首页 > 最新文献

2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)最新文献

英文 中文
Balance-aware Cost-efficient Routing in the Payment Channel Network 支付通道网络中平衡感知的成本效益路由
Suhan Jiang, Jie Wu, Fei Zuo, A. Mei
Payment Channel Networks (PCNs) have been introduced as a viable solution to the scalability problem of the popular blockchain. In PCNs, a payment channel allows its end nodes to pay each other without publishing every transaction to the blockchain. A transaction can be routed in the network if there is a path of channels with sufficient funds, and the intermediate routing nodes can ask the transaction sender for a compensatory fee. However, a channel may eventually become depleted and cannot support further payments in a certain direction, as transaction flows from that direction is heavier than flows from the other direction. In this paper, we discuss a PCN node’s possible roles and objectives, and analyze the strategies nodes should take under different roles by considering nodes’ benefits and the network’s performance. Then, we examine two basic network structures (ring and chord) and determine the constraints under which they constitute a Nash equilibrium. Based on the theoretical results, we propose a balance-aware fee-incentivized routing algorithm to guarantee cost-efficient routing, fair fee charging, and the network’s long lasting good performance in general PCNs. Testbed-based evaluation is conducted to validate our theoretical results and to show the feasibility of our proposed approach.
支付通道网络(pcn)已被引入,作为流行区块链可扩展性问题的可行解决方案。在pcn中,支付通道允许其终端节点相互支付,而无需将每笔交易发布到区块链。如果有足够资金的通道路径,就可以在网络中路由交易,中间路由节点可以向交易发送方索要补偿费。然而,通道可能最终耗尽,无法支持某个方向的进一步支付,因为来自该方向的交易流量比来自另一个方向的流量更大。本文讨论了PCN节点可能扮演的角色和目标,并综合考虑节点的利益和网络性能,分析了不同角色下节点应采取的策略。然后,我们研究了两种基本的网络结构(环和弦),并确定了它们构成纳什均衡的约束条件。在理论结果的基础上,我们提出了一种平衡感知的费用激励路由算法,以保证在一般pcn中具有成本效益的路由,公平的费用收费和网络的长期良好性能。基于试验台的评估验证了我们的理论结果,并证明了我们提出的方法的可行性。
{"title":"Balance-aware Cost-efficient Routing in the Payment Channel Network","authors":"Suhan Jiang, Jie Wu, Fei Zuo, A. Mei","doi":"10.1109/SERA57763.2023.10197670","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197670","url":null,"abstract":"Payment Channel Networks (PCNs) have been introduced as a viable solution to the scalability problem of the popular blockchain. In PCNs, a payment channel allows its end nodes to pay each other without publishing every transaction to the blockchain. A transaction can be routed in the network if there is a path of channels with sufficient funds, and the intermediate routing nodes can ask the transaction sender for a compensatory fee. However, a channel may eventually become depleted and cannot support further payments in a certain direction, as transaction flows from that direction is heavier than flows from the other direction. In this paper, we discuss a PCN node’s possible roles and objectives, and analyze the strategies nodes should take under different roles by considering nodes’ benefits and the network’s performance. Then, we examine two basic network structures (ring and chord) and determine the constraints under which they constitute a Nash equilibrium. Based on the theoretical results, we propose a balance-aware fee-incentivized routing algorithm to guarantee cost-efficient routing, fair fee charging, and the network’s long lasting good performance in general PCNs. Testbed-based evaluation is conducted to validate our theoretical results and to show the feasibility of our proposed approach.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126464298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishy? Detecting Phishing Emails Using ML and NLP Phishy吗?使用ML和NLP检测钓鱼邮件
Md. Fazle Rabbi, Arifa I. Champa, M. Zibran
Phishing emails, a type of cyberattack using fake emails, are difficult to recognize due to sophisticated techniques employed by attackers. In this paper, we use a natural language processing (NLP) and machine learning (ML) based approach for detecting phishing emails. We compare the efficacy of six different ML algorithms for the purpose. An empirical evaluation on two public datasets demonstrates that our approach detects phishing emails with high accuracy, precision, and recall. The findings from this work are useful in devising more efficient techniques for recognizing and preventing phishing attacks.
