首页 > 最新文献

2020 54th Annual Conference on Information Sciences and Systems (CISS)最新文献

英文 中文
Statistical Delay/Error-Rate Bounded QoS Provisioning Across Clustered MmWave-Channels Over Cell-Free Massive MIMO Based 5G Mobile Wireless Networks in the Finite Blocklength Regime 有限块长度下基于无蜂窝大规模MIMO的5G移动无线网络上集群毫米波信道的统计延迟/错误率有界QoS提供
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570617109
Xi Zhang, Jingqing Wang, H. V. Poor
To support ultra-reliable low-latency communications (URLLC) for time-sensitive multimedia 5G wireless services, several advanced techniques, including statistical delay-bounded quality-of-service (QoS) provisioning and finite blocklength coding (FBC), have been developed to upper-bound both delay and error- rate. On the other hand, millimeter wave (mmWave) cell-free (CF) massive multi-input multi-output (m-MIMO) techniques, where a large number of distributed access points (APs) jointly serve all users at millimeter wave frequencies using the same time- frequency resources, has emerged as one of the key promising candidate techniques to significantly improve QoS performance in 5G networks. Leveraging the sparse scattering characteristics of mmWave wireless channels, the arrival traffic can be partitioned into parallel substreams using scattering-clusters based mmWave wireless channel model to reduce queuing delay. However, due to the complexity of analyzing queueing dynamics across clustered mmWave wireless channels for CF m-MIMO schemes, it is challenging to statistically guarantee QoS performance in terms of upper-bounding delay and error-rate. To overcome the above- mentioned problems, in this paper we propose a novel analytical model to quantitatively characterize stochastic QoS performance of delay and error-rate across clustered mmWave channels for CF m-MIMO schemes. In particular, we develop CF m-MIMO system models across clustered mmWave wireless channels. We also apply the Mellin transform to derive an upper bound on the delay violation probability using the spatial multiplexing queue model. Our simulation results validate and evaluate our proposed FBC based mmWave CF m-MIMO schemes under statistical delay/error-rate bounded QoS constraints.
为了支持对时间敏感的多媒体5G无线服务的超可靠低延迟通信(URLLC),已经开发了几种先进技术,包括统计延迟有界服务质量(QoS)提供和有限块长度编码(FBC),以实现延迟和错误率的上限。另一方面,毫米波(mmWave)无蜂窝(CF)大规模多输入多输出(m-MIMO)技术,其中大量分布式接入点(ap)在毫米波频率上使用相同的时间-频率资源共同为所有用户服务,已成为显著提高5G网络QoS性能的关键有前途的候选技术之一。利用毫米波无线信道的稀疏散射特性,利用基于散射簇的毫米波无线信道模型将到达流量划分为并行子流,以降低排队延迟。然而,由于分析CF m-MIMO方案跨集群毫米波无线信道的队列动态的复杂性,从统计上保证上限延迟和错误率方面的QoS性能是具有挑战性的。为了克服上述问题,本文提出了一种新的分析模型来定量表征CF m-MIMO方案在集群毫米波信道上的延迟和错误率的随机QoS性能。特别是,我们开发了跨集群毫米波无线信道的CF m-MIMO系统模型。利用空间复用队列模型,利用Mellin变换推导出了延迟违反概率的上界。我们的仿真结果验证和评估了我们在统计延迟/错误率有界QoS约束下提出的基于FBC的毫米波CF m-MIMO方案。
{"title":"Statistical Delay/Error-Rate Bounded QoS Provisioning Across Clustered MmWave-Channels Over Cell-Free Massive MIMO Based 5G Mobile Wireless Networks in the Finite Blocklength Regime","authors":"Xi Zhang, Jingqing Wang, H. V. Poor","doi":"10.1109/CISS48834.2020.1570617109","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570617109","url":null,"abstract":"To support ultra-reliable low-latency communications (URLLC) for time-sensitive multimedia 5G wireless services, several advanced techniques, including statistical delay-bounded quality-of-service (QoS) provisioning and finite blocklength coding (FBC), have been developed to upper-bound both delay and error- rate. On the other hand, millimeter wave (mmWave) cell-free (CF) massive multi-input multi-output (m-MIMO) techniques, where a large number of distributed access points (APs) jointly serve all users at millimeter wave frequencies using the same time- frequency resources, has emerged as one of the key promising candidate techniques to significantly improve QoS performance in 5G networks. Leveraging the sparse scattering characteristics of mmWave wireless channels, the arrival traffic can be partitioned into parallel substreams using scattering-clusters based mmWave wireless channel model to reduce queuing delay. However, due to the complexity of analyzing queueing dynamics across clustered mmWave wireless channels for CF m-MIMO schemes, it is challenging to statistically guarantee QoS performance in terms of upper-bounding delay and error-rate. To overcome the above- mentioned problems, in this paper we propose a novel analytical model to quantitatively characterize stochastic QoS performance of delay and error-rate across clustered mmWave channels for CF m-MIMO schemes. In particular, we develop CF m-MIMO system models across clustered mmWave wireless channels. We also apply the Mellin transform to derive an upper bound on the delay violation probability using the spatial multiplexing queue model. Our simulation results validate and evaluate our proposed FBC based mmWave CF m-MIMO schemes under statistical delay/error-rate bounded QoS constraints.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine Sensors 拜占庭传感器存在下的降秩最小二乘参数估计
