首页 > 最新文献

2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
Study on Performance Bottleneck of Flow-Level Information-Centric Network Simulator 流量级信息中心网络模拟器的性能瓶颈研究
Pub Date : 2023-06-26 DOI: 10.1109/COMPSAC57700.2023.10368592
Shota Inoue, Han Nay Aung, Keita Goto, Soma Yamamoto, Hiroyuki Ohsaki
Information-Centric Networking (ICN) has gained attention as one of the next-generation internet architectures that focuses on the data being transmitted rather than the hosts transmitting it. Due to the differences between ICN and TCP/IP networks, it is not possible to evaluate the performance of ICN using network simulators designed for TCP/IP. A number of studies have been conducted to develop ICN network simulators. However, further acceleration of ICN network simulators is expected to enable large-scale ICN network performance evaluation. In this paper, we analyze the performance bottleneck of the flow-level ICN simulator called FICNSIM (Fluid-based ICNSIMulator) by profiling its performance using the Julia language source code. Specifically, we identify the processing that is causing the performance bottleneck of FICNSIM and investigate the scalability of FICNSIM with respect to network scale.
以信息为中心的网络(ICN)是下一代互联网架构之一,它关注传输的数据而不是传输数据的主机,因此备受关注。由于 ICN 与 TCP/IP 网络不同,因此无法使用为 TCP/IP 设计的网络模拟器来评估 ICN 的性能。为开发 ICN 网络模拟器,已经开展了一些研究。然而,ICN 网络模拟器的进一步加速有望实现大规模的 ICN 网络性能评估。在本文中,我们使用 Julia 语言源代码分析了名为 FICNSIM(基于流体的 ICNSIMulator)的流级 ICN 模拟器的性能瓶颈。具体来说,我们确定了导致 FICNSIM 性能瓶颈的处理过程,并研究了 FICNSIM 在网络规模方面的可扩展性。
{"title":"Study on Performance Bottleneck of Flow-Level Information-Centric Network Simulator","authors":"Shota Inoue, Han Nay Aung, Keita Goto, Soma Yamamoto, Hiroyuki Ohsaki","doi":"10.1109/COMPSAC57700.2023.10368592","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.10368592","url":null,"abstract":"Information-Centric Networking (ICN) has gained attention as one of the next-generation internet architectures that focuses on the data being transmitted rather than the hosts transmitting it. Due to the differences between ICN and TCP/IP networks, it is not possible to evaluate the performance of ICN using network simulators designed for TCP/IP. A number of studies have been conducted to develop ICN network simulators. However, further acceleration of ICN network simulators is expected to enable large-scale ICN network performance evaluation. In this paper, we analyze the performance bottleneck of the flow-level ICN simulator called FICNSIM (Fluid-based ICNSIMulator) by profiling its performance using the Julia language source code. Specifically, we identify the processing that is causing the performance bottleneck of FICNSIM and investigate the scalability of FICNSIM with respect to network scale.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"241 1","pages":"1908-1911"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139368437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RL-KDA: A K-degree Anonymity Algorithm Based on Reinforcement Learning 基于强化学习的k度匿名算法RL-KDA
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00100
Xuebin Ma, Nan Xiang, Yulan Gao
K-degree anonymity is one of the main techniques for data privacy and has gained attention in academia, industry, and government. Many social network data publishing algorithms based on K-anonymity techniques have been proposed, but most studies focus on static social networks. Compared to static social networks, dynamic social networks suffer from problems such as higher information loss and lower data utility. To address the existing problem of dynamic social networks, we propose a K-degree anonymity dynamic data publishing algorithm based on reinforcement learning. The algorithm ends with two phases: anonymization sequence and graph modification. In the anonymous sequence phase, this paper combines the idea of reinforcement learning and the characteristics of dynamic data change to build a reinforcement learning model for anonymous sequences. In this way, an ideal anonymous sequence can be created. We also propose a new strategy for graph modification, which selects edges according to degree centrality to generate anonymous graphs. Finally, experiments on real datasets show the effectiveness of our algorithm.
