首页 > 最新文献

2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
The Effect of Cognitive Load on Gesture Acceptability of Older Adults in Mobile Application 认知负荷对老年人移动应用中手势可接受性的影响
Afshan Ejaz, Maria Rahim, S. Khoja
The use of gesture to interact with technology is widely gaining the popularity since they are not only easy to use but also easy to learn and remember. Moreover, gestures are very natural since they are used by human in their day to day life to communicate and interact with each other. Hence those gesture does not put greater cognitive load on human mind. The cognitive capabilities of older adult are less than of younger adults as older adults have low learnability and memorability. To carter this problem we have analyzed the impact of gesture usage on the cognitive load of older adults and how this cognitive affect the acceptability of those gestures. In addition to this, we have compared different types of gestures to understand which gestures are more accepted by the older adult. The types of gestures included were single finger gesture, multiple finger gesture, bimanual gesture, metaphoric gesture, complex gesture and simple gestures. To compare the usability, affordance, acceptability and cognitive load of these gesture we have developed seven hypotheses. After operationalizing the variable of these hypothesis, the experiment was conducted on the older adults. The results of experiment showed that gestures which are mapped to a metaphor had low cognitive load as compare to gesture that are not mapped. Moreover, the results also showed that performance of single figure gesture was better than multiple finger gesture. However, one handed gesture does not have better performance than bimanual gesture. Finally results showed that gestures with higher cognitive load have low acceptability rate among the older adults.
使用手势与技术进行交互正广泛受到欢迎,因为它们不仅易于使用,而且易于学习和记忆。此外,手势是非常自然的,因为它们是人类在日常生活中用来相互交流和互动的。因此,这些手势不会给人类大脑带来更大的认知负荷。老年人的认知能力低于年轻人,因为老年人的可学习性和记忆性较低。为了解决这个问题,我们分析了手势使用对老年人认知负荷的影响,以及这种认知负荷如何影响这些手势的可接受性。除此之外,我们还比较了不同类型的手势,以了解老年人更容易接受哪种手势。手势类型包括单指手势、多指手势、双手手势、隐喻手势、复杂手势和简单手势。为了比较这些手势的可用性、可视性、可接受性和认知负荷,我们提出了七个假设。在对这些假设变量进行操作化后,对老年人进行了实验。实验结果表明,与未映射隐喻的手势相比,映射隐喻的手势具有较低的认知负荷。此外,研究结果还表明,单指手势的表现优于多指手势。然而,单手手势并不比双手手势表现得更好。结果表明,具有较高认知负荷的手势在老年人中可接受率较低。
{"title":"The Effect of Cognitive Load on Gesture Acceptability of Older Adults in Mobile Application","authors":"Afshan Ejaz, Maria Rahim, S. Khoja","doi":"10.1109/UEMCON47517.2019.8992970","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992970","url":null,"abstract":"The use of gesture to interact with technology is widely gaining the popularity since they are not only easy to use but also easy to learn and remember. Moreover, gestures are very natural since they are used by human in their day to day life to communicate and interact with each other. Hence those gesture does not put greater cognitive load on human mind. The cognitive capabilities of older adult are less than of younger adults as older adults have low learnability and memorability. To carter this problem we have analyzed the impact of gesture usage on the cognitive load of older adults and how this cognitive affect the acceptability of those gestures. In addition to this, we have compared different types of gestures to understand which gestures are more accepted by the older adult. The types of gestures included were single finger gesture, multiple finger gesture, bimanual gesture, metaphoric gesture, complex gesture and simple gestures. To compare the usability, affordance, acceptability and cognitive load of these gesture we have developed seven hypotheses. After operationalizing the variable of these hypothesis, the experiment was conducted on the older adults. The results of experiment showed that gestures which are mapped to a metaphor had low cognitive load as compare to gesture that are not mapped. Moreover, the results also showed that performance of single figure gesture was better than multiple finger gesture. However, one handed gesture does not have better performance than bimanual gesture. Finally results showed that gestures with higher cognitive load have low acceptability rate among the older adults.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"33 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123254654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform 一种基于小波变换的网络异常流量分类方法
Soo-Yeon Ji, C. Kamhoua, Nandi O. Leslie, D. Jeong
