首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
What Makes a National Football League Team Successful? an Analysis of Play by Play Data 是什么让一个国家橄榄球联盟的球队成功?基于游戏数据的游戏分析
Josef Ur, Mathew Craner, Rehab El Hajj
The National Football League (NFL) is one of the most popular sports in North America. The league showcases many strong athletes and winning is very important to all teams; however, for every winning team, there is a losing team, and it is the coaches' responsibility to decide what plays to call in order to help their teams win. Data mining play data can help show trends and areas where the top teams in the NFL excel by looking at questions like how often certain plays are run, how many yards do the plays get and where on the field are touchdown scored. With the help of data mining intelligent tools such as Naive Bayes, decision tree algorithms and association rules, we worked to isolate the areas where the best teams in the league separate themselves and produce winning franchises. By classifying the teams into two categories - the top teams and bottom teams - we were able to compare the two classes for differences which explain what results in more success in the league. Although we found that most teams - both top and bottom teams - use similar plays, there were also factors that distinguished the two types of teams. This research highlights these specific factors and some overall distinctions found between the more successful versus less successful teams to the NFL community.
美国国家橄榄球联盟(NFL)是北美最受欢迎的运动之一。联赛展示了许多强大的运动员,获胜对所有球队都非常重要;然而,对于每一支获胜的球队来说,都有一支失败的球队,教练的责任是决定该叫什么比赛来帮助他们的球队获胜。数据挖掘比赛数据可以通过观察某些比赛的频率、比赛的码数以及场地上的触地得分等问题,帮助显示NFL顶级球队的趋势和领域。在数据挖掘智能工具的帮助下,如朴素贝叶斯,决策树算法和关联规则,我们努力隔离联盟中最好的球队分开并产生胜利的区域。通过将球队分为两类——顶级球队和低端球队——我们能够比较这两类球队的差异,从而解释什么球队在联赛中取得了更多的成功。尽管我们发现大多数球队——无论是顶级球队还是低端球队——都使用类似的战术,但也有一些因素可以区分这两种类型的球队。这项研究强调了这些具体因素,以及在NFL社区中更成功的球队和不太成功的球队之间发现的一些总体区别。
{"title":"What Makes a National Football League Team Successful? an Analysis of Play by Play Data","authors":"Josef Ur, Mathew Craner, Rehab El Hajj","doi":"10.1109/UEMCON47517.2019.8993072","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993072","url":null,"abstract":"The National Football League (NFL) is one of the most popular sports in North America. The league showcases many strong athletes and winning is very important to all teams; however, for every winning team, there is a losing team, and it is the coaches' responsibility to decide what plays to call in order to help their teams win. Data mining play data can help show trends and areas where the top teams in the NFL excel by looking at questions like how often certain plays are run, how many yards do the plays get and where on the field are touchdown scored. With the help of data mining intelligent tools such as Naive Bayes, decision tree algorithms and association rules, we worked to isolate the areas where the best teams in the league separate themselves and produce winning franchises. By classifying the teams into two categories - the top teams and bottom teams - we were able to compare the two classes for differences which explain what results in more success in the league. Although we found that most teams - both top and bottom teams - use similar plays, there were also factors that distinguished the two types of teams. This research highlights these specific factors and some overall distinctions found between the more successful versus less successful teams to the NFL community.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115682891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UWB Channel Classification Using Convolutional Neural Networks 基于卷积神经网络的超宽带信道分类
Parnian A. ShirinAbadi, A. Abbasi
In this paper, a novel convolutional neural network (CNN) algorithm for ultra-wideband (UWB) line-of-sight (LOS) and non-line-of-sight (NLOS) channel classification is proposed. Unlike the existing methods, which are based on machine learning algorithms and require suitable information/parameters for classification to be extracted for classification procedure, the proposed method uses deep learning approaches in which the model learns discriminating information for classification automatically by itself during the “training” phase. The performance of the proposed method is investigated in the IEEE 802.15.4a standard for UWB channels in indoor office LOS and NLOS environments.