k度匿名是保护数据隐私的主要技术之一,已引起学术界、工业界和政府的广泛关注。许多基于k -匿名技术的社交网络数据发布算法已经被提出,但大多数研究都集中在静态社交网络上。与静态社交网络相比,动态社交网络存在信息丢失率高、数据效用低等问题。针对动态社交网络存在的问题,提出了一种基于强化学习的k度匿名动态数据发布算法。该算法以匿名化排序和图修改两个阶段结束。在匿名序列阶段,本文结合强化学习的思想和数据动态变化的特点,建立了匿名序列的强化学习模型。通过这种方式,可以创建理想的匿名序列。我们还提出了一种新的图修改策略,根据度中心性选择边生成匿名图。最后,在实际数据集上进行了实验,验证了算法的有效性。
{"title":"RL-KDA: A K-degree Anonymity Algorithm Based on Reinforcement Learning","authors":"Xuebin Ma, Nan Xiang, Yulan Gao","doi":"10.1109/COMPSAC57700.2023.00100","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00100","url":null,"abstract":"K-degree anonymity is one of the main techniques for data privacy and has gained attention in academia, industry, and government. Many social network data publishing algorithms based on K-anonymity techniques have been proposed, but most studies focus on static social networks. Compared to static social networks, dynamic social networks suffer from problems such as higher information loss and lower data utility. To address the existing problem of dynamic social networks, we propose a K-degree anonymity dynamic data publishing algorithm based on reinforcement learning. The algorithm ends with two phases: anonymization sequence and graph modification. In the anonymous sequence phase, this paper combines the idea of reinforcement learning and the characteristics of dynamic data change to build a reinforcement learning model for anonymous sequences. In this way, an ideal anonymous sequence can be created. We also propose a new strategy for graph modification, which selects edges according to degree centrality to generate anonymous graphs. Finally, experiments on real datasets show the effectiveness of our algorithm.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dealing with Explainability Requirements for Machine Learning Systems 处理机器学习系统的可解释性要求
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00182
Tong Li, Lu Han
Explainability has recently been recognized as an increasingly important quality requirement for machine learning systems. Various methods have been proposed by machine learning researchers to explain the results of machine learning techniques. However, analyzing and operationalizing such explainability requirements is knowledge-intensive and time-consuming. This paper proposes an explainability requirements analysis framework using contextual goal models, aiming at systematically and automatically deriving appropriate explainability methods. Specifically, we comprehensively survey and analyze existing explainability methods, associating them with explainability requirements and emphasizing the context for applying them. In such a way, we can automatically operationalize explainability requirements into concrete explainability methods. We conducted a case study with ten participants to evaluate our proposal. The results illustrate the framework’s usability for satisfying the explainability requirements of machine learning systems.
可解释性最近被认为是机器学习系统越来越重要的质量要求。机器学习研究人员提出了各种方法来解释机器学习技术的结果。然而,分析和操作这种可解释性需求是知识密集型的,而且很耗时。本文提出了一个基于上下文目标模型的可解释性需求分析框架,旨在系统、自动地推导出合适的可解释性方法。具体而言,我们全面调查和分析现有的可解释性方法,将它们与可解释性要求联系起来,并强调应用它们的背景。通过这种方式,我们可以自动地将可解释性需求操作化为具体的可解释性方法。我们对10名参与者进行了案例研究,以评估我们的提案。结果说明了该框架在满足机器学习系统的可解释性要求方面的可用性。
{"title":"Dealing with Explainability Requirements for Machine Learning Systems","authors":"Tong Li, Lu Han","doi":"10.1109/COMPSAC57700.2023.00182","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00182","url":null,"abstract":"Explainability has recently been recognized as an increasingly important quality requirement for machine learning systems. Various methods have been proposed by machine learning researchers to explain the results of machine learning techniques. However, analyzing and operationalizing such explainability requirements is knowledge-intensive and time-consuming. This paper proposes an explainability requirements analysis framework using contextual goal models, aiming at systematically and automatically deriving appropriate explainability methods. Specifically, we comprehensively survey and analyze existing explainability methods, associating them with explainability requirements and emphasizing the context for applying them. In such a way, we can automatically operationalize explainability requirements into concrete explainability methods. We conducted a case study with ten participants to evaluate our proposal. The results illustrate the framework’s usability for satisfying the explainability requirements of machine learning systems.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Bicycle Flow Forecasting using Spatial and Temporal Graph Neural Network 基于时空图神经网络的公共自行车流量预测
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00071
Xiang-Li Lu, Hwai-Jung Hsu, William Cheng-Chung Chu
Public bicycle systems (PBSs) that connect end users’ houses to public mass transportation are typically viewed as the "last-mile" of public transportation. Because of the limited capacity of stations in a PBS, the PBS operator must dispatch bicycles between stations to ensure that there are always bicycles/spaces available for bicycle borrowing/returning. However, because the variances in flows among stations are large, bicycle dispatch is difficult without a precise flow forecasting approach. In this paper, we propose an innovative approach to forecast bicycle flow on the basis of a graph neural network (GNN). Instead of processing the temporal information using RNN, or 1D-CNN, our approach integrates both spatial and temporal information into graphs, and analyzes them using graph convolution. Our approach works well on NYCitibike open dataset in terms of prediction accuracy. From the experiment, our approach shows it capability in accurate forecasting of peak flows and self-adjustment while perceiving abnormal flows caused by sporadic situations.
