首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Efficient Feature Selection for Intrusion Detection Systems 入侵检测系统的高效特征选择
S. Ahmadi, S. Rashad, H. Elgazzar
Intrusion detection systems (IDSs) monitor network traffics to find suspicious activities, such as an attack or illegal activities. These systems play an important role in securing computer networks. Due to availability of irrelevant or redundant features and big dimensionality of network datasets which results to an inefficient detection process, this study, focused on identifying important attributes in order to build an effective IDS. A majority vote system, using three standard feature selection methods, Correlation-based feature selection, Information Gain, and Chi-square is proposed to select the most relevant features for IDS. The decision tree classifier is applied on reduced feature sets to build an intrusion detection system. The results show that selected reduced attributes from the novel feature selection system give a better performance for building a computationally efficient IDS system.
入侵检测系统(Intrusion detection system, ids)通过监控网络流量,发现可疑活动,如攻击或非法活动。这些系统在保护计算机网络安全方面发挥着重要作用。由于网络数据集存在不相关或冗余的特征,且网络数据集的维度较大,导致检测过程效率低下,因此本研究将重点放在识别重要属性以构建有效的入侵检测系统上。提出了一种基于相关性特征选择、信息增益和卡方三种标准特征选择方法的多数投票系统,以选择最相关的IDS特征。将决策树分类器应用于约简特征集,构建入侵检测系统。结果表明,从新的特征选择系统中选择的约简属性为构建计算效率高的IDS系统提供了更好的性能。
{"title":"Efficient Feature Selection for Intrusion Detection Systems","authors":"S. Ahmadi, S. Rashad, H. Elgazzar","doi":"10.1109/UEMCON47517.2019.8992960","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992960","url":null,"abstract":"Intrusion detection systems (IDSs) monitor network traffics to find suspicious activities, such as an attack or illegal activities. These systems play an important role in securing computer networks. Due to availability of irrelevant or redundant features and big dimensionality of network datasets which results to an inefficient detection process, this study, focused on identifying important attributes in order to build an effective IDS. A majority vote system, using three standard feature selection methods, Correlation-based feature selection, Information Gain, and Chi-square is proposed to select the most relevant features for IDS. The decision tree classifier is applied on reduced feature sets to build an intrusion detection system. The results show that selected reduced attributes from the novel feature selection system give a better performance for building a computationally efficient IDS system.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123735577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mitigating Implanted Medical Device Cybersecurity Risks 降低植入式医疗设备的网络安全风险
Chuck Easttom, Nagi Mei
Cybersecurity vulnerabilities in medical devices have been widely documented. These issues have been described in hacking conferences as well as bulletins from the United States Food and Drug Administration. These issues present a serious threat to implantable medical devices. While the literature is replete with discussions of these vulnerabilities, there is less literature on a broad-based solution that would be applicable to all such devices. In fact, there is a substantial gap in the literature regarding how to mitigate the threat to implanted medical devices. This paper describes a specific firmware solution which can apply to any implantable medical device in order to mitigate security concerns.
