首页 > 最新文献

2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
LogKT: Hybrid Log Anomaly Detection Method for Cloud Data Center LogKT:云数据中心混合日志异常检测方法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00030
Xuedong Ou, J. Liu
Log anomaly detection is a fairly indispensable log analysis task for reliability and maintainability in cloud data center. By performing tasks such as log parsing and feature extraction on logs, which are common and valid data, a model with self-judgment capability can be trained for log anomaly detection. Improving the model used for anomaly detection is the main line of research in the current anomaly detection field. However, the data set partitioning method during anomaly detection also has an important impact on the results of anomaly detection, which should be given more considerations. Most of the existing anomaly detection models are single-architecture models, which cannot make full use of the multiple forms of information that logs have. This paper proposes a hybrid anomaly detection method, named LogKT, which is divided into two parts. First, a new dataset partitioning method is constructed based on time-series, randomness and imbalances of logs. It is a dataset partitioning method that fits the characteristics of log anomaly detection from the aspects of time-series feature preservation, sampling range expansion and training method change. Then, we further propose a hybrid anomaly detection model based on a Transformer and Bi-LSTM models, which can extract features from multiple information of logs and can fit well with the dataset partitioning method. Finally, we perform validation experiments on two public datasets, and the experimental results show that our LogKT approach has superior anomaly detection accuracy compared with baseline methods.
日志异常检测是云数据中心可靠性和可维护性不可或缺的日志分析任务。通过对常见有效的日志数据进行日志解析、特征提取等任务,训练出具有自判断能力的日志异常检测模型。改进用于异常检测的模型是当前异常检测领域的研究主线。然而,异常检测过程中数据集的划分方法对异常检测结果也有重要影响,应该给予更多的考虑。现有的异常检测模型大多是单一架构的模型,不能充分利用日志所具有的多种形式的信息。本文提出了一种名为LogKT的混合异常检测方法,该方法分为两部分。首先,基于日志的时间序列、随机性和不平衡性,构造了一种新的数据集划分方法。它是一种从时间序列特征保持、采样范围扩展和训练方法变化等方面适合日志异常检测特点的数据集划分方法。然后,我们进一步提出了一种基于Transformer和Bi-LSTM模型的混合异常检测模型,该模型可以从日志的多个信息中提取特征,并且可以很好地适应数据集划分方法。最后,我们在两个公共数据集上进行了验证实验,实验结果表明,与基线方法相比,我们的LogKT方法具有更高的异常检测精度。
{"title":"LogKT: Hybrid Log Anomaly Detection Method for Cloud Data Center","authors":"Xuedong Ou, J. Liu","doi":"10.1109/COMPSAC57700.2023.00030","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00030","url":null,"abstract":"Log anomaly detection is a fairly indispensable log analysis task for reliability and maintainability in cloud data center. By performing tasks such as log parsing and feature extraction on logs, which are common and valid data, a model with self-judgment capability can be trained for log anomaly detection. Improving the model used for anomaly detection is the main line of research in the current anomaly detection field. However, the data set partitioning method during anomaly detection also has an important impact on the results of anomaly detection, which should be given more considerations. Most of the existing anomaly detection models are single-architecture models, which cannot make full use of the multiple forms of information that logs have. This paper proposes a hybrid anomaly detection method, named LogKT, which is divided into two parts. First, a new dataset partitioning method is constructed based on time-series, randomness and imbalances of logs. It is a dataset partitioning method that fits the characteristics of log anomaly detection from the aspects of time-series feature preservation, sampling range expansion and training method change. Then, we further propose a hybrid anomaly detection model based on a Transformer and Bi-LSTM models, which can extract features from multiple information of logs and can fit well with the dataset partitioning method. Finally, we perform validation experiments on two public datasets, and the experimental results show that our LogKT approach has superior anomaly detection accuracy compared with baseline methods.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134517733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Paillier Homomorphic Encryption in Federated Learning for Speech Emotion Recognition 语音情感识别联邦学习中的优化Paillier同态加密
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00156
Samaneh Mohammadi, Sima Sinaei, A. Balador, Francesco Flammini
Context: Federated Learning is an approach to distributed machine learning that enables collaborative model training on end devices. FL enhances privacy as devices only share local model parameters instead of raw data with a central server. However, the central server or eavesdroppers could extract sensitive information from these shared parameters. This issue is crucial in applications like speech emotion recognition (SER) that deal with personal voice data. To address this, we propose Optimized Paillier Homomorphic Encryption (OPHE) for SER applications in FL. Paillier homomorphic encryption enables computations on ciphertext, preserving privacy but with high computation and communication overhead. The proposed OPHE method can reduce this overhead by combing Paillier homomorphic encryption with pruning. So, we employ OPHE in one of the use cases of a large research project (DAIS) funded by the European Commission using a public SER dataset.