公共自行车系统(PBSs)将最终用户的房屋与公共交通连接起来,通常被视为公共交通的“最后一英里”。由于公共广播系统中各站点的容量有限,公共广播系统操作员必须在站点之间调度自行车,以确保始终有可用的自行车/空间供自行车借用/归还。然而,由于车站之间的流量差异很大,如果没有精确的流量预测方法,自行车调度是困难的。本文提出了一种基于图神经网络(GNN)的自行车流量预测方法。我们的方法不是使用RNN或1D-CNN来处理时间信息,而是将空间和时间信息集成到图中,并使用图卷积来分析它们。我们的方法在NYCitibike开放数据集上的预测精度很好。实验结果表明,该方法具有准确预测峰值流量和自我调节的能力,同时能够感知由偶发情况引起的异常流量。
{"title":"Public Bicycle Flow Forecasting using Spatial and Temporal Graph Neural Network","authors":"Xiang-Li Lu, Hwai-Jung Hsu, William Cheng-Chung Chu","doi":"10.1109/COMPSAC57700.2023.00071","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00071","url":null,"abstract":"Public bicycle systems (PBSs) that connect end users’ houses to public mass transportation are typically viewed as the \"last-mile\" of public transportation. Because of the limited capacity of stations in a PBS, the PBS operator must dispatch bicycles between stations to ensure that there are always bicycles/spaces available for bicycle borrowing/returning. However, because the variances in flows among stations are large, bicycle dispatch is difficult without a precise flow forecasting approach. In this paper, we propose an innovative approach to forecast bicycle flow on the basis of a graph neural network (GNN). Instead of processing the temporal information using RNN, or 1D-CNN, our approach integrates both spatial and temporal information into graphs, and analyzes them using graph convolution. Our approach works well on NYCitibike open dataset in terms of prediction accuracy. From the experiment, our approach shows it capability in accurate forecasting of peak flows and self-adjustment while perceiving abnormal flows caused by sporadic situations.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123099540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defeasible-PROV: Conflict Resolution in Smart Building Devices 可失败的证明:智能建筑设备中的冲突解决
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00152
A. Farooq, Zac Taylor, Kyle Ruona, Thomas Moyer
Programmable Logic Controllers (PLCs) are an integral component for managing automation processes of smart buildings. PLCs use protocols which make these control systems vulnerable to many common attacks due to which it is possible to create conflicts on certain devices of smart buildings thereby disrupting functionality. In this paper, we propose DEFEASIBLE-PROV, a system for resolving conflicts in the system by detecting the conflict creating sensors and conflict impacted actuators. Our tool is capable of blocking conflict creating rules in the system. Our evaluation results show that our proposed methodology contributes significantly to conflict resolution in the system.
