable and decentralized data storage methods. This combined approach helps us in maintaining an autonomous precise agriculture system and managing in more secure and optimized ways. This paper presents a comprehensive approach on highlighting the importance of integrating blockchain technology with smart agriculture. This paper also proposes novel approach to blockchain models which are used as alternate solutions for challenges faced by IoT based smart agriculture. Various sub sectors like food supply chain, livestock grazing, and crops overseeing are also managed using blockchain platform. Later section of the paper focuses on open challenges and issues while developing blockchain based IoT system used in precision farming.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125309965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tree-based Supervised Machine Learning Models For Detecting GPS Spoofing Attacks on UAS 基于树的有监督机器学习模型检测无人机的GPS欺骗攻击
Ghilas Aissou, Hadjar Ould Slimane, Selma Benouadah, N. Kaabouch
The security of Unmanned Aerial System (UAS) networks is becoming crucial as their number and application in several fields are increasing every day. For navigation and positioning, the Global Navigation System (GPS) is essential as it provides an accurate location for the UAS. However, since the civilian GPS signals are open and unencrypted, attackers target them in different ways such as spoofing attacks. To address this security concern, we propose a comparison of several tree-based machine learning models, namely Random Forest, Gradient Boost, XGBoost, and LightGBM, to detect GPS spoofing attacks. In this work, the dataset was built of real GPS signals that were collected using a Software Defined Radio unit and different types of simulated GPS spoofing attacks. The results show that XGBoost has the best accuracy (95.52%) and fastest detection time (2ms), which makes this model appropriate for UAS applications.
随着无人机系统(UAS)网络的数量和在多个领域的应用日益增加,其安全性变得至关重要。对于导航和定位,全球导航系统(GPS)是必不可少的,因为它为无人机提供了准确的位置。然而,由于民用GPS信号是开放的、未加密的,攻击者以欺骗攻击等不同的方式来攻击它们。为了解决这一安全问题,我们提出了几种基于树的机器学习模型的比较,即随机森林、梯度Boost、XGBoost和LightGBM,以检测GPS欺骗攻击。在这项工作中,数据集是由使用软件定义无线电单元和不同类型的模拟GPS欺骗攻击收集的真实GPS信号构建的。结果表明,XGBoost具有最高的准确率(95.52%)和最快的检测时间(2ms),适合无人机应用。
{"title":"Tree-based Supervised Machine Learning Models For Detecting GPS Spoofing Attacks on UAS","authors":"Ghilas Aissou, Hadjar Ould Slimane, Selma Benouadah, N. Kaabouch","doi":"10.1109/uemcon53757.2021.9666744","DOIUrl":"https://doi.org/10.1109/uemcon53757.2021.9666744","url":null,"abstract":"The security of Unmanned Aerial System (UAS) networks is becoming crucial as their number and application in several fields are increasing every day. For navigation and positioning, the Global Navigation System (GPS) is essential as it provides an accurate location for the UAS. However, since the civilian GPS signals are open and unencrypted, attackers target them in different ways such as spoofing attacks. To address this security concern, we propose a comparison of several tree-based machine learning models, namely Random Forest, Gradient Boost, XGBoost, and LightGBM, to detect GPS spoofing attacks. In this work, the dataset was built of real GPS signals that were collected using a Software Defined Radio unit and different types of simulated GPS spoofing attacks. The results show that XGBoost has the best accuracy (95.52%) and fastest detection time (2ms), which makes this model appropriate for UAS applications.","PeriodicalId":127072,"journal":{"name":"2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1