首页 > 最新文献

2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)最新文献

英文 中文
Message from IEEE 2021 CIC General Chairs and PC Chairs IEEE 2021 CIC主席和PC主席的信息
Pub Date : 2021-12-01 DOI: 10.1109/cic52973.2021.00005
{"title":"Message from IEEE 2021 CIC General Chairs and PC Chairs","authors":"","doi":"10.1109/cic52973.2021.00005","DOIUrl":"https://doi.org/10.1109/cic52973.2021.00005","url":null,"abstract":"","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126616037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Collaborative Work in Wide-band Display Environments 确保宽带显示环境下的协同工作
Pub Date : 2021-12-01 DOI: 10.1109/CIC52973.2021.00014
Krishna Bharadwaj, A. Burks, Andrew E. Johnson, Lance Long, L. Renambot, Maxine D. Brown, Dylan Kobayashi, Mahdi Belcaid, Nurit Kirshenbaum, Roderick S. Tabalba, Ryan Theriot, J. Leigh
SAGE2 (Scalable Amplified Group Environment) is the de facto platform to support group work on wide-band display environments. Unlike most web applications, the SAGE environment, due to the nature of its collaborative model, needs a nuanced handling of security aspects. This paper details the security requirements of SAGE2, the Identity and Access Control model that was developed to address those requirements, and the details of the Identity and Access Management system that the SAGE team implemented based on this new model. Further, we present a comparison of this new system with some of the popular collaboration platforms to highlight the uniqueness of SAGE2 integrated with this new Identity and Access Management system.
SAGE2(可扩展放大组环境)是支持在宽带显示环境下组工作的实际平台。与大多数web应用程序不同,SAGE环境由于其协作模型的性质,需要对安全方面进行细致的处理。本文详细介绍了SAGE2的安全需求,为满足这些需求而开发的身份和访问控制模型,以及SAGE团队基于这个新模型实现的身份和访问管理系统的细节。此外,我们还将这个新系统与一些流行的协作平台进行了比较,以突出SAGE2与这个新的身份和访问管理系统集成的独特性。
{"title":"Securing Collaborative Work in Wide-band Display Environments","authors":"Krishna Bharadwaj, A. Burks, Andrew E. Johnson, Lance Long, L. Renambot, Maxine D. Brown, Dylan Kobayashi, Mahdi Belcaid, Nurit Kirshenbaum, Roderick S. Tabalba, Ryan Theriot, J. Leigh","doi":"10.1109/CIC52973.2021.00014","DOIUrl":"https://doi.org/10.1109/CIC52973.2021.00014","url":null,"abstract":"SAGE2 (Scalable Amplified Group Environment) is the de facto platform to support group work on wide-band display environments. Unlike most web applications, the SAGE environment, due to the nature of its collaborative model, needs a nuanced handling of security aspects. This paper details the security requirements of SAGE2, the Identity and Access Control model that was developed to address those requirements, and the details of the Identity and Access Management system that the SAGE team implemented based on this new model. Further, we present a comparison of this new system with some of the popular collaboration platforms to highlight the uniqueness of SAGE2 integrated with this new Identity and Access Management system.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133239963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Disorders Classification in Phonetic Exams with MFCC and DTW MFCC和DTW在语音测试中的言语障碍分类
Pub Date : 2021-12-01 DOI: 10.1109/CIC52973.2021.00015
Jueting Liu, Marisha Speights, Dallin J Bailey, Sicheng Li, Huanyi Zhou, Yaoxuan Luan, Tianshi Xie, Cheryl D. Seals
Recognizing disordered speech is a challenge to Automatic Speech Recognition (ASR) systems. This research focuses on classifying disordered speech vs. non-disordered speech through signal processing coupled with machine learning techniques. We have found little evidence of ASR that correctly classifies disordered vs. ordered speech at the level of expert-based classification. This research supports the Automated Phonetic Transcription - Grading Tool (APTgt). APTgt is an online E-Learning system that supports Communications Disorders (CMDS) faculty during linguistic courses and provides reinforcement activities for phonetic transcription with the potential to improve the quality of students' learning efficacy and teachers' pedagogical experience. In addition, APTgt generates interactive practice sessions and exams, automatic grading, and exam analysis. This paper will focus on the classification module to classify disordered speech and non-disordered speech supporting APTgt. We utilize Mel-frequency cepstral coefficients (MFCCs) and dynamic time warping (DTW) to preprocess the audio files and calculate the similarity, and the Support Vector Machine (SVM) algorithm for classification and regression.