网络钓鱼邮件是一种利用虚假电子邮件进行的网络攻击,由于攻击者采用了复杂的技术,因此很难识别。在本文中,我们使用基于自然语言处理(NLP)和机器学习(ML)的方法来检测网络钓鱼电子邮件。我们比较了六种不同ML算法的有效性。对两个公共数据集的实证评估表明,我们的方法检测网络钓鱼电子邮件具有很高的准确性、精度和召回率。这项工作的发现有助于设计更有效的技术来识别和防止网络钓鱼攻击。
{"title":"Phishy? Detecting Phishing Emails Using ML and NLP","authors":"Md. Fazle Rabbi, Arifa I. Champa, M. Zibran","doi":"10.1109/SERA57763.2023.10197758","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197758","url":null,"abstract":"Phishing emails, a type of cyberattack using fake emails, are difficult to recognize due to sophisticated techniques employed by attackers. In this paper, we use a natural language processing (NLP) and machine learning (ML) based approach for detecting phishing emails. We compare the efficacy of six different ML algorithms for the purpose. An empirical evaluation on two public datasets demonstrates that our approach detects phishing emails with high accuracy, precision, and recall. The findings from this work are useful in devising more efficient techniques for recognizing and preventing phishing attacks.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile User Analysis Considering Collaboration with Financial Services 考虑与金融服务合作的移动用户分析
K. Nishimatsu, A. Inoue
The purpose of this study is to understand mobile user behavior for collaboration services, especially financial services, offered by mobile carriers in Japan. Mobile phone market in Japan remains highly competitive, mobile carriers are focusing on introducing various types of collaboration services other than mobile services. In recent years, loyalty programs based on collaboration services has become an important decision-making factor in mobile carrier choice behavior. This is because loyalty programs are increasingly allowing users to directly use the reward points they have earned as electronic money to purchase various products and other goods, and users can choose the loyalty program that best suits their lifestyle and benefits. With the spread of smartphones, telecommunication services and financial services are increasingly collaborating, and loyalty program is becoming important tool for retaining users. Using survey data, we analyze and evaluate the impact of financial services on the preferences of mobile carriers. The results showed that financial services were effective in retaining users.
本研究的目的是了解日本移动运营商提供的协作服务,特别是金融服务的移动用户行为。日本移动电话市场的竞争仍然非常激烈,移动运营商正致力于推出除移动服务之外的各种合作服务。近年来,基于协作服务的忠诚度计划已成为移动运营商选择行为的重要决策因素。这是因为越来越多的忠诚计划允许用户直接使用他们所获得的奖励积分作为电子货币购买各种产品和其他商品,用户可以选择最适合自己生活方式和福利的忠诚计划。随着智能手机的普及,电信服务和金融服务的合作日益紧密,忠诚计划成为留住用户的重要工具。利用调查数据,我们分析和评估了金融服务对移动运营商偏好的影响。结果表明,金融服务在留住用户方面是有效的。
{"title":"Mobile User Analysis Considering Collaboration with Financial Services","authors":"K. Nishimatsu, A. Inoue","doi":"10.1109/SERA57763.2023.10197691","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197691","url":null,"abstract":"The purpose of this study is to understand mobile user behavior for collaboration services, especially financial services, offered by mobile carriers in Japan. Mobile phone market in Japan remains highly competitive, mobile carriers are focusing on introducing various types of collaboration services other than mobile services. In recent years, loyalty programs based on collaboration services has become an important decision-making factor in mobile carrier choice behavior. This is because loyalty programs are increasingly allowing users to directly use the reward points they have earned as electronic money to purchase various products and other goods, and users can choose the loyalty program that best suits their lifestyle and benefits. With the spread of smartphones, telecommunication services and financial services are increasingly collaborating, and loyalty program is becoming important tool for retaining users. Using survey data, we analyze and evaluate the impact of financial services on the preferences of mobile carriers. The results showed that financial services were effective in retaining users.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132561052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDCG: Silhouette-based Deep Clustering with GNN for Improved Graph Node Clustering SDCG:基于轮廓的深度聚类与改进图节点聚类的GNN
