首页 > 最新文献

2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)最新文献

英文 中文
Message from Program Chairs 节目主持人的信息
{"title":"Message from Program Chairs","authors":"","doi":"10.1109/sera57763.2023.10197804","DOIUrl":"https://doi.org/10.1109/sera57763.2023.10197804","url":null,"abstract":"","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Statistical Method for API Usage Learning and API Misuse Violation Finding 一种API使用学习和API滥用违规发现的统计方法
Deepak Panda, Piyush Basia, Kushal Nallavolu, Xin Zhong, Harvey P. Siy, Myoungkyu Song
A large corpus of software repositories enables an opportunity for using machine learning (ML) approaches to create new software engineering tools. In this paper, we propose a novel technique which leverages ML approaches for automating software engineering tasks and thus improves software quality. Our concrete goal is to (1) explore the abundance of predictable repetitive regularities of such a massive codebase, (2) develop an ML approach for training a statistical model to identify common patterns in software corpora, and then (3) use these patterns to statistically detect anomalous, likely buggy, program behavior that significantly deviates from these typical patterns. These internal regularities and repetitive properties of software can be captured as patterns to detect violations of these common patterns. Such violations have a critical impact on program behavior such as bugs, security vulnerabilities, or even program crashes. Our approach focuses on usage patterns of application programming interfaces (APIs). API usage patterns are commonly recurring, representative examples of how real-world applications use APIs in software corpora. These desirable patterns of API usage are learnable to validate or improve developers' implementations. This paper shows preliminary results that we use standard cross-entropy and perplexity to measure how surprising a test subject application is to a statistical model estimated from a software corpus. We continue to develop our approach and evaluate the effectiveness to focus on the following research questions. Are our ML models effectively trainable on large code corpora to learn desirable API usage patterns? How does the performance of our ML-based approach compare to state-of-the-art language models for software when learning API usage for detecting API misuse violations?
大量的软件存储库为使用机器学习(ML)方法创建新的软件工程工具提供了机会。在本文中,我们提出了一种利用机器学习方法自动化软件工程任务的新技术,从而提高了软件质量。我们的具体目标是:(1)探索如此庞大的代码库中大量可预测的重复规律,(2)开发一种ML方法来训练统计模型以识别软件语料库中的常见模式,然后(3)使用这些模式来统计检测异常,可能有bug的程序行为,这些行为明显偏离这些典型模式。软件的这些内部规律和重复属性可以作为模式捕获,以检测对这些公共模式的违反。这种违反对程序行为有严重的影响,比如bug、安全漏洞,甚至程序崩溃。我们的方法侧重于应用程序编程接口(api)的使用模式。API使用模式通常是真实应用程序如何在软件语料库中使用API的代表性示例。这些理想的API使用模式可以通过学习来验证或改进开发人员的实现。本文显示了我们使用标准交叉熵和困惑度来衡量测试对象应用对从软件语料库估计的统计模型的惊讶程度的初步结果。我们将继续发展我们的方法并评估其有效性,以关注以下研究问题。我们的机器学习模型是否可以在大型代码语料库上有效地训练,以学习理想的API使用模式?在学习API使用情况以检测API滥用违规时,我们基于ml的方法与最先进的软件语言模型的性能如何?