可编程逻辑控制器(plc)是智能建筑自动化过程管理的重要组成部分。plc使用的协议使这些控制系统容易受到许多常见攻击,因此有可能在智能建筑的某些设备上产生冲突,从而破坏功能。本文提出了一种通过检测产生冲突的传感器和受冲突影响的执行器来解决系统中冲突的DEFEASIBLE-PROV系统。我们的工具能够阻止在系统中创建规则的冲突。我们的评估结果表明,我们提出的方法有助于解决系统中的冲突。
{"title":"Defeasible-PROV: Conflict Resolution in Smart Building Devices","authors":"A. Farooq, Zac Taylor, Kyle Ruona, Thomas Moyer","doi":"10.1109/COMPSAC57700.2023.00152","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00152","url":null,"abstract":"Programmable Logic Controllers (PLCs) are an integral component for managing automation processes of smart buildings. PLCs use protocols which make these control systems vulnerable to many common attacks due to which it is possible to create conflicts on certain devices of smart buildings thereby disrupting functionality. In this paper, we propose DEFEASIBLE-PROV, a system for resolving conflicts in the system by detecting the conflict creating sensors and conflict impacted actuators. Our tool is capable of blocking conflict creating rules in the system. Our evaluation results show that our proposed methodology contributes significantly to conflict resolution in the system.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"17 16","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120844373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Human Context Recognition: Evasion Attacks and Defenses 对抗性人类语境识别:逃避攻击和防御
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00036
Abdulaziz Alajaji, Walter Gerych, kar 2402565399 ku, Luke Buquicchio, E. Agu, E. Rundensteiner
Human Context Recognition (HCR) from smartphone sensor data is a crucial task for Context-Aware (CA) systems, such as those targeting the healthcare and security domains. HCR models deployed in the wild are susceptible to adversarial attacks, wherein an adversary perturbs input sensor values to cause malicious mis-classifications. In this study, we demonstrate evasion attacks that can be perpetuated during model inference, particularly input perturbations that are adversarially calibrated to fool classifiers. In contrast to white-box methods that require impractical levels of system access, black-box evasion attacks merely require the ability to query the model with arbitrary inputs. Specifically, we generate adversarial perturbations using only class confidence scores, as in the Zoo attack, or only class decisions, as in the HopSkipJump (HSJ) attack that correspond with plausible scenarios of possible adversarial attacks. We empirically demonstrate that sophisticated adversarial evasion attacks can significantly impair the accuracy of HCR models, resulting in a performance drop of up to 60% in f1-score. We also propose RobustHCR, an innovative framework for demonstrating and defending against black box evasion threats using a provable defense based on a duality-based network. RobustHCR is able to make reliable predictions regardless of whether its input is under attack or not, effectively mitigating the potential negative impacts caused by adversarial attacks. Rigorous evaluation on both scripted and in-the-wild smartphone HCR datasets demonstrates that RobustHCR can significantly improve the HCR model’s robustness and protect it from possible evasion attacks while maintaining acceptable performance on "clean" inputs. In particular, an HCR model with integrated RobustHCR defenses experienced an f1-score reduction of about 3% as opposed to a reduction of over 50% for an HCR model without a defense.
来自智能手机传感器数据的人类上下文识别(HCR)是上下文感知(CA)系统的关键任务,例如针对医疗保健和安全领域的系统。部署在野外的HCR模型容易受到对抗性攻击,其中攻击者干扰输入传感器值以导致恶意错误分类。在这项研究中,我们展示了逃避攻击可以在模型推理期间持续存在,特别是输入扰动,这些输入扰动被对对性校准以欺骗分类器。与需要不切实际的系统访问级别的白盒方法相比,黑盒规避攻击只需要能够使用任意输入查询模型。具体来说,我们仅使用类置信度得分(如Zoo攻击)或仅使用类决策(如HopSkipJump (HSJ)攻击)生成对抗性扰动,这些攻击与可能的对抗性攻击的合理场景相对应。我们的经验证明,复杂的对抗性逃避攻击会显著损害HCR模型的准确性,导致f1分数的性能下降高达60%。我们还提出了RobustHCR,这是一个创新的框架,用于使用基于二元性网络的可证明防御来演示和防御黑盒规避威胁。无论其输入是否受到攻击,roubusthcr都能够做出可靠的预测,有效减轻对抗性攻击造成的潜在负面影响。对脚本化和野生智能手机HCR数据集的严格评估表明,roubusthcr可以显着提高HCR模型的鲁棒性,并保护它免受可能的逃避攻击,同时在“干净”输入上保持可接受的性能。特别是,集成了RobustHCR防御的HCR模型的f1分数降低了约3%,而没有防御的HCR模型的f1分数降低了50%以上。
{"title":"Adversarial Human Context Recognition: Evasion Attacks and Defenses","authors":"Abdulaziz Alajaji, Walter Gerych, kar 2402565399 ku, Luke Buquicchio, E. Agu, E. Rundensteiner","doi":"10.1109/COMPSAC57700.2023.00036","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00036","url":null,"abstract":"Human Context Recognition (HCR) from smartphone sensor data is a crucial task for Context-Aware (CA) systems, such as those targeting the healthcare and security domains. HCR models deployed in the wild are susceptible to adversarial attacks, wherein an adversary perturbs input sensor values to cause malicious mis-classifications. In this study, we demonstrate evasion attacks that can be perpetuated during model inference, particularly input perturbations that are adversarially calibrated to fool