上下文:联邦学习是分布式机器学习的一种方法,它支持在终端设备上进行协作模型训练。FL增强了隐私性,因为设备只共享本地模型参数,而不是与中央服务器共享原始数据。然而,中央服务器或窃听者可以从这些共享参数中提取敏感信息。这个问题在处理个人语音数据的语音情感识别(SER)等应用中至关重要。为了解决这个问题,我们为FL中的SER应用提出了优化的Paillier同态加密(OPHE)。Paillier同态加密支持对密文进行计算,保护隐私,但具有较高的计算和通信开销。本文提出的OPHE方法通过将Paillier同态加密与剪枝相结合来减少这种开销。因此,我们在一个大型研究项目(DAIS)的一个用例中使用OPHE,该项目由欧盟委员会资助,使用公共SER数据集。
{"title":"Optimized Paillier Homomorphic Encryption in Federated Learning for Speech Emotion Recognition","authors":"Samaneh Mohammadi, Sima Sinaei, A. Balador, Francesco Flammini","doi":"10.1109/COMPSAC57700.2023.00156","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00156","url":null,"abstract":"Context: Federated Learning is an approach to distributed machine learning that enables collaborative model training on end devices. FL enhances privacy as devices only share local model parameters instead of raw data with a central server. However, the central server or eavesdroppers could extract sensitive information from these shared parameters. This issue is crucial in applications like speech emotion recognition (SER) that deal with personal voice data. To address this, we propose Optimized Paillier Homomorphic Encryption (OPHE) for SER applications in FL. Paillier homomorphic encryption enables computations on ciphertext, preserving privacy but with high computation and communication overhead. The proposed OPHE method can reduce this overhead by combing Paillier homomorphic encryption with pruning. So, we employ OPHE in one of the use cases of a large research project (DAIS) funded by the European Commission using a public SER dataset.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy 人工智能系统安全与隐私的真实学习方法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00151
Mst. Shapna Akter, H. Shahriar, Dan C. Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu
The main objective of authentic learning is to offer students an exciting and stimulating educational setting that provides practical experiences in tackling real-world security issues. Each educational theme is composed of pre-lab, lab, and post-lab activities. Through the application of authentic learning, we create and produce portable lab equipment for AI Security and Privacy on Google CoLab. This enables students to access and practice these hands-on labs conveniently and without the need for time-consuming installations and configurations. As a result, students can concentrate more on learning concepts and gain more experience in hands-on problem-solving abilities.
真实学习的主要目标是为学生提供一个令人兴奋和刺激的教育环境,为解决现实世界的安全问题提供实践经验。每个教育主题都由实验前、实验和实验后的活动组成。通过真实学习的应用,我们在Google CoLab上为人工智能安全与隐私创造和生产便携式实验室设备。这使学生能够方便地访问和实践这些动手实验室,而不需要耗时的安装和配置。因此,学生可以更专注于学习概念,并在动手解决问题的能力方面获得更多的经验。
{"title":"Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy","authors":"Mst. Shapna Akter, H. Shahriar, Dan C. Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu","doi":"10.1109/COMPSAC57700.2023.00151","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00151","url":null,"abstract":"The main objective of authentic learning is to offer students an exciting and stimulating educational setting that provides practical experiences in tackling real-world security issues. Each educational theme is composed of pre-lab, lab, and post-lab activities. Through the application of authentic learning, we create and produce portable lab equipment for AI Security and Privacy on Google CoLab. This enables students to access and practice these hands-on labs conveniently and without the need for time-consuming installations and configurations. As a result, students can concentrate more on learning concepts and gain more experience in hands-on problem-solving abilities.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting and Preventing ROP Attacks using Machine Learning on ARM 基于ARM的机器学习检测和预防ROP攻击
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00092
Gebrehiwet B. Welearegai, Chenpo Hu, Christian Hammer
As the ARM processor is receiving increased attention due to the fast growth of mobile technologies and the internet-of-things (IoT), it is simultaneously becoming the target of several control flow attacks such as return-oriented programming (ROP), which uses code present in the software system in order to exploit memory bugs. While some research can detect control flow attacks on architectures like x86, the ARM architecture has been neglected. In this paper, we investigate whether ROP attack detection and prevention based on hardware performance counters (HPC) and machine learning can be effectively transferred to the ARM architecture. Given the observation that ROP attacks exhibit different micro-architectural events compared to benign executions of a software, we evaluate whether and which HPCs, which track these hardware events, are indicative on ARM to detect control flow attacks. We collect data