Hyesoo Shin, Eunjo Jang, Sojeong Kim, Ki Yong Lee
Graph Neural Networks (GNNs) are powerful tools for analyzing graph-structured data in various fields because of their great expressive power for graph data. They use a message-passing mechanism to update node embeddings, which are then used for tasks such as node classification and link prediction. Recently, node embeddings have also been used in research on graph node clustering, which aims to group similar nodes based on their features and graph topology. However, traditional methods for node clustering have a limitation in that GNNs only focus on generating node embeddings without considering the ultimate objective of clustering. To address this issue, a novel technique called "Deep Clustering" has been proposed, which integrates both node embedding and clustering stages. This requires defining a new loss function by simultaneously minimizing the GNN loss and the clustering loss. Our proposed loss function incorporates not only the distance within clusters but also the distance between clusters by applying the Silhouette coefficient, which enables us to achieve better clustering results. In this paper, we propose a Silhouette-based Deep Clustering with GNN (SDCG) to more effectively cluster nodes in a graph by iteratively training the embedding model to produce embedding vectors with improved clustering results. Through extensive experiments, we demonstrate that SDCG outperforms the conventional approach of performing embedding and clustering independently.
图神经网络(Graph Neural Networks, gnn)对图数据具有很强的表达能力,是分析各种领域图结构数据的有力工具。它们使用消息传递机制来更新节点嵌入,然后将其用于节点分类和链接预测等任务。最近,节点嵌入也被用于图节点聚类的研究,其目的是根据节点的特征和图的拓扑结构对相似的节点进行分组。然而,传统的节点聚类方法存在一个局限性,即gnn只关注生成节点嵌入,而不考虑聚类的最终目的。为了解决这个问题,一种新的技术被称为“深度聚类”,它集成了节点嵌入和聚类两个阶段。这需要定义一个新的损失函数,同时最小化GNN损失和聚类损失。我们提出的损失函数不仅包含聚类内的距离,还包含聚类之间的距离,通过应用Silhouette系数,使我们能够获得更好的聚类结果。在本文中,我们提出了一种基于轮廓的GNN深度聚类(SDCG)方法,通过迭代训练嵌入模型来产生嵌入向量,从而提高聚类结果,从而更有效地聚类图中的节点。通过大量的实验,我们证明SDCG优于传统的独立执行嵌入和聚类的方法。
{"title":"SDCG: Silhouette-based Deep Clustering with GNN for Improved Graph Node Clustering","authors":"Hyesoo Shin, Eunjo Jang, Sojeong Kim, Ki Yong Lee","doi":"10.1109/SERA57763.2023.10197683","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197683","url":null,"abstract":"Graph Neural Networks (GNNs) are powerful tools for analyzing graph-structured data in various fields because of their great expressive power for graph data. They use a message-passing mechanism to update node embeddings, which are then used for tasks such as node classification and link prediction. Recently, node embeddings have also been used in research on graph node clustering, which aims to group similar nodes based on their features and graph topology. However, traditional methods for node clustering have a limitation in that GNNs only focus on generating node embeddings without considering the ultimate objective of clustering. To address this issue, a novel technique called \"Deep Clustering\" has been proposed, which integrates both node embedding and clustering stages. This requires defining a new loss function by simultaneously minimizing the GNN loss and the clustering loss. Our proposed loss function incorporates not only the distance within clusters but also the distance between clusters by applying the Silhouette coefficient, which enables us to achieve better clustering results. In this paper, we propose a Silhouette-based Deep Clustering with GNN (SDCG) to more effectively cluster nodes in a graph by iteratively training the embedding model to produce embedding vectors with improved clustering results. Through extensive experiments, we demonstrate that SDCG outperforms the conventional approach of performing embedding and clustering independently.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake News Detection Using Machine Learning Techniques 利用机器学习技术检测假新闻
Achhiya Sultana, Mahmudul Islam, Mahady Hasan, F. Ahmed