医疗设备中的网络安全漏洞已被广泛记录。这些问题在黑客会议以及美国食品和药物管理局的公告中都有描述。这些问题对植入式医疗设备构成严重威胁。虽然文献中充满了对这些漏洞的讨论,但关于适用于所有此类设备的基础广泛的解决方案的文献却很少。事实上,关于如何减轻对植入医疗设备的威胁,文献中存在很大的差距。本文描述了一个特定的固件解决方案,可以适用于任何植入式医疗设备,以减轻安全问题。
{"title":"Mitigating Implanted Medical Device Cybersecurity Risks","authors":"Chuck Easttom, Nagi Mei","doi":"10.1109/UEMCON47517.2019.8992922","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992922","url":null,"abstract":"Cybersecurity vulnerabilities in medical devices have been widely documented. These issues have been described in hacking conferences as well as bulletins from the United States Food and Drug Administration. These issues present a serious threat to implantable medical devices. While the literature is replete with discussions of these vulnerabilities, there is less literature on a broad-based solution that would be applicable to all such devices. In fact, there is a substantial gap in the literature regarding how to mitigate the threat to implanted medical devices. This paper describes a specific firmware solution which can apply to any implantable medical device in order to mitigate security concerns.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Tracking the Mobile Jammer in Wireless Sensor Networks Using Extended Kalman Filter 利用扩展卡尔曼滤波跟踪无线传感器网络中的移动干扰机
Waleed Aldosari, M. Zohdy, Richard Olawoyin
Wireless Sensor Networks (WSNs) are susceptible to jamming attacks due to the shared wireless medium. The jammer can disrupt any specific or entire radio frequency based on its function and strategies. Locating the jammer location is very important against the jamming in the wireless network and restore the communication channel. To support the existing anti-jamming techniques, we proposed an algorithm based on the Extended Kalman filter (EKF) and power received to track the jammer. Detecting jammer location is the first step taking to defend such attacks. Besides, estimating jammer location supports a wide range of defense. Range-based jammer localization technique based on the received power is used in this work to detect the external malicious node location by designed the position, velocity, and acceleration approach of Extended Kalman filter. An extensive simulation conducted to evaluate the performance of EKF compares to the Virtual Force Iteration Localization (VFIL), Weighted Centroid Localization (WCL), and Centroid Localization algorithms (CL). The EKF proves to be of high efficiency in comparison to VFIL, WCL, and CL.
无线传感器网络由于采用共享无线介质,容易受到干扰攻击。干扰机可以根据其功能和策略干扰任何特定或整个无线电频率。确定干扰机的位置对于防止无线网络中的干扰和恢复通信信道具有十分重要的意义。为了支持现有的抗干扰技术,我们提出了一种基于扩展卡尔曼滤波(EKF)和接收功率的算法来跟踪干扰机。探测干扰机的位置是防御此类攻击的第一步。此外,估计干扰机的位置支持广泛的防御。本文采用基于接收功率的距离干扰机定位技术,设计了扩展卡尔曼滤波的位置、速度和加速度方法,检测外部恶意节点的位置。通过广泛的仿真来评估EKF与虚拟力迭代定位(VFIL)、加权质心定位(WCL)和质心定位算法(CL)的性能。与VFIL、WCL和CL相比,EKF被证明是高效率的。
{"title":"Tracking the Mobile Jammer in Wireless Sensor Networks Using Extended Kalman Filter","authors":"Waleed Aldosari, M. Zohdy, Richard Olawoyin","doi":"10.1109/UEMCON47517.2019.8993050","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993050","url":null,"abstract":"Wireless Sensor Networks (WSNs) are susceptible to jamming attacks due to the shared wireless medium. The jammer can disrupt any specific or entire radio frequency based on its function and strategies. Locating the jammer location is very important against the jamming in the wireless network and restore the communication channel. To support the existing anti-jamming techniques, we proposed an algorithm based on the Extended Kalman filter (EKF) and power received to track the jammer. Detecting jammer location is the first step taking to defend such attacks. Besides, estimating jammer location supports a wide range of defense. Range-based jammer localization technique based on the received power is used in this work to detect the external malicious node location by designed the position, velocity, and acceleration approach of Extended Kalman filter. An extensive simulation conducted to evaluate the performance of EKF compares to the Virtual Force Iteration Localization (VFIL), Weighted Centroid Localization (WCL), and Centroid Localization algorithms (CL). The EKF proves to be of high efficiency in comparison to VFIL, WCL, and CL.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126625076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SPEED CONTROLLING & TRAFFIC MANAGEMENT SYSTEM (SCTMS) 速度控制及交通管理系统
Aneesh Kar, Soujanya Syamal, Suvraneel Chatterjee, Antarika Basu, Himadri Nath Saha, Srijata Choudhuri
This paper is based on Electronic Vehicle System, like any other electric vehicle, with certain additional, new features which will take electronic vehicles to a whole new level. Speed management, thereby contributing to traffic management has always been a very big challenge to us. The safety and the smooth flow of traffic is very much essential. To overcome these huddles, it is necessary to device a smart vehicle system, which will be responsible to regulate the speed of the vehicle and manage the traffic. Firstly, to control the speed, we need to device a three condition layer, which is based on Data Analytics, Machine Learning, Deep Learning and IOT. This three-layered System will get the maximum speed of the car, beyond which the driver will be unable to drive. Obtaining the maximum speed limit will depend on factors like the prescribed maximum speed limit of the particular road, the car is running on, the present traffic density of the road and the traffic situation as per the nearby traffic pole, the position of the other cars with respect to the concerned car. All these major factors will attribute to obtaining a safe maximum speed limit, as the three-layered system will work simultaneously, enabling the driver to drive safely within this limit. Since speed management can be reached, this will attribute to the management of the traffic. The knowledge of IOT is necessary, which will connect the car and the nearby traffic pole. Once they are connected, the car will receive signals and updates, regarding the traffic situation and based on the color of the signal the car will adjust it's speed or stop, accordingly. These are the major aspects of this proposed new vehicle system. Thus, the System can prove to be very much beneficial.