本文提出了一种新的卷积神经网络(CNN)算法,用于超宽带(UWB)视距(LOS)和非视距(NLOS)信道分类。现有方法基于机器学习算法,需要提取合适的分类信息/参数进行分类,而本文提出的方法采用深度学习方法,模型在“训练”阶段自动学习分类的判别信息。在ieee802.15.a标准中对该方法在室内办公室LOS和NLOS环境下的UWB信道性能进行了研究。
{"title":"UWB Channel Classification Using Convolutional Neural Networks","authors":"Parnian A. ShirinAbadi, A. Abbasi","doi":"10.1109/UEMCON47517.2019.8993100","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993100","url":null,"abstract":"In this paper, a novel convolutional neural network (CNN) algorithm for ultra-wideband (UWB) line-of-sight (LOS) and non-line-of-sight (NLOS) channel classification is proposed. Unlike the existing methods, which are based on machine learning algorithms and require suitable information/parameters for classification to be extracted for classification procedure, the proposed method uses deep learning approaches in which the model learns discriminating information for classification automatically by itself during the “training” phase. The performance of the proposed method is investigated in the IEEE 802.15.4a standard for UWB channels in indoor office LOS and NLOS environments.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards a Threat Model for Fog Computing 面向雾计算的威胁模型
Yasser Karim, Ragib Hasan
In recent years, the addition of billions of Internet of Thing (IoT) device spawned a massive demand for computing service near the edge of the network. Due to latency, limited mobility, and location awareness, cloud computing is not capable enough to serve these devices. As a result, the focus is shifting more towards distributed platform service to put ample computing power near the edge of the networks. Thus, paradigms such as Fog and Edge computing are gaining attention from researchers as well as business stakeholders. Fog computing is a new computing paradigm, which places computing nodes in between the Cloud and the end user to reduce latency and increase availability. As an emerging technology, Fog computing also brings newer security challenges for the stakeholders to solve. Before designing the security models for Fog computing, it is better to understand the existing threats to Fog computing. In this regard, a thorough threat model can significantly help to identify these threats. Threat modeling is a sophisticated engineering process by which a computer-based system is analyzed to discover security flaws. In this paper, we applied two popular security threat modeling processes - CIAA and STRIDE - to identify and analyze attackers, their capabilities and motivations, and a list of potential threats in the context of Fog computing. We posit that such a systematic and thorough discussion of a threat model for Fog computing will help security researchers and professionals to design secure and reliable Fog computing systems.
近年来,数十亿的物联网(IoT)设备的增加催生了对网络边缘计算服务的巨大需求。由于延迟、有限的移动性和位置感知,云计算无法为这些设备提供足够的服务。因此,重点更多地转向分布式平台服务,以便在网络边缘附近提供充足的计算能力。因此,雾计算和边缘计算等范例正受到研究人员和商业利益相关者的关注。雾计算是一种新的计算范式,它将计算节点置于云和最终用户之间,以减少延迟并提高可用性。作为一项新兴技术,雾计算也给利益相关者带来了新的安全挑战。在设计雾计算的安全模型之前,最好先了解目前雾计算面临的威胁。在这方面,一个全面的威胁模型可以极大地帮助识别这些威胁。威胁建模是一项复杂的工程过程,通过对基于计算机的系统进行分析来发现安全漏洞。在本文中,我们应用了两种流行的安全威胁建模过程——CIAA和STRIDE——来识别和分析攻击者,他们的能力和动机,以及雾计算背景下的潜在威胁列表。我们认为,对雾计算威胁模型的系统和深入的讨论将有助于安全研究人员和专业人员设计安全可靠的雾计算系统。
{"title":"Towards a Threat Model for Fog Computing","authors":"Yasser Karim, Ragib Hasan","doi":"10.1109/UEMCON47517.2019.8993005","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993005","url":null,"abstract":"In recent years, the addition of billions of Internet of Thing (IoT) device spawned a massive demand for computing service near the edge of the network. Due to latency, limited mobility, and location awareness, cloud computing is not capable enough to serve these devices. As a result, the focus is shifting more towards distributed platform service to put ample computing power near the edge of the networks. Thus, paradigms such as Fog and Edge computing are gaining attention from researchers as well as business stakeholders. Fog computing is a new computing paradigm, which places computing nodes in between the Cloud and the end user to reduce latency and increase availability. As an emerging technology, Fog computing also brings newer security