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570610804
G. NaganandaK., Rick S. Blum, Alec Koppel
In this paper, we study the impact of the presence of byzantine sensors on the reduced-rank linear least squares (LS) estimator. A sensor network with N sensors makes observations of the physical phenomenon and transmits them to a fusion center which computes the LS estimate of the parameter of interest. It is well-known that rank reduction exploits the bias-variance tradeoff in the full-rank estimator by putting higher priority on highly informative content of the data. The low-rank LS estimator is constructed using this highly informative content, while the remaining data can be discarded without affecting the overall performance of the estimator. We consider the scenario where a fraction 0 < α < 1 of the N sensors are subject to data falsification attack from byzantine sensors, wherein an intruder injects a higher noise power (compared to the unattacked sensors) to the measurements of the attacked sensors.Our main contribution is an analytical characterization of the impact of data falsification attack of the above type on the performance of reduced-rank LS estimator. In particular, we show how optimally prioritizing the highly informative content of the data gets affected in the presence of attacks. A surprising result is that, under sensor attacks, when the elements of the data matrix are all positive the error performance of the low- rank estimator experiences a phenomenon wherein the estimate of the mean-squared error comprises negative components. A complex nonlinear programming-based recipe is known to exist that resolves this undesirable effect; however, the phenomenon is oftentimes considered very objectionable in the statistical literature. On the other hand, to our advantage this effect can serve to detect cyber attacks on sensor systems. Numerical results are presented to complement the theoretical findings of the paper.
在本文中,我们研究了拜占庭传感器的存在对降秩线性最小二乘估计量的影响。由N个传感器组成的传感器网络对物理现象进行观测,并将其传输到一个融合中心,由该中心计算感兴趣参数的LS估计。众所周知,秩降利用全秩估计器中的偏差-方差权衡,将高信息量的数据内容放在更高的优先级上。低秩LS估计器是使用这些高信息量的内容构建的,而剩余的数据可以被丢弃,而不会影响估计器的整体性能。我们考虑的情况是,N个传感器中的分数0 < α < 1受到拜占庭传感器的数据伪造攻击,其中入侵者向受攻击传感器的测量注入更高的噪声功率(与未受攻击的传感器相比)。我们的主要贡献是分析了上述类型的数据伪造攻击对降秩LS估计器性能的影响。特别是,我们展示了在存在攻击时如何对数据的高信息量内容进行最佳优先级排序。一个令人惊讶的结果是,在传感器攻击下,当数据矩阵的元素都是正值时,低秩估计器的误差性能会经历一种均方误差估计包含负分量的现象。已知存在一种复杂的基于非线性规划的方法来解决这种不良影响;然而,这种现象在统计文献中经常被认为是非常令人反感的。另一方面,对我们有利的是,这种效应可以用来检测对传感器系统的网络攻击。数值结果补充了本文的理论结论。
{"title":"Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine Sensors","authors":"G. NaganandaK., Rick S. Blum, Alec Koppel","doi":"10.1109/CISS48834.2020.1570610804","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570610804","url":null,"abstract":"In this paper, we study the impact of the presence of byzantine sensors on the reduced-rank linear least squares (LS) estimator. A sensor network with N sensors makes observations of the physical phenomenon and transmits them to a fusion center which computes the LS estimate of the parameter of interest. It is well-known that rank reduction exploits the bias-variance tradeoff in the full-rank estimator by putting higher priority on highly informative content of the data. The low-rank LS estimator is constructed using this highly informative content, while the remaining data can be discarded without affecting the overall performance of the estimator. We consider the scenario where a fraction 0 < α < 1 of the N sensors are subject to data falsification attack from byzantine sensors, wherein an intruder injects a higher noise power (compared to the unattacked sensors) to the measurements of the attacked sensors.Our main contribution is an analytical characterization of the impact of data falsification attack of the above type on the performance of reduced-rank LS estimator. In particular, we show how optimally prioritizing the highly informative content of the data gets affected in the presence of attacks. A surprising result is that, under sensor attacks, when the elements of the data matrix are all positive the error performance of the low- rank estimator experiences a phenomenon wherein the estimate of the mean-squared error comprises negative components. A complex nonlinear programming-based recipe is known to exist that resolves this undesirable effect; however, the phenomenon is oftentimes considered very objectionable in the statistical literature. On the other hand, to our advantage this effect can serve to detect cyber attacks on sensor systems. Numerical results are presented to complement the theoretical findings of the paper.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123861928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity of Inference in Vehicular Ad-hoc Networks : Invited Presentation 车辆自组织网络中的推理网络安全:特邀报告