本文是基于电子汽车系统,像任何其他电动汽车,有一些额外的,新的功能,将电子汽车到一个全新的水平。速度管理,从而促进交通管理一直是我们面临的一个非常大的挑战。交通的安全和畅通是非常重要的。为了克服这些困难,有必要安装一个智能车辆系统,它将负责调节车辆的速度和管理交通。首先,为了控制速度,我们需要设置一个基于数据分析、机器学习、深度学习和物联网的三条件层。这个三层系统将获得汽车的最大速度,超过这个速度司机将无法驾驶。获得最高速度限制将取决于特定道路的规定最高速度限制,汽车正在行驶,目前道路的交通密度和附近交通杆的交通状况,以及其他车辆相对于相关车辆的位置等因素。所有这些主要因素都将归因于获得安全的最高速度限制,因为三层系统将同时工作,使驾驶员能够在此限制内安全驾驶。由于速度管理可以达到,这将归因于交通的管理。物联网的知识是必要的,它将连接汽车和附近的交通杆。一旦它们连接起来,汽车就会收到信号和更新,关于交通状况,根据信号的颜色,汽车将相应地调整速度或停车。这些是提出的新车辆系统的主要方面。因此,该系统可以证明是非常有益的。
{"title":"SPEED CONTROLLING & TRAFFIC MANAGEMENT SYSTEM (SCTMS)","authors":"Aneesh Kar, Soujanya Syamal, Suvraneel Chatterjee, Antarika Basu, Himadri Nath Saha, Srijata Choudhuri","doi":"10.1109/UEMCON47517.2019.8993092","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993092","url":null,"abstract":"This paper is based on Electronic Vehicle System, like any other electric vehicle, with certain additional, new features which will take electronic vehicles to a whole new level. Speed management, thereby contributing to traffic management has always been a very big challenge to us. The safety and the smooth flow of traffic is very much essential. To overcome these huddles, it is necessary to device a smart vehicle system, which will be responsible to regulate the speed of the vehicle and manage the traffic. Firstly, to control the speed, we need to device a three condition layer, which is based on Data Analytics, Machine Learning, Deep Learning and IOT. This three-layered System will get the maximum speed of the car, beyond which the driver will be unable to drive. Obtaining the maximum speed limit will depend on factors like the prescribed maximum speed limit of the particular road, the car is running on, the present traffic density of the road and the traffic situation as per the nearby traffic pole, the position of the other cars with respect to the concerned car. All these major factors will attribute to obtaining a safe maximum speed limit, as the three-layered system will work simultaneously, enabling the driver to drive safely within this limit. Since speed management can be reached, this will attribute to the management of the traffic. The knowledge of IOT is necessary, which will connect the car and the nearby traffic pole. Once they are connected, the car will receive signals and updates, regarding the traffic situation and based on the color of the signal the car will adjust it's speed or stop, accordingly. These are the major aspects of this proposed new vehicle system. Thus, the System can prove to be very much beneficial.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hive and SQL Case Study in Cloud Data Analytics Hive和SQL在云数据分析中的案例研究
Shireesha Chandra, A. Varde, Jiayin Wang
The digital universe is expanding at a very fast pace generating massive datasets. In order to keep up with the processing and storage needs for this big data, and to discover knowledge, we need scalable infrastructure and technologies that can access data from multiple disks simultaneously. Cloud computing provides paradigms for data analytics over such huge datasets. While SQL continues to be popular among database and data mining professionals, in recent years Hive has established itself as a rapidly advancing technology for big data which makes it highly suitable for use over the cloud. In this paper, we present investigatory research on Hive and SQL with a detailed case study between them, considering cloud data management and mining. Our work here constitutes a thorough scrutiny, focusing on processing Hive queries on cloud infrastructure considering three different approaches, and also delving into SQL processing on the cloud with similar approaches. Real datasets are used for conducting various operations using Hive and SQL. This paper conducts performance comparisons of the two technologies and explains the environment in which one is preferred over the other for processing and analyzing data. It provides recommendations for cloud data analytics, based on the case study.
