首页 > 最新文献

2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)最新文献

英文 中文
WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi WiBWi: BLE与WiFi之间基于编码的双向物理层跨技术通信
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00050
Yuanhe Shu, Jingwei Wang, L. Kong, Jiadi Yu, Guisong Yang, Yueping Cai, Zhen Wang, M. K. Khan
The booming of mobile technologies and Internet of Things (IoTs) have facilitated the explosion of wireless devices and brought convenience to people's daily lives. Coming with the explosive growth of wireless devices, incompatibility of heterogeneous wireless technologies hindered the growing demands for everything connected. And spectrum sharing among heterogeneous wireless technologies has led to severe Cross-Technology Interference (CTI), which is a vital obstacle for network reliability and spectrum utilization. Researches in recent years have shown that Cross-Technology Communication (CTC) turns out to be a promising solution with broad perspective for the coexistence of heterogeneous wireless technologies. However, due to the physical layer incompatibility of WiFi and Bluetooth Low Energy (BLE), the researches about CTC between these two most wildly used wireless technologies are limited by now. In this paper, we propose WiBWi, a payload encoding-based bidirectional CTC scheme between BLE and WiFi, which can achieve near-optimal throughput and powerful robustness. For uplink, i.e., BLE to WiFi communication, WiBWi leverages a novel extended WiFi preamble detection rule and probabilistic inference based encode mapping to achieve fast and reliable communication. For downlink, i.e., WiFi to BLE communication, WiBWi introduces an encoding mapping scheme in the sight of BLE receiver with little modification to accomplish high throughput and robustness. Extensive evaluation shows that WiBWi can offer near-optimal throughput (near the maximum throughput of BLE) and extremely low bit error rate (less than 1%).
移动技术和物联网的蓬勃发展,推动了无线设备的爆炸式增长,为人们的日常生活带来了便利。随着无线设备的爆炸式增长,异构无线技术的不兼容性阻碍了人们对万物互联的需求。而异构无线技术之间的频谱共享导致了严重的跨技术干扰(CTI),这是影响网络可靠性和频谱利用率的重要障碍。近年来的研究表明,跨技术通信(CTC)是一种很有前途的解决方案,为异构无线技术共存提供了广阔的前景。然而,由于WiFi和低功耗蓝牙(Bluetooth Low Energy, BLE)的物理层不兼容,目前对这两种应用最广泛的无线技术之间的CTC的研究还很有限。在本文中,我们提出了WiBWi,一种介于BLE和WiFi之间的基于有效载荷编码的双向CTC方案,可以实现近乎最优的吞吐量和强大的鲁棒性。对于上行链路,即BLE到WiFi通信,WiBWi利用了一种新颖的扩展WiFi前导检测规则和基于概率推理的编码映射,实现了快速可靠的通信。对于下行链路,即WiFi到BLE通信,WiBWi在BLE接收器的视线中引入了一种编码映射方案,修改很少,实现了高吞吐量和鲁棒性。广泛的评估表明,WiBWi可以提供近乎最佳的吞吐量(接近BLE的最大吞吐量)和极低的误码率(小于1%)。
{"title":"WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi","authors":"Yuanhe Shu, Jingwei Wang, L. Kong, Jiadi Yu, Guisong Yang, Yueping Cai, Zhen Wang, M. K. Khan","doi":"10.1109/ICPADS53394.2021.00050","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00050","url":null,"abstract":"The booming of mobile technologies and Internet of Things (IoTs) have facilitated the explosion of wireless devices and brought convenience to people's daily lives. Coming with the explosive growth of wireless devices, incompatibility of heterogeneous wireless technologies hindered the growing demands for everything connected. And spectrum sharing among heterogeneous wireless technologies has led to severe Cross-Technology Interference (CTI), which is a vital obstacle for network reliability and spectrum utilization. Researches in recent years have shown that Cross-Technology Communication (CTC) turns out to be a promising solution with broad perspective for the coexistence of heterogeneous wireless technologies. However, due to the physical layer incompatibility of WiFi and Bluetooth Low Energy (BLE), the researches about CTC between these two most wildly used wireless technologies are limited by now. In this paper, we propose WiBWi, a payload encoding-based bidirectional CTC scheme between BLE and WiFi, which can achieve near-optimal throughput and powerful robustness. For uplink, i.e., BLE to WiFi communication, WiBWi leverages a novel extended WiFi preamble detection rule and probabilistic inference based encode mapping to achieve fast and reliable communication. For downlink, i.e., WiFi to BLE communication, WiBWi introduces an encoding mapping scheme in the sight of BLE receiver with little modification to accomplish high throughput and robustness. Extensive evaluation shows that WiBWi can offer near-optimal throughput (near the maximum throughput of BLE) and extremely low bit error rate (less than 1%).","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133625889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