{"title":"A Statistical Method for API Usage Learning and API Misuse Violation Finding","authors":"Deepak Panda, Piyush Basia, Kushal Nallavolu, Xin Zhong, Harvey P. Siy, Myoungkyu Song","doi":"10.1109/SERA57763.2023.10197708","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197708","url":null,"abstract":"A large corpus of software repositories enables an opportunity for using machine learning (ML) approaches to create new software engineering tools. In this paper, we propose a novel technique which leverages ML approaches for automating software engineering tasks and thus improves software quality. Our concrete goal is to (1) explore the abundance of predictable repetitive regularities of such a massive codebase, (2) develop an ML approach for training a statistical model to identify common patterns in software corpora, and then (3) use these patterns to statistically detect anomalous, likely buggy, program behavior that significantly deviates from these typical patterns. These internal regularities and repetitive properties of software can be captured as patterns to detect violations of these common patterns. Such violations have a critical impact on program behavior such as bugs, security vulnerabilities, or even program crashes. Our approach focuses on usage patterns of application programming interfaces (APIs). API usage patterns are commonly recurring, representative examples of how real-world applications use APIs in software corpora. These desirable patterns of API usage are learnable to validate or improve developers' implementations. This paper shows preliminary results that we use standard cross-entropy and perplexity to measure how surprising a test subject application is to a statistical model estimated from a software corpus. We continue to develop our approach and evaluate the effectiveness to focus on the following research questions. Are our ML models effectively trainable on large code corpora to learn desirable API usage patterns? How does the performance of our ML-based approach compare to state-of-the-art language models for software when learning API usage for detecting API misuse violations?","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of a Novel Object-Detection-Based Cheat Tool for First-Person Shooter Games Using Machine Learning 基于机器学习的第一人称射击游戏中基于物体检测的作弊工具的检测
Zhang Xiao, T. Goto, Partha Ghosh, Tadaaki Kirishima, K. Tsuchida
Detection of novel game cheating tools is critical for ensuring fair online play. Such cheating tools are visual-based and effectively avoid detection because they do not change the data of game software. With the development and popularity of artificial intelligence technology, it has become easier for individuals to develop cheating tools, such as a new cheating tool for first-person shooter games that searches for characters on the game screen and automatically targets them. Therefore, in this study, a new cheat detection method is proposed using machine learning. The proposed method can be used to detect new cheating tools based on object detection.
检测新的游戏作弊工具对于确保公平的在线游戏至关重要。这种作弊工具是基于视觉的,并且由于不改变游戏软件的数据,有效地避免了检测。随着人工智能技术的发展和普及,个人开发作弊工具变得更加容易,比如一款针对第一人称射击游戏的新型作弊工具,它可以在游戏屏幕上搜索角色并自动锁定目标。因此,本研究提出了一种新的利用机器学习的欺骗检测方法。该方法可用于检测基于目标检测的新型作弊工具。
{"title":"Detection of a Novel Object-Detection-Based Cheat Tool for First-Person Shooter Games Using Machine Learning","authors":"Zhang Xiao, T. Goto, Partha Ghosh, Tadaaki Kirishima, K. Tsuchida","doi":"10.1109/SERA57763.2023.10197816","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197816","url":null,"abstract":"Detection of novel game cheating tools is critical for ensuring fair online play. Such cheating tools are visual-based and effectively avoid detection because they do not change the data of game software. With the development and popularity of artificial intelligence technology, it has become easier for individuals to develop cheating tools, such as a new cheating tool for first-person shooter games that searches for characters on the game screen and automatically targets them. Therefore, in this study, a new cheat detection method is proposed using machine learning. The proposed method can be used to detect new cheating tools based on object detection.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Verification Process for Smart Cities 基于区块链的智慧城市验证流程
Raad Haddad, D. E. D. I. Abou-Tair, Alá F. Khalifeh
Blockchain technology is widely used in many security-related Internet of Things (IoT) paradigms due to its dynamic and distributed architecture, which assures secure and private network access. Smart cities are one of these IoT applications in which security and privacy play a vital role. This paper proposes a blockchain-based verification process for smart nodes communication within the smart city, demonstrating the implementation details of the proposed security verification process and discussing potential security attacks.
