Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00228
Erika Sugita, Ryosuke Abe, Shigeya Suzuki, K. Uehara, O. Nakamura
To receive effective treatment during emergency response due to seizures or unforeseen accidents, a patient with intractable diseases must disclose information about their disease to an emergency physician. If the patient loses consciousness while traveling, the patient should disclose this information to a companion in advance. However, disclosing this information to a companion is undesirable because the information is confidential. Thus, we propose a system that discloses specific information on intractable diseases only when an emergency physician has verified they possess a medical license. Otherwise, the proposed system only discloses appropriate first aid information. We implemented a prototype of the proposed under the assumption that a physician has a digital medical license based on verifiable credentials (i.e., a standard for digital credentials). With this system, the patient does not disclose confidential information to the patient’s companion but does disclose necessary information to the emergency physician.
{"title":"A System for Selective Disclosure of Information about a Patient with Intractable Disease","authors":"Erika Sugita, Ryosuke Abe, Shigeya Suzuki, K. Uehara, O. Nakamura","doi":"10.1109/COMPSAC57700.2023.00228","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00228","url":null,"abstract":"To receive effective treatment during emergency response due to seizures or unforeseen accidents, a patient with intractable diseases must disclose information about their disease to an emergency physician. If the patient loses consciousness while traveling, the patient should disclose this information to a companion in advance. However, disclosing this information to a companion is undesirable because the information is confidential. Thus, we propose a system that discloses specific information on intractable diseases only when an emergency physician has verified they possess a medical license. Otherwise, the proposed system only discloses appropriate first aid information. We implemented a prototype of the proposed under the assumption that a physician has a digital medical license based on verifiable credentials (i.e., a standard for digital credentials). With this system, the patient does not disclose confidential information to the patient’s companion but does disclose necessary information to the emergency physician.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133854181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00215
M. Subu, Mohammad Yousef Alkhawaldeh, F. Ahmed, Nabeel Al-Yateem, J. Dias, S. Rahman, M. AbuRuz, A. Saifan, Amina Al-Marzouqi, Heba H Hijazi, Mohamad Qasim Alshabi, A. Hossain
Introduction The development of internet technology and information and smartphone applications is progressing very rapidly. ON the other hand, accumulating evidence is indicating that excessive use of smartphone can cause mental and emotional health problems among adolescents. Objectives: The purpose of this study was to investigate the association between adolescent smartphone addiction and psychological and emotional health in Indonesia. Methods: This study used a cross-sectional correlational design. The study respondents were 350 adolescents aged 10-22 years and were selected through the convenience sampling method. Data were collected using the adapted and validated psychological wellbeing scale and the Smartphone addiction scale. Results: The study using Kendall's method indicated a significant correlation between the study variables (Sig. = 0.001). The correlation coefficient is -0.255, which denotes a negative, and weak to a moderate relationship. Discussion: Adolescents should exercise, attend school, and volunteer more. During unstable adolescent growth, parents must lead their children, and explain rules and conventions. Adolescents should be encouraged and directed to do more exercise, extra-school activities, and volunteer work among others. In this study it was apparent the issue of technology addiction and its possible negative effects on adolescents9 emotional and mental well-being, therefore individual, group, and community interventions and assertive behavior techniques are needed to decrease adolescent smartphone addiction. Interventions such as group mentoring, counseling, and cognitive behavioral therapy could be useful in this area.