exploiting real-world vulnerable applications running on ARM-based Raspberry Pi machines. The collected data then serves as training data for different machine learning techniques. We also implement an online monitor consisting of a modified program loader, kernel module and a classifier, which labels a program’s execution as benign or under attack, and stops its execution once the latter is detected. An evaluation of our approach provides detection accuracy of 92% for the offline training and 75% for the online monitoring, which demonstrates that variations in the HPCs are indicative of attacks on ARM architectures. The performance overhead of online monitoring evaluated on 8 real-world vulnerable applications exhibits a moderate 6.2% slowdown on average. The result of our evaluation indicates that the behavioral changes in micro-architectural events of the ARM platform can play a vital role in detecting memory attacks.
随着移动技术和物联网(IoT)的快速发展,ARM处理器受到越来越多的关注,同时它也成为一些控制流攻击的目标,如返回导向编程(ROP),它利用软件系统中的代码来利用内存漏洞。虽然一些研究可以检测x86等架构上的控制流攻击,但ARM架构一直被忽视。在本文中,我们研究了基于硬件性能计数器(HPC)和机器学习的ROP攻击检测和预防是否可以有效地转移到ARM架构。鉴于观察到ROP攻击与软件的良性执行相比表现出不同的微架构事件,我们评估跟踪这些硬件事件的hpc是否以及哪些hpc在ARM上指示检测控制流攻击。我们利用运行在基于arm的树莓派机器上的易受攻击的应用程序收集数据。然后收集的数据作为不同机器学习技术的训练数据。我们还实现了一个由修改后的程序加载器、内核模块和分类器组成的在线监视器,它将程序的执行标记为良性或受到攻击,并在检测到后者时停止其执行。对我们方法的评估表明,离线训练的检测准确率为92%,在线监测的检测准确率为75%,这表明hpc的变化表明了对ARM架构的攻击。在线监控的性能开销在8个真实的易受攻击的应用程序上进行了评估,显示出平均6.2%的适度放缓。我们的评估结果表明,ARM平台微架构事件中的行为变化可以在检测内存攻击中发挥重要作用。
{"title":"Detecting and Preventing ROP Attacks using Machine Learning on ARM","authors":"Gebrehiwet B. Welearegai, Chenpo Hu, Christian Hammer","doi":"10.1109/COMPSAC57700.2023.00092","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00092","url":null,"abstract":"As the ARM processor is receiving increased attention due to the fast growth of mobile technologies and the internet-of-things (IoT), it is simultaneously becoming the target of several control flow attacks such as return-oriented programming (ROP), which uses code present in the software system in order to exploit memory bugs. While some research can detect control flow attacks on architectures like x86, the ARM architecture has been neglected. In this paper, we investigate whether ROP attack detection and prevention based on hardware performance counters (HPC) and machine learning can be effectively transferred to the ARM architecture. Given the observation that ROP attacks exhibit different micro-architectural events compared to benign executions of a software, we evaluate whether and which HPCs, which track these hardware events, are indicative on ARM to detect control flow attacks. We collect data exploiting real-world vulnerable applications running on ARM-based Raspberry Pi machines. The collected data then serves as training data for different machine learning techniques. We also implement an online monitor consisting of a modified program loader, kernel module and a classifier, which labels a program’s execution as benign or under attack, and stops its execution once the latter is detected. An evaluation of our approach provides detection accuracy of 92% for the offline training and 75% for the online monitoring, which demonstrates that variations in the HPCs are indicative of attacks on ARM architectures. The performance overhead of online monitoring evaluated on 8 real-world vulnerable applications exhibits a moderate 6.2% slowdown on average. The result of our evaluation indicates that the behavioral changes in micro-architectural events of the ARM platform can play a vital role in detecting memory attacks.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133198293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Problems in Active Sampling for Mobile Robotic Online Learning 移动机器人在线学习中主动采样的新问题
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00174
Xiuxian Guan, Junming Wang, Zekai Sun, Zongyuan Zhang, Tian-dong Duan, Shengliang Deng, Fangming Liu, Heming Cui
AI models deployed in real-world tasks (e.g., surveillance, implicit mapping, health care) typically need to be online trained for better modelling of the changing real-world environments and various online training methods (e.g., domain adaptation, few shot learning) are proposed for refining the AI models based on training input incrementally sampled from the real world. However, in the whole loop of AI model online training, there is a section rarely discussed: how to sample training input from the real world. In this paper, we show from the perspective of online training of AI models deployed on edge devices (e.g., robots) that several problems in sampling of training input on the device are affecting the time and energy consumption for the online training process to reach high performance. Notably, the online training relies on training input consecutively sampled from the real world and the consecutive samples from nearby states (e.g., position and orientation of a camera) are too similar and would limit the training accuracy gain per training iteration; on the other hand, while we can choose to sample more about the inaccurate samples to better final training accuracy, it is costly to obtain the accuracy statistics of samples via traditional ways such as validating, especially for AI models deployed on edge devices. These findings aim to raise research effort for practical online training of AI models, so that they can achieve resiliently and sustainably high performance in real-world tasks.