classifiers. In contrast to white-box methods that require impractical levels of system access, black-box evasion attacks merely require the ability to query the model with arbitrary inputs. Specifically, we generate adversarial perturbations using only class confidence scores, as in the Zoo attack, or only class decisions, as in the HopSkipJump (HSJ) attack that correspond with plausible scenarios of possible adversarial attacks. We empirically demonstrate that sophisticated adversarial evasion attacks can significantly impair the accuracy of HCR models, resulting in a performance drop of up to 60% in f1-score. We also propose RobustHCR, an innovative framework for demonstrating and defending against black box evasion threats using a provable defense based on a duality-based network. RobustHCR is able to make reliable predictions regardless of whether its input is under attack or not, effectively mitigating the potential negative impacts caused by adversarial attacks. Rigorous evaluation on both scripted and in-the-wild smartphone HCR datasets demonstrates that RobustHCR can significantly improve the HCR model’s robustness and protect it from possible evasion attacks while maintaining acceptable performance on \"clean\" inputs. In particular, an HCR model with integrated RobustHCR defenses experienced an f1-score reduction of about 3% as opposed to a reduction of over 50% for an HCR model without a defense.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An AI Framework for Modelling and Evaluating Attribution Methods in Enhanced Machine Learning Interpretability 在增强机器学习可解释性中建模和评估归因方法的AI框架
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00158
A. Cuzzocrea, Q. E. A. Ratul, Islam Belmerabet, Edoardo Serra
In this paper, we propose a general methodology for estimating the degree of the attribution methods precision and generality in machine learning interpretability. Additionally, we propose a technique to measure the attribution consistency between two attribution methods. In our experiments, we focus on the two well-known model agnostic attribution methods, SHAP and LIME, then we evaluate them on two real applications in the attack detection field. Our proposed methodology highlights the fact that both LIME and SHAP are lacking precision, generality, and consistency. Therefore, more inspection is needed in the attribution research field.
在本文中,我们提出了一种估计归因方法在机器学习可解释性中的精度和通用性程度的通用方法。此外,我们还提出了一种测量两种归因方法之间归因一致性的技术。在实验中,我们重点研究了两种著名的模型不可知归因方法SHAP和LIME,并对它们在攻击检测领域的两个实际应用进行了评估。我们提出的方法强调了这样一个事实,即LIME和SHAP都缺乏精度、通用性和一致性。因此,归因研究领域还需要更多的检验。
{"title":"An AI Framework for Modelling and Evaluating Attribution Methods in Enhanced Machine Learning Interpretability","authors":"A. Cuzzocrea, Q. E. A. Ratul, Islam Belmerabet, Edoardo Serra","doi":"10.1109/COMPSAC57700.2023.00158","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00158","url":null,"abstract":"In this paper, we propose a general methodology for estimating the degree of the attribution methods precision and generality in machine learning interpretability. Additionally, we propose a technique to measure the attribution consistency between two attribution methods. In our experiments, we focus on the two well-known model agnostic attribution methods, SHAP and LIME, then we evaluate them on two real applications in the attack detection field. Our proposed methodology highlights the fact that both LIME and SHAP are lacking precision, generality, and consistency. Therefore, more inspection is needed in the attribution research field.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"780 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123282669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents 不公开文件内容的恶意软件动态分析部分外包
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00098
Keisuke Hamajima, Daisuke Kotani, Y. Okabe
Dynamic analysis is one of the methods to analyze malware. However, if the file to be analyzed contains confidential information, disclosing it to the analyst outside the organization is undesirable. Previous works proposed classifying malware while preserving privacy or outsourcing dynamic analysis, but it is challenging to outsource dynamic analysis without disclosing file contents. The proposed method builds the Local Environment for users and the Remote Environment for analysts outside the organization. We proposed partial outsourcing, which opens a file in the Local Environment, reproduces its behavior in the Remote Environment, and conducts dynamic analysis based on this information. The Local Environment hooks an API call and retrieves information on the function name and arguments. Then, the Local Environment sends the information to the Remote Environment to reproduce file behavior. Our method could reproduce most operations on files and registries but could not reproduce some operations on files.