challenges for the stakeholders to solve. Before designing the security models for Fog computing, it is better to understand the existing threats to Fog computing. In this regard, a thorough threat model can significantly help to identify these threats. Threat modeling is a sophisticated engineering process by which a computer-based system is analyzed to discover security flaws. In this paper, we applied two popular security threat modeling processes - CIAA and STRIDE - to identify and analyze attackers, their capabilities and motivations, and a list of potential threats in the context of Fog computing. We posit that such a systematic and thorough discussion of a threat model for Fog computing will help security researchers and professionals to design secure and reliable Fog computing systems.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Deployment of Heterogeneous Wireless Nodes in Integrated LTElWi-Fi Networks 综合LTElWi-Fi网络中异构无线节点的优化部署
Noha A. Elmosilhy, Ahmed M. Abd El-Haleem, M. M. Elmesalawy
Optimal placement of small cells in integrated LTE/Wi-Fi heterogeneous network architecture is considered one of the key approaches that can be used to increase the system capacity and enhance the coverage to meet the unexpected explosion of mobile data traffic. Co-operation and interworking between different Radio Access Technologies (RATs) introduce the LTE/Wi-Fi Aggregation (LWA) which allows the traffic aggregation between Wi-Fi Access Point (WAP) and LTE small cell on the level of Radio Access Network (RAN). In this paper, the effectiveness of the optimal deployment of heterogeneous wireless small nodes in a hotspot zone is considered and explored. The deployment of different wireless small nodes is formulated as an optimization problem with the objective of (i) Maximizing the total system throughput while considering the minimum received Signal-to-Interference-plus-Noise Ratio (SINR)/Signal-to-Noise Ratio (SNR) requirements for LTE/Wi-Fi coverage (ii) Choosing the optimal number of small cells which can guarantee the coverage of the considered hotspot zone (iii) Choosing the optimal formation of WAPs Basic Service Sets (BSSs). The objective function is formulated as a Mixed Integer Non-Linear Programming (MINLP) problem and solved using genetic algorithm. The performance of the proposed optimal deployment approach is compared to the uniform distributed deployment algorithm in terms of system throughput in which a significant improvement is noticed when the proposed approach is adopted.
在集成的LTE/Wi-Fi异构网络架构中,小蜂窝的优化布局被认为是增加系统容量和增强覆盖以满足移动数据流量意外爆炸的关键方法之一。不同无线接入技术(rat)之间的合作和相互作用引入了LTE/Wi-Fi聚合(LWA),它允许Wi-Fi接入点(WAP)和LTE小蜂窝在无线接入网络(RAN)级别上进行流量聚合。本文对热点区域异构无线小节点优化部署的有效性进行了考虑和探讨。不同无线小节点的部署被定义为一个优化问题,其目标是(i)在考虑LTE/Wi-Fi覆盖范围的最小接收信噪比(SINR)/信噪比(SNR)要求的同时最大化系统总吞吐量(ii)选择能够保证所考虑的热点区域覆盖的最优小蜂窝数量(iii)选择最优wap基本服务集(bss)的形成。将目标函数表述为一个混合整数非线性规划(MINLP)问题,并采用遗传算法求解。在系统吞吐量方面,将所提出的最优部署方法与均匀分布式部署算法进行了比较,发现采用所提出的方法可以显著提高系统吞吐量。
{"title":"Optimal Deployment of Heterogeneous Wireless Nodes in Integrated LTElWi-Fi Networks","authors":"Noha A. Elmosilhy, Ahmed M. Abd El-Haleem, M. M. Elmesalawy","doi":"10.1109/UEMCON47517.2019.8993033","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993033","url":null,"abstract":"Optimal placement of small cells in integrated LTE/Wi-Fi heterogeneous network architecture is considered one of the key approaches that can be used to increase the system capacity and enhance the coverage to meet the unexpected explosion of mobile data traffic. Co-operation and interworking between different Radio Access Technologies (RATs) introduce the LTE/Wi-Fi Aggregation (LWA) which allows the traffic aggregation between Wi-Fi Access Point (WAP) and LTE small cell on the level of Radio Access Network (RAN). In this paper, the effectiveness of the optimal deployment of heterogeneous wireless small nodes in a hotspot zone is considered and explored. The deployment of different wireless small nodes is formulated as an optimization problem with the objective of (i) Maximizing the total system throughput while considering the minimum received Signal-to-Interference-plus-Noise Ratio (SINR)/Signal-to-Noise Ratio (SNR) requirements for LTE/Wi-Fi coverage (ii) Choosing the optimal number of small cells which can guarantee the coverage of the considered hotspot zone (iii) Choosing the optimal formation of WAPs Basic Service Sets (BSSs). The objective function is formulated as a Mixed Integer Non-Linear Programming (MINLP) problem and solved using genetic algorithm. The performance of the proposed optimal deployment approach is compared to the uniform distributed deployment algorithm in terms of system throughput in which a significant improvement is noticed when the proposed approach is adopted.