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570627364
Zisheng Wang, Rick S. Blum
In recent years, there has been a surge in research and development efforts on vehicular ad-hoc networks (VANETs) with the objective to make driving safer. VANETS that share sensor data can provide tremendous improvements in this respect. Unfortunately, such VANETs are known for numerous security concerns and are vulnerable to cyber-attacks. In this paper we focus on studying cyber physical attacks on VANETs which share sensor data among vehicles to track important objects, an important emerging topic that has received little attention. We develop an appropriate VANET system model along with attack detection methods that can find any attack that impacts tracking of important objects like other vehicles or pedestrians regardless of how the attack is launched. This includes attacks modifying hardware, software, sensor data, communications or anything else. We have not seen any similar work. We illustrate these ideas with numerical results for a specific efficient distributed tracking algorithm. We describe a attack detection algorithm and numerically investigate the performance.
近年来,车辆自组织网络(vanet)的研究和开发工作激增,目的是使驾驶更安全。共享传感器数据的VANETS可以在这方面提供巨大的改进。不幸的是,这种vanet存在许多安全问题,容易受到网络攻击。在本文中,我们重点研究了对vanet的网络物理攻击,vanet在车辆之间共享传感器数据以跟踪重要物体,这是一个重要的新兴课题,但很少受到关注。我们开发了一个适当的VANET系统模型以及攻击检测方法,可以发现任何影响其他车辆或行人等重要物体跟踪的攻击,无论攻击是如何发起的。这包括修改硬件、软件、传感器数据、通信或其他任何东西的攻击。我们还没有看到类似的工作。我们用一个特定的高效分布式跟踪算法的数值结果来说明这些思想。我们描述了一种攻击检测算法,并对其性能进行了数值研究。
{"title":"Cybersecurity of Inference in Vehicular Ad-hoc Networks : Invited Presentation","authors":"Zisheng Wang, Rick S. Blum","doi":"10.1109/CISS48834.2020.1570627364","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570627364","url":null,"abstract":"In recent years, there has been a surge in research and development efforts on vehicular ad-hoc networks (VANETs) with the objective to make driving safer. VANETS that share sensor data can provide tremendous improvements in this respect. Unfortunately, such VANETs are known for numerous security concerns and are vulnerable to cyber-attacks. In this paper we focus on studying cyber physical attacks on VANETs which share sensor data among vehicles to track important objects, an important emerging topic that has received little attention. We develop an appropriate VANET system model along with attack detection methods that can find any attack that impacts tracking of important objects like other vehicles or pedestrians regardless of how the attack is launched. This includes attacks modifying hardware, software, sensor data, communications or anything else. We have not seen any similar work. We illustrate these ideas with numerical results for a specific efficient distributed tracking algorithm. We describe a attack detection algorithm and numerically investigate the performance.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Belief Propagation Pattern-Coupled Sparse Bayesian Learning for Non-Stationary Uplink Channel Estimation Over Massive-MIMO Based 5G Mobile Wireless Networks 基于大规模mimo的5G移动无线网络非平稳上行信道估计的信念传播模式耦合稀疏贝叶斯学习
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570617107
Jianqiao Chen, Xi Zhang
In this paper, we develop a novel sparse Bayesian learning (SBL) scheme for recovery of block-sparse uplink channels in time-division duplex (TDD) massive multi-input multi-output (MIMO) based 5G mobile wireless networks. We first introduce a pattern-coupled hierarchical Gaussian prior to characterize the sparse channel dependency among neighboring antennas, where the dependency coefficient is modeled by birth- death process. Then, to derive hyperparameters, which are employed to control the sparsity of channel coefficients, we exploit an expectation-maximization (EM) formulation to iteratively maximize a lower bound on the posterior probability. In the M-step, the particle swarm optimization (PSO) algorithm is employed to maximize the lower bound efficiently. Finally, we develop a belief propagation (BP)-based pattern-coupled sparse Bayesian learning (PC-SBL) algorithm, referred to as the BP-PC-SBL, to recover block-sparse uplink channels. Based on the factor graph of blocksparse uplink channels, we show that messages in BP satisfy complex Gaussian probability distribution. Therefore, we only need to update their means and variances when updating the messages. BP-PC-SBL algorithm provides precise approximations of matrix inversion as computed by the conventional SBL algorithm, which results in significantly improved computational efficiency. Our numerical analyses validate and evaluate the effectiveness of our proposed schemes and algorithms.