STNN: A Spatial-Temporal Graph Neural Network for Traffic Prediction STNN:用于交通预测的时空图神经网络
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00024
Xueyan Yin, Fei Li, Genze Wu, Pengfei Wang, Yanming Shen, Heng Qi, Baocai Yin
Accurate traffic prediction is of great importance in Intelligent Transportation System. This problem is very challenging due to the complex spatial and long-range temporal dependencies. Existing models generally suffer two limitations: (1) GCN-based methods usually use a fixed Laplacian matrix to model spatial dependencies, without considering their dynamics; (2) RNN and its variants are only capable of modeling a limited-range temporal dependencies, resulting in significant information loss. In this paper, we propose a novel spatial-temporal graph neural network (STNN), an end-to-end solution for traffic prediction that simultaneously captures dynamic spatial and long-range temporal dependencies. Specifically, STNN first uses a spatial attention network to model complex and dynamic spatial correlations, without any expensive matrix operations or relying on predefined road network topologies. Second, a temporal transformer network is utilized to model long-range temporal dependencies across multiple time steps, which considers not only the recent segment, but also the periodic dependencies of historical data. Making full use of historical data can alleviate the difficulty of obtaining real-time data and improve the prediction accuracy. Experiments are conducted on two real-world traffic datasets, and the results verify the effectiveness of the proposed model, especially in long-term traffic prediction.
准确的交通预测在智能交通系统中具有重要意义。由于复杂的空间和长时间依赖关系,这个问题非常具有挑战性。现有模型一般存在两个局限性:(1)基于gcn的方法通常使用固定的拉普拉斯矩阵来建模空间依赖关系,而不考虑它们的动态;(2) RNN及其变体仅能对有限范围的时间依赖性进行建模,导致严重的信息损失。在本文中,我们提出了一种新的时空图神经网络(STNN),这是一种端到端的交通预测解决方案,同时捕获动态空间和长期时间依赖性。具体来说,STNN首先使用空间注意网络来模拟复杂和动态的空间相关性,而不需要任何昂贵的矩阵操作或依赖于预定义的道路网络拓扑。其次,利用时序变压器网络对多个时间步长的时间依赖关系进行建模,该网络不仅考虑了最近段,而且考虑了历史数据的周期性依赖关系。充分利用历史数据可以缓解获取实时数据的困难,提高预测精度。在两个真实交通数据集上进行了实验,结果验证了该模型的有效性,特别是在长期交通预测方面。
{"title":"STNN: A Spatial-Temporal Graph Neural Network for Traffic Prediction","authors":"Xueyan Yin, Fei Li, Genze Wu, Pengfei Wang, Yanming Shen, Heng Qi, Baocai Yin","doi":"10.1109/ICPADS53394.2021.00024","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00024","url":null,"abstract":"Accurate traffic prediction is of great importance in Intelligent Transportation System. This problem is very challenging due to the complex spatial and long-range temporal dependencies. Existing models generally suffer two limitations: (1) GCN-based methods usually use a fixed Laplacian matrix to model spatial dependencies, without considering their dynamics; (2) RNN and its variants are only capable of modeling a limited-range temporal dependencies, resulting in significant information loss. In this paper, we propose a novel spatial-temporal graph neural network (STNN), an end-to-end solution for traffic prediction that simultaneously captures dynamic spatial and long-range temporal dependencies. Specifically, STNN first uses a spatial attention network to model complex and dynamic spatial correlations, without any expensive matrix operations or relying on predefined road network topologies. Second, a temporal transformer network is utilized to model long-range temporal dependencies across multiple time steps, which considers not only the recent segment, but also the periodic dependencies of historical data. Making full use of historical data can alleviate the difficulty of obtaining real-time data and improve the prediction accuracy. Experiments are conducted on two real-world traffic datasets, and the results verify the effectiveness of the proposed model, especially in long-term traffic prediction.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A User-related Semantic Location Privacy Protection Method In Location-based Service 基于位置的服务中基于用户的语义位置隐私保护方法