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Wearable Device Network to Track Animal Behavior and Relationships in the Wild 追踪野生动物行为和关系的可穿戴设备网络
Luis Camal, Anup Kirtane, Teresa Blanco, Roberto Casas, F. Rossano, Baris Aksanli
The advancements in sensor technology have made it possible to design wearable devices specifically designed for animals. These wearable devices can be used for locating individual animals, monitor their status, and track their trajectories in the wild. Some animal groups (such as chimpanzees) exhibit complex group behavior and these group dynamics play an important role in the physical and mental health of the animals. Scientists have traditionally been monitoring group dynamics manually in the wild. This requires extensive field trips, costing a lot of time and money. This calls for using the recent developments in technology, such as smart wearable devices for this purpose. However, lack of infrastructure support (limited connectivity, limited power, etc.) in the wilderness makes this a tedious task. In this work-in-progress paper, we present our technological approach and how we address the issues of wilderness to study animal behavior. We demonstrate how we build a network of lightweight wearable devices, and how the digital output of these devices can be used to analyze animal relationship. We show an initial, exploratory experiment, outlining the capabilities of the devices and technologies used in terms of communication efficiency, and the potential of the devices that can be used in the wilderness. Our initial results show that up to 90% of the proximity-based interactions can be captured.
传感器技术的进步使得设计专门为动物设计的可穿戴设备成为可能。这些可穿戴设备可用于定位单个动物,监控它们的状态,并跟踪它们在野外的轨迹。一些动物群体(如黑猩猩)表现出复杂的群体行为,这些群体动态对动物的身心健康起着重要作用。传统上,科学家一直在野外人工监测群体动态。这需要大量的实地考察,花费大量的时间和金钱。这就需要利用最新的技术发展,比如智能可穿戴设备。然而,在荒野中缺乏基础设施支持(有限的连接,有限的电力等)使这成为一项乏味的任务。在这篇正在进行的论文中,我们介绍了我们的技术方法以及我们如何解决荒野研究动物行为的问题。我们演示了如何构建一个轻量级可穿戴设备网络,以及如何使用这些设备的数字输出来分析动物关系。我们展示了一个初步的探索性实验,概述了设备和技术在通信效率方面的能力,以及这些设备在荒野中使用的潜力。我们的初步结果表明,高达90%的基于邻近的相互作用可以被捕获。
{"title":"A Wearable Device Network to Track Animal Behavior and Relationships in the Wild","authors":"Luis Camal, Anup Kirtane, Teresa Blanco, Roberto Casas, F. Rossano, Baris Aksanli","doi":"10.1109/UEMCON47517.2019.8992986","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992986","url":null,"abstract":"The advancements in sensor technology have made it possible to design wearable devices specifically designed for animals. These wearable devices can be used for locating individual animals, monitor their status, and track their trajectories in the wild. Some animal groups (such as chimpanzees) exhibit complex group behavior and these group dynamics play an important role in the physical and mental health of the animals. Scientists have traditionally been monitoring group dynamics manually in the wild. This requires extensive field trips, costing a lot of time and money. This calls for using the recent developments in technology, such as smart wearable devices for this purpose. However, lack of infrastructure support (limited connectivity, limited power, etc.) in the wilderness makes this a tedious task. In this work-in-progress paper, we present our technological approach and how we address the issues of wilderness to study animal behavior. We demonstrate how we build a network of lightweight wearable devices, and how the digital output of these devices can be used to analyze animal relationship. We show an initial, exploratory experiment, outlining the capabilities of the devices and technologies used in terms of communication efficiency, and the potential of the devices that can be used in the wilderness. Our initial results show that up to 90% of the proximity-based interactions can be captured.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126780248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimized IoT Based Decision Making For Autonomous Vehicles In Intersections 基于物联网的十字路口自动驾驶汽车优化决策