语音识别是自动语音识别系统面临的一个挑战。本研究的重点是通过信号处理和机器学习技术对无序语音和非无序语音进行分类。我们几乎没有发现ASR在基于专家的分类水平上正确分类无序和有序语音的证据。本研究支持自动语音转录分级工具(APTgt)。APTgt是一个在线电子学习系统,支持沟通障碍(CMDS)教师在语言课程中学习,并提供语音转录的强化活动,有可能提高学生的学习效率和教师的教学体验。此外,APTgt生成交互式练习和考试,自动评分和考试分析。本文将重点研究支持APTgt的对无序语音和非无序语音进行分类的分类模块。我们使用Mel-frequency倒谱系数(MFCCs)和动态时间规整(DTW)对音频文件进行预处理并计算相似度,并使用支持向量机(SVM)算法进行分类和回归。
{"title":"Speech Disorders Classification in Phonetic Exams with MFCC and DTW","authors":"Jueting Liu, Marisha Speights, Dallin J Bailey, Sicheng Li, Huanyi Zhou, Yaoxuan Luan, Tianshi Xie, Cheryl D. Seals","doi":"10.1109/CIC52973.2021.00015","DOIUrl":"https://doi.org/10.1109/CIC52973.2021.00015","url":null,"abstract":"Recognizing disordered speech is a challenge to Automatic Speech Recognition (ASR) systems. This research focuses on classifying disordered speech vs. non-disordered speech through signal processing coupled with machine learning techniques. We have found little evidence of ASR that correctly classifies disordered vs. ordered speech at the level of expert-based classification. This research supports the Automated Phonetic Transcription - Grading Tool (APTgt). APTgt is an online E-Learning system that supports Communications Disorders (CMDS) faculty during linguistic courses and provides reinforcement activities for phonetic transcription with the potential to improve the quality of students' learning efficacy and teachers' pedagogical experience. In addition, APTgt generates interactive practice sessions and exams, automatic grading, and exam analysis. This paper will focus on the classification module to classify disordered speech and non-disordered speech supporting APTgt. We utilize Mel-frequency cepstral coefficients (MFCCs) and dynamic time warping (DTW) to preprocess the audio files and calculate the similarity, and the Support Vector Machine (SVM) algorithm for classification and regression.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards an Integrated Micro-services Architecture for Campus environments 面向校园环境的集成微服务体系结构
Pub Date : 2021-12-01 DOI: 10.1109/CIC52973.2021.00023
Arnett Campbell, Sean S. E. Thorpe, Tyrone Edwards, Christopher Panther, Sean Ramsey, David White
This paper posits the need for an integrated micro services framework for handling all business and student services at our local University. We present the research question, “to what extent do the functionalities of the micro service frameworks provide beneficial considerations for the implementation of a micro service system within the University campus environment?” We discuss the response to this question regarding using a use case implementation now in progress from our enterprise systems solution - ISAS (Integrated Student Assessment System). The assumption is to implement functional micro-services to support our student and staff environments like never before. As such, the pivot from traditionally monolithic legacy systems to one that is component-based and service-driven is urgently necessary to allow our University to support all its application layered services continuously. The adaption of scalable micro services architectures focuses on Universities like ours to keep delivering a sustainable virtual presence. We use the summary perspectives presented in this paper to inform other institutions seeking to make these changes part of driving workable virtualized infrastructure, both containerized and serverless in design.