数字宇宙正在以非常快的速度膨胀,产生大量的数据集。为了跟上大数据的处理和存储需求,并发现知识,我们需要可扩展的基础设施和技术,可以同时从多个磁盘访问数据。云计算为如此庞大的数据集提供了数据分析的范例。虽然SQL在数据库和数据挖掘专业人士中继续流行,但近年来Hive已经成为一种快速发展的大数据技术,这使得它非常适合在云上使用。在本文中,我们对Hive和SQL进行了调查研究,并对它们进行了详细的案例研究,考虑了云数据管理和挖掘。我们在这里的工作构成了一个彻底的审查,重点是在云基础设施上处理Hive查询,考虑了三种不同的方法,并深入研究了云上使用类似方法的SQL处理。真实数据集用于Hive和SQL的各种操作。本文对这两种技术进行了性能比较,并解释了在处理和分析数据时一种技术优于另一种技术的环境。它提供了基于案例研究的云数据分析建议。
{"title":"A Hive and SQL Case Study in Cloud Data Analytics","authors":"Shireesha Chandra, A. Varde, Jiayin Wang","doi":"10.1109/UEMCON47517.2019.8992925","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992925","url":null,"abstract":"The digital universe is expanding at a very fast pace generating massive datasets. In order to keep up with the processing and storage needs for this big data, and to discover knowledge, we need scalable infrastructure and technologies that can access data from multiple disks simultaneously. Cloud computing provides paradigms for data analytics over such huge datasets. While SQL continues to be popular among database and data mining professionals, in recent years Hive has established itself as a rapidly advancing technology for big data which makes it highly suitable for use over the cloud. In this paper, we present investigatory research on Hive and SQL with a detailed case study between them, considering cloud data management and mining. Our work here constitutes a thorough scrutiny, focusing on processing Hive queries on cloud infrastructure considering three different approaches, and also delving into SQL processing on the cloud with similar approaches. Real datasets are used for conducting various operations using Hive and SQL. This paper conducts performance comparisons of the two technologies and explains the environment in which one is preferred over the other for processing and analyzing data. It provides recommendations for cloud data analytics, based on the case study.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116202973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scavenging Residual Energy from Wi-Fi Sources Using a Rectenna Circuit 利用整流天线电路清除Wi-Fi源的剩余能量
R. Parekh, Kushal Jain, David Luu, K. George
With the increasing popularity of wireless devices, the need to develop ways to charge, or to expand the battery life, also increases. This paper proposes a hybrid rectification circuit for collecting energy from nearby Wi-Fi networks. The circuit scavenges the energy emitted, but not used, by routers when they send information through the air, and stores the energy within a capacitor. The proposed architecture consists of two main building blocks: a bridgeless converter, and a diode bridge. The incident power on the antenna of the harvester is passed through the network of the LC lumped circuit, which helps in rectifying and boosting the voltage level. The second building block takes the output of the first block and further rectifies it, helping to further enhance voltage. The proposed system has been tested by using two distinct capacitive loads: 0.47 uF and 1000 uF. It was found that in the case of 1000 uF, the capacitor was able to charge 2.47 V within a span of 16.5 hours when kept directly next to the transmitting source antenna. In the case of 0.47 uF, it was able to charge within a span of 12 hours when kept 10 feet away from the transmitting source. The energy stored was used to light an LED, which was successful in the proximity circuit, albeit briefly.