区块链技术由于其动态和分布式的架构,确保了安全、私有的网络访问,被广泛应用于许多与安全相关的物联网(IoT)范式中。智慧城市是这些物联网应用之一,其中安全和隐私发挥着至关重要的作用。本文提出了一种基于区块链的智能城市内智能节点通信验证流程,展示了所提出的安全验证流程的实现细节,并讨论了潜在的安全攻击。
{"title":"A Blockchain-Based Verification Process for Smart Cities","authors":"Raad Haddad, D. E. D. I. Abou-Tair, Alá F. Khalifeh","doi":"10.1109/SERA57763.2023.10197780","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197780","url":null,"abstract":"Blockchain technology is widely used in many security-related Internet of Things (IoT) paradigms due to its dynamic and distributed architecture, which assures secure and private network access. Smart cities are one of these IoT applications in which security and privacy play a vital role. This paper proposes a blockchain-based verification process for smart nodes communication within the smart city, demonstrating the implementation details of the proposed security verification process and discussing potential security attacks.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124703210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection in Intrusion Detection System using Amazon SageMaker 基于Amazon SageMaker的入侵检测系统异常检测
Ian Trawinski, H. Wimmer, Jongyeop Kim
Applying artificial intelligence and machine learning to analyzing network traffic has the potential to be transformative in protecting organizations from cyber threats. Intrusion detection systems (IDS) are historically rule-based; however, they could be improved. Applying machine learning in the form of Anomaly Detection could be the next step in preventing cyber threats from causing malicious activity on the network. Two algorithms that are implemented in anomaly detection through the use of Amazon SageMaker are Random Cut Forest (RCF) and XGBoost. The data for this project are the training and testing data set provided by the UNSW-15 data set. The models are created using the Jupiter Notebook on the Amazon SageMaker Studio Lab platform. The models were tested using the metrics of accuracy, precision, recall, and F1 score. The best-performing model was the XGBoost model, with an accuracy of 61.83%. The recall for this model was 96.49%, and the f1 score was 73.24%.
将人工智能和机器学习应用于网络流量分析,在保护组织免受网络威胁方面具有变革性的潜力。入侵检测系统(IDS)历来是基于规则的;然而,它们还可以改进。以异常检测的形式应用机器学习可能是防止网络威胁在网络上引起恶意活动的下一步。通过使用Amazon SageMaker实现异常检测的两种算法是Random Cut Forest (RCF)和XGBoost。本项目数据为UNSW-15数据集提供的训练和测试数据集。这些模型是使用Amazon SageMaker Studio Lab平台上的Jupiter Notebook创建的。使用准确性、精密度、召回率和F1分数对模型进行了测试。其中,XGBoost模型表现最好,准确率为61.83%。该模型的召回率为96.49%,f1得分为73.24%。
{"title":"Anomaly Detection in Intrusion Detection System using Amazon SageMaker","authors":"Ian Trawinski, H. Wimmer, Jongyeop Kim","doi":"10.1109/SERA57763.2023.10197735","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197735","url":null,"abstract":"Applying artificial intelligence and machine learning to analyzing network traffic has the potential to be transformative in protecting organizations from cyber threats. Intrusion detection systems (IDS) are historically rule-based; however, they could be improved. Applying machine learning in the form of Anomaly Detection could be the next step in preventing cyber threats from causing malicious activity on the network. Two algorithms that are implemented in anomaly detection through the use of Amazon SageMaker are Random Cut Forest (RCF) and XGBoost. The data for this project are the training and testing data set provided by the UNSW-15 data set. The models are created using the Jupiter Notebook on the Amazon SageMaker Studio Lab platform. The models were tested using the metrics of accuracy, precision, recall, and F1 score. The best-performing model was the XGBoost model, with an accuracy of 61.83%. The recall for this model was 96.49%, and the f1 score was 73.24%.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Strategy of Digital Twin Convergence Service based on Metavers 基于Metavers的数字孪生融合服务策略
Jieun Kang, SuBi Kim, Yongik Yoon
The Advanced and radical development of IT technology and artificial intelligence technology have made it possible to develop advanced services Digital Twin, Metaverse, Metatwin-verse, etc using Artificial Intelligence(AI). The results induced from AI present the correct solution when AI performs accurate study and analysis. Specifically, real situations reflecting complex relationships between objects, results from real situations have to be adaptive to convergence situations and then it should be possible to draw conclusions and make decisions that are not limited to specific situations. So, it is essential to conduct AI based study and analysis by considering these real world characteristics to provide digital twin services based on metaverse. Recently, there are many studies on Graph Neural Network(GNN) and services applied to GNN for learning the relationship between objects detected in real situations. Accordingly, this paper proposes a metaverse-based Digital Twin Convergence Service(DTCS) including spatial elements strategy that is possible to draw accurate conclusions in a changing convergence situation. DTCS is able to conduct causal reasoning and association learning between objects considering directions and distances change characteristics between objects and this is possible to make correct solution and decision making in the process of simulation and analysis of digital twin. In that DTCS proceeds by considering distance and changing angle between objects, this overcomes the limitation of existing GNN which only considers the degree of association or assigns the same parameters to connected objects. DTCS would be possible to expand the advanced services of Metatwinverse in that it is possible to have robust learning based conclusions in real-time changing convergence situations.