Amin Sahba, Ramin Sahba, P. Rad, M. Jamshidi
Applications that use communication networks and distributed systems to control traffic have high latency, especially in critical situations. The performance of these applications largely depends on the computational delay of algorithms that run on local or central processors. Therefore, providing an optimized solution to minimize this delay to a tolerable range is highly needed. This article studies a method in which autonomous vehicles around an intersection try to control the intersection traffic efficiently by communicating and interacting with each other and road-side smart devices. This problem can be addressed in the form of a network utility maximization problem. To achieve a solution that is close to an optimal solution, a gradient descent algorithm with a fixed step size can be utilized. It is necessary to find a balance between latency and accuracy, which leads to finding a velocity close to the optimal velocity. The number of loop repetitions in the scheduling algorithm, determines the latency in preparation for making the proper schedule for autonomous vehicles. In this work, we propose an approach to provide an optimized schedule for autonomous vehicles in intersections considering pedestrian traffic. Autonomous vehicles are able to communicate with each other and road side unites. However, surveillance cameras are required to observe pedestrians passing the intersection. Hence, we utilize cameras, smart sensors, processors, and communication equipment embedded in autonomous vehicles and road side unites, to collect the required data, process it, and distribute the calculated optimal decision to autonomous vehicles. To simulate the traffic behaviors resulting from applying the proposed solution, Simulation of Urban Mobility software is used.
使用通信网络和分布式系统控制流量的应用程序具有很高的延迟,特别是在关键情况下。这些应用程序的性能在很大程度上取决于在本地或中央处理器上运行的算法的计算延迟。因此,提供一个优化的解决方案,将延迟最小化到可容忍的范围是非常必要的。本文研究了一种交叉口周围的自动驾驶车辆通过相互之间以及路边智能设备之间的通信和交互来有效控制交叉口交通的方法。这个问题可以用网络效用最大化问题的形式来解决。为了获得接近最优解的解,可以使用固定步长的梯度下降算法。有必要在延迟和精度之间找到平衡,从而找到接近最佳速度的速度。调度算法中的循环重复次数决定了为自动驾驶汽车制定适当调度的准备延迟。在这项工作中,我们提出了一种方法,为自动驾驶汽车在考虑行人交通的十字路口提供优化的调度。自动驾驶汽车可以相互通信,也可以与路边的车辆通信。然而,需要监控摄像头来观察通过十字路口的行人。因此,我们利用嵌入在自动驾驶汽车和道路侧单元中的摄像头、智能传感器、处理器和通信设备来收集所需的数据,对其进行处理,并将计算出的最优决策分发给自动驾驶汽车。为了模拟应用所提出的解决方案所产生的交通行为,使用了Simulation of Urban Mobility软件。
{"title":"Optimized IoT Based Decision Making For Autonomous Vehicles In Intersections","authors":"Amin Sahba, Ramin Sahba, P. Rad, M. Jamshidi","doi":"10.1109/UEMCON47517.2019.8992978","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992978","url":null,"abstract":"Applications that use communication networks and distributed systems to control traffic have high latency, especially in critical situations. The performance of these applications largely depends on the computational delay of algorithms that run on local or central processors. Therefore, providing an optimized solution to minimize this delay to a tolerable range is highly needed. This article studies a method in which autonomous vehicles around an intersection try to control the intersection traffic efficiently by communicating and interacting with each other and road-side smart devices. This problem can be addressed in the form of a network utility maximization problem. To achieve a solution that is close to an optimal solution, a gradient descent algorithm with a fixed step size can be utilized. It is necessary to find a balance between latency and accuracy, which leads to finding a velocity close to the optimal velocity. The number of loop repetitions in the scheduling algorithm, determines the latency in preparation for making the proper schedule for autonomous vehicles. In this work, we propose an approach to provide an optimized schedule for autonomous vehicles in intersections considering pedestrian traffic. Autonomous vehicles are able to communicate with each other and road side unites. However, surveillance cameras are required to observe pedestrians passing the intersection. Hence, we utilize cameras, smart sensors, processors, and communication equipment embedded in autonomous vehicles and road side unites, to collect the required data, process it, and distribute the calculated optimal decision to autonomous vehicles. To simulate the traffic behaviors resulting from applying the proposed solution, Simulation of Urban Mobility software is used.