Understanding network activities has become the most significant task in network security due to the rapid growth of the Internet and mobile devices usages. To protect our computing infrastructures and personal data from network intruders or attacks, identifying abnormal activities is critical. Extracting features from network traffic data is considered as an essential task to be performed because it affects the overall performances to identify the activities accurately. Although researchers proposed several approaches, they mainly focused on identifying the best possible technique to detect abnormal network activities. Only a few studies considered utilizing feature extraction techniques. In this paper, we introduced a new approach, with which an integrative information feature set is determined to identify abnormal network activities using wavelet transformation. Instead of extracting features by attributes, the approach uses all attributes information to extract features and to design a reliable learning model to detect abnormal activities by reducing false positives. Two machine learning techniques, Logistic Regression (LR) and Naive Bayes, are utilized to show the effectiveness of the approach. A visualization method is also used to emphasize our approach. As a result, we found that our proposed approach produces a better performance result with less computational time in detecting abnormal network activities.
由于互联网和移动设备使用的快速增长,了解网络活动已成为网络安全中最重要的任务。为了保护我们的计算基础设施和个人数据免受网络入侵者或攻击,识别异常活动至关重要。从网络流量数据中提取特征被认为是一项必不可少的任务,因为它会影响到准确识别活动的整体性能。尽管研究人员提出了几种方法,但他们主要集中在确定检测异常网络活动的最佳技术上。只有少数研究考虑使用特征提取技术。本文提出了一种利用小波变换确定综合信息特征集来识别网络异常活动的新方法。该方法不是通过属性提取特征,而是利用所有属性信息提取特征,并设计可靠的学习模型,通过减少误报来检测异常活动。两种机器学习技术,逻辑回归(LR)和朴素贝叶斯,被用来显示该方法的有效性。可视化的方法也被用来强调我们的方法。结果,我们发现我们的方法在检测异常网络活动时以更少的计算时间产生了更好的性能结果。
{"title":"An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform","authors":"Soo-Yeon Ji, C. Kamhoua, Nandi O. Leslie, D. Jeong","doi":"10.1109/UEMCON47517.2019.8993044","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993044","url":null,"abstract":"Understanding network activities has become the most significant task in network security due to the rapid growth of the Internet and mobile devices usages. To protect our computing infrastructures and personal data from network intruders or attacks, identifying abnormal activities is critical. Extracting features from network traffic data is considered as an essential task to be performed because it affects the overall performances to identify the activities accurately. Although researchers proposed several approaches, they mainly focused on identifying the best possible technique to detect abnormal network activities. Only a few studies considered utilizing feature extraction techniques. In this paper, we introduced a new approach, with which an integrative information feature set is determined to identify abnormal network activities using wavelet transformation. Instead of extracting features by attributes, the approach uses all attributes information to extract features and to design a reliable learning model to detect abnormal activities by reducing false positives. Two machine learning techniques, Logistic Regression (LR) and Naive Bayes, are utilized to show the effectiveness of the approach. A visualization method is also used to emphasize our approach. As a result, we found that our proposed approach produces a better performance result with less computational time in detecting abnormal network activities.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Office Multi-Occupancy Detection using BLE Beacons and Power Meters 使用BLE信标和功率表的办公室多占用检测
A. R. Pratama, A. Lazovik, Marco Aiello
Indoor occupancy provides information about human occupation in the closed space, most notably, office and residential buildings. This information is useful in dwindling unnecessary energy usage, such as consumption in unoccupied spaces or energy-wasting due to unnecessarily active appliances. We present an empirical experiment on office occupancy detection using simple office sensors. We choose generic power meters and mobile phones. First, we classify beacon signals received by mobile phones into a room location. A workspace map is assumed to be available to facilitate the mapping between room locations and the occupancy state of users' workspace. Second, we infer the individual occupancy state utilizing the aggregated electricity consumption of occupant-related devices (i.e., monitors) in shared offices. The later solution helps to keep costs and intrusiveness level low compared to deploying a power meter for each device or user. We experiment in an work environment with two shared offices, a personal office, and a social corner involving five volunteers. Given the acquired data, three techniques based on machine learning, optimization, and probabilistic approach are implemented and compared to evaluate their performance. The results indicate that localization and occupancy based on beaconing works best for three of the five volunteers, reaching 95% F-measure. Further findings shows that occupancy inference based on the aggregated power consumption performs well for the four volunteers when using Decision Tree classification, reaching more than 90% F-measure. Our effort on the fusion of two modalities gives a positive result for all five volunteers, ranging from 92% to 99% F-measure.