随着无线设备的日益普及,开发充电方式或延长电池寿命的需求也在增加。本文提出了一种混合整流电路,用于从附近的Wi-Fi网络收集能量。当路由器通过空气发送信息时,电路会清除路由器发出但未使用的能量,并将这些能量储存在电容器中。所提出的架构由两个主要构建块组成:无桥转换器和二极管桥。收割机天线上的入射功率通过LC集总电路网络,有助于整流和提升电压水平。第二个构建模块接收第一个模块的输出并进一步整流,帮助进一步提高电压。该系统已在0.47 uF和1000 uF两种不同的容性负载下进行了测试。研究发现,在1000 uF的情况下,当电容器直接放在发射源天线旁边时,可以在16.5小时内充电2.47 V。在0.47 uF的情况下,当距离发射源10英尺时,它能够在12小时内充电。储存的能量被用来点亮LED,这在接近电路中是成功的,尽管时间很短。
{"title":"Scavenging Residual Energy from Wi-Fi Sources Using a Rectenna Circuit","authors":"R. Parekh, Kushal Jain, David Luu, K. George","doi":"10.1109/UEMCON47517.2019.8993094","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993094","url":null,"abstract":"With the increasing popularity of wireless devices, the need to develop ways to charge, or to expand the battery life, also increases. This paper proposes a hybrid rectification circuit for collecting energy from nearby Wi-Fi networks. The circuit scavenges the energy emitted, but not used, by routers when they send information through the air, and stores the energy within a capacitor. The proposed architecture consists of two main building blocks: a bridgeless converter, and a diode bridge. The incident power on the antenna of the harvester is passed through the network of the LC lumped circuit, which helps in rectifying and boosting the voltage level. The second building block takes the output of the first block and further rectifies it, helping to further enhance voltage. The proposed system has been tested by using two distinct capacitive loads: 0.47 uF and 1000 uF. It was found that in the case of 1000 uF, the capacitor was able to charge 2.47 V within a span of 16.5 hours when kept directly next to the transmitting source antenna. In the case of 0.47 uF, it was able to charge within a span of 12 hours when kept 10 feet away from the transmitting source. The energy stored was used to light an LED, which was successful in the proximity circuit, albeit briefly.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Misbehavior Authority System for Sybil Attack Detection in C-ITS C-ITS中Sybil攻击检测的不当行为授权系统
Joseph Kamel, Farah Haidar, I. B. Jemaa, Arnaud Kaiser, B. Lonc, P. Urien
Global misbehavior detection is an important backend mechanism in Cooperative Intelligent Transport Systems (C-ITS). It is based on the local misbehavior detection information sent by Vehicle's On-Board Units (OBUs) and by Road-Side Units (RSUs) called Misbehavior Reports (MBRs) to the Misbehavior Authority (MA). By analyzing these reports, the MA provides more accurate and robust misbehavior detection results. Sybil attacks pose a significant threat to the C-ITS systems. Their detection and identification may be inaccurate and confusing. In this work, we propose a Machine Learning (ML) based solution for the internal detection process of the MA. We show through extensive simulation that our solution is able to precisely identify the type of the Sybil attack and provide promising detection accuracy results.