本文假设需要一个集成的微服务框架来处理本地大学的所有业务和学生服务。我们提出了一个研究问题,“微服务框架的功能在多大程度上为在大学校园环境中实现微服务系统提供了有益的考虑?”我们将讨论对这个问题的回应,使用我们的企业系统解决方案——ISAS(综合学生评估系统)中正在进行的一个用例实现。我们的假设是实现功能性微服务,以前所未有的方式支持我们的学生和员工环境。因此,从传统的单片遗留系统转向基于组件和服务驱动的系统是迫切需要的,以允许我们的大学持续支持其所有应用程序分层服务。可扩展的微服务架构的适应主要集中在像我们这样的大学,以保持可持续的虚拟存在。我们使用本文中提出的总结观点来告知其他寻求使这些变化成为驱动可行的虚拟化基础设施的一部分的机构,包括容器化和无服务器化的设计。
{"title":"Towards an Integrated Micro-services Architecture for Campus environments","authors":"Arnett Campbell, Sean S. E. Thorpe, Tyrone Edwards, Christopher Panther, Sean Ramsey, David White","doi":"10.1109/CIC52973.2021.00023","DOIUrl":"https://doi.org/10.1109/CIC52973.2021.00023","url":null,"abstract":"This paper posits the need for an integrated micro services framework for handling all business and student services at our local University. We present the research question, “to what extent do the functionalities of the micro service frameworks provide beneficial considerations for the implementation of a micro service system within the University campus environment?” We discuss the response to this question regarding using a use case implementation now in progress from our enterprise systems solution - ISAS (Integrated Student Assessment System). The assumption is to implement functional micro-services to support our student and staff environments like never before. As such, the pivot from traditionally monolithic legacy systems to one that is component-based and service-driven is urgently necessary to allow our University to support all its application layered services continuously. The adaption of scalable micro services architectures focuses on Universities like ours to keep delivering a sustainable virtual presence. We use the summary perspectives presented in this paper to inform other institutions seeking to make these changes part of driving workable virtualized infrastructure, both containerized and serverless in design.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organizing Committee CIC 2021 组委会CIC 2021
Pub Date : 2021-12-01 DOI: 10.1109/cic52973.2021.00006
{"title":"Organizing Committee CIC 2021","authors":"","doi":"10.1109/cic52973.2021.00006","DOIUrl":"https://doi.org/10.1109/cic52973.2021.00006","url":null,"abstract":"","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123148926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Vulnerabilities of Wearable Activity Monitors: Threat and Potential Defence 可穿戴活动监视器的隐私漏洞:威胁和潜在防御
Pub Date : 2021-12-01 DOI: 10.1109/CIC52973.2021.00022
Mohammad Al-Saad, Madeleine Lucas, Lakshmish Ramaswamy
Nowadays, large companies including Fitbit, Garmin, and Apple provide consumers with highly accurate and real-time activity trackers. An individual can simply wear a watch or handheld IoT device to automatically detect and track any movement throughout their day. Using sensor data obtained from Arizona State's Kinesiology department, this study presents the privacy concerns that activity-tracker devices pose due to the extensive amount of user data they obtain. We input unidentified user sensor data from six different recorded activities to an LSTM to show how accurately the model can match the data to the individual who completed it. We show that for three out of the six activities, the model can accurately match 88-92% of the timestep samples to the correct subject that performed them and 60-70% for the remaining three activities studied. Additionally, we present a voting based mechanism that improves the accuracy of sensor data classification to an average of 93%. Replacing the data of the participants with fake data can potentially enhance the privacy and anonymize the identities of those participants. One promising way to generate fake data with high quality data is to use generative adversarial networks (GANs). GANs have gained attention in the research community due to its ability to learn rich data distribution from samples and its outstanding experimental performance as a generative model. However, applying GANs by itself on sensitive data could raise a privacy concern since the density of the learned generative distribution could concentrate on the training data points. This means that GANs can easily remember training samples due to the high model complexity of deep networks. To mitigate the privacy risks, we combine ideas from the literature to implement a differentially private GAN model (HDP-GAN) that is capable of generating private synthetic streaming data before residing at its final destination in the tracker's company cloud. Two experiments were conducted to show that HDP-GAN can have promising results in protecting the individuals who performed the activities.