室内占用提供了人类在封闭空间的占用信息,最明显的是办公和住宅建筑。这些信息有助于减少不必要的能源使用,例如在未占用空间的消耗或由于不必要的活跃设备而造成的能源浪费。我们提出了一个使用简单的办公室传感器的办公室占用检测的实证实验。我们选择通用的电表和手机。首先,我们将手机接收到的信标信号分类为房间位置。假设工作空间映射可用,以方便在房间位置和用户工作空间的占用状态之间进行映射。其次,我们利用共享办公室中与乘员相关的设备(即监视器)的总用电量推断出个人的占用状态。与为每个设备或用户部署一个功率计相比,后一种解决方案有助于降低成本和降低入侵程度。我们在一个工作环境中进行了实验,包括两间共享办公室、一间个人办公室和一个由五名志愿者组成的社交角落。根据获取的数据,实现了基于机器学习、优化和概率方法的三种技术,并对其性能进行了比较。结果表明,基于信标的定位和占用对5名志愿者中的3名效果最好,达到95% F-measure。进一步的研究表明,当使用决策树分类时,基于总功耗的占用推断对四名志愿者表现良好,达到90%以上的F-measure。我们在两种模式融合上的努力为所有五名志愿者提供了积极的结果,f值从92%到99%不等。
{"title":"Office Multi-Occupancy Detection using BLE Beacons and Power Meters","authors":"A. R. Pratama, A. Lazovik, Marco Aiello","doi":"10.1109/UEMCON47517.2019.8993008","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993008","url":null,"abstract":"Indoor occupancy provides information about human occupation in the closed space, most notably, office and residential buildings. This information is useful in dwindling unnecessary energy usage, such as consumption in unoccupied spaces or energy-wasting due to unnecessarily active appliances. We present an empirical experiment on office occupancy detection using simple office sensors. We choose generic power meters and mobile phones. First, we classify beacon signals received by mobile phones into a room location. A workspace map is assumed to be available to facilitate the mapping between room locations and the occupancy state of users' workspace. Second, we infer the individual occupancy state utilizing the aggregated electricity consumption of occupant-related devices (i.e., monitors) in shared offices. The later solution helps to keep costs and intrusiveness level low compared to deploying a power meter for each device or user. We experiment in an work environment with two shared offices, a personal office, and a social corner involving five volunteers. Given the acquired data, three techniques based on machine learning, optimization, and probabilistic approach are implemented and compared to evaluate their performance. The results indicate that localization and occupancy based on beaconing works best for three of the five volunteers, reaching 95% F-measure. Further findings shows that occupancy inference based on the aggregated power consumption performs well for the four volunteers when using Decision Tree classification, reaching more than 90% F-measure. Our effort on the fusion of two modalities gives a positive result for all five volunteers, ranging from 92% to 99% F-measure.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114288656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tracking and Classification of Multiple Human Objects Directly in Compressive Measurement Domain for Low Quality Optical Videos 基于压缩测量域的低质量光学视频多目标直接跟踪与分类
C. Kwan, David Gribben, T. Tran
Data collected in compressive measurement domain can save data storage and transmission costs. In this paper, we summarize new results in human target tracking and classification using compressive measurements directly. Two deep learning algorithms known as You Only Look Once (YOLO) and residual network (ResNet) have been applied. YOLO was used for object detection and tracking and ResNet was used for human classification. Extensive experiments using low quality and long range optical videos in the SENSIAC database showed that the proposed approach is promising.