IT技术和人工智能技术的先进和彻底发展,使得利用人工智能(AI)开发数字孪生(Digital Twin)、元宇宙(Metaverse)、元双宇宙(Metatwin-verse)等先进服务成为可能。当人工智能进行准确的研究和分析时,人工智能得出的结果是正确的解决方案。具体来说,真实情况反映了对象之间的复杂关系,真实情况的结果必须适应收敛情况,然后应该有可能得出结论并做出不限于特定情况的决策。因此,考虑到这些现实世界的特征,进行基于AI的研究和分析,提供基于元宇宙的数字孪生服务是非常必要的。近年来,人们对图神经网络(Graph Neural Network, GNN)进行了大量研究,并将其应用于学习真实场景中检测到的物体之间的关系。因此,本文提出了一种基于元数据的包含空间元素的数字双收敛服务策略,该策略可以在不断变化的收敛情况下得出准确的结论。DTCS能够考虑到对象之间的方向和距离变化特征,在对象之间进行因果推理和关联学习,从而可以在数字孪生仿真分析过程中做出正确的求解和决策。由于dtc考虑对象之间的距离和角度变化,克服了现有GNN只考虑关联程度或对连接对象分配相同参数的局限性。DTCS将有可能扩展Metatwinverse的高级服务,因为它可以在实时变化的收敛情况下获得基于强大学习的结论。
{"title":"The Strategy of Digital Twin Convergence Service based on Metavers","authors":"Jieun Kang, SuBi Kim, Yongik Yoon","doi":"10.1109/SERA57763.2023.10197772","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197772","url":null,"abstract":"The Advanced and radical development of IT technology and artificial intelligence technology have made it possible to develop advanced services Digital Twin, Metaverse, Metatwin-verse, etc using Artificial Intelligence(AI). The results induced from AI present the correct solution when AI performs accurate study and analysis. Specifically, real situations reflecting complex relationships between objects, results from real situations have to be adaptive to convergence situations and then it should be possible to draw conclusions and make decisions that are not limited to specific situations. So, it is essential to conduct AI based study and analysis by considering these real world characteristics to provide digital twin services based on metaverse. Recently, there are many studies on Graph Neural Network(GNN) and services applied to GNN for learning the relationship between objects detected in real situations. Accordingly, this paper proposes a metaverse-based Digital Twin Convergence Service(DTCS) including spatial elements strategy that is possible to draw accurate conclusions in a changing convergence situation. DTCS is able to conduct causal reasoning and association learning between objects considering directions and distances change characteristics between objects and this is possible to make correct solution and decision making in the process of simulation and analysis of digital twin. In that DTCS proceeds by considering distance and changing angle between objects, this overcomes the limitation of existing GNN which only considers the degree of association or assigns the same parameters to connected objects. DTCS would be possible to expand the advanced services of Metatwinverse in that it is possible to have robust learning based conclusions in real-time changing convergence situations.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132578961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Test Suite Minimization Technique for Testing Numerical Programs 一种用于数值程序测试的测试套件最小化技术
Prashanta Saha, C. Izurieta, Upulee Kanewala
Metamorphic testing is a technique that uses metamorphic relations (i.e., necessary properties of the software under test), to construct new test cases (i.e., follow-up test cases), from existing test cases (i.e., source test cases). Metamorphic testing allows for the verification of testing results without the need of test oracles (a mechanism to detect the correctness of the outcomes of a program), and it has been widely used in many application domains to detect real-world faults. Numerous investigations have been conducted to further improve the effectiveness of metamorphic testing. Recent studies have emerged suggesting a new research direction on the generation and selection of source test cases that are effective in fault detection. Herein, we present two important findings: i) a mutant reduction strategy that is applied to increase the testing efficiency of source test cases, and ii) a test suite minimization technique to help reduce the testing costs without trading off fault-finding effectiveness. To validate our results, an empirical study was conducted to demonstrate the increase in efficiency and fault-finding effectiveness of source test cases. The results from the experiment provide evidence to support our claims.