部署在现实世界任务中的人工智能模型(例如,监视、隐式映射、医疗保健)通常需要进行在线训练,以便更好地建模不断变化的现实世界环境,并提出了各种在线训练方法(例如,域适应、少量镜头学习),用于基于从现实世界中逐步采样的训练输入来改进人工智能模型。然而,在整个AI模型在线训练的循环中,有一个部分很少被讨论:如何从现实世界中对训练输入进行采样。在本文中,我们从部署在边缘设备(如机器人)上的人工智能模型的在线训练的角度来看,设备上的训练输入采样中的几个问题正在影响在线训练过程达到高性能的时间和能量消耗。值得注意的是,在线训练依赖于从真实世界连续采样的训练输入,并且来自附近状态(例如,相机的位置和方向)的连续样本过于相似,会限制每次训练迭代的训练精度增益;另一方面,虽然我们可以选择对不准确的样本进行更多采样,以提高最终的训练精度,但通过验证等传统方式获得样本的准确性统计数据是昂贵的,特别是对于部署在边缘设备上的AI模型。这些发现旨在提高对人工智能模型的实际在线培训的研究力度,使它们能够在现实世界的任务中实现弹性和可持续的高性能。
{"title":"New Problems in Active Sampling for Mobile Robotic Online Learning","authors":"Xiuxian Guan, Junming Wang, Zekai Sun, Zongyuan Zhang, Tian-dong Duan, Shengliang Deng, Fangming Liu, Heming Cui","doi":"10.1109/COMPSAC57700.2023.00174","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00174","url":null,"abstract":"AI models deployed in real-world tasks (e.g., surveillance, implicit mapping, health care) typically need to be online trained for better modelling of the changing real-world environments and various online training methods (e.g., domain adaptation, few shot learning) are proposed for refining the AI models based on training input incrementally sampled from the real world. However, in the whole loop of AI model online training, there is a section rarely discussed: how to sample training input from the real world. In this paper, we show from the perspective of online training of AI models deployed on edge devices (e.g., robots) that several problems in sampling of training input on the device are affecting the time and energy consumption for the online training process to reach high performance. Notably, the online training relies on training input consecutively sampled from the real world and the consecutive samples from nearby states (e.g., position and orientation of a camera) are too similar and would limit the training accuracy gain per training iteration; on the other hand, while we can choose to sample more about the inaccurate samples to better final training accuracy, it is costly to obtain the accuracy statistics of samples via traditional ways such as validating, especially for AI models deployed on edge devices. These findings aim to raise research effort for practical online training of AI models, so that they can achieve resiliently and sustainably high performance in real-world tasks.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126578808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Metamorphic Testing for Fake-News Detection Software: A Case Study 探索变形测试假新闻检测软件:一个案例研究
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00122
Lin Miao, D. Towey, Yingrui Ma, T. Chen, Z. Zhou
Concerns have been growing over fake news and its impact. Software that can automatically detect fake news is becoming more popular. However, the accuracy and reliability of such fake-news detection software remains questionable, partly due to a lack of testing and verification. Testing this kind of software may face the oracle problem, which refers to difficulty (or inability) of identifying the correctness of the software’s output in a reasonable amount of time. Metamorphic testing (MT) has a record of effectively alleviating the oracle problem, and has been successfully applied to testing fake-news detection software. This paper reports on a study, extending previous work, exploring the use of MT for fake-news detection software. The study includes new metamorphic relations and additional experimental results and analysis. Some alternative MR-generation approaches are also explored. The study targets software where the output is a real/fake news decision, enhancing the applicability of MT to current fake-news detection software. The paper also explores the impact of the prediction accuracy of the fake-news detection software on the MT process. The study demonstrates the validity and applicability of MT to fake-news detection software. The prediction accuracy of the software has a greater impact on MT experiments with greater changes between the source and follow-up inputs, and less dependence on prediction stability. Some possible factors affecting the experimental results are discussed, and directions for future work are provided.