如今,包括Fitbit、Garmin和Apple在内的大公司都为消费者提供了高度精确和实时的活动追踪器。个人只需佩戴手表或手持物联网设备,即可自动检测和跟踪一天中的任何运动。利用从亚利桑那州立大学运动机能系获得的传感器数据,本研究提出了活动跟踪设备由于获取大量用户数据而带来的隐私问题。我们从六个不同的记录活动中输入身份不明的用户传感器数据到LSTM,以显示模型如何准确地将数据与完成数据的个人相匹配。我们表明,对于六个活动中的三个,该模型可以准确地将88-92%的时间步样本匹配到执行它们的正确主体,其余三个活动可以准确地匹配到60-70%。此外,我们提出了一种基于投票的机制,将传感器数据分类的准确率提高到平均93%。用假数据替换参与者的数据可能会增强隐私性,并使这些参与者的身份匿名化。生成对抗网络(GANs)是一种很有前途的方法,可以生成具有高质量数据的假数据。由于gan能够从样本中学习丰富的数据分布,并且作为生成模型具有出色的实验性能,因此受到了研究界的关注。然而,将gan单独应用于敏感数据可能会引起隐私问题,因为学习到的生成分布的密度可能集中在训练数据点上。这意味着由于深度网络的高模型复杂性,gan可以很容易地记住训练样本。为了减轻隐私风险,我们结合了文献中的想法来实现一个差分私有GAN模型(HDP-GAN),该模型能够在存储在跟踪器公司云中的最终目的地之前生成私有合成流数据。两项实验表明,HDP-GAN在保护进行活动的个体方面具有良好的效果。
{"title":"Privacy Vulnerabilities of Wearable Activity Monitors: Threat and Potential Defence","authors":"Mohammad Al-Saad, Madeleine Lucas, Lakshmish Ramaswamy","doi":"10.1109/CIC52973.2021.00022","DOIUrl":"https://doi.org/10.1109/CIC52973.2021.00022","url":null,"abstract":"Nowadays, large companies including Fitbit, Garmin, and Apple provide consumers with highly accurate and real-time activity trackers. An individual can simply wear a watch or handheld IoT device to automatically detect and track any movement throughout their day. Using sensor data obtained from Arizona State's Kinesiology department, this study presents the privacy concerns that activity-tracker devices pose due to the extensive amount of user data they obtain. We input unidentified user sensor data from six different recorded activities to an LSTM to show how accurately the model can match the data to the individual who completed it. We show that for three out of the six activities, the model can accurately match 88-92% of the timestep samples to the correct subject that performed them and 60-70% for the remaining three activities studied. Additionally, we present a voting based mechanism that improves the accuracy of sensor data classification to an average of 93%. Replacing the data of the participants with fake data can potentially enhance the privacy and anonymize the identities of those participants. One promising way to generate fake data with high quality data is to use generative adversarial networks (GANs). GANs have gained attention in the research community due to its ability to learn rich data distribution from samples and its outstanding experimental performance as a generative model. However, applying GANs by itself on sensitive data could raise a privacy concern since the density of the learned generative distribution could concentrate on the training data points. This means that GANs can easily remember training samples due to the high model complexity of deep networks. To mitigate the privacy risks, we combine ideas from the literature to implement a differentially private GAN model (HDP-GAN) that is capable of generating private synthetic streaming data before residing at its final destination in the tracker's company cloud. Two experiments were conducted to show that HDP-GAN can have promising results in protecting the individuals who performed the activities.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service-Based Drone Delivery 基于服务的无人机配送
Pub Date : 2021-12-01 DOI: 10.1109/CIC52973.2021.00019
Balsam Alkouz, Babar Shahzaad, A. Bouguettaya
Service delivery is set to experience a major paradigm shift with fast advances in drone technologies coupled with higher expectations from customers and increased competition. We propose a novel service-oriented approach to enable the ubiquitous delivery of packages in a drone-operated skyway network. We discuss the benefits, framework and architecture, contemporary approaches, open challenges and future visioned directions of service-based drone deliveries.