压缩测量域采集的数据可以节省数据的存储和传输成本。本文总结了直接利用压缩测量进行人体目标跟踪和分类的新成果。应用了You Only Look Once (YOLO)和residual network (ResNet)两种深度学习算法。使用YOLO进行目标检测和跟踪,使用ResNet进行人体分类。利用senac数据库中的低质量和远程光学视频进行的大量实验表明,该方法是有前途的。
{"title":"Tracking and Classification of Multiple Human Objects Directly in Compressive Measurement Domain for Low Quality Optical Videos","authors":"C. Kwan, David Gribben, T. Tran","doi":"10.1109/UEMCON47517.2019.8993029","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993029","url":null,"abstract":"Data collected in compressive measurement domain can save data storage and transmission costs. In this paper, we summarize new results in human target tracking and classification using compressive measurements directly. Two deep learning algorithms known as You Only Look Once (YOLO) and residual network (ResNet) have been applied. YOLO was used for object detection and tracking and ResNet was used for human classification. Extensive experiments using low quality and long range optical videos in the SENSIAC database showed that the proposed approach is promising.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Identification of Critical-Attacks Set in an Attack-Graph 攻击图中关键攻击集的识别
A. Ghazo, Ratnesh Kumar
SCADA/ICS (Supervisory Control and Data Acqui-sition/Industrial Control Systems) networks are becoming targets of advanced multi-faceted attacks, and use of attack-graphs has been proposed to model complex attacks scenarios that exploit interdependence among existing atomic vulnerabilities to stitch together the attack-paths that might compromise a system-level security property. While such analysis of attack scenarios enables security administrators to establish appropriate security measurements to secure the system, practical considerations on time and cost limit their ability to address all system vulnerabilities at once. In this paper, we propose an approach that identifies label-cuts to automatically identify a set of critical-attacks that, when blocked, guarantee system security. We utilize the Strongly-Connected-Components (SCCs) of the given attack graph to generate an abstracted version of the attack-graph, a tree over the SCCs, and next use an iterative backward search over this tree to identify set of backward reachable SCCs, along with their outgoing edges and their labels, to identify a cut with a minimum number of labels that forms a critical-attacks set. We also report the implementation and validation of the proposed algorithm to a real-world case study, a SCADA network for a water treatment cyber-physical system.
SCADA/ICS(监控和数据采集/工业控制系统)网络正在成为高级多方面攻击的目标,并且已经提出使用攻击图来模拟复杂的攻击场景,这些攻击场景利用现有原子漏洞之间的相互依赖性,将可能危及系统级安全属性的攻击路径拼接在一起。虽然对攻击场景的这种分析使安全管理员能够建立适当的安全度量来保护系统,但对时间和成本的实际考虑限制了他们一次解决所有系统漏洞的能力。在本文中,我们提出了一种识别标签切割的方法来自动识别一组关键攻击,当被阻止时,保证系统的安全性。我们利用给定攻击图的强连接组件(scc)来生成攻击图的抽象版本,即scc上的树,然后在该树上使用迭代向后搜索来识别一组向后可达的scc,以及它们的外向边缘和标签,以识别具有最小数量标签的切割,形成关键攻击集。我们还报告了一个现实世界的案例研究,一个用于水处理网络物理系统的SCADA网络,该算法的实施和验证。
{"title":"Identification of Critical-Attacks Set in an Attack-Graph","authors":"A. Ghazo, Ratnesh Kumar","doi":"10.1109/UEMCON47517.2019.8993076","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993076","url":null,"abstract":"SCADA/ICS (Supervisory Control and Data Acqui-sition/Industrial Control Systems) networks are becoming targets of advanced multi-faceted attacks, and use of attack-graphs has been proposed to model complex attacks scenarios that exploit interdependence among existing atomic vulnerabilities to stitch together the attack-paths that might compromise a system-level security property. While such analysis of attack scenarios enables security administrators to establish appropriate security measurements to secure the system, practical considerations on