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00092
Xudong Yang, Ling Gao, Hai Wang, Yan Li, Jie Zheng, Jipeng Xu, Yuhui Ma
With the popularity and development of Location-Based Services (LBS), location privacy-preservation has become a hot research topic in recent years, especially research on k-anonymity. Although previous studies have done a lot of work on privacy protection, they ignore the negative impact on the security of the knowledge of user-related semantic information of locations that attacker has. To solve this issue, we proposed a User-related Semantic Location Privacy Protection Mechanism (USPPM) based on k-anonymity. First, the anonymity set generation method that combines user-related mobile semantic feature of locations and semantic diversity entropy is proposed to improve the location semantic privacy safety. Second, we design an anonymity set optimization method which enhances sensitive semantic location privacy, through stackberg game model between attacker and protector. Finally, compared with other solutions, experiment on the real dataset shows that our algorithms can provide location privacy efficiently.
随着基于位置的服务(LBS)的普及和发展,位置隐私保护成为近年来的研究热点,尤其是k-匿名的研究。虽然以往的研究在隐私保护方面做了大量的工作,但忽视了攻击者所拥有的与用户相关的位置语义信息知识对安全性的负面影响。为了解决这个问题,我们提出了一种基于k-匿名的用户相关语义位置隐私保护机制(USPPM)。首先,提出将用户相关移动位置语义特征与语义多样性熵相结合的匿名集生成方法,提高位置语义隐私安全性;其次,通过攻击者和保护者之间的stackberg博弈模型,设计了一种增强敏感语义位置隐私的匿名集优化方法。最后,在真实数据集上的实验表明,我们的算法能够有效地提供位置隐私。
{"title":"A User-related Semantic Location Privacy Protection Method In Location-based Service","authors":"Xudong Yang, Ling Gao, Hai Wang, Yan Li, Jie Zheng, Jipeng Xu, Yuhui Ma","doi":"10.1109/ICPADS53394.2021.00092","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00092","url":null,"abstract":"With the popularity and development of Location-Based Services (LBS), location privacy-preservation has become a hot research topic in recent years, especially research on k-anonymity. Although previous studies have done a lot of work on privacy protection, they ignore the negative impact on the security of the knowledge of user-related semantic information of locations that attacker has. To solve this issue, we proposed a User-related Semantic Location Privacy Protection Mechanism (USPPM) based on k-anonymity. First, the anonymity set generation method that combines user-related mobile semantic feature of locations and semantic diversity entropy is proposed to improve the location semantic privacy safety. Second, we design an anonymity set optimization method which enhances sensitive semantic location privacy, through stackberg game model between attacker and protector. Finally, compared with other solutions, experiment on the real dataset shows that our algorithms can provide location privacy efficiently.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Minimizing Play Request Rejection through Workload Splitting in Edge-Cloud Gaming 在边缘云游戏中通过工作量分割最小化游戏请求拒绝
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00108
Iryanto Jaya, Yusen Li, Wentong Cai
Cloud gaming abstracts the concept of traditional gaming and places the gaming activities on remote rendering servers (RSes). Although this allows heterogeneous devices to gain access to multiple game titles, latency issue is always unavoidable. Each game input must go through a complete round trip between the player's device and the cloud gaming server. Hence, cloud games are not as responsive as traditional computer games where the game logic runs locally. Moreover, in order to have an acceptable level of game playability, the latency level must be within a certain threshold. This also prevents some players who are located in remote regions from playing the game due to high latency. Therefore, in this paper, we employ edge servers in order to reach those players by activating lower capability RSes which are more geographically distributed. Furthermore, we also allow workload splitting of foreground and background rendering between edge and cloud RSes to ease the burden of each individual RS with a trade-off between cost and latency constraints. From our experiments, our architecture and allocation scheme results in reduction of play request rejections for up to 28% compared to traditional cloud gaming approach.