变形测试是一种使用变形关系(例如,被测软件的必要属性)从现有的测试用例(例如,源测试用例)构建新的测试用例(例如,后续测试用例)的技术。变形测试允许在不需要测试oracle(一种检测程序结果正确性的机制)的情况下验证测试结果,并且在许多应用程序领域中被广泛用于检测实际故障。为了进一步提高变质试验的有效性,进行了大量的研究。近年来的研究为有效的故障检测源测试用例的生成和选择提供了新的研究方向。在这里,我们提出了两个重要的发现:i)用于提高源测试用例测试效率的突变减少策略,以及ii)用于帮助降低测试成本而不牺牲故障查找效率的测试套件最小化技术。为了验证我们的结果,进行了一项实证研究,以证明源测试用例在效率和故障查找有效性方面的提高。实验结果为支持我们的主张提供了证据。
{"title":"A Test Suite Minimization Technique for Testing Numerical Programs","authors":"Prashanta Saha, C. Izurieta, Upulee Kanewala","doi":"10.1109/SERA57763.2023.10197757","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197757","url":null,"abstract":"Metamorphic testing is a technique that uses metamorphic relations (i.e., necessary properties of the software under test), to construct new test cases (i.e., follow-up test cases), from existing test cases (i.e., source test cases). Metamorphic testing allows for the verification of testing results without the need of test oracles (a mechanism to detect the correctness of the outcomes of a program), and it has been widely used in many application domains to detect real-world faults. Numerous investigations have been conducted to further improve the effectiveness of metamorphic testing. Recent studies have emerged suggesting a new research direction on the generation and selection of source test cases that are effective in fault detection. Herein, we present two important findings: i) a mutant reduction strategy that is applied to increase the testing efficiency of source test cases, and ii) a test suite minimization technique to help reduce the testing costs without trading off fault-finding effectiveness. To validate our results, an empirical study was conducted to demonstrate the increase in efficiency and fault-finding effectiveness of source test cases. The results from the experiment provide evidence to support our claims.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128553544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twins of Smart Campus: Performance Evaluation Using Machine Learning Analysis 智能校园的数字孪生:使用机器学习分析进行绩效评估
Adamu Hussaini, Cheng Qian, Y. Guo, Chao Lu, Wei Yu
The Internet of Things (IoT) paradigm is gradually becoming more prevalent through numerous devices and technologies, including sensors, actuators, microcontrollers, cloud-enabled services, and analytics. IoT objects gain intelligence by integrating with wireless sensor networks (WSNs), mobile computing and communication, and others. With sensors, smart things can be enabled by monitoring and identifying environmental changes related to motion, temperature, humidity, pressure, light, vibration, etc. To timely keep track of state changes, researchers are considering developing a cyber replicator, denoted as Digital Twin (DT), of real physical systems as a way to visualize, model, and work with complex cyber-physical systems (CPS). In this paper, we first refine the dataset to a format that can be easily used for deep learning (DL) experiments, IoT data pipeline development, data modeling and simulation, data aggregation, etc. We then demonstrate that DT data can be used to determine space occupancy based on the ambient light sensor, which tends to indicate occupancy in particular spaces because the building has smart lighting that will switch off when rooms are unoccupied after a certain time. Given the apparent developments in machine learning technology, it is clear that machine learning-based prediction has the ability to enhance resource utilization and further forecast future events. Particularly, we use a DT-based dataset and Long-Short-Term Memory (LSTM) neural network architecture to forecast the campus building’s internal temperature.