time and cost limit their ability to address all system vulnerabilities at once. In this paper, we propose an approach that identifies label-cuts to automatically identify a set of critical-attacks that, when blocked, guarantee system security. We utilize the Strongly-Connected-Components (SCCs) of the given attack graph to generate an abstracted version of the attack-graph, a tree over the SCCs, and next use an iterative backward search over this tree to identify set of backward reachable SCCs, along with their outgoing edges and their labels, to identify a cut with a minimum number of labels that forms a critical-attacks set. We also report the implementation and validation of the proposed algorithm to a real-world case study, a SCADA network for a water treatment cyber-physical system.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117317883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SecML: A Proposed Modeling Language for CyberSecurity SecML:一种网络安全建模语言
Chuck Easttom
Cybersecurity is a comparatively new discipline, related to computer science, electrical engineering, and similar subjects. As a newer discipline it lacks some of the tools found in more established subject areas. As one example, many engineering disciplines have modeling languages specific for that engineering discipline. As two examples, software engineering utilizes Unified Modeling Language (UML) and systems engineering uses System Modeling Language (SysML). Cybersecurity engineering lacks such a generalized modeling language. Cybersecurity as a profession would be enhanced with a security specific modeling language. This paper describes such a modeling language. The model is described in sufficient detail to be actionable and applicable. However, suggestions for future work are also provided.
网络安全是一门相对较新的学科,与计算机科学、电子工程和类似学科有关。作为一门较新的学科,它缺乏在更成熟的学科领域中发现的一些工具。例如,许多工程规程都有针对该工程规程的建模语言。作为两个例子,软件工程使用统一建模语言(UML),系统工程使用系统建模语言(SysML)。网络安全工程缺乏这样一种通用的建模语言。网络安全作为一种职业,将通过一种特定于安全的建模语言得到加强。本文描述了这样一种建模语言。对模型进行了足够详细的描述,使其具有可操作性和适用性。同时,对今后的工作提出了建议。
{"title":"SecML: A Proposed Modeling Language for CyberSecurity","authors":"Chuck Easttom","doi":"10.1109/UEMCON47517.2019.8993105","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993105","url":null,"abstract":"Cybersecurity is a comparatively new discipline, related to computer science, electrical engineering, and similar subjects. As a newer discipline it lacks some of the tools found in more established subject areas. As one example, many engineering disciplines have modeling languages specific for that engineering discipline. As two examples, software engineering utilizes Unified Modeling Language (UML) and systems engineering uses System Modeling Language (SysML). Cybersecurity engineering lacks such a generalized modeling language. Cybersecurity as a profession would be enhanced with a security specific modeling language. This paper describes such a modeling language. The model is described in sufficient detail to be actionable and applicable. However, suggestions for future work are also provided.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115073082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing a Connected Home 保护互联家庭
Andrew Camphouse, L. Ngalamou
The modern home is becoming more and more reliant on connected devices. Nearly every device from the refrigerator to the thermostat is capable of connecting to the internet and communicating with other devices. Information security is discussed as it relates to smart home and Internet of Things devices. Several examples of exploits discovered in popular smart home hardware are discussed. A network security and monitoring appliance for the home is proposed as a possible solution.