人们对假新闻及其影响的担忧越来越大。能够自动检测假新闻的软件正变得越来越流行。然而,这种假新闻检测软件的准确性和可靠性仍然值得怀疑,部分原因是缺乏测试和验证。测试这类软件可能会面临oracle问题,即难以(或无法)在合理的时间内确定软件输出的正确性。变形测试(MT)具有有效缓解oracle问题的记录,并已成功地应用于测试假新闻检测软件。本文报道了一项研究,扩展了以前的工作,探索将机器翻译用于假新闻检测软件。研究包括新的变质关系和补充的实验结果和分析。本文还探讨了一些替代的核磁共振生成方法。该研究的目标是输出真假新闻决策的软件,增强了机器翻译对当前假新闻检测软件的适用性。本文还探讨了假新闻检测软件的预测精度对机器翻译过程的影响。研究证明了机器翻译在假新闻检测软件中的有效性和适用性。该软件的预测精度对MT实验的影响较大,源和随动输入之间的变化较大,对预测稳定性的依赖较小。讨论了影响实验结果的可能因素,并提出了今后的工作方向。
{"title":"Exploring Metamorphic Testing for Fake-News Detection Software: A Case Study","authors":"Lin Miao, D. Towey, Yingrui Ma, T. Chen, Z. Zhou","doi":"10.1109/COMPSAC57700.2023.00122","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00122","url":null,"abstract":"Concerns have been growing over fake news and its impact. Software that can automatically detect fake news is becoming more popular. However, the accuracy and reliability of such fake-news detection software remains questionable, partly due to a lack of testing and verification. Testing this kind of software may face the oracle problem, which refers to difficulty (or inability) of identifying the correctness of the software’s output in a reasonable amount of time. Metamorphic testing (MT) has a record of effectively alleviating the oracle problem, and has been successfully applied to testing fake-news detection software. This paper reports on a study, extending previous work, exploring the use of MT for fake-news detection software. The study includes new metamorphic relations and additional experimental results and analysis. Some alternative MR-generation approaches are also explored. The study targets software where the output is a real/fake news decision, enhancing the applicability of MT to current fake-news detection software. The paper also explores the impact of the prediction accuracy of the fake-news detection software on the MT process. The study demonstrates the validity and applicability of MT to fake-news detection software. The prediction accuracy of the software has a greater impact on MT experiments with greater changes between the source and follow-up inputs, and less dependence on prediction stability. Some possible factors affecting the experimental results are discussed, and directions for future work are provided.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133764549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid/Online Teaching: A Survey and Key Issues 混合/在线教学:调查与关键问题
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00028
Yue Jiang, Hoi-yan Doris. Lin, Long Fai Cheung, Henry C. B. Chan, Ping Li
Hybrid/online teaching in general and HyFlex teaching in particular are now widely adopted among higher education institutions around the world due to their hybrid (physical/virtual) advantage and flexible arrangement. To gain a better understanding of hybrid/online teaching, we have conducted a survey at the International Conference on Teaching, Assessment and Learning for Engineering (TALE) 2022, one of the flagship conferences of the IEEE Education Society (i.e., for international conference participants from more than 16 countries/cities/regions). The aim is to evaluate hybrid/online teaching in general and the 4C elements (Content, Collaboration, Community and Communication) of a hybrid/online classroom model. Results from this international survey provide valuable insights, perspectives and good practices, and point to future research directions on this important topic.