{"title":"Smartphone Addiction and Mental Health Wellbeing Among Indonesian Adolescents","authors":"M. Subu, Mohammad Yousef Alkhawaldeh, F. Ahmed, Nabeel Al-Yateem, J. Dias, S. Rahman, M. AbuRuz, A. Saifan, Amina Al-Marzouqi, Heba H Hijazi, Mohamad Qasim Alshabi, A. Hossain","doi":"10.1109/COMPSAC57700.2023.00215","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00215","url":null,"abstract":"Introduction The development of internet technology and information and smartphone applications is progressing very rapidly. ON the other hand, accumulating evidence is indicating that excessive use of smartphone can cause mental and emotional health problems among adolescents. Objectives: The purpose of this study was to investigate the association between adolescent smartphone addiction and psychological and emotional health in Indonesia. Methods: This study used a cross-sectional correlational design. The study respondents were 350 adolescents aged 10-22 years and were selected through the convenience sampling method. Data were collected using the adapted and validated psychological wellbeing scale and the Smartphone addiction scale. Results: The study using Kendall's method indicated a significant correlation between the study variables (Sig. = 0.001). The correlation coefficient is -0.255, which denotes a negative, and weak to a moderate relationship. Discussion: Adolescents should exercise, attend school, and volunteer more. During unstable adolescent growth, parents must lead their children, and explain rules and conventions. Adolescents should be encouraged and directed to do more exercise, extra-school activities, and volunteer work among others. In this study it was apparent the issue of technology addiction and its possible negative effects on adolescents9 emotional and mental well-being, therefore individual, group, and community interventions and assertive behavior techniques are needed to decrease adolescent smartphone addiction. Interventions such as group mentoring, counseling, and cognitive behavioral therapy could be useful in this area.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115024290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00195
Nobuhiro Kobayashi
While the introduction of cyber physical systems (CPS) into society is progressing toward the realization of Society 5.0, the threat of cyberattacks on IoT devices(IoT actuators) that have actuator functions to bring about physical changes in the real world among the IoT devices that constitute the CPS is increasing. In order to prepare for unauthorized control of IoT actuators caused by cyberattacks that are evolving daily, such as zero-day attacks that exploit unknown vulnerabilities in programs, it is an urgent issue to strengthen the CPS, which will become the social infrastructure of the future. In this paper, I explain, in particular, the security requirements for IoT actuators that exert physical action as feedback from cyberspace to the physical space, and a security framework for control that changes the real world, based on changes in cyberspace, where attackers are persistently present. And, I propose a security scheme for IoT actuators that integrates a new concept of security known as Zero Trust, as the Zero Trust IoT Security Framework (ZeTiots-FW).
{"title":"Zero Trust Security Framework for IoT Actuators","authors":"Nobuhiro Kobayashi","doi":"10.1109/COMPSAC57700.2023.00195","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00195","url":null,"abstract":"While the introduction of cyber physical systems (CPS) into society is progressing toward the realization of Society 5.0, the threat of cyberattacks on IoT devices(IoT actuators) that have actuator functions to bring about physical changes in the real world among the IoT devices that constitute the CPS is increasing. In order to prepare for unauthorized control of IoT actuators caused by cyberattacks that are evolving daily, such as zero-day attacks that exploit unknown vulnerabilities in programs, it is an urgent issue to strengthen the CPS, which will become the social infrastructure of the future. In this paper, I explain, in particular, the security requirements for IoT actuators that exert physical action as feedback from cyberspace to the physical space, and a security framework for control that changes the real world, based on changes in cyberspace, where attackers are persistently present. And, I propose a security scheme for IoT actuators that integrates a new concept of security known as Zero Trust, as the Zero Trust IoT Security Framework (ZeTiots-FW).","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115234415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00134
S. Reddivari, James K. Orr, Reyansh Reddy
Blockchain-oriented software (BOS) is emerging rapidly, however, tailored software engineering techniques to assist software testing is one of the important and necessary phases of software development that plays a vital role in software quality assurance. Blockchain-oriented software testing (BOST) is another area that is still emerging. This paper conducts a preliminary literature review to assess the type of research published, where this research can be found, and the main themes of existing research in BOST. This study also introduces a framework for conducting an empirical study on BOS available on GitHub and proposes future work to expand the knowledge in this domain.