A lot of information is spread by people in the social media to update their status and share crucial news with others. But the majority of these platforms don’t promptly validate the individuals or their posts and people aren’t able to identify the fake news manually. Therefore, there is a need for an automated system capable of detecting fake news. This research has proposed to build a model using four machine learning algorithms. The dataset employed in the experiment is a composite of two datasets containing almost equal amounts of true and fake news articles on politics. The preprocessing stages begin with cleaning the data by removing punctuation, tokenization, special characters, white spaces, redundant word elimination, numerals, and English letters followed by stemming and stop with data discretization. Then, we analyzed the collected data and 80% of the data has been used to train each model initially. After that, the four manifested classification algorithms are applied. For identifying fake news from news articles, meth-ods like Logistic Regression, Decision Tree, Random Forest, and Gradient Boosting Classifier were used. The trained classifiers’ accuracy has been evaluated using the remaining 20% of the data. The results show that the decision tree model produces the best accuracy of 99.60% and gradient boosting of 99.55%. Besides, the random forest shows 99.10% along with the logistic regression 98.99%. Moreover, we have explored the best model to achieve the highest precision, recall, F1-score based on the confusion matrix’s outcome.
人们在社交媒体上传播大量信息,以更新自己的状态,并与他人分享重要新闻。但这些平台中的大多数都没有及时验证个人或他们的帖子,人们也无法手动识别假新闻。因此,需要一种能够检测假新闻的自动化系统。本研究提出使用四种机器学习算法建立一个模型。实验中使用的数据集是两个数据集的组合,其中包含几乎相同数量的真假政治新闻文章。预处理阶段首先通过删除标点符号、标记化、特殊字符、空白、冗余单词消除、数字和英文字母来清理数据,然后进行词干提取,最后以数据离散化结束。然后,我们对收集到的数据进行分析,80%的数据被用于初始训练每个模型。然后,应用了四种分类算法。为了从新闻文章中识别假新闻,使用了逻辑回归、决策树、随机森林和梯度增强分类器等方法。使用剩下的20%的数据对训练好的分类器的准确性进行了评估。结果表明,决策树模型的准确率为99.60%,梯度提升率为99.55%。随机森林为99.10%,逻辑回归为98.99%。此外,我们还探索了基于混淆矩阵结果的最佳模型,以实现最高的精度,召回率,f1分数。
{"title":"Fake News Detection Using Machine Learning Techniques","authors":"Achhiya Sultana, Mahmudul Islam, Mahady Hasan, F. Ahmed","doi":"10.1109/SERA57763.2023.10197712","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197712","url":null,"abstract":"A lot of information is spread by people in the social media to update their status and share crucial news with others. But the majority of these platforms don’t promptly validate the individuals or their posts and people aren’t able to identify the fake news manually. Therefore, there is a need for an automated system capable of detecting fake news. This research has proposed to build a model using four machine learning algorithms. The dataset employed in the experiment is a composite of two datasets containing almost equal amounts of true and fake news articles on politics. The preprocessing stages begin with cleaning the data by removing punctuation, tokenization, special characters, white spaces, redundant word elimination, numerals, and English letters followed by stemming and stop with data discretization. Then, we analyzed the collected data and 80% of the data has been used to train each model initially. After that, the four manifested classification algorithms are applied. For identifying fake news from news articles, meth-ods like Logistic Regression, Decision Tree, Random Forest, and Gradient Boosting Classifier were used. The trained classifiers’ accuracy has been evaluated using the remaining 20% of the data. The results show that the decision tree model produces the best accuracy of 99.60% and gradient boosting of 99.55%. Besides, the random forest shows 99.10% along with the logistic regression 98.99%. Moreover, we have explored the best model to achieve the highest precision, recall, F1-score based on the confusion matrix’s outcome.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116472690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consideration of Semantics between Q&A Statements to Obtain Factor Score 考虑问答语句之间的语义以获得因子得分
Yuya Yokoyama