物联网(IoT)范例通过传感器、执行器、微控制器、云服务和分析等众多设备和技术逐渐变得越来越普遍。物联网对象通过与无线传感器网络(wsn)、移动计算和通信等集成来获得智能。有了传感器,智能事物可以通过监测和识别与运动、温度、湿度、压力、光线、振动等相关的环境变化来实现。为了及时跟踪状态变化,研究人员正在考虑开发一种网络复制器,表示为真实物理系统的数字孪生(DT),作为一种可视化、建模和处理复杂网络物理系统(CPS)的方法。在本文中,我们首先将数据集细化为可以轻松用于深度学习(DL)实验、物联网数据管道开发、数据建模和仿真、数据聚合等的格式。然后,我们证明了DT数据可用于根据环境光传感器确定空间占用情况,环境光传感器倾向于指示特定空间的占用情况,因为建筑物具有智能照明,当房间在一定时间后无人使用时将关闭。鉴于机器学习技术的明显发展,很明显,基于机器学习的预测具有提高资源利用率和进一步预测未来事件的能力。特别地,我们使用基于dt的数据集和长短期记忆(LSTM)神经网络架构来预测校园建筑的内部温度。
{"title":"Digital Twins of Smart Campus: Performance Evaluation Using Machine Learning Analysis","authors":"Adamu Hussaini, Cheng Qian, Y. Guo, Chao Lu, Wei Yu","doi":"10.1109/SERA57763.2023.10197806","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197806","url":null,"abstract":"The Internet of Things (IoT) paradigm is gradually becoming more prevalent through numerous devices and technologies, including sensors, actuators, microcontrollers, cloud-enabled services, and analytics. IoT objects gain intelligence by integrating with wireless sensor networks (WSNs), mobile computing and communication, and others. With sensors, smart things can be enabled by monitoring and identifying environmental changes related to motion, temperature, humidity, pressure, light, vibration, etc. To timely keep track of state changes, researchers are considering developing a cyber replicator, denoted as Digital Twin (DT), of real physical systems as a way to visualize, model, and work with complex cyber-physical systems (CPS). In this paper, we first refine the dataset to a format that can be easily used for deep learning (DL) experiments, IoT data pipeline development, data modeling and simulation, data aggregation, etc. We then demonstrate that DT data can be used to determine space occupancy based on the ambient light sensor, which tends to indicate occupancy in particular spaces because the building has smart lighting that will switch off when rooms are unoccupied after a certain time. Given the apparent developments in machine learning technology, it is clear that machine learning-based prediction has the ability to enhance resource utilization and further forecast future events. Particularly, we use a DT-based dataset and Long-Short-Term Memory (LSTM) neural network architecture to forecast the campus building’s internal temperature.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Augmented Reality System for Emergency Response 移动增强现实应急响应系统
Sharad Sharma
There are a wide variety of mobile phone emergency response applications exist for both indoor and outdoor environments. However, outdoor applications mostly provide accident and navigation information to users, and indoor applications are limited to the unavailability of GPS positioning and WiFi access problems. This paper describes the proposed mobile augmented reality system (MARS) that allows both outdoor and indoor users to retrieve and manage information for emergency response and navigation that is spatially registered with the real world. The proposed MARS utilizes feature extraction for location sensing in indoor environments as during emergencies GPS and WiFi systems might not work. This paper describes the implementation of this MARS deployed on tablets and smartphones for building evacuation purposes. The MARS delivers critical evacuation information to smartphone users in the indoor environment and navigation information in the outdoor environments. A limited user study was conducted to test the effectiveness of the proposed MARS using the mobile phone usability questionnaire (MPUQ) framework. The results show that AR features were well integrated into the MARS and it will help identify the nearest exit in the building during the emergency evacuation.