动态分析是恶意软件分析的方法之一。但是,如果要分析的文件包含机密信息,则不希望将其透露给组织外部的分析人员。以往的研究提出了在保护隐私的情况下对恶意软件进行分类或将动态分析外包,但如何在不泄露文件内容的情况下将动态分析外包是一个挑战。提出的方法为用户构建本地环境,为组织外部的分析人员构建远程环境。我们建议部分外包,它在本地环境中打开一个文件,在远程环境中再现它的行为,并根据这些信息进行动态分析。Local Environment钩住API调用并检索函数名和参数的信息。然后,本地环境将信息发送到远程环境以重现文件行为。我们的方法可以重现文件和注册表上的大多数操作,但不能重现文件上的某些操作。
{"title":"Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents","authors":"Keisuke Hamajima, Daisuke Kotani, Y. Okabe","doi":"10.1109/COMPSAC57700.2023.00098","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00098","url":null,"abstract":"Dynamic analysis is one of the methods to analyze malware. However, if the file to be analyzed contains confidential information, disclosing it to the analyst outside the organization is undesirable. Previous works proposed classifying malware while preserving privacy or outsourcing dynamic analysis, but it is challenging to outsource dynamic analysis without disclosing file contents. The proposed method builds the Local Environment for users and the Remote Environment for analysts outside the organization. We proposed partial outsourcing, which opens a file in the Local Environment, reproduces its behavior in the Remote Environment, and conducts dynamic analysis based on this information. The Local Environment hooks an API call and retrieves information on the function name and arguments. Then, the Local Environment sends the information to the Remote Environment to reproduce file behavior. Our method could reproduce most operations on files and registries but could not reproduce some operations on files.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The EcoIndex metric, reviewed from the perspective of Data Science techniques EcoIndex指标,从数据科学技术的角度进行回顾
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00172
C. Cérin, D. Trystram, Tarek Menouer
EcoIndex has been proposed to evaluate the absolute environmental performance of a given URL using a score ranging from 0 to 100 (higher is better). In this article, we revisit the calculation method of the EcoIndex metric through low-cost Machine Learning (ML) approaches. Our research aims to extend the initial idea of analytical computation, i.e., a relation (equation) between three variables, in the direction of algorithmic Machine Learning (ML) computations, allowing to treat large numbers of data, which is not the case with the current computation. For a URL, our new calculation methods mimic the initial metric and return an environmental performance score but make fewer assumptions than the initial method. We develop several ML ways, either using learning techniques (Locality Sensitive Hashing, K Nearest Neighbor) or matrix computation constitutes the paper’s first contribution. We use standard methods to keep the solutions simple and understood by the public. The second contribution corresponds to a discussion on our implementations, available on a GitHub repository. As major findings or trends of our study, we also discuss the limits of the past and new approaches in a search for new metrics regarding the environmental performance of HTTP requests admissible by the most significant number of people. Our work refers to the uses of digital technology. Therefore, explaining the environmental footprint measures with few words seems important if we want to move towards greater digital sobriety. Otherwise, we run the risk of not being followed by civil society.
EcoIndex被提议使用0到100分(越高越好)来评估给定URL的绝对环境绩效。在本文中,我们通过低成本机器学习(ML)方法重新审视EcoIndex指标的计算方法。我们的研究旨在扩展解析计算的初始思想,即三个变量之间的关系(方程),向算法机器学习(ML)计算的方向发展,允许处理大量数据,这与当前的计算不同。对于URL,我们的新计算方法模拟初始度量并返回环境绩效分数,但比初始方法做出的假设更少。我们开发了几种机器学习方法,要么使用学习技术(局部敏感哈希,K近邻),要么使用矩阵计算构成本文的第一个贡献。我们使用标准的方法使解决方案简单易懂。第二个贡献对应于对我们实现的讨论,可以在GitHub存储库中获得。作为我们研究的主要发现或趋势,我们还讨论了过去的局限性和新方法,以寻找有关大多数人可接受的HTTP请求的环境性能的新指标。我们的工作涉及数字技术的使用。因此,如果我们想要走向更大的数字清醒,用寥寥数语解释环境足迹措施似乎很重要。否则,我们将面临不被公民社会追随的风险。