混合/在线教学,特别是HyFlex教学,由于其混合(物理/虚拟)优势和灵活的安排,现在在世界各地的高等教育机构中被广泛采用。为了更好地了解混合/在线教学,我们在IEEE教育学会旗舰会议之一的国际工程教学,评估和学习会议(TALE) 2022上进行了一项调查(即来自超过16个国家/城市/地区的国际会议参与者)。目的是评估混合/在线教学的总体情况,以及混合/在线课堂模式的4C要素(内容、协作、社区和交流)。这项国际调查的结果提供了宝贵的见解、观点和良好的做法,并指出了这一重要主题的未来研究方向。
{"title":"Hybrid/Online Teaching: A Survey and Key Issues","authors":"Yue Jiang, Hoi-yan Doris. Lin, Long Fai Cheung, Henry C. B. Chan, Ping Li","doi":"10.1109/COMPSAC57700.2023.00028","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00028","url":null,"abstract":"Hybrid/online teaching in general and HyFlex teaching in particular are now widely adopted among higher education institutions around the world due to their hybrid (physical/virtual) advantage and flexible arrangement. To gain a better understanding of hybrid/online teaching, we have conducted a survey at the International Conference on Teaching, Assessment and Learning for Engineering (TALE) 2022, one of the flagship conferences of the IEEE Education Society (i.e., for international conference participants from more than 16 countries/cities/regions). The aim is to evaluate hybrid/online teaching in general and the 4C elements (Content, Collaboration, Community and Communication) of a hybrid/online classroom model. Results from this international survey provide valuable insights, perspectives and good practices, and point to future research directions on this important topic.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning Based Rendering Service Placement for Cloud Gaming in Mobile Edge Computing Systems 移动边缘计算系统中基于深度强化学习的云游戏渲染服务布局
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00073
Yongqiang Gao, Zhihan Li
In recent years, the advancement of 4G/5G network technologies and smart devices has led to an increasing demand for smooth, massively multiplayer online games on mobile terminals. These games necessitate high performance and heavy workloads, often consuming substantial amounts of computing and storage resources while imposing strict latency requirements. However, due to the limited resources of end devices, such tasks cannot be efficiently and independently executed. The traditional solution typically involves processing gaming tasks at centralized cloud servers. However, this approach introduces issues such as bandwidth pressure, high latency, load imbalance, and elevated costs. Recently, mobile edge computing (MEC) has gained popularity, and its low-latency capabilities can be integrated with cloud gaming to enhance the gaming performance experience. In this paper, we explore the offloading and placement of rendering services in a scenario that combines MEC with cloud gaming. We propose a model-free algorithm based on deep reinforcement learning to learn the optimal task offloading and placement policy, which optimizes a combination of four metrics: latency, cost, bandwidth, and load balancing. Additionally, the algorithm predicts future bandwidth using LSTM, significantly improving the player's gaming experience and fairness. Simulation results demonstrate that our proposed task placement strategy outperforms state-of-the-art methods applied to similar problems.