云游戏抽象了传统游戏的概念,并将游戏活动放在远程呈现服务器(rse)上。尽管这允许不同设备访问多个游戏,但延迟问题总是不可避免的。每次游戏输入都必须在玩家的设备和云游戏服务器之间进行一次完整的往返。因此,云游戏的响应性不如传统电脑游戏,后者的游戏逻辑在本地运行。此外,为了获得可接受的游戏可玩性水平,延迟水平必须在一定的阈值范围内。这也阻止了一些位于偏远地区的玩家由于高延迟而无法玩游戏。因此,在本文中,我们使用边缘服务器,以便通过激活更地理分布的低能力rse来到达那些玩家。此外,我们还允许在边缘和云rsse之间拆分前景和背景渲染的工作负载,从而在成本和延迟约束之间进行权衡,减轻每个RS的负担。从我们的实验来看,与传统的云游戏方法相比,我们的架构和分配方案减少了高达28%的游戏请求拒绝。
{"title":"Minimizing Play Request Rejection through Workload Splitting in Edge-Cloud Gaming","authors":"Iryanto Jaya, Yusen Li, Wentong Cai","doi":"10.1109/ICPADS53394.2021.00108","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00108","url":null,"abstract":"Cloud gaming abstracts the concept of traditional gaming and places the gaming activities on remote rendering servers (RSes). Although this allows heterogeneous devices to gain access to multiple game titles, latency issue is always unavoidable. Each game input must go through a complete round trip between the player's device and the cloud gaming server. Hence, cloud games are not as responsive as traditional computer games where the game logic runs locally. Moreover, in order to have an acceptable level of game playability, the latency level must be within a certain threshold. This also prevents some players who are located in remote regions from playing the game due to high latency. Therefore, in this paper, we employ edge servers in order to reach those players by activating lower capability RSes which are more geographically distributed. Furthermore, we also allow workload splitting of foreground and background rendering between edge and cloud RSes to ease the burden of each individual RS with a trade-off between cost and latency constraints. From our experiments, our architecture and allocation scheme results in reduction of play request rejections for up to 28% compared to traditional cloud gaming approach.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Split Convolutional Neural Networks for Distributed Inference on Concurrent IoT Sensors 并行物联网传感器分布式推理的分裂卷积神经网络
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00014
Jiale Chen, D. V. Le, R. Tan, Daren Ho
Convolutional neural networks (CNNs) are increasingly adopted on resource-constrained sensors for in-situ data analytics in Internet of Things (IoT) applications. This paper presents a model split framework, namely, splitCNN, in order to run a large CNN on a collection of concurrent IoT sensors. Specifically, we adopt CNN filter pruning techniques to split the large CNN into multiple small-size models, each of which is only sensitive to a certain number of data classes. These class-specific models are deployed onto the resource-constrained concurrent sensors which collaboratively perform distributed CNN inference on their same/similar sensing data. The outputs of multiple models are then fused to yield the global inference result. We apply splitCNN to three case studies with different sensing modalities, which include the human voice, industrial vibration signal, and visual sensing data. Extensive evaluation shows the effectiveness of the proposed splitCNN. In particular, the splitCNN achieves significant reduction in the model size and inference time while maintaining similar accuracy, compared with the original CNN model for all three case studies.