{"title":"The EcoIndex metric, reviewed from the perspective of Data Science techniques","authors":"C. Cérin, D. Trystram, Tarek Menouer","doi":"10.1109/COMPSAC57700.2023.00172","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00172","url":null,"abstract":"EcoIndex has been proposed to evaluate the absolute environmental performance of a given URL using a score ranging from 0 to 100 (higher is better). In this article, we revisit the calculation method of the EcoIndex metric through low-cost Machine Learning (ML) approaches. Our research aims to extend the initial idea of analytical computation, i.e., a relation (equation) between three variables, in the direction of algorithmic Machine Learning (ML) computations, allowing to treat large numbers of data, which is not the case with the current computation. For a URL, our new calculation methods mimic the initial metric and return an environmental performance score but make fewer assumptions than the initial method. We develop several ML ways, either using learning techniques (Locality Sensitive Hashing, K Nearest Neighbor) or matrix computation constitutes the paper’s first contribution. We use standard methods to keep the solutions simple and understood by the public. The second contribution corresponds to a discussion on our implementations, available on a GitHub repository. As major findings or trends of our study, we also discuss the limits of the past and new approaches in a search for new metrics regarding the environmental performance of HTTP requests admissible by the most significant number of people. Our work refers to the uses of digital technology. Therefore, explaining the environmental footprint measures with few words seems important if we want to move towards greater digital sobriety. Otherwise, we run the risk of not being followed by civil society.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoT 一种高效且可验证的多项式物联网跨链外包计算方案
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00056
Cui Zhang, Hui Yang, Jun Li, Yunhua He, J. Zhang, Q. Yao, Chao Li
The increase in IoT(Internet of Things) computing demands has brought more and more attention to the polynomial outsourcing computing. As a distributed computing method, IoT polynomial outsourcing computing based on cross-chain can enable IoT data on other blockchains to participate in computing by outsourcing polynomials. However, the trust isolation between multiple blockchains will bring challenges to the efficient verification of polynomial cross-chain outsourced calculations. In this paper, we first design a multi-chain outsourcing computing model to improve the efficiency of IoT cross-chain computing by outsourcing polynomials to blockchains that store related data. Then, an efficient and verifiable polynomial cross-chain outsourcing calculation scheme is proposed. In this scheme, we design a polynomial commitment generation algorithm, a witness generation algorithm and a cross-chain verification algorithm by combining commitment and witness mechanisms. These algorithms work together to efficiently verify the correctness and integrity of the calculation results of the outsourced polynomials. Security analysis and experimental results show that the scheme is feasible in practice.
随着物联网计算需求的增长,多项式外包计算越来越受到人们的关注。基于跨链的物联网多项式外包计算作为一种分布式计算方法,可以通过外包多项式使其他区块链上的物联网数据参与计算。然而,多个区块链之间的信任隔离将给多项式跨链外包计算的高效验证带来挑战。本文首先设计了一种多链外包计算模型,通过将多项式外包给存储相关数据的区块链来提高物联网跨链计算的效率。然后,提出了一种高效、可验证的多项式跨链外包计算方案。在该方案中,我们将承诺机制和见证机制结合起来,设计了多项式承诺生成算法、见证生成算法和跨链验证算法。这些算法协同工作,有效地验证了外包多项式计算结果的正确性和完整性。安全性分析和实验结果表明,该方案在实际应用中是可行的。
{"title":"An Efficient and Verifiable Polynomial Cross-chain Outsourcing Calculation Scheme for IoT","authors":"Cui Zhang, Hui Yang, Jun Li, Yunhua He, J. Zhang, Q. Yao, Chao Li","doi":"10.1109/COMPSAC57700.2023.00056","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00056","url":null,"abstract":"The increase in IoT(Internet of Things) computing demands has brought more and more attention to the polynomial outsourcing computing. As a distributed computing method, IoT polynomial outsourcing computing based on cross-chain can enable IoT data on other blockchains to participate in computing by outsourcing polynomials. However, the trust isolation between multiple blockchains will bring challenges to the efficient verification of polynomial cross-chain outsourced calculations. In this paper, we first design a multi-chain outsourcing computing model to improve the efficiency of IoT cross-chain computing by outsourcing polynomials to blockchains that store related data. Then, an efficient and verifiable polynomial cross-chain outsourcing calculation scheme is proposed. In this scheme, we design a polynomial commitment generation algorithm, a witness generation algorithm and a cross-chain verification algorithm by combining commitment and witness mechanisms. These algorithms work together to efficiently verify the correctness and integrity of the calculation results of the outsourced polynomials. Security analysis and experimental results show that the scheme is feasible in practice.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1