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114954205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems 基于网络流量的智能手机和传统网络系统混合恶意软件检测
Safia Rahmat, Quamar Niyaz, A. Mathur, Weiqing Sun, A. Javaid
With the widespread use of the Internet in recent times, security remains one of the major concerns. Malware poses security threats to smartphones, computers, and networks. These threats require an urgent need to build an efficient hybrid intrusion detection system, which can detect malware from smartphone and traditional systems, and ensure minimal damage to the resources of an organization. In this paper, we propose an intelligent and self-learning network traffic-based hybrid malware detection approach (HMDA) for smartphones and traditional systems considering features that show a similar trend in the network traffic. The system could be used by an organizational network to detect and mitigate any occurrence of malware-based malicious activity inside the network. The proposed HMDA is implemented using machine learning algorithms. We have used ensemble learners to train the model for the HMDA and achieved an accuracy of 95.7% using XGBoost algorithm. The Android traffic captures collected by running the malware dataset have been made publicly available upon request to authors.
随着近年来互联网的广泛使用,安全性仍然是主要问题之一。恶意软件对智能手机、计算机和网络构成安全威胁。这些威胁迫切需要构建一个高效的混合入侵检测系统,该系统可以检测来自智能手机和传统系统的恶意软件,并确保对组织资源的损害最小。在本文中,我们提出了一种基于智能和自学习网络流量的混合恶意软件检测方法(HMDA),用于智能手机和传统系统,考虑网络流量中显示类似趋势的特征。该系统可被组织网络用于检测和减轻网络内任何基于恶意软件的恶意活动的发生。提出的HMDA是使用机器学习算法实现的。我们使用集成学习器来训练HMDA模型,并使用XGBoost算法实现了95.7%的准确率。通过运行恶意软件数据集收集的Android流量捕获已应作者的要求公开提供。
{"title":"Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems","authors":"Safia Rahmat, Quamar Niyaz, A. Mathur, Weiqing Sun, A. Javaid","doi":"10.1109/UEMCON47517.2019.8992934","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992934","url":null,"abstract":"With the widespread use of the Internet in recent times, security remains one of the major concerns. Malware poses security threats to smartphones, computers, and networks. These threats require an urgent need to build an efficient hybrid intrusion detection system, which can detect malware from smartphone and traditional systems, and ensure minimal damage to the resources of an organization. In this paper, we propose an intelligent and self-learning network traffic-based hybrid malware detection approach (HMDA) for smartphones and traditional systems considering features that show a similar trend in the network traffic. The system could be used by an organizational network to detect and mitigate any occurrence of malware-based malicious activity inside the network. The proposed HMDA is implemented using machine learning algorithms. We have used ensemble learners to train the model for the HMDA and achieved an accuracy of 95.7% using XGBoost algorithm. The Android traffic captures collected by running the malware dataset have been made publicly available upon request to authors.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116075369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Use of Sensor Node Networks for Car Security 传感器节点网络在汽车安全中的应用
Rafael Lopez, Christian DeGuzman, Abdelrahman Elleithy
Smart cars are capable of connecting to the internet. This ability of a vehicle to connect to the internet opens up many possibilities for car security. In this paper, we introduce a new protocol to protect an automobile from theft. The proposed protocol is called the Emergency One's Complement (E1C) protocol. Simulation results demonstrated that the protocol is capable of detecting theft as well as detect and mitigate packet spoofing.