卷积神经网络(cnn)越来越多地应用于资源受限的传感器,用于物联网(IoT)应用中的原位数据分析。为了在一组并发物联网传感器上运行大型CNN,本文提出了一个模型拆分框架,即splitCNN。具体来说,我们采用CNN滤波剪枝技术,将大的CNN拆分成多个小的模型,每个小的模型只对一定数量的数据类敏感。这些类特定的模型被部署到资源受限的并发传感器上,这些传感器协同对它们相同/相似的传感数据执行分布式CNN推理。然后将多个模型的输出融合以产生全局推理结果。我们将splitCNN应用于三个具有不同传感模式的案例研究,包括人声、工业振动信号和视觉传感数据。广泛的评估表明了所提出的splitCNN的有效性。特别是,splitCNN在所有三个案例研究中,与原始CNN模型相比,在保持相似精度的同时,显著减少了模型大小和推理时间。
{"title":"Split Convolutional Neural Networks for Distributed Inference on Concurrent IoT Sensors","authors":"Jiale Chen, D. V. Le, R. Tan, Daren Ho","doi":"10.1109/ICPADS53394.2021.00014","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00014","url":null,"abstract":"Convolutional neural networks (CNNs) are increasingly adopted on resource-constrained sensors for in-situ data analytics in Internet of Things (IoT) applications. This paper presents a model split framework, namely, splitCNN, in order to run a large CNN on a collection of concurrent IoT sensors. Specifically, we adopt CNN filter pruning techniques to split the large CNN into multiple small-size models, each of which is only sensitive to a certain number of data classes. These class-specific models are deployed onto the resource-constrained concurrent sensors which collaboratively perform distributed CNN inference on their same/similar sensing data. The outputs of multiple models are then fused to yield the global inference result. We apply splitCNN to three case studies with different sensing modalities, which include the human voice, industrial vibration signal, and visual sensing data. Extensive evaluation shows the effectiveness of the proposed splitCNN. In particular, the splitCNN achieves significant reduction in the model size and inference time while maintaining similar accuracy, compared with the original CNN model for all three case studies.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRPeek: Super Resolution Enabled Screen Peeking via COTS Smartphone SRPeek:通过COTS智能手机实现超分辨率屏幕窥视
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00117
Jialuo Du, Chenning Li, Zhenge Guo, Zhichao Cao
The screens of our smartphones and laptops display our private information persistently. The term “shoulder surfing” refers to the behavior of unauthorized people peeking at our screens, easily causing severe privacy leakages. Many countermeasures have been used to prevent naked eye-based peeking by reducing the possible peeking distance. However, the risk from modern smartphones with powerful cameras is underestimated. In this paper, we propose SRPeek, a long-distance shoulder surfing attack method using smartphones. Our key observation is that although a single image captured by smartphone cameras is blurred, the attacker can leverage super-resolution (SR) techniques to recover the information from multiple blurry images. We design an end-to-end system deployed on commercial smartphones, including an innovative deep neural network (DNN) architecture, StARe, for efficient multi-image SR. We implement SRPeek in Android and conduct extensive experiments to evaluate its performance. The results demonstrate we can recognize 90% of characters at a distance of 6m with telephoto lenses and 1.8m with common lenses, calling for the vigilance of the Quietly growing shoulder surfing threat.