随着无人机技术的快速发展,加上客户的更高期望和竞争的加剧,服务交付将经历一次重大的范式转变。我们提出了一种新的面向服务的方法,使无人机操作的高架公路网络中无处不在的包裹交付成为可能。我们讨论了基于服务的无人机交付的好处、框架和架构、当代方法、开放的挑战和未来的愿景方向。
{"title":"Service-Based Drone Delivery","authors":"Balsam Alkouz, Babar Shahzaad, A. Bouguettaya","doi":"10.1109/CIC52973.2021.00019","DOIUrl":"https://doi.org/10.1109/CIC52973.2021.00019","url":null,"abstract":"Service delivery is set to experience a major paradigm shift with fast advances in drone technologies coupled with higher expectations from customers and increased competition. We propose a novel service-oriented approach to enable the ubiquitous delivery of packages in a drone-operated skyway network. We discuss the benefits, framework and architecture, contemporary approaches, open challenges and future visioned directions of service-based drone deliveries.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131457257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects 《当信任遇上车联网:机遇、挑战与未来展望》
Pub Date : 2021-12-01 DOI: 10.1109/CIC52973.2021.00018
A. Mahmood, Quan Z. Sheng, S. A. Siddiqui, S. Sagar, Wei Emma Zhang, Hajime Suzuki, Wei Ni
Recent technological breakthroughs in vehicular ad hoc networks and the Internet of Things (IoT) have transformed vehicles into smart objects thus paving the way for the evolution of the promising paradigm of the Internet of Vehicles (IoV), which is an integral constituent of the modern intelligent transportation systems. Simply put, IoV attributes to the IoT-on-wheels, wherein vehicles broadcast safety-critical information among one another (and their immediate ambiences) for guaranteeing highly reliable and efficacious traffic flows. This, therefore, necessitates the need to fully secure an IoV network since a single malicious message is capable enough of jeopardizing the safety of the nearby vehicles (and their respective passengers) and vulnerable pedestrians. It is also pertinent to mention that a malicious attacker, i.e., vehicle, is not only able to send counterfeited safety-critical messages to its nearby vehicles and the traffic management authorities but could further enable a compromised vehicle to broadcast both spoofed coordinates and speed-related information. It is, therefore, of the utmost importance that malicious entities and their messages be identified and subsequently eliminated from the network before they are able to manipulate the entire network for their malicious gains. This paper, therefore, delineates on the convergence of the notion of trust with the IoV primarily in terms of its underlying rationale. It further highlights the opportunities which transpire as a result of this convergence to secure an IoV network. Finally, open research challenges, together with the recommendations for addressing the same, have been discussed.
车辆自组织网络和物联网(IoT)的最新技术突破已将车辆转变为智能对象,从而为有前途的车联网(IoV)范式的发展铺平了道路,这是现代智能交通系统的一个组成部分。简而言之,物联网属于车轮上的物联网,其中车辆之间(及其周围环境)广播安全关键信息,以保证高度可靠和有效的交通流量。因此,由于单个恶意信息足以危及附近车辆(及其乘客)和脆弱行人的安全,因此有必要完全保护车联网网络。值得一提的是,恶意攻击者(即车辆)不仅能够向附近的车辆和交通管理部门发送伪造的安全关键信息,而且还可以进一步使受感染的车辆广播欺骗的坐标和速度相关信息。因此,在恶意实体能够操纵整个网络以获取恶意收益之前,识别并随后从网络中消除恶意实体及其消息是至关重要的。因此,本文主要从其基本原理方面描述了信任概念与IoV的趋同。它进一步强调了由于这种融合而产生的机会,以确保物联网网络的安全。最后,讨论了开放的研究挑战,以及解决这些挑战的建议。
{"title":"When Trust Meets the Internet of Vehicles: Opportunities, Challenges, and Future Prospects","authors":"A. Mahmood, Quan Z. Sheng, S. A. Siddiqui, S. Sagar, Wei Emma Zhang, Hajime Suzuki, Wei Ni","doi":"10.1109/CIC52973.2021.00018","DOIUrl":"https://doi.org/10.1109/CIC52973.2021.00018","url":null,"abstract":"Recent technological breakthroughs in vehicular ad hoc networks and the Internet of Things (IoT) have transformed vehicles into smart objects thus paving the way for the evolution of the promising paradigm of the Internet of Vehicles (IoV), which is an integral constituent of the modern intelligent transportation systems. Simply put, IoV attributes to the IoT-on-wheels, wherein vehicles broadcast safety-critical information among one another (and their immediate ambiences) for guaranteeing highly reliable and efficacious traffic flows. This, therefore, necessitates the need to fully secure an IoV network since a single malicious message is capable enough of jeopardizing the safety of the nearby vehicles (and their respective passengers) and vulnerable pedestrians. It is also pertinent to mention that a malicious attacker, i.e., vehicle, is not only able to send counterfeited safety-critical messages to its nearby vehicles and the