{"title":"Blockchain-Oriented Software Testing: A Preliminary Literature Review","authors":"S. Reddivari, James K. Orr, Reyansh Reddy","doi":"10.1109/COMPSAC57700.2023.00134","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00134","url":null,"abstract":"Blockchain-oriented software (BOS) is emerging rapidly, however, tailored software engineering techniques to assist software testing is one of the important and necessary phases of software development that plays a vital role in software quality assurance. Blockchain-oriented software testing (BOST) is another area that is still emerging. This paper conducts a preliminary literature review to assess the type of research published, where this research can be found, and the main themes of existing research in BOST. This study also introduces a framework for conducting an empirical study on BOS available on GitHub and proposes future work to expand the knowledge in this domain.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"115 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114262782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00017
Niccolò De Bona, L. Santoro, D. Brunelli, D. Fontanelli
Multi-robot patrolling for dynamic coverage in flat environments is proposed, through a systematic simulative analysis between the Greedy Bayesian Strategy and the Expected Reactive algorithm based on the expected idleness. The two approaches are compared against unreliable communications, communication and sensing range, and number of conflicts. In addition, we introduce a new weighting-term for the regions close to a quantity of interest detected by robots, decreasing the passing-time for those regions. Combining the proposed control strategy and a traditional distributed and recursive Weighted Least Square estimation algorithm, the swarm is capable to compute the quantity of interest position with a desired target uncertainty. Extensive simulations and comparisons are reported.
{"title":"Adaptive Expected Reactive algorithm for Heterogeneous Patrolling Systems based on Target Uncertainty","authors":"Niccolò De Bona, L. Santoro, D. Brunelli, D. Fontanelli","doi":"10.1109/COMPSAC57700.2023.00017","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00017","url":null,"abstract":"Multi-robot patrolling for dynamic coverage in flat environments is proposed, through a systematic simulative analysis between the Greedy Bayesian Strategy and the Expected Reactive algorithm based on the expected idleness. The two approaches are compared against unreliable communications, communication and sensing range, and number of conflicts. In addition, we introduce a new weighting-term for the regions close to a quantity of interest detected by robots, decreasing the passing-time for those regions. Combining the proposed control strategy and a traditional distributed and recursive Weighted Least Square estimation algorithm, the swarm is capable to compute the quantity of interest position with a desired target uncertainty. Extensive simulations and comparisons are reported.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114408011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/compsac57700.2023.00140
Sze Chit Au, J. Keung
In computational intelligence, Gerald Appel designed MACD, short for Moving Average Convergence /Divergence in the 1970s, a popular trading indicator used in the business data analysis of stock prices to predict future trends. While it is easy to read, MACD has two distinct disadvantages, the time lagging problem and the fake signals problem, resulting in delays in buying or selling signals and decisions. Besides, three parameters input are required for the calculation model, which is not user-friendly for new learners. This study proposes a new methodology – Volume Square-Weighted Moving Average Convergence & Divergence (VSWMACD). It aims to improve MACD performance and apply various evaluation tools to verify the enhancements. Five datasets with 200 stocks from Hong Kong Stock Market in each have been applied to the testing. The outcome shows that compared to MACD, the average Return On Investment of VSWMACD increased by around 15%, and the average Maximum Drawdown decreased by about 5%. VSWMACD is proven to reduce fake signals while earning a higher return with a lower risk than MACD. A better portfolio management can be formed.
在计算智能领域,杰拉尔德•阿佩尔(Gerald Appel)设计了MACD,即上世纪70年代的移动平均收敛/偏离(Moving Average Convergence /Divergence)的缩写,是一种流行的交易指标,用于股票价格的商业数据分析,以预测未来趋势。虽然MACD很容易阅读,但它有两个明显的缺点,时间滞后问题和假信号问题,导致买卖信号和决策的延迟。此外,计算模型需要输入三个参数,这对初学者来说不是很方便。本研究提出了一种新的方法——成交量平方加权移动平均收敛和偏离(VSWMACD)。它旨在提高MACD性能,并应用各种评估工具来验证增强功能。我们使用了5个数据集,每个数据集包含200只香港股票。结果显示,与MACD相比,VSWMACD的平均投资回报率增加了约15%,平均最大回撤率下降了约5%。VSWMACD被证明可以减少虚假信号,同时获得比MACD更高的回报和更低的风险。可以形成更好的项目组合管理。