我们的智能手机和笔记本电脑的屏幕持续显示我们的私人信息。“肩冲浪”指的是未经授权的人偷窥我们的屏幕,很容易造成严重的隐私泄露。为了防止裸眼偷窥,减少了可能的偷窥距离,采取了很多对策。然而,带有强大摄像头的现代智能手机带来的风险被低估了。在本文中,我们提出了一种基于智能手机的长距离肩冲浪攻击方法SRPeek。我们的主要观察结果是,尽管智能手机摄像头拍摄的单个图像是模糊的,但攻击者可以利用超分辨率(SR)技术从多个模糊图像中恢复信息。我们设计了一个部署在商用智能手机上的端到端系统,包括创新的深度神经网络(DNN)架构StARe,用于高效的多图像sr。我们在Android上实现了SRPeek,并进行了大量的实验来评估其性能。结果表明,使用长焦镜头和普通镜头,我们可以在6米和1.8米的距离内识别90%的字符,这引起了人们对悄悄增长的肩部冲浪威胁的警惕。
{"title":"SRPeek: Super Resolution Enabled Screen Peeking via COTS Smartphone","authors":"Jialuo Du, Chenning Li, Zhenge Guo, Zhichao Cao","doi":"10.1109/ICPADS53394.2021.00117","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00117","url":null,"abstract":"The screens of our smartphones and laptops display our private information persistently. The term “shoulder surfing” refers to the behavior of unauthorized people peeking at our screens, easily causing severe privacy leakages. Many countermeasures have been used to prevent naked eye-based peeking by reducing the possible peeking distance. However, the risk from modern smartphones with powerful cameras is underestimated. In this paper, we propose SRPeek, a long-distance shoulder surfing attack method using smartphones. Our key observation is that although a single image captured by smartphone cameras is blurred, the attacker can leverage super-resolution (SR) techniques to recover the information from multiple blurry images. We design an end-to-end system deployed on commercial smartphones, including an innovative deep neural network (DNN) architecture, StARe, for efficient multi-image SR. We implement SRPeek in Android and conduct extensive experiments to evaluate its performance. The results demonstrate we can recognize 90% of characters at a distance of 6m with telephoto lenses and 1.8m with common lenses, calling for the vigilance of the Quietly growing shoulder surfing threat.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Optimization of Auto-Scaling and Adaptive Service Placement in Edge Computing 边缘计算中自缩放和自适应服务布局的联合优化
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00121
Ye Li, Haitao Zhang, W. Tian, Huadong Ma
In edge computing environment where network connections are often unstable and workload intensity changes frequently, the proper scaling mechanism and service placement strategy based on microservices are needed to ensure the edge services can be provided consistently. However, the common elastic scaling mechanism nowadays is threshold-based responsive scaling and has reaction time in the order of minutes, which is not suitable for delay-sensitive applications in the edge computing environment. Moreover, auto-scaling strategy and service replica placement are considered separately. If the scaled service replicas are misplaced on the edge nodes with limited resources or significant communication latency between upstream and downstream neighbours, the Quality of Service (QoS) cannot be guaranteed even with the auto-scaling mechanism. In this paper, we study the joint optimization of dynamic auto-scaling and adaptive service placement, and define it as a task delay minimization problem while satisfying resource and bandwidth constraints. Firstly, we design a multi-stage auto-scaling model based on workload prediction and performance evaluation of edge nodes to dynamically create an appropriate number of service replicas. Secondly, we propose a Dynamic Adaptive Service Placement (DASP) approach to iteratively place each service replica by using Adaptive Discrete Binary Particle Swarm Optimization (ADBPSO) algorithm. DASP can determine the current optimal placement strategy according to dynamic service replica scaling decision in a short time. The placement results of the current round will guide the optimization of the next cycle iteratively. The experimental evaluation shows that our approach significantly outperforms the existing methods in reducing the average task response time.