智能汽车能够连接到互联网。车辆连接互联网的能力为汽车安全开辟了许多可能性。本文提出了一种新的汽车防盗协议。提议的协议被称为紧急补充协议(E1C)。仿真结果表明,该协议既能检测盗窃,又能检测和减轻数据包欺骗。
{"title":"Use of Sensor Node Networks for Car Security","authors":"Rafael Lopez, Christian DeGuzman, Abdelrahman Elleithy","doi":"10.1109/UEMCON47517.2019.8992952","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992952","url":null,"abstract":"Smart cars are capable of connecting to the internet. This ability of a vehicle to connect to the internet opens up many possibilities for car security. In this paper, we introduce a new protocol to protect an automobile from theft. The proposed protocol is called the Emergency One's Complement (E1C) protocol. Simulation results demonstrated that the protocol is capable of detecting theft as well as detect and mitigate packet spoofing.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra 几何代数上完全同态加密的新方法
D. W. H. A. D. Silva, Carlos Paz de Araujo, C. E. Chow, Bryan Sosa Barillas
The ability to compute on encrypted data in a meaningful way is a subject of increasing interest in both academia and industry. The type of encryption that allows any function to be evaluated on encrypted data is called fully homomorphic encryption, or FHE, and is one promising way to achieve secure computation. The problem was first stated in 1978 by Rivest et al. and first realized by Gentry in 2009, but remains an open problem since an FHE scheme that is both efficient and secure is yet to be presented. Most of the prominent FHE schemes follow Gentry's blueprint which concentrates the efforts of researchers on very similar algebraic structures and noise management techniques. The intrinsic complexity of these schemes results in the similar shortfalls that they share in efficiency. We introduce the application of Geometric Algebra (GA) to encryption in conjunction with p-adic arithmetic and a modified version of the Chinese Remainder Theorem and we demonstrate an efficient, noise-free, symmetric-key FHE scheme. We focus the security analysis on demonstrating that our FHE scheme is not linearly decryptable. Further, we discuss a practical approach for generalizing different types of algebraic structures in the geometric product space of two dimensions, which allows us to export GA operations to other algebras and vice-versa. Our construction supports a variety of applications, from homomorphic obfuscation to general purpose FHE computations.