现代家庭越来越依赖于联网设备。从冰箱到恒温器,几乎所有设备都能够连接到互联网,并与其他设备进行通信。讨论信息安全,因为它涉及到智能家居和物联网设备。讨论了在流行的智能家居硬件中发现的几个漏洞的例子。提出了一种家庭网络安全和监控设备作为一种可能的解决方案。
{"title":"Securing a Connected Home","authors":"Andrew Camphouse, L. Ngalamou","doi":"10.1109/UEMCON47517.2019.8992944","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8992944","url":null,"abstract":"The modern home is becoming more and more reliant on connected devices. Nearly every device from the refrigerator to the thermostat is capable of connecting to the internet and communicating with other devices. Information security is discussed as it relates to smart home and Internet of Things devices. Several examples of exploits discovered in popular smart home hardware are discussed. A network security and monitoring appliance for the home is proposed as a possible solution.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Thin MobileNet: An Enhanced MobileNet Architecture 瘦MobileNet:一种增强的MobileNet架构
Debjyoti Sinha, M. El-Sharkawy
In the field of computer, mobile and embedded vision Convolutional Neural Networks (CNNs) are deep learning models which play a significant role in object detection and recognition. MobileNet is one such efficient, light-weighted model for this purpose, but there are many constraints or challenges for the hardware deployment of such architectures into resource-constrained micro-controller units due to limited memory, energy and power. Also, the overall accuracy of the model generally decreases when the size and the total number of parameters are reduced by any method such as pruning or deep compression. The paper proposes three hybrid MobileNet architectures which has improved accuracy along-with reduced size, lesser number of layers, lower average computation time and very less overfitting as compared to the baseline MobileNet v1. The reason behind developing these models is to have a variant of the existing MobileNet model which will be easily deployable in memory constrained MCUs. We name the model having the smallest size (9.9 MB) as Thin MobileNet. We achieve an increase in accuracy by replacing the standard non-linear activation function ReLU with Drop Activation and introducing Random erasing regularization technique in place of drop out. The model size is reduced by using Separable Convolutions instead of the Depthwise separable convolutions used in the baseline MobileNet. Later on, we make our model shallow by eliminating a few unnecessary layers without a drop in the accuracy. The experimental results are based on training the model on CIFAR-10 dataset.
在计算机领域,移动和嵌入式视觉卷积神经网络(cnn)是深度学习模型,在目标检测和识别中发挥着重要作用。MobileNet就是这样一个高效、轻量级的模型,但由于有限的内存、能量和功率,将这种架构的硬件部署到资源受限的微控制器单元中存在许多限制或挑战。此外,当采用任何方法(如剪枝或深度压缩)减少参数的大小和总数时,模型的整体精度通常会降低。本文提出了三种混合MobileNet架构,与基准MobileNet v1相比,它们具有更小的尺寸,更少的层数,更低的平均计算时间和更少的过拟合,从而提高了精度。开发这些模型背后的原因是有一个现有的MobileNet模型的变体,它将很容易部署在内存受限的mcu中。我们将最小的模型(9.9 MB)命名为Thin MobileNet。我们通过用Drop activation取代标准的非线性激活函数ReLU,并引入Random erase正则化技术来代替Drop out,从而提高了精度。通过使用可分离卷积而不是基线MobileNet中使用的深度可分离卷积来减小模型大小。后来,我们通过消除一些不必要的层使我们的模型变浅,而不降低精度。实验结果是基于在CIFAR-10数据集上训练模型得出的。
{"title":"Thin MobileNet: An Enhanced MobileNet Architecture","authors":"Debjyoti Sinha, M. El-Sharkawy","doi":"10.1109/UEMCON47517.2019.8993089","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993089","url":null,"abstract":"In the field of computer, mobile and embedded vision Convolutional Neural Networks (CNNs) are deep learning models which play a significant role in object detection and recognition. MobileNet is one such efficient, light-weighted model for this purpose, but there are many constraints or challenges for the hardware deployment of such architectures into resource-constrained micro-controller units due to limited memory, energy and power. Also, the overall accuracy of the model generally decreases when the size and the total number of parameters are reduced by any method such as pruning or deep compression. The paper proposes three hybrid MobileNet architectures which has improved accuracy along-with reduced size, lesser number of layers, lower average computation time and very less overfitting as compared to the baseline MobileNet v1. The reason behind developing these models is to have a variant of the existing MobileNet model which will be easily deployable in memory constrained MCUs. We name the model having the smallest size (9.9 MB) as Thin MobileNet. We achieve an increase in accuracy by replacing the standard non-linear activation function ReLU with Drop Activation and introducing Random erasing regularization technique in place of drop out. The model size is reduced by using Separable Convolutions instead of the Depthwise separable convolutions used in the baseline MobileNet. Later on, we make our model shallow by eliminating a few unnecessary layers without a drop in the accuracy. The experimental results are based on training the model on CIFAR-10 dataset.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
An Approach to Optimize Device Power Performance Towards Energy Efficient Next Generation 5G Networks 面向节能下一代5G网络优化设备功耗性能的方法
Anurag Thantharate, C. Beard, S. Marupaduga