全局错误行为检测是协同智能交通系统(C-ITS)的重要后端机制。它基于由车载单元(OBUs)和路侧单元(rsu)发送给不当行为管理机构(MA)的称为不当行为报告(mbr)的本地不当行为检测信息。通过分析这些报告,MA提供了更准确和稳健的不当行为检测结果。西比尔攻击对C-ITS系统构成重大威胁。它们的检测和识别可能是不准确和令人困惑的。在这项工作中,我们提出了一种基于机器学习(ML)的MA内部检测过程解决方案。我们通过广泛的模拟表明,我们的解决方案能够精确识别Sybil攻击的类型,并提供有希望的检测精度结果。
{"title":"A Misbehavior Authority System for Sybil Attack Detection in C-ITS","authors":"Joseph Kamel, Farah Haidar, I. B. Jemaa, Arnaud Kaiser, B. Lonc, P. Urien","doi":"10.1109/UEMCON47517.2019.8993045","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993045","url":null,"abstract":"Global misbehavior detection is an important backend mechanism in Cooperative Intelligent Transport Systems (C-ITS). It is based on the local misbehavior detection information sent by Vehicle's On-Board Units (OBUs) and by Road-Side Units (RSUs) called Misbehavior Reports (MBRs) to the Misbehavior Authority (MA). By analyzing these reports, the MA provides more accurate and robust misbehavior detection results. Sybil attacks pose a significant threat to the C-ITS systems. Their detection and identification may be inaccurate and confusing. In this work, we propose a Machine Learning (ML) based solution for the internal detection process of the MA. We show through extensive simulation that our solution is able to precisely identify the type of the Sybil attack and provide promising detection accuracy results.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132663385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Comparison of Machine Learning Models to Predict Twitter Buzz 预测Twitter Buzz的机器学习模型比较
Yash Parikh, Eman Abdelfattah
This paper investigates six machine-learning models to determine which algorithm would effectively predict buzz on Twitter. Different classifiers are applied such as Stochastic Gradient Descent, Support Vector Machines, Logistic Regression, Deep Neural Networks, Random Forests and Extra Trees on a Twitter dataset. This dataset contains features with users and author engagement over a certain period. After tests conducted on all the algorithms, we concluded that Extra Trees model outperforms the other models.
本文研究了六种机器学习模型,以确定哪种算法可以有效地预测Twitter上的嗡嗡声。在Twitter数据集上应用了不同的分类器,如随机梯度下降、支持向量机、逻辑回归、深度神经网络、随机森林和额外树。该数据集包含特定时期内用户和作者参与的特征。在对所有算法进行测试后,我们得出结论,Extra Trees模型优于其他模型。
{"title":"Comparison of Machine Learning Models to Predict Twitter Buzz","authors":"Yash Parikh, Eman Abdelfattah","doi":"10.1109/UEMCON47517.2019.8993082","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993082","url":null,"abstract":"This paper investigates six machine-learning models to determine which algorithm would effectively predict buzz on Twitter. Different classifiers are applied such as Stochastic Gradient Descent, Support Vector Machines, Logistic Regression, Deep Neural Networks, Random Forests and Extra Trees on a Twitter dataset. This dataset contains features with users and author engagement over a certain period. After tests conducted on all the algorithms, we concluded that Extra Trees model outperforms the other models.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132717354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overhead View Person Detection Using YOLO 俯视图人员检测使用YOLO
Misbah Ahmad, Imran Ahmed, A. Adnan
In video surveillance system, one of the important task is to detect person. In recent years, different computer vision and deep learning algorithms have been developed, which provides robust person detection results. Majority of these developed techniques focused on frontal and asymmetric views. Therefore, in this paper, person detection has been performed from a significantly changed perspective i.e. overhead view. A deep learning model i.e. YOLO (You Look Only Once) has been explored in the context of person detection from overhead view. The model is trained on frontal view data set and tested on overhead view person data set. Furthermore, overhead view person counting has been performed using information of classified bounding box. The YOLO model produces significantly good results with TPR of 95% and FPR up to 0.2%.