以有意义的方式对加密数据进行计算的能力是学术界和工业界越来越感兴趣的主题。允许在加密数据上计算任何函数的加密类型称为完全同态加密(fully homomorphic encryption,简称FHE),这是实现安全计算的一种很有希望的方法。这个问题最早由Rivest等人在1978年提出,并于2009年由Gentry首次意识到,但由于尚未提出既高效又安全的FHE方案,因此仍然是一个悬而未决的问题。大多数突出的FHE方案遵循Gentry的蓝图,将研究人员的努力集中在非常相似的代数结构和噪声管理技术上。这些方案固有的复杂性导致了它们在效率方面的相似不足。我们介绍了几何代数(GA)在加密中的应用,结合p进算法和中国剩余定理的一个改进版本,并展示了一个有效的、无噪声的、对称密钥的FHE方案。我们将安全分析的重点放在证明我们的FHE方案不是线性可解密的。此外,我们讨论了一种在二维几何积空间中推广不同类型代数结构的实用方法,该方法允许我们将GA操作导出到其他代数,反之亦然。我们的结构支持各种应用,从同态混淆到通用的FHE计算。
{"title":"A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra","authors":"D. W. H. A. D. Silva, Carlos Paz de Araujo, C. E. Chow, Bryan Sosa Barillas","doi":"10.1109/UEMCON47517.2019.8992917","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992917","url":null,"abstract":"The ability to compute on encrypted data in a meaningful way is a subject of increasing interest in both academia and industry. The type of encryption that allows any function to be evaluated on encrypted data is called fully homomorphic encryption, or FHE, and is one promising way to achieve secure computation. The problem was first stated in 1978 by Rivest et al. and first realized by Gentry in 2009, but remains an open problem since an FHE scheme that is both efficient and secure is yet to be presented. Most of the prominent FHE schemes follow Gentry's blueprint which concentrates the efforts of researchers on very similar algebraic structures and noise management techniques. The intrinsic complexity of these schemes results in the similar shortfalls that they share in efficiency. We introduce the application of Geometric Algebra (GA) to encryption in conjunction with p-adic arithmetic and a modified version of the Chinese Remainder Theorem and we demonstrate an efficient, noise-free, symmetric-key FHE scheme. We focus the security analysis on demonstrating that our FHE scheme is not linearly decryptable. Further, we discuss a practical approach for generalizing different types of algebraic structures in the geometric product space of two dimensions, which allows us to export GA operations to other algebras and vice-versa. Our construction supports a variety of applications, from homomorphic obfuscation to general purpose FHE computations.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122459255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data Augmentation with Generative Models for Improved Malware Detection: A Comparative Study* 基于生成模型的数据增强改进恶意软件检测:比较研究*
R. Burks, K. Islam, Yan Lu, Jiang Li
Generative Models have been very accommodating when it comes to generating artificial data. Two of the most popular and promising models are the Generative Adversarial Network (GAN) and Variational Autoencoder (VAE) models. They both play critical roles in classification problems by generating synthetic data to train classifier more accurately. Malware detection is the process of determining whether or not software is malicious on the host's system and diagnosing what type of attack it is. Without adequate amount of training data, it makes malware detection less efficient. In this paper, we compare the two generative models to generate synthetic training data to boost the Residual Network (ResNet-18) classifier for malware detection. Experiment results show that adding synthetic malware samples generated by VAE to the training data improved the accuracy of ResNet-18 by 2% as it compared to 6% by GAN.
生成模型在生成人工数据方面非常灵活。两个最流行和最有前途的模型是生成对抗网络(GAN)和变分自编码器(VAE)模型。它们都通过生成合成数据来更准确地训练分类器,在分类问题中发挥着关键作用。恶意软件检测是确定软件在主机系统上是否是恶意软件并诊断它是哪种类型的攻击的过程。如果没有足够的训练数据,就会降低恶意软件检测的效率。在本文中,我们比较了两种生成模型来生成合成训练数据,以增强残差网络(ResNet-18)分类器用于恶意软件检测。实验结果表明,将VAE生成的合成恶意软件样本加入到训练数据中,ResNet-18的准确率比GAN的6%提高了2%。
{"title":"Data Augmentation with Generative Models for Improved Malware Detection: A Comparative Study*","authors":"R. Burks, K. Islam, Yan Lu, Jiang Li","doi":"10.1109/UEMCON47517.2019.8993085","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993085","url":null,"abstract":"Generative Models have been very accommodating when it comes to generating artificial data. Two of the most popular and promising models are the Generative Adversarial Network (GAN) and Variational Autoencoder (VAE) models. They both play critical roles in classification problems by generating synthetic data to train classifier more accurately. Malware detection is the process of determining whether or not software is malicious on the host's system and diagnosing what type of attack it is. Without adequate amount of training data, it makes malware detection less efficient. In this paper, we compare the two generative models to generate synthetic training data to boost the Residual Network (ResNet-18) classifier for malware detection. Experiment results show that adding synthetic malware samples generated by VAE to the training data improved the accuracy of ResNet-18 by 2% as it compared to 6% by GAN.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1