traffic management authorities but could further enable a compromised vehicle to broadcast both spoofed coordinates and speed-related information. It is, therefore, of the utmost importance that malicious entities and their messages be identified and subsequently eliminated from the network before they are able to manipulate the entire network for their malicious gains. This paper, therefore, delineates on the convergence of the notion of trust with the IoV primarily in terms of its underlying rationale. It further highlights the opportunities which transpire as a result of this convergence to secure an IoV network. Finally, open research challenges, together with the recommendations for addressing the same, have been discussed.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116941856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Conference Panel: Pandemic 2023 – An Information Technology Retrospective 会议小组:2023年大流行——信息技术回顾
Pub Date : 2021-12-01 DOI: 10.1109/cic52973.2021.00010
{"title":"Conference Panel: Pandemic 2023 – An Information Technology Retrospective","authors":"","doi":"10.1109/cic52973.2021.00010","DOIUrl":"https://doi.org/10.1109/cic52973.2021.00010","url":null,"abstract":"","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Reconnaissance Attack Classification with Random Undersampling and Ensemble Feature Selection 基于随机欠采样和集成特征选择的物联网侦察攻击分类
Pub Date : 2021-12-01 DOI: 10.1109/CIC52973.2021.00016
Joffrey L. Leevy, John T. Hancock, T. Khoshgoftaar, Naeem Seliya
The exponential increase in the use of Internet of Things (IoT) devices has been accompanied by a spike in cyberattacks on IoT networks. In this research, we investigate the Bot-IoT dataset with a focus on classifying IoT reconnaissance attacks. Reconnaissance attacks are a foundational step in the cyberattack lifecycle. Our contribution is centered on the building of predictive models with the aid of Random Undersampling (RUS) and ensemble Feature Selection Techniques (FSTs). As far as we are aware, this type of experimentation has never been performed for the Reconnaissance attack category of Bot-IoT. Our work uses the Area Under the Receiver Operating Characteristic Curve (AUC) metric to quantify the performance of a diverse range of classifiers: Light GBM, CatBoost, XGBoost, Random Forest (RF), Logistic Regression (LR), Naive Bayes (NB), Decision Tree (DT), and a Multilayer Perceptron (MLP). For this study, we determined that the best learners are DT and DT-based ensemble classifiers, the best RUS ratio is 1:1 or 1:3, and the best ensemble FST is our “6 Agree” technique.
物联网(IoT)设备使用的指数级增长伴随着对物联网网络的网络攻击激增。在本研究中,我们研究了Bot-IoT数据集,重点是对IoT侦察攻击进行分类。侦察攻击是网络攻击生命周期中的一个基本步骤。我们的贡献集中在随机欠采样(RUS)和集成特征选择技术(FSTs)的帮助下建立预测模型。据我们所知,这种类型的实验从未针对Bot-IoT的侦察攻击类别进行过。我们的工作使用接收者工作特征曲线下面积(AUC)度量来量化各种分类器的性能:Light GBM、CatBoost、XGBoost、随机森林(RF)、逻辑回归(LR)、朴素贝叶斯(NB)、决策树(DT)和多层感知器(MLP)。在本研究中,我们确定了最好的学习器是DT和基于DT的集成分类器,最好的RUS比率是1:1或1:3,而最好的集成FST是我们的“6 Agree”技术。
{"title":"IoT Reconnaissance Attack Classification with Random Undersampling and Ensemble Feature Selection","authors":"Joffrey L. Leevy, John T. Hancock, T. Khoshgoftaar, Naeem Seliya","doi":"10.1109/CIC52973.2021.00016","DOIUrl":"https://doi.org/10.1109/CIC52973.2021.00016","url":null,"abstract":"The exponential increase in the use of Internet of Things (IoT) devices has been accompanied by a spike in cyberattacks on IoT networks. In this research, we investigate the Bot-IoT dataset with a focus on classifying IoT reconnaissance attacks. Reconnaissance attacks are a foundational step in the cyberattack lifecycle. Our contribution is centered on the building of predictive models with the aid of Random Undersampling (RUS) and ensemble Feature Selection Techniques (FSTs). As far as we are aware, this type of experimentation has never been performed for the Reconnaissance attack category of Bot-IoT. Our work uses the Area Under the Receiver Operating Characteristic Curve (AUC) metric to quantify the performance of a diverse range of classifiers: Light GBM, CatBoost, XGBoost, Random Forest (RF), Logistic Regression (LR), Naive Bayes (NB), Decision Tree (DT), and a Multilayer Perceptron (MLP). For this study, we determined that the best learners are DT and DT-based ensemble classifiers, the best RUS ratio is 1:1 or 1:3, and the best ensemble FST is our “6 Agree” technique.","PeriodicalId":170121,"journal":{"name":"2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1