我们首先引入模式耦合的分层高斯先验来表征邻近天线之间的稀疏信道依赖,其中依赖系数通过生-死过程建模。然后,为了推导用于控制信道系数稀疏度的超参数,我们利用期望最大化(EM)公式迭代地最大化后验概率的下界。在m步中,采用粒子群优化算法(PSO)实现下界的有效最大化。最后,我们开发了一种基于信念传播(BP)的模式耦合稀疏贝叶斯学习(PC-SBL)算法,简称BP-PC-SBL,用于恢复块稀疏上行信道。基于块稀疏上行信道的因子图,我们证明BP中的消息满足复高斯概率分布。因此,我们只需要在更新消息时更新它们的均值和方差。BP-PC-SBL算法提供了传统SBL算法计算的矩阵反演的精确逼近,从而显著提高了计算效率。我们的数值分析验证和评估了我们所提出的方案和算法的有效性。
{"title":"Belief Propagation Pattern-Coupled Sparse Bayesian Learning for Non-Stationary Uplink Channel Estimation Over Massive-MIMO Based 5G Mobile Wireless Networks","authors":"Jianqiao Chen, Xi Zhang","doi":"10.1109/CISS48834.2020.1570617107","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570617107","url":null,"abstract":"In this paper, we develop a novel sparse Bayesian learning (SBL) scheme for recovery of block-sparse uplink channels in time-division duplex (TDD) massive multi-input multi-output (MIMO) based 5G mobile wireless networks. We first introduce a pattern-coupled hierarchical Gaussian prior to characterize the sparse channel dependency among neighboring antennas, where the dependency coefficient is modeled by birth- death process. Then, to derive hyperparameters, which are employed to control the sparsity of channel coefficients, we exploit an expectation-maximization (EM) formulation to iteratively maximize a lower bound on the posterior probability. In the M-step, the particle swarm optimization (PSO) algorithm is employed to maximize the lower bound efficiently. Finally, we develop a belief propagation (BP)-based pattern-coupled sparse Bayesian learning (PC-SBL) algorithm, referred to as the BP-PC-SBL, to recover block-sparse uplink channels. Based on the factor graph of blocksparse uplink channels, we show that messages in BP satisfy complex Gaussian probability distribution. Therefore, we only need to update their means and variances when updating the messages. BP-PC-SBL algorithm provides precise approximations of matrix inversion as computed by the conventional SBL algorithm, which results in significantly improved computational efficiency. Our numerical analyses validate and evaluate the effectiveness of our proposed schemes and algorithms.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"34 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113933825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Mismatched Detection and Safe, Trustworthy Machine Learning 关于不匹配检测和安全、可信的机器学习
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570627767
Kush R. Varshney
Instilling trust in high-stakes applications of machine learning is becoming essential. Trust may be decomposed into four dimensions: basic accuracy, reliability, human interaction, and aligned purpose. The first two of these also constitute the properties of safe machine learning systems. The second dimension, reliability, is mainly concerned with being robust to epistemic uncertainty and model mismatch. It arises in the machine learning paradigms of distribution shift, data poisoning attacks, and algorithmic fairness. All of these problems can be abstractly modeled using the theory of mismatched hypothesis testing from statistical signal processing. By doing so, we can take advantage of performance characterizations in that literature to better understand the various machine learning issues.