In Fifth Generation (5G), wireless cellular networks, smartphone battery efficiency, and optimal utilization of power have become a matter of utmost importance. Battery and power are an area of significant challenges considering smartphones these days are equipped with advanced technological network features and systems. These features require much simultaneous power to make decisions and to transfer information between devices and network to provide best the user experience. Furthermore, to meet the demands of increased data capacity, data rate, and to provide the best quality of service, there is a need to adopt energy-efficient architectures. This paper presents system-level architectural changes on both User Equipment (UE) and Network elements along with a proposal to modify control signaling as part of Radio Resource Control messages using smartphone battery level. Additionally, we presented real-world 5G mmWave field results, showing impacts on device battery life in varying RF conditions and proposed methods to allocate optimal network resources and improve the energy efficiency by modifying radio layer parameters between devices and base stations. Without these proposed architecture level and system-level algorithm changes, realizing optimal and consistent 5G speeds will be near impossible.
在第五代(5G)时代,无线蜂窝网络、智能手机电池效率和最佳电力利用已成为最重要的问题。考虑到智能手机配备了先进的技术网络功能和系统,电池和电力是一个重大挑战。为了提供最佳的用户体验,在设备和网络之间进行决策和信息传输时,这些功能需要大量的同步能力。此外,为了满足不断增长的数据容量和数据速率的需求,并提供最佳的服务质量,需要采用节能的架构。本文介绍了用户设备(UE)和网络元素的系统级架构变化,以及使用智能手机电池级别修改控制信令作为无线电资源控制消息的一部分的建议。此外,我们展示了真实世界的5G毫米波场结果,显示了不同射频条件下对设备电池寿命的影响,并提出了通过修改设备和基站之间的无线电层参数来分配最佳网络资源和提高能量效率的方法。如果没有这些拟议的架构级和系统级算法更改,实现最佳和一致的5G速度几乎是不可能的。
{"title":"An Approach to Optimize Device Power Performance Towards Energy Efficient Next Generation 5G Networks","authors":"Anurag Thantharate, C. Beard, S. Marupaduga","doi":"10.1109/UEMCON47517.2019.8993067","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993067","url":null,"abstract":"In Fifth Generation (5G), wireless cellular networks, smartphone battery efficiency, and optimal utilization of power have become a matter of utmost importance. Battery and power are an area of significant challenges considering smartphones these days are equipped with advanced technological network features and systems. These features require much simultaneous power to make decisions and to transfer information between devices and network to provide best the user experience. Furthermore, to meet the demands of increased data capacity, data rate, and to provide the best quality of service, there is a need to adopt energy-efficient architectures. This paper presents system-level architectural changes on both User Equipment (UE) and Network elements along with a proposal to modify control signaling as part of Radio Resource Control messages using smartphone battery level. Additionally, we presented real-world 5G mmWave field results, showing impacts on device battery life in varying RF conditions and proposed methods to allocate optimal network resources and improve the energy efficiency by modifying radio layer parameters between devices and base stations. Without these proposed architecture level and system-level algorithm changes, realizing optimal and consistent 5G speeds will be near impossible.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128717999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution 基于联盟区块链的网络攻击签名和特征分发架构
O. Ajayi, O. Igbe, T. Saadawi
One of the effective ways of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Though IDS identify malicious activities in a network, it might be difficult to detect distributed or coordinated attacks because they only have single vantage point. To combat this problem, cooperative intrusion detection system was proposed. In this detection system, nodes exchange attack features or signatures with a view of detecting an attack that has previously been detected by one of the other nodes in the system. Exchanging of attack features is necessary because a zero-day attacks (attacks without known signature) experienced in different locations are not the same. Although this solution enhanced the ability of a single IDS to respond to attacks that have been previously identified by cooperating nodes, malicious activities such as fake data injection, data manipulation or deletion and data consistency are problems threatening this approach. In this paper, we propose a solution that leverages blockchain's distributive technology, tamper-proof ability and data immutability to detect and prevent malicious activities and solve data consistency problems facing cooperative intrusion detection. Focusing on extraction, storage and distribution stages of cooperative intrusion detection, we develop a blockchain-based solution that securely extracts features or signatures, adds extra verification step, makes storage of these signatures and features distributive and data sharing secured. Performance evaluation of the system with respect to its response time and resistance to the features/signatures injection is presented. The result shows that the proposed solution prevents stored attack features or signature against malicious data injection, manipulation or deletion and has low latency.