{"title":"New Technique for Stock Trend Analysis – Volume-weighted Squared Moving Average Convergence & Divergence","authors":"Sze Chit Au, J. Keung","doi":"10.1109/compsac57700.2023.00140","DOIUrl":"https://doi.org/10.1109/compsac57700.2023.00140","url":null,"abstract":"In computational intelligence, Gerald Appel designed MACD, short for Moving Average Convergence /Divergence in the 1970s, a popular trading indicator used in the business data analysis of stock prices to predict future trends. While it is easy to read, MACD has two distinct disadvantages, the time lagging problem and the fake signals problem, resulting in delays in buying or selling signals and decisions. Besides, three parameters input are required for the calculation model, which is not user-friendly for new learners. This study proposes a new methodology – Volume Square-Weighted Moving Average Convergence & Divergence (VSWMACD). It aims to improve MACD performance and apply various evaluation tools to verify the enhancements. Five datasets with 200 stocks from Hong Kong Stock Market in each have been applied to the testing. The outcome shows that compared to MACD, the average Return On Investment of VSWMACD increased by around 15%, and the average Maximum Drawdown decreased by about 5%. VSWMACD is proven to reduce fake signals while earning a higher return with a lower risk than MACD. A better portfolio management can be formed.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117298203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00072
Wesley B. R. Herculano, Everton L. G. Alves, Melina Mongiovi
Maintenance tasks often rely on failing test cases, highlighting the importance of well-designed tests for their success. While automatically generated tests can provide higher code coverage and detect faults, it is unclear whether they can be effective in guiding maintenance tasks or if developers fully accept them. In our recent work, we presented the results of a series of empirical studies that evaluated the practical support of generated tests. Our studies with 126 developers showed that automatically generated tests can effectively identify faults during maintenance tasks. Developers were equally effective in creating bug fixes when using manually-written, Evosuite, and Randoop tests. However, developers perceived generated tests as not well-designed and preferred refactored versions of Randoop tests. We plan to enhance Evosuite tests and propose an approach/tool that assesses the quality of generated tests and automatically enhances them. Our research may impact the design and use of generated tests in the context of maintenance tasks.
{"title":"Assessing and Improving the Quality of Generated Tests in the Context of Maintenance Tasks","authors":"Wesley B. R. Herculano, Everton L. G. Alves, Melina Mongiovi","doi":"10.1109/COMPSAC57700.2023.00072","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00072","url":null,"abstract":"Maintenance tasks often rely on failing test cases, highlighting the importance of well-designed tests for their success. While automatically generated tests can provide higher code coverage and detect faults, it is unclear whether they can be effective in guiding maintenance tasks or if developers fully accept them. In our recent work, we presented the results of a series of empirical studies that evaluated the practical support of generated tests. Our studies with 126 developers showed that automatically generated tests can effectively identify faults during maintenance tasks. Developers were equally effective in creating bug fixes when using manually-written, Evosuite, and Randoop tests. However, developers perceived generated tests as not well-designed and preferred refactored versions of Randoop tests. We plan to enhance Evosuite tests and propose an approach/tool that assesses the quality of generated tests and automatically enhances them. Our research may impact the design and use of generated tests in the context of maintenance tasks.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121709928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00076
Kazunori Fujiwara, Shuji Sannomiya, Akira Sato, K. Yoshida
IP anycast is widely used for root and TLD DNS servers to reduce latency. DNS operators need to perform measurements to understand and improve their service quality. Although it is vital to measure the effect of IP anycast, the measurement requires enough worldwide measurement points to send queries. In this paper, we try a more manageable approach, i.e., analyzing the existing capture data to reveal the response delays between resolvers and authoritative DNS servers. There are two packet capture datasets, the DITL and JP datasets. The DITL dataset is collected by Root server operators and maintained by DNS-OARC. The JP dataset is collected for JP TLD operations. Specifically, we extracted communication delay information from TCP session data in these datasets.Our analysis that uses multiple datasets, i.e., DITL and JP datasets, reveals: 1) Approximately 30% of IPv4 addresses seen at the M-Root & JP DNS server have RTT information and come from over 200 countries. 2) JP DNS servers offer RTT of less than 20ms for 80% of queries from Japan, and RTT of less than 100ms for 80% of queries from outside of Japan. 3) The newly installed M-root Brisbane node offers shorter RTTs in Australia.