有各种各样的移动电话应急响应应用存在于室内和室外环境。然而,户外应用主要为用户提供事故和导航信息,而室内应用则受到GPS定位不可用和WiFi接入问题的限制。本文描述了拟议的移动增强现实系统(MARS),该系统允许室外和室内用户检索和管理应急响应和导航信息,这些信息在空间上与现实世界相匹配。在紧急情况下,GPS和WiFi系统可能无法工作,因此提议的MARS利用特征提取在室内环境中进行位置感知。本文描述了这种部署在平板电脑和智能手机上的用于建筑物疏散目的的MARS的实现。MARS在室内环境下为智能手机用户提供关键的疏散信息,在室外环境下为智能手机用户提供导航信息。一项有限用户研究使用手机可用性问卷(MPUQ)框架来测试拟议的MARS的有效性。结果表明,AR功能很好地融入了MARS,它将有助于在紧急疏散时识别建筑物中最近的出口。
{"title":"Mobile Augmented Reality System for Emergency Response","authors":"Sharad Sharma","doi":"10.1109/SERA57763.2023.10197820","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197820","url":null,"abstract":"There are a wide variety of mobile phone emergency response applications exist for both indoor and outdoor environments. However, outdoor applications mostly provide accident and navigation information to users, and indoor applications are limited to the unavailability of GPS positioning and WiFi access problems. This paper describes the proposed mobile augmented reality system (MARS) that allows both outdoor and indoor users to retrieve and manage information for emergency response and navigation that is spatially registered with the real world. The proposed MARS utilizes feature extraction for location sensing in indoor environments as during emergencies GPS and WiFi systems might not work. This paper describes the implementation of this MARS deployed on tablets and smartphones for building evacuation purposes. The MARS delivers critical evacuation information to smartphone users in the indoor environment and navigation information in the outdoor environments. A limited user study was conducted to test the effectiveness of the proposed MARS using the mobile phone usability questionnaire (MPUQ) framework. The results show that AR features were well integrated into the MARS and it will help identify the nearest exit in the building during the emergency evacuation.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Evaluation of Adversarial Attacks Against Natural Language Machine Learning Models 针对自然语言机器学习模型的对抗性攻击的实验评估
Jonathan Li, Steven Pugh, Honghe Zhou, Lin Deng, J. Dehlinger, Suranjan Chakraborty
Machine learning models are being increasingly relied on for many natural language processing tasks. However, these models are vulnerable to adversarial attacks, i.e., inputs designed to target models into making a wrong prediction. Among different methods of attacking a model, it is important to understand what attacks are effective, so that we can design countermeasures to protect the models. In this paper, we design and implement six adversarial attacks against natural language machine learning models. Then, we evaluate the effectiveness of these attacks using a fine-tuned distilled BERT model and 5,000 sample sentences from the SST-2 dataset. Our results indicate that the Word-replace attack affected the model the most, which reduces the F1-score of the model by 34%. The Word-delete attack is the least effective, but still reduces the model’s accuracy by 17%. Based on the experimental results, we discuss our insights and provide our recommendations for building robust natural language machine learning models.
许多自然语言处理任务越来越依赖机器学习模型。然而,这些模型很容易受到对抗性攻击,即设计用于目标模型做出错误预测的输入。在攻击模型的不同方法中,了解哪些攻击是有效的是很重要的,这样我们就可以设计对策来保护模型。在本文中,我们设计并实现了六种针对自然语言机器学习模型的对抗性攻击。然后,我们使用经过微调的蒸馏BERT模型和来自SST-2数据集的5000个样本句子来评估这些攻击的有效性。我们的研究结果表明,Word-replace攻击对模型的影响最大,使模型的f1分数降低了34%。单词删除攻击是最不有效的,但仍然使模型的准确率降低了17%。基于实验结果,我们讨论了我们的见解,并为构建健壮的自然语言机器学习模型提供了建议。
{"title":"Experimental Evaluation of Adversarial Attacks Against Natural Language Machine Learning Models","authors":"Jonathan Li, Steven Pugh, Honghe Zhou, Lin Deng, J. Dehlinger, Suranjan Chakraborty","doi":"10.1109/SERA57763.2023.10197813","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197813","url":null,"abstract":"Machine learning models are being increasingly relied on for many natural language processing tasks. However, these models are vulnerable to adversarial attacks, i.e., inputs designed to target models into making a wrong prediction. Among different methods of attacking a model, it is important to understand what attacks are effective, so that we can design countermeasures to protect the models. In this paper, we design and implement six adversarial attacks against natural language machine learning models. Then, we evaluate the effectiveness of these attacks using a fine-tuned distilled BERT model and 5,000 sample sentences from the SST-2 dataset. Our results indicate that the Word-replace attack affected the model the most, which reduces the F1-score of the model by 34%. The Word-delete attack is the least effective, but still reduces the model’s accuracy by 17%. Based on the experimental results, we discuss our insights and provide our recommendations for building robust natural language machine learning models.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1