入侵检测系统(IDS)是检测计算机网络中恶意流量的有效方法之一。虽然IDS可以识别网络中的恶意活动,但可能很难检测到分布式或协同攻击,因为它们只有一个有利位置。针对这一问题,提出了协同入侵检测系统。在此检测系统中,节点交换攻击特征或签名,以检测系统中其他节点先前检测到的攻击。交换攻击特征是必要的,因为在不同位置经历的零日攻击(没有已知签名的攻击)是不一样的。尽管该解决方案增强了单个IDS响应以前由协作节点识别的攻击的能力,但恶意活动(如虚假数据注入、数据操作或删除以及数据一致性)是威胁该方法的问题。在本文中,我们提出了一种利用区块链的分布式技术、防篡改能力和数据不变性来检测和防止恶意活动,解决协同入侵检测面临的数据一致性问题的解决方案。专注于协同入侵检测的提取、存储和分发阶段,我们开发了一种基于区块链的解决方案,可以安全地提取特征或签名,增加额外的验证步骤,使这些签名和特征的存储分布式和数据共享安全。从响应时间和抵抗特征/签名注入两方面对系统进行了性能评估。结果表明,该解决方案可以防止存储攻击特征或签名,防止恶意数据注入、操纵或删除,并且具有低延迟。
{"title":"Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution","authors":"O. Ajayi, O. Igbe, T. Saadawi","doi":"10.1109/UEMCON47517.2019.8993036","DOIUrl":"https://doi.org/10.1109/UEMCON47517.2019.8993036","url":null,"abstract":"One of the effective ways of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Though IDS identify malicious activities in a network, it might be difficult to detect distributed or coordinated attacks because they only have single vantage point. To combat this problem, cooperative intrusion detection system was proposed. In this detection system, nodes exchange attack features or signatures with a view of detecting an attack that has previously been detected by one of the other nodes in the system. Exchanging of attack features is necessary because a zero-day attacks (attacks without known signature) experienced in different locations are not the same. Although this solution enhanced the ability of a single IDS to respond to attacks that have been previously identified by cooperating nodes, malicious activities such as fake data injection, data manipulation or deletion and data consistency are problems threatening this approach. In this paper, we propose a solution that leverages blockchain's distributive technology, tamper-proof ability and data immutability to detect and prevent malicious activities and solve data consistency problems facing cooperative intrusion detection. Focusing on extraction, storage and distribution stages of cooperative intrusion detection, we develop a blockchain-based solution that securely extracts features or signatures, adds extra verification step, makes storage of these signatures and features distributive and data sharing secured. Performance evaluation of the system with respect to its response time and resistance to the features/signatures injection is presented. The result shows that the proposed solution prevents stored attack features or signature against malicious data injection, manipulation or deletion and has low latency.","PeriodicalId":187022,"journal":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127914531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1