近年来,4G/5G网络技术和智能设备的进步,导致人们对移动端流畅、大型多人在线游戏的需求不断增加。这些游戏需要高性能和繁重的工作负载,通常消耗大量的计算和存储资源,同时施加严格的延迟要求。然而,由于终端设备资源有限,这些任务无法高效独立地执行。传统的解决方案通常涉及在集中式云服务器上处理游戏任务。然而,这种方法引入了带宽压力、高延迟、负载不平衡和成本升高等问题。最近,移动边缘计算(MEC)得到了普及,其低延迟功能可以与云游戏集成,以增强游戏性能体验。在本文中,我们探讨了将MEC与云游戏相结合的场景中渲染服务的卸载和放置。我们提出了一种基于深度强化学习的无模型算法来学习最优任务卸载和放置策略,该算法优化了四个指标的组合:延迟、成本、带宽和负载平衡。此外,该算法使用LSTM预测未来带宽,显著提高了玩家的游戏体验和公平性。仿真结果表明,我们提出的任务布置策略优于应用于类似问题的最先进的方法。
{"title":"Deep Reinforcement Learning Based Rendering Service Placement for Cloud Gaming in Mobile Edge Computing Systems","authors":"Yongqiang Gao, Zhihan Li","doi":"10.1109/COMPSAC57700.2023.00073","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00073","url":null,"abstract":"In recent years, the advancement of 4G/5G network technologies and smart devices has led to an increasing demand for smooth, massively multiplayer online games on mobile terminals. These games necessitate high performance and heavy workloads, often consuming substantial amounts of computing and storage resources while imposing strict latency requirements. However, due to the limited resources of end devices, such tasks cannot be efficiently and independently executed. The traditional solution typically involves processing gaming tasks at centralized cloud servers. However, this approach introduces issues such as bandwidth pressure, high latency, load imbalance, and elevated costs. Recently, mobile edge computing (MEC) has gained popularity, and its low-latency capabilities can be integrated with cloud gaming to enhance the gaming performance experience. In this paper, we explore the offloading and placement of rendering services in a scenario that combines MEC with cloud gaming. We propose a model-free algorithm based on deep reinforcement learning to learn the optimal task offloading and placement policy, which optimizes a combination of four metrics: latency, cost, bandwidth, and load balancing. Additionally, the algorithm predicts future bandwidth using LSTM, significantly improving the player's gaming experience and fairness. Simulation results demonstrate that our proposed task placement strategy outperforms state-of-the-art methods applied to similar problems.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114463244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limiting the Spread of Misinformation on Multiplex Social Networks 限制虚假信息在多重社交网络上的传播
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00061
Yumi Fujita, Sho Tsugawa
The dissemination of messages countering misinformation is considered a promising approach for limiting the spread of misinformation. On social network, the approach can be posed as a problem, the influence limitation problem. Although most existing studies on the influence limitation problem assume a single-layer structure for social networks, in reality, each individual in society usually has multiple communication channels; moreover, the social network has a multilayer structure. Therefore, this study investigates the problems in limiting the spread of negative influences (i.e., misinformation) in multilayer networks by spreading positive influences (i.e., counter messages against misinformation). Furthermore, we formulate the problem on a two-layered multiplex network by extending the influence limitation problem on a single-layer network. By conducting simulation experiments using synthetic and real multiplex networks, we evaluated the effectiveness of the methods to select seed nodes that trigger the spread of positive influence. The results show that even in two-layered multiplex networks, the seed-node selection methods that use a single-layer structure achieve effectiveness comparable to that of the seed-node selection method that uses both layers of the two-layered network. A method that selects seed nodes from the community boundary nodes can effectively limit the spread of negative influence in most cases.
传播对抗错误信息的信息被认为是限制错误信息传播的一种有希望的方法。在社交网络上,这种方法可以被提出一个问题,即影响限制问题。虽然现有的大多数关于影响限制问题的研究都假设社会网络的单层结构,但在现实中,社会中的每个个体通常都有多个沟通渠道;此外,社会网络具有多层结构。因此,本研究探讨了通过传播积极影响(即针对错误信息的反信息)来限制多层网络中负面影响(即错误信息)传播的问题。在此基础上,将影响限制问题推广到单层多路网络,在二层多路网络上给出了问题的形式。通过使用合成和真实复用网络进行仿真实验,我们评估了选择触发积极影响传播的种子节点的方法的有效性。结果表明,即使在两层复用网络中,使用单层结构的种子节点选择方法与使用两层网络的两层结构的种子节点选择方法的有效性相当。在大多数情况下,从社区边界节点中选择种子节点的方法可以有效地限制负面影响的传播。
{"title":"Limiting the Spread of Misinformation on Multiplex Social Networks","authors":"Yumi Fujita, Sho Tsugawa","doi":"10.1109/COMPSAC57700.2023.00061","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00061","url":null,"abstract":"The dissemination of messages countering misinformation is considered a promising approach for limiting the spread of misinformation. On social network, the approach can be posed as a problem, the influence limitation problem. Although most existing studies on the influence limitation problem assume a single-layer structure for social networks, in reality, each individual in society usually has multiple communication channels; moreover, the social network has a multilayer structure. Therefore, this study investigates the problems in limiting the spread of negative influences (i.e., misinformation) in multilayer networks by spreading positive influences (i.e., counter messages against misinformation). Furthermore, we formulate the problem on a two-layered multiplex network by extending the influence limitation problem on a single-layer network. By conducting simulation experiments using synthetic and real multiplex networks, we evaluated the effectiveness of the methods to select seed nodes that trigger the spread of positive influence. The results show that even in two-layered multiplex networks, the seed-node selection methods that use a single-layer structure achieve effectiveness comparable to that of the seed-node selection method that uses both layers of the two-layered network. A method that selects seed nodes from the community boundary nodes can effectively limit the spread of negative influence in most cases.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Rural women’s Experience in STEM and Non-STEM field in Bangladesh 了解孟加拉国农村妇女在STEM和非STEM领域的经验
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00159
Mst. Shapna Akter, Nova Ahmed, H. Shahriar
This paper represents the experience of women from STEM and Non-STEM fields from the perspective of the rural area of Bangladesh. In Bangladesh, the social and cultural perspectives differ from one area to another. Previously no work has been done in Bangladesh from the perspective of the rural areas. We have come up with the motivation to work on this particular area to find out what barriers and challenges women face when they move to urban areas to study in the STEM field. From our findings, we have found some barriers from the Non-STEM field and opportunities from the STEM field. We have studied n=8 participants (5 Non-STEM, 3 STEM). Through their shared experience, they face barriers such as early marriage, excessive usage of social media, lack of support from teachers, peers, institutions, and family, challenge of Accommodation and security system outside of the hometown, and parents’ mentality towards children’s career. We have found opportunities such as parents’ educational background, female role models, and family support from the shared experience of STEM field participants. This research uncovered the barriers and opportunities that rural women face for entering the STEM field, which is very important to mitigate the barriers to entering the STEM field for rural women, which will help to create a new dimension in the HCI field. We believe that by following our work, future researchers might get motivated to contribute in this area, which will help the area to be considered as a big and an important part of the future investigation.
本文从孟加拉国农村地区的角度,代表了来自STEM和非STEM领域的女性的经历。在孟加拉国,社会和文化观点因地区而异。以前没有从农村地区的角度在孟加拉国开展工作。我们有动力在这一特定领域开展工作,以找出女性在搬到城市地区学习STEM领域时面临的障碍和挑战。从我们的研究结果中,我们发现了来自非STEM领域的一些障碍和来自STEM领域的机会。我们研究了n=8名参与者(5名非STEM, 3名STEM)。通过他们共同的经历,他们面临着早婚、过度使用社交媒体、缺乏来自老师、同龄人、机构和家庭的支持、家乡以外的住宿和安全体系的挑战、父母对孩子职业生涯的心态等障碍。我们从STEM领域参与者的共同经历中发现了父母的教育背景、女性榜样和家庭支持等机会。本研究揭示了农村妇女进入STEM领域所面临的障碍和机会,这对于缓解农村妇女进入STEM领域的障碍非常重要,有助于在HCI领域创造新的维度。我们相信,通过遵循我们的工作,未来的研究人员可能会有动力在这一领域做出贡献,这将有助于该领域被认为是未来研究的一个重要组成部分。
{"title":"Understanding Rural women’s Experience in STEM and Non-STEM field in Bangladesh","authors":"Mst. Shapna Akter, Nova Ahmed, H. Shahriar","doi":"10.1109/COMPSAC57700.2023.00159","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00159","url":null,"abstract":"This paper represents the experience of women from STEM and Non-STEM fields from the perspective of the rural area of Bangladesh. In Bangladesh, the social and cultural perspectives differ from one area to another. Previously no work has been done in Bangladesh from the perspective of the rural areas. We have come up with the motivation to work on this particular area to find out what barriers and challenges women face when they move to urban areas to study in the STEM field. From our findings, we have found some barriers from the Non-STEM field and opportunities from the STEM field. We have studied n=8 participants (5 Non-STEM, 3 STEM). Through their shared experience, they face barriers such as early marriage, excessive usage of social media, lack of support from teachers, peers, institutions, and family, challenge of Accommodation and security system outside of the hometown, and parents’ mentality towards children’s career. We have found opportunities such as parents’ educational background, female role models, and family support from the shared experience of STEM field participants. This research uncovered the barriers and opportunities that rural women face for entering the STEM field, which is very important to mitigate the barriers to entering the STEM field for rural women, which will help to create a new dimension in the HCI field. We believe that by following our work, future researchers might get motivated to contribute in this area, which will help the area to be considered as a big and an important part of the future investigation.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116182345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1