在网络连接不稳定、工作负载强度变化频繁的边缘计算环境中,需要适当的扩展机制和基于微服务的服务放置策略来保证边缘服务的一致性提供。然而,目前常见的弹性缩放机制是基于阈值的响应缩放,其反应时间在分钟量级,不适合边缘计算环境中对延迟敏感的应用。此外,还分别考虑了自动伸缩策略和服务副本的放置。如果扩展后的服务副本被放置在资源有限或上下游邻居之间通信延迟较大的边缘节点上,则即使使用自动扩展机制也无法保证服务质量(QoS)。本文研究了动态自伸缩和自适应服务布局的联合优化问题,并将其定义为满足资源和带宽约束的任务延迟最小化问题。首先,设计了基于工作负载预测和边缘节点性能评估的多阶段自动扩展模型,动态创建适当数量的服务副本;其次,我们提出了一种动态自适应服务放置(DASP)方法,通过自适应离散二进制粒子群优化(ADBPSO)算法迭代放置每个服务副本。DASP可以根据动态的服务副本扩展决策在短时间内确定当前的最优放置策略。当前一轮的投放结果将迭代地指导下一轮的优化。实验评估表明,我们的方法在减少平均任务响应时间方面明显优于现有方法。
{"title":"Joint Optimization of Auto-Scaling and Adaptive Service Placement in Edge Computing","authors":"Ye Li, Haitao Zhang, W. Tian, Huadong Ma","doi":"10.1109/ICPADS53394.2021.00121","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00121","url":null,"abstract":"In edge computing environment where network connections are often unstable and workload intensity changes frequently, the proper scaling mechanism and service placement strategy based on microservices are needed to ensure the edge services can be provided consistently. However, the common elastic scaling mechanism nowadays is threshold-based responsive scaling and has reaction time in the order of minutes, which is not suitable for delay-sensitive applications in the edge computing environment. Moreover, auto-scaling strategy and service replica placement are considered separately. If the scaled service replicas are misplaced on the edge nodes with limited resources or significant communication latency between upstream and downstream neighbours, the Quality of Service (QoS) cannot be guaranteed even with the auto-scaling mechanism. In this paper, we study the joint optimization of dynamic auto-scaling and adaptive service placement, and define it as a task delay minimization problem while satisfying resource and bandwidth constraints. Firstly, we design a multi-stage auto-scaling model based on workload prediction and performance evaluation of edge nodes to dynamically create an appropriate number of service replicas. Secondly, we propose a Dynamic Adaptive Service Placement (DASP) approach to iteratively place each service replica by using Adaptive Discrete Binary Particle Swarm Optimization (ADBPSO) algorithm. DASP can determine the current optimal placement strategy according to dynamic service replica scaling decision in a short time. The placement results of the current round will guide the optimization of the next cycle iteratively. The experimental evaluation shows that our approach significantly outperforms the existing methods in reducing the average task response time.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128951678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enabling Conflict-free Collaborations with Cloud Storage Services 通过云存储服务实现无冲突协作
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00082
Minghao Zhao, Jian Chen, Zhenhua Li
Cloud storage services (e.g., Dropbox) have become pervasive in not only simple file sharing but also advanced collaborative file editing (collaboration for short). Using Dropbox for collaboration is much easier than SVN and Git, thus greatly facilitating common users. In practice, however, many Dropbox users are perplexed by unexpected collaboration conflicts, which severely impair their experiences. Through various benchmark experiments, we unveil the two root causes of collaboration conflicts: 1) Dropbox never locks an edited file during collaboration; 2) Dropbox only guarantees eventual data consistency among the collaborators, significantly aggravating the probability of conflicts. In this paper, we attempt to enable conflict-free collaborations with Dropbox-like cloud storage services. This attempt is empowered by three key findings and measures. First, although the end-to-end sync delay is unpredictable due to eventual consistency, we can always track the latest version of an edited file by actively resorting to the cloud via certain web APIs. Second, although all application-level data is encrypted in Dropbox, we can roughly deduce the sync status from traffic statistics. Third, applying a couple of useful mechanisms (e.g., distributed architecture and data lock) learned from Git, we can effectively and efficiently avoid collaboration conflicts-of course, this requires re-implementing Git mechanisms in cloud storage services with minimum overhead and user interference. Integrating above efforts, we build the ConflictReaper system capable of helping users automatically avoid almost all collaboration conflicts with affordable network and computation overhead.