{"title":"Latency analysis of JP and Root DNS servers from packet capture data","authors":"Kazunori Fujiwara, Shuji Sannomiya, Akira Sato, K. Yoshida","doi":"10.1109/COMPSAC57700.2023.00076","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00076","url":null,"abstract":"IP anycast is widely used for root and TLD DNS servers to reduce latency. DNS operators need to perform measurements to understand and improve their service quality. Although it is vital to measure the effect of IP anycast, the measurement requires enough worldwide measurement points to send queries. In this paper, we try a more manageable approach, i.e., analyzing the existing capture data to reveal the response delays between resolvers and authoritative DNS servers. There are two packet capture datasets, the DITL and JP datasets. The DITL dataset is collected by Root server operators and maintained by DNS-OARC. The JP dataset is collected for JP TLD operations. Specifically, we extracted communication delay information from TCP session data in these datasets.Our analysis that uses multiple datasets, i.e., DITL and JP datasets, reveals: 1) Approximately 30% of IPv4 addresses seen at the M-Root & JP DNS server have RTT information and come from over 200 countries. 2) JP DNS servers offer RTT of less than 20ms for 80% of queries from Japan, and RTT of less than 100ms for 80% of queries from outside of Japan. 3) The newly installed M-root Brisbane node offers shorter RTTs in Australia.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00045
D.P.H. Napolitano, Luca Cagliero
Shapley Values are established concepts used to explain local and global contribution of individual features to the prediction of AI models. Currently, global Shapley-based explainers do not consider the co-occurrences of feature-value pairs in the analyzed data. This paper proposes a novel approach to leverage the High-Utility Itemset Mining framework to jointly consider Shapley-based feature-level contributions and feature-value pair co-occurrences. The results achieved on benchmark datasets show that the extracted patterns provide actionable knowledge, complementary to those of global Shapley Values.
{"title":"GX-HUI: Global Explanations of AI Models based on High-Utility Itemsets","authors":"D.P.H. Napolitano, Luca Cagliero","doi":"10.1109/COMPSAC57700.2023.00045","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00045","url":null,"abstract":"Shapley Values are established concepts used to explain local and global contribution of individual features to the prediction of AI models. Currently, global Shapley-based explainers do not consider the co-occurrences of feature-value pairs in the analyzed data. This paper proposes a novel approach to leverage the High-Utility Itemset Mining framework to jointly consider Shapley-based feature-level contributions and feature-value pair co-occurrences. The results achieved on benchmark datasets show that the extracted patterns provide actionable knowledge, complementary to those of global Shapley Values.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122754129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1109/COMPSAC57700.2023.00139
Yong Jin, M. Tomoishi
Authentication and authorization are essential functionalities in Internet of Things (IoT) systems in the areas of device monitoring, access control, data sharing, and privacy preservation. The current authentication and authorization technologies are mainly based on ID/Password (credential), public key cryptography collaborating with multi-factor approaches, and manual basis static access control for data resources. However, they have disadvantages in terms of identity/credential management, privacy preservation, and the mandatory requirement of Trusted Third Party (TTP) Certificate Authorities (which are not cryptographically secure) for certificate verifications. The objective of this fast abstract is to present a novel idea for named-entity-based TTP-free authentication and authorization architecture in IoT systems. The proposed architecture is based on the collaboration of blockchain technology and DNS-based Authentication of Named Entity (DANE) protocol to provide secure and privacy-preserved authentication and authorization functionalities with considering effective device identity management and secure data access control in IoT systems.
{"title":"A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems","authors":"Yong Jin, M. Tomoishi","doi":"10.1109/COMPSAC57700.2023.00139","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00139","url":null,"abstract":"Authentication and authorization are essential functionalities in Internet of Things (IoT) systems in the areas of device monitoring, access control, data sharing, and privacy preservation. The current authentication and authorization technologies are mainly based on ID/Password (credential), public key cryptography collaborating with multi-factor approaches, and manual basis static access control for data resources. However, they have disadvantages in terms of identity/credential management, privacy preservation, and the mandatory requirement of Trusted Third Party (TTP) Certificate Authorities (which are not cryptographically secure) for certificate verifications. The objective of this fast abstract is to present a novel idea for named-entity-based TTP-free authentication and authorization architecture in IoT systems. The proposed architecture is based on the collaboration of blockchain technology and DNS-based Authentication of Named Entity (DANE) protocol to provide secure and privacy-preserved authentication and authorization functionalities with considering effective device identity management and secure data access control in IoT systems.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}