In order to solve the issues of mismatches between the intentions of questioners and respondents at Question and Answer (Q&A) sites, nine factors of impressions for Q&A statements were obtained through factor analysis applied to the results of impression evaluation experiments. Then through multiple regression analysis, factor scores were estimated by using the feature values of statements. The factor scores estimated and obtained were subsequently utilized for detecting respondents who are expected to appropriately answer a posted question. Nevertheless, up to now the meanings and contents of Q&A statements have not been taken into consideration. Therefore, this paper aims to consider the semantics between Q&A statements. The feature values are reviewed and narrowed down to syntactic information, closing sentence expressions, 2-gram, and word2vec. The analysis result conveys that all the trials show good estimation with the consideration of cross-validation. It has also been suggested that applying word2vec could play a vital role in estimating improved factor scores.
为了解决问答网站中提问者与被调查者意图不匹配的问题,通过对印象评价实验结果进行因子分析,得出了问答语句的九个印象因子。然后通过多元回归分析,利用语句的特征值估计因子得分。估计和获得的因素得分随后被用于检测预计会适当回答所发布问题的受访者。然而,到目前为止,还没有考虑到Q&A语句的含义和内容。因此,本文旨在考虑问答语句之间的语义。检查特征值并将其缩小到语法信息、结束句表达式、2-gram和word2vec。分析结果表明,在考虑交叉验证的情况下,所有试验都显示出良好的估计。也有人建议,应用word2vec可以在估计改进的因素得分方面发挥重要作用。
{"title":"Consideration of Semantics between Q&A Statements to Obtain Factor Score","authors":"Yuya Yokoyama","doi":"10.1109/SERA57763.2023.10197794","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197794","url":null,"abstract":"In order to solve the issues of mismatches between the intentions of questioners and respondents at Question and Answer (Q&A) sites, nine factors of impressions for Q&A statements were obtained through factor analysis applied to the results of impression evaluation experiments. Then through multiple regression analysis, factor scores were estimated by using the feature values of statements. The factor scores estimated and obtained were subsequently utilized for detecting respondents who are expected to appropriately answer a posted question. Nevertheless, up to now the meanings and contents of Q&A statements have not been taken into consideration. Therefore, this paper aims to consider the semantics between Q&A statements. The feature values are reviewed and narrowed down to syntactic information, closing sentence expressions, 2-gram, and word2vec. The analysis result conveys that all the trials show good estimation with the consideration of cross-validation. It has also been suggested that applying word2vec could play a vital role in estimating improved factor scores.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-based Digital Twins Storage in Emergency Healthcare 紧急医疗保健中基于云的数字孪生存储
Erdan Wang, Pouria Tayebi, Yeong-Tae Song
In this paper, we explore the potential of utilizing Digital Twin (DT) technology for real-time data storage and processing in emergency healthcare. Focusing on Internet of Things (IoT) and cloud computing technologies, we investigate various enabling technologies, including cloud platforms, data transmission formats, and storage file formats, to develop a feasible DT storage solution for emergency healthcare. Through our analysis, we find Amazon AWS to be the most suitable cloud platform due to its sophisticated real-time data processing and analytical tools. Additionally, we determine that the MQTT protocol is suitable for real-time medical data transmission, and FHIR is the most appropriate medical file storage format for emergency healthcare situations.We propose a cloud-based DT storage solution, in which real-time medical data is transmitted to AWS IoT Core, processed by Kinesis Data Analytics, and stored securely in AWS HealthLake. Despite the feasibility of the proposed solution, challenges such as insufficient access control, lack of encryption, and vendor conformity must be addressed for successful practical implementation. Future work may involve incorporating Hyperledger Fabric technology and HTTPS protocol to enhance security, while the maturation of DT technology is expected to resolve vendor conformity issues. By addressing these challenges, our proposed DT storage solution has the potential to improve data accessibility and decision-making in emergency healthcare settings.