向高风险的机器学习应用灌输信任正变得至关重要。信任可以分解为四个维度:基本准确性、可靠性、人际互动和一致的目的。其中的前两个也构成了安全机器学习系统的属性。第二个维度是可靠性,主要关注对认知不确定性和模型不匹配的鲁棒性。它出现在分布转移、数据中毒攻击和算法公平性的机器学习范式中。所有这些问题都可以用统计信号处理中的错配假设检验理论进行抽象建模。通过这样做,我们可以利用这些文献中的性能特征来更好地理解各种机器学习问题。
{"title":"On Mismatched Detection and Safe, Trustworthy Machine Learning","authors":"Kush R. Varshney","doi":"10.1109/CISS48834.2020.1570627767","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570627767","url":null,"abstract":"Instilling trust in high-stakes applications of machine learning is becoming essential. Trust may be decomposed into four dimensions: basic accuracy, reliability, human interaction, and aligned purpose. The first two of these also constitute the properties of safe machine learning systems. The second dimension, reliability, is mainly concerned with being robust to epistemic uncertainty and model mismatch. It arises in the machine learning paradigms of distribution shift, data poisoning attacks, and algorithmic fairness. All of these problems can be abstractly modeled using the theory of mismatched hypothesis testing from statistical signal processing. By doing so, we can take advantage of performance characterizations in that literature to better understand the various machine learning issues.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Learning Parallel Markov Chains over Unreliable Wireless Channels 在不可靠无线信道上学习平行马尔可夫链
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570614323
Weichang Wang, Lei Ying
This paper studies the problem of communications between aircraft and a control tower for aviation risk monitoring over wireless channels. The control tower needs to monitor the state of each aircraft in real time by receiving reports from the aircraft. Due to limited bandwidth, only a subset of aircraft can communicate with the control tower at the same time. This paper focuses on the problem of optimal scheduling of data transmissions to minimize the risk. We formulate the problem as learning states of parallel Markov chains where each Markov chain represents an aircraft, and the objective is to minimize the information entropy of all the aircraft. We propose an algorithm based on Whittle’s index and study the indexability of the problem for both single-state wireless channels and multi-state wireless channels. Our numerical evaluations show that our algorithm improves the accuracy of the estimations compared with the heuristic scheduling methods such as greedy and Round& Robin.
研究了航空风险监测中飞机与控制塔的无线通信问题。控制塔需要通过接收每架飞机的报告来实时监控每架飞机的状态。由于带宽有限,只有一小部分飞机可以同时与控制塔通信。本文主要研究数据传输的最优调度问题,以使风险最小化。我们将问题表述为平行马尔可夫链的学习状态,其中每个马尔可夫链代表一个飞机,目标是最小化所有飞机的信息熵。提出了一种基于Whittle索引的算法,并对单状态无线信道和多状态无线信道的可索引性进行了研究。数值计算表明,与启发式调度方法(如贪心调度和轮循调度)相比,该算法提高了估计的准确性。
{"title":"Learning Parallel Markov Chains over Unreliable Wireless Channels","authors":"Weichang Wang, Lei Ying","doi":"10.1109/CISS48834.2020.1570614323","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570614323","url":null,"abstract":"This paper studies the problem of communications between aircraft and a control tower for aviation risk monitoring over wireless channels. The control tower needs to monitor the state of each aircraft in real time by receiving reports from the aircraft. Due to limited bandwidth, only a subset of aircraft can communicate with the control tower at the same time. This paper focuses on the problem of optimal scheduling of data transmissions to minimize the risk. We formulate the problem as learning states of parallel Markov chains where each Markov chain represents an aircraft, and the objective is to minimize the information entropy of all the aircraft. We propose an algorithm based on Whittle’s index and study the indexability of the problem for both single-state wireless channels and multi-state wireless channels. Our numerical evaluations show that our algorithm improves the accuracy of the estimations compared with the heuristic scheduling methods such as greedy and Round& Robin.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning based Affective Sensing with Remote Photoplethysmography 基于深度学习的情感感知与远程光容积脉搏波
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570617362
Timur Luguev, Dominik Seuss, Jens-Uwe Garbas
Recent studies show that heart rate variability (HRV) is an important physiological characteristic that reflects physiological and affective states of a person. Advancements in the field of remote camera-based photoplethysmography has made possible measurement of cardiac signals using just the raw face videos. Most of existing studies of camera-based cardiovascular monitoring focus on just heart rate (HR) estimation, leaving more interesting case of remote HRV estimation out of scope. However, knowing only the average HR is not enough for affective sensing applications, and measurement of HRV is beneficial. We propose a new framework, which uses deep spatiotemporal networks for contactless HRV measurements from raw facial videos. The proposed framework employs data augmentation technique. It was evaluated on two multimodal databases that consists face videos with synchronized physiological signals. Experiments demonstrate the advantage of our deep learning based approach for HRV estimation. We also achieved promising results for inclusion remote HRV estimation in affective sensing applications.