在视频监控系统中,人员检测是一项重要任务。近年来,不同的计算机视觉和深度学习算法被开发出来,提供了鲁棒的人检测结果。这些已开发的技术大多集中在正面和非对称视图上。因此,在本文中,人的检测已经从一个显著改变的角度进行,即俯视图。一种深度学习模型,即YOLO (You Look Only Once),已经在俯视视角的人检测环境中进行了探索。该模型在正面视图数据集上进行训练,在俯视图人数据集上进行测试。在此基础上,利用分类边界框信息进行了俯视图人员计数。YOLO模型的TPR可达95%,FPR可达0.2%,效果显著。
{"title":"Overhead View Person Detection Using YOLO","authors":"Misbah Ahmad, Imran Ahmed, A. Adnan","doi":"10.1109/UEMCON47517.2019.8992980","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992980","url":null,"abstract":"In video surveillance system, one of the important task is to detect person. In recent years, different computer vision and deep learning algorithms have been developed, which provides robust person detection results. Majority of these developed techniques focused on frontal and asymmetric views. Therefore, in this paper, person detection has been performed from a significantly changed perspective i.e. overhead view. A deep learning model i.e. YOLO (You Look Only Once) has been explored in the context of person detection from overhead view. The model is trained on frontal view data set and tested on overhead view person data set. Furthermore, overhead view person counting has been performed using information of classified bounding box. The YOLO model produces significantly good results with TPR of 95% and FPR up to 0.2%.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Multi-sensor Wearable for Child Safety 儿童安全多传感器可穿戴设备
Ushashi Chowdhury, Pranjal Chowdhury, Sourav Paul, Anwesha Sen, Partho Protim Sarkar, S. Basak, Abari Bhattacharya
Now-a-days we can see that human life is becoming very fast. Moreover, the city life is getting very busy day- by-day. So in the daily busy schedule it is becoming very difficult for the parents to monitor their children closely. This paper discusses about a smart wearable device like a wristband which tracks the child from time to time to ensure their safety. If any problem occurs it would alert parents through the cell phone so that they can take immediate action. This paper focus on the SMS text enabled communication. Parents can send SMS with some keywords and the device reply back. The device can detect the child's approximate location, it can detect the body temperature and the surrounding temperature, humidity and also the heartbeat of a child. For the emergency situation, the device would have some measures like an alarm buzzer, SOS light which will notify the bystanders to help the child. So this paper is all about the safety and security of a child to help them to recover from any type of difficulty.
如今,我们可以看到人类的生活变得非常快。此外,城市生活日益繁忙。因此,在每天繁忙的日程安排中,父母很难密切监控他们的孩子。本文讨论了一种智能可穿戴设备,如腕带,可以随时跟踪孩子,以确保他们的安全。如果出现任何问题,它会通过手机提醒父母,以便他们能够立即采取行动。本文主要研究短信文本通信。家长可以发送带有一些关键词的短信,设备会回复。该设备可以检测孩子的大致位置,它可以检测孩子的体温和周围的温度、湿度,也可以检测孩子的心跳。对于紧急情况,该设备将有一些措施,如报警蜂鸣器,SOS灯,将通知旁观者帮助孩子。所以这篇论文是关于儿童的安全和保障,以帮助他们从任何类型的困难中恢复过来。
{"title":"Multi-sensor Wearable for Child Safety","authors":"Ushashi Chowdhury, Pranjal Chowdhury, Sourav Paul, Anwesha Sen, Partho Protim Sarkar, S. Basak, Abari Bhattacharya","doi":"10.1109/UEMCON47517.2019.8992950","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992950","url":null,"abstract":"Now-a-days we can see that human life is becoming very fast. Moreover, the city life is getting very busy day- by-day. So in the daily busy schedule it is becoming very difficult for the parents to monitor their children closely. This paper discusses about a smart wearable device like a wristband which tracks the child from time to time to ensure their safety. If any problem occurs it would alert parents through the cell phone so that they can take immediate action. This paper focus on the SMS text enabled communication. Parents can send SMS with some keywords and the device reply back. The device can detect the child's approximate location, it can detect the body temperature and the surrounding temperature, humidity and also the heartbeat of a child. For the emergency situation, the device would have some measures like an alarm buzzer, SOS light which will notify the bystanders to help the child. So this paper is all about the safety and security of a child to help them to recover from any type of difficulty.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114220539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1