在本文中,我们探讨了利用数字孪生(DT)技术进行实时数据存储和处理在紧急医疗保健中的潜力。我们以物联网(IoT)和云计算技术为重点,研究各种使能技术,包括云平台、数据传输格式和存储文件格式,以开发一种可行的应急医疗DT存储解决方案。通过我们的分析,我们发现亚马逊AWS是最合适的云平台,因为它有成熟的实时数据处理和分析工具。此外,我们确定MQTT协议适合实时医疗数据传输,而FHIR是最适合紧急医疗状况的医疗文件存储格式。我们提出了一种基于云的DT存储解决方案,其中实时医疗数据传输到AWS IoT Core,由Kinesis data Analytics处理,并安全存储在AWS HealthLake中。尽管提出的解决方案是可行的,但是要想成功地实际实现,必须解决诸如访问控制不足、缺乏加密和供应商一致性等挑战。未来的工作可能涉及整合Hyperledger Fabric技术和HTTPS协议以增强安全性,而DT技术的成熟有望解决供应商一致性问题。通过解决这些挑战,我们提出的DT存储解决方案有可能改善紧急医疗保健环境中的数据可访问性和决策。
{"title":"Cloud-based Digital Twins Storage in Emergency Healthcare","authors":"Erdan Wang, Pouria Tayebi, Yeong-Tae Song","doi":"10.1109/SERA57763.2023.10197705","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197705","url":null,"abstract":"In this paper, we explore the potential of utilizing Digital Twin (DT) technology for real-time data storage and processing in emergency healthcare. Focusing on Internet of Things (IoT) and cloud computing technologies, we investigate various enabling technologies, including cloud platforms, data transmission formats, and storage file formats, to develop a feasible DT storage solution for emergency healthcare. Through our analysis, we find Amazon AWS to be the most suitable cloud platform due to its sophisticated real-time data processing and analytical tools. Additionally, we determine that the MQTT protocol is suitable for real-time medical data transmission, and FHIR is the most appropriate medical file storage format for emergency healthcare situations.We propose a cloud-based DT storage solution, in which real-time medical data is transmitted to AWS IoT Core, processed by Kinesis Data Analytics, and stored securely in AWS HealthLake. Despite the feasibility of the proposed solution, challenges such as insufficient access control, lack of encryption, and vendor conformity must be addressed for successful practical implementation. Future work may involve incorporating Hyperledger Fabric technology and HTTPS protocol to enhance security, while the maturation of DT technology is expected to resolve vendor conformity issues. By addressing these challenges, our proposed DT storage solution has the potential to improve data accessibility and decision-making in emergency healthcare settings.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131463586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Library-Based Approach for Writing Design Assertions 基于库的设计断言编写方法
Yoonsik Cheon, R. Lozano, Rajasoundarya Senthil Prabhu
Assertions are a crucial aspect of software development, serving as a way to validate conditions during code execution. They are expressed as Boolean expressions that must hold true for the code to run correctly and enforce design decisions and constraints. This paper introduces a new approach for creating assertions called design assertions. These assertions are generated from formally written design constraints and help to enforce important design decisions during code execution. The approach utilizes immutable library classes, specifically designed for writing design assertions, and converts design constraints written in the Object Constraint Language (OCL) into assert statements in the Dart language. The result is a more readable, maintainable, and reliable set of Dart assertions, providing a powerful tool for ensuring software design quality and integrity.