近年来的研究表明,心率变异性(HRV)是反映人的生理和情感状态的重要生理特征。基于远程摄像机的光电脉搏波描记技术的进步使得仅使用原始面部视频就可以测量心脏信号成为可能。现有的基于摄像机的心血管监测研究大多集中在心率(HR)的估计上,而对远程HRV的估计则处于研究范围之外。然而,对于情感感知应用来说,仅仅知道平均人力资源是不够的,测量人力资源价值是有益的。我们提出了一个新的框架,该框架使用深度时空网络对原始面部视频进行非接触式HRV测量。该框架采用了数据增强技术。在两个多模态数据库上进行了评估,该数据库由具有同步生理信号的面部视频组成。实验证明了基于深度学习的HRV估计方法的优势。我们还在情感传感应用中包含远程HRV估计方面取得了可喜的结果。
{"title":"Deep Learning based Affective Sensing with Remote Photoplethysmography","authors":"Timur Luguev, Dominik Seuss, Jens-Uwe Garbas","doi":"10.1109/CISS48834.2020.1570617362","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570617362","url":null,"abstract":"Recent studies show that heart rate variability (HRV) is an important physiological characteristic that reflects physiological and affective states of a person. Advancements in the field of remote camera-based photoplethysmography has made possible measurement of cardiac signals using just the raw face videos. Most of existing studies of camera-based cardiovascular monitoring focus on just heart rate (HR) estimation, leaving more interesting case of remote HRV estimation out of scope. However, knowing only the average HR is not enough for affective sensing applications, and measurement of HRV is beneficial. We propose a new framework, which uses deep spatiotemporal networks for contactless HRV measurements from raw facial videos. The proposed framework employs data augmentation technique. It was evaluated on two multimodal databases that consists face videos with synchronized physiological signals. Experiments demonstrate the advantage of our deep learning based approach for HRV estimation. We also achieved promising results for inclusion remote HRV estimation in affective sensing applications.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CISS 2020 TOC
Pub Date : 2020-03-01 DOI: 10.1109/ciss48834.2020.9086271
{"title":"CISS 2020 TOC","authors":"","doi":"10.1109/ciss48834.2020.9086271","DOIUrl":"https://doi.org/10.1109/ciss48834.2020.9086271","url":null,"abstract":"","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Multiple Change-Point Detection with Limited Communication 有限通信条件下的确定性多变化点检测
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570627514
Eyal Nitzan, Topi Halme, H. Poor, V. Koivunen
Large-scale sensor networks are used in modern applications to perform statistical inference. In particular, multiple change-point detection using a sensor network is of interest in applications, such as Internet of Things and environmental monitoring. In this paper, we consider deterministic multiple change-point detection using a sensor network, in which each sensor observes a different data stream and communicates with a fusion center (FC). Due to communication limitations, the fusion center monitors only a subset of the sensors at each time slot. We propose a detection procedure that takes into account these limitations. In this procedure, the FC monitors the sensors with the highest cumulative sum values under the communication limitations. It is shown that the proposed procedure is scalable in the sense that it attains an average detection delay (ADD) that does not increase with the number of sensors, while controlling the false discovery rate. Using the proposed procedure, we identify and analyze the tradeoff between reducing the ADD and reducing the average number of observations drawn until the change-points are declared.
大规模传感器网络在现代应用中用于执行统计推断。特别是,使用传感器网络的多变化点检测在物联网和环境监测等应用中很有意义。在本文中,我们考虑使用传感器网络的确定性多变化点检测,其中每个传感器观察不同的数据流并与融合中心(FC)通信。由于通信的限制,融合中心在每个时隙只监控传感器的一个子集。我们提出了一种考虑到这些限制的检测程序。在此过程中,FC监控在通信限制下累积和值最高的传感器。结果表明,该方法具有可扩展性,在控制错误发现率的同时,获得了不随传感器数量增加而增加的平均检测延迟(ADD)。使用所提出的过程,我们确定并分析了减少ADD和减少在声明更改点之前绘制的平均观察数之间的权衡。
{"title":"Deterministic Multiple Change-Point Detection with Limited Communication","authors":"Eyal Nitzan, Topi Halme, H. Poor, V. Koivunen","doi":"10.1109/CISS48834.2020.1570627514","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570627514","url":null,"abstract":"Large-scale sensor networks are used in modern applications to perform statistical inference. In particular, multiple change-point detection using a sensor network is of interest in applications, such as Internet of Things and environmental monitoring. In this paper, we consider deterministic multiple change-point detection using a sensor network, in which each sensor observes a different data stream and communicates with a fusion center (FC). Due to communication limitations, the fusion center monitors only a subset of the sensors at each time slot. We propose a detection procedure that takes into account these limitations. In this procedure, the FC monitors the sensors with the highest cumulative sum values under the communication limitations. It is shown that the proposed procedure is scalable in the sense that it attains an average detection delay (ADD) that does not increase with the number of sensors, while controlling the false discovery rate. Using the proposed procedure, we identify and analyze the tradeoff between reducing the ADD and reducing the average number of observations drawn until the change-points are declared.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised Learning 基于变分自编码器和监督学习的文本恶意域名检测
Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570601577
Yuwei Sun, Ng S. T. Chong, H. Ochiai
With the rapid development of information technology, adaptation of an information system in industries and institutes has become more and more common. However, attacks like using zombie networks to access a host thus causing it to shut down are frequent in recent years. Domain names play a significant role in the connection with a server, considered as a key for detecting these attacks. In this paper, we propose a text-based method to convert domain names into numeric features, based on the term frequency and inverse document frequency (TF-IDF). Then we adopt the variational autoencoder (VAE) consisting of an encoder and a decoder, extracting hidden information from features. Moreover, through collapsing the Gaussian distribution of these features at the hidden layer to its mean, the distribution of domain names is visualized. After that, we adopt a supervised learning called Convolutional Neural Network (CNN) for the classification between the malicious and benign. We train the model using feature vectors from the VAE. At last, the scheme achieves a validation accuracy of 0.868 for the malicious domain names detection.
随着信息技术的飞速发展,企业和科研院所对信息系统的适配已经越来越普遍。然而,近年来,使用僵尸网络访问主机从而导致其关闭的攻击频繁发生。域名在与服务器的连接中起着重要的作用,被认为是检测这些攻击的关键。本文提出了一种基于术语频率和逆文档频率(TF-IDF)的基于文本的域名数字特征转换方法。然后采用由编码器和解码器组成的变分自编码器(VAE),从特征中提取隐藏信息。此外,通过将这些特征在隐藏层的高斯分布压缩到其均值,可以可视化域名的分布。之后,我们采用一种被称为卷积神经网络(CNN)的监督学习来进行恶意和良性的分类。我们使用来自VAE的特征向量来训练模型。最后,该方案对恶意域名的检测准确率达到了0.868。
{"title":"Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised Learning","authors":"Yuwei Sun, Ng S. T. Chong, H. Ochiai","doi":"10.1109/CISS48834.2020.1570601577","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570601577","url":null,"abstract":"With the rapid development of information technology, adaptation of an information system in industries and institutes has become more and more common. However, attacks like using zombie networks to access a host thus causing it to shut down are frequent in recent years. Domain names play a significant role in the connection with a server, considered as a key for detecting these attacks. In this paper, we propose a text-based method to convert domain names into numeric features, based on the term frequency and inverse document frequency (TF-IDF). Then we adopt the variational autoencoder (VAE) consisting of an encoder and a decoder, extracting hidden information from features. Moreover, through collapsing the Gaussian distribution of these features at the hidden layer to its mean, the distribution of domain names is visualized. After that, we adopt a supervised learning called Convolutional Neural Network (CNN) for the classification between the malicious and benign. We train the model using feature vectors from the VAE. At last, the scheme achieves a validation accuracy of 0.868 for the malicious domain names detection.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 54th Annual Conference on Information Sciences and Systems (CISS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1