断言是软件开发的一个重要方面,是在代码执行期间验证条件的一种方法。它们被表示为布尔表达式,必须为真才能使代码正确运行并执行设计决策和约束。本文介绍了一种创建断言的新方法,称为设计断言。这些断言是从正式编写的设计约束中生成的,并有助于在代码执行期间强制执行重要的设计决策。该方法利用了专为编写设计断言而设计的不可变库类,并将用对象约束语言(Object Constraint Language, OCL)编写的设计约束转换为Dart语言中的断言语句。其结果是一组更具可读性、可维护性和可靠性的Dart断言,为确保软件设计质量和完整性提供了一个强大的工具。
{"title":"A Library-Based Approach for Writing Design Assertions","authors":"Yoonsik Cheon, R. Lozano, Rajasoundarya Senthil Prabhu","doi":"10.1109/SERA57763.2023.10197770","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197770","url":null,"abstract":"Assertions are a crucial aspect of software development, serving as a way to validate conditions during code execution. They are expressed as Boolean expressions that must hold true for the code to run correctly and enforce design decisions and constraints. This paper introduces a new approach for creating assertions called design assertions. These assertions are generated from formally written design constraints and help to enforce important design decisions during code execution. The approach utilizes immutable library classes, specifically designed for writing design assertions, and converts design constraints written in the Object Constraint Language (OCL) into assert statements in the Dart language. The result is a more readable, maintainable, and reliable set of Dart assertions, providing a powerful tool for ensuring software design quality and integrity.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133033336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Model to Improve the Stability of Damage Identification via Output-only Signal 基于只输出信号的深度学习模型提高损伤识别的稳定性
Jongyeop Kim, Jinki Kim, M. Sands, Seongsoo Kim
This study utilizes vibration-based signal analysis as a non-destructive testing technique that involves analyzing the vibration signals produced by a structure to detect possible defects or damage. The study aims to employ deep learning models to identify defects in a 3D-printed cantilever beam by analyzing the beam’s tip displacement given a random input signal generated by an electromagnetic shaker. This study is focused on the output signal without any information of the random input, which is common for structural health monitoring applications in practice. Additionally, the study has revealed that the number of times the test set is applied to the trained model significantly impacts the accuracy of the model’s consistent predictions.
本研究利用基于振动的信号分析作为一种无损检测技术,包括分析结构产生的振动信号以检测可能的缺陷或损伤。该研究旨在利用深度学习模型,通过分析由电磁振动筛产生的随机输入信号的梁的尖端位移,来识别3d打印悬臂梁的缺陷。本研究的重点是在没有任何随机输入信息的输出信号,这是在实际结构健康监测应用中常见的。此外,研究表明,测试集应用于训练模型的次数显著影响模型一致性预测的准确性。
{"title":"Deep Learning Model to Improve the Stability of Damage Identification via Output-only Signal","authors":"Jongyeop Kim, Jinki Kim, M. Sands, Seongsoo Kim","doi":"10.1109/SERA57763.2023.10197684","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197684","url":null,"abstract":"This study utilizes vibration-based signal analysis as a non-destructive testing technique that involves analyzing the vibration signals produced by a structure to detect possible defects or damage. The study aims to employ deep learning models to identify defects in a 3D-printed cantilever beam by analyzing the beam’s tip displacement given a random input signal generated by an electromagnetic shaker. This study is focused on the output signal without any information of the random input, which is common for structural health monitoring applications in practice. Additionally, the study has revealed that the number of times the test set is applied to the trained model significantly impacts the accuracy of the model’s consistent predictions.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122770353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Adversarial Machine Learning Framework in Cyber-Physical Systems 面向网络物理系统中的对抗性机器学习框架
John Mulo, Pu Tian, Adamu Hussaini, Hengshuo Liang, Wei Yu
The applications of machine learning (ML) in cyber-physical systems (CPS), such as the smart energy grid has increased significantly. While ML technology can be integrated into CPS, the security risk of ML technology has to be considered. In particular, adversarial examples provide inputs to a ML model with intentionally attached perturbations (noise) that could pose the model to make incorrect decisions. Perturbations are expected to be small or marginal so that adversarial examples could be invisible to humans, but can significantly affect the output of ML models. In this paper, we design a taxonomy to provide the problem space for investigating the adversarial example generation techniques based on state-of-the-art literature. We propose a three-dimensional framework containing three dimensions for adversarial attack scenarios (i.e., black-box, white-box, and gray-box), target type, and adversarial examples generation methods (gradient-based, score-based, decision-based, transfer- based, and others). Based on the designed taxonomy, we systematically review the existing research efforts on adversarial ML in representative CPS (i.e., transportation, healthcare, and energy). Furthermore, we provide one case study to demonstrate the impact of adversarial examples of attacks on a smart energy CPS deployment. The results indicate that the accuracy can decrease significantly from 92.62% to 55.42% with a 30% adversarial sample injection. Finally, we discuss potential countermeasures and future research directions for adversarial ML.
机器学习(ML)在智能电网等网络物理系统(CPS)中的应用显著增加。虽然可以将ML技术集成到CPS中,但必须考虑ML技术的安全风险。特别是,对抗性示例为ML模型提供了带有故意附加扰动(噪声)的输入,这些扰动(噪声)可能会使模型做出错误的决策。预计扰动很小或很小,因此对抗性示例对人类来说可能是不可见的,但会显著影响ML模型的输出。在本文中,我们设计了一个分类法,为研究基于最新文献的对抗性示例生成技术提供了问题空间。我们提出了一个包含三个维度的三维框架,用于对抗性攻击场景(即黑盒、白盒和灰盒)、目标类型和对抗性示例生成方法(基于梯度、基于分数、基于决策、基于转移等)。基于设计的分类法,我们系统地回顾了代表性CPS(即交通、医疗和能源)中对抗性机器学习的现有研究成果。此外,我们提供了一个案例研究,以展示对抗性攻击示例对智能能源CPS部署的影响。结果表明,当对抗性样品加量为30%时,正确率从92.62%显著下降到55.42%。最后,讨论了对抗性机器学习的潜在对策和未来的研究方向。
{"title":"Towards an Adversarial Machine Learning Framework in Cyber-Physical Systems","authors":"John Mulo, Pu Tian, Adamu Hussaini, Hengshuo Liang, Wei Yu","doi":"10.1109/SERA57763.2023.10197774","DOIUrl":"https://doi.org/10.1109/SERA57763.2023.10197774","url":null,"abstract":"The applications of machine learning (ML) in cyber-physical systems (CPS), such as the smart energy grid has increased significantly. While ML technology can be integrated into CPS, the security risk of ML technology has to be considered. In particular, adversarial examples provide inputs to a ML model with intentionally attached perturbations (noise) that could pose the model to make incorrect decisions. Perturbations are expected to be small or marginal so that adversarial examples could be invisible to humans, but can significantly affect the output of ML models. In this paper, we design a taxonomy to provide the problem space for investigating the adversarial example generation techniques based on state-of-the-art literature. We propose a three-dimensional framework containing three dimensions for adversarial attack scenarios (i.e., black-box, white-box, and gray-box), target type, and adversarial examples generation methods (gradient-based, score-based, decision-based, transfer- based, and others). Based on the designed taxonomy, we systematically review the existing research efforts on adversarial ML in representative CPS (i.e., transportation, healthcare, and energy). Furthermore, we provide one case study to demonstrate the impact of adversarial examples of attacks on a smart energy CPS deployment. The results indicate that the accuracy can decrease significantly from 92.62% to 55.42% with a 30% adversarial sample injection. Finally, we discuss potential countermeasures and future research directions for adversarial ML.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1