云存储服务(例如Dropbox)不仅在简单的文件共享方面,而且在高级协同文件编辑(简称协作)方面已经变得普遍。使用Dropbox进行协作比SVN和Git容易得多,从而极大地方便了普通用户。然而,在实践中,许多Dropbox用户都被意想不到的协作冲突所困扰,这严重影响了他们的体验。通过各种基准测试,我们揭示了协作冲突的两个根本原因:1)Dropbox在协作期间从不锁定已编辑的文件;2) Dropbox只保证协作者之间最终的数据一致性,这大大加剧了冲突的可能性。在本文中,我们试图通过类似dropbox的云存储服务实现无冲突的协作。这一尝试得到了三个关键发现和措施的支持。首先,尽管端到端同步延迟是不可预测的,因为最终的一致性,我们总是可以通过某些web api主动求助于云来跟踪编辑文件的最新版本。其次,虽然所有应用级数据在Dropbox中都是加密的,但我们可以从流量统计中大致推断出同步状态。第三,应用从Git中学到的一些有用的机制(例如,分布式架构和数据锁),我们可以有效地避免协作冲突——当然,这需要在云存储服务中以最小的开销和用户干扰重新实现Git机制。综合上述努力,我们构建了一个ConflictReaper系统,能够帮助用户在可承受的网络和计算开销下自动避免几乎所有的协作冲突。
{"title":"Enabling Conflict-free Collaborations with Cloud Storage Services","authors":"Minghao Zhao, Jian Chen, Zhenhua Li","doi":"10.1109/ICPADS53394.2021.00082","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00082","url":null,"abstract":"Cloud storage services (e.g., Dropbox) have become pervasive in not only simple file sharing but also advanced collaborative file editing (collaboration for short). Using Dropbox for collaboration is much easier than SVN and Git, thus greatly facilitating common users. In practice, however, many Dropbox users are perplexed by unexpected collaboration conflicts, which severely impair their experiences. Through various benchmark experiments, we unveil the two root causes of collaboration conflicts: 1) Dropbox never locks an edited file during collaboration; 2) Dropbox only guarantees eventual data consistency among the collaborators, significantly aggravating the probability of conflicts. In this paper, we attempt to enable conflict-free collaborations with Dropbox-like cloud storage services. This attempt is empowered by three key findings and measures. First, although the end-to-end sync delay is unpredictable due to eventual consistency, we can always track the latest version of an edited file by actively resorting to the cloud via certain web APIs. Second, although all application-level data is encrypted in Dropbox, we can roughly deduce the sync status from traffic statistics. Third, applying a couple of useful mechanisms (e.g., distributed architecture and data lock) learned from Git, we can effectively and efficiently avoid collaboration conflicts-of course, this requires re-implementing Git mechanisms in cloud storage services with minimum overhead and user interference. Integrating above efforts, we build the ConflictReaper system capable of helping users automatically avoid almost all collaboration conflicts with affordable network and computation overhead.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Choosing Appropriate AI-enabled Edge Devices, Not the Costly Ones 选择合适的支持人工智能的边缘设备,而不是昂贵的设备
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00031
Ziyang Zhang, Feng Li, Changyao Lin, Shihui Wen, Xiangyu Liu, Jie Liu
Advances in Edge AI make it possible to achieve inference deep learning for emerging applications, e.g., smart transportation and smart city on the edge in real-time. Nowadays, different industry companies have developed several edge AI devices with various architectures. However, it is hard for application users to justify how to choose the appropriate edge-AI, due to the lack of benchmark testing results and testbeds specifically used to evaluate the system performance for those edge-AI systems. In this paper, we attempt to design a benchmark test platform for the edge-AI devices and evaluate six mainstream edge devices that are equipped with different computing powers and AI chip architectures. Throughput, power consumption ratio, and cost-effectiveness are chosen as the performance metrics for the evaluation process. Three classic deep learning workloads: object detection, image classification, and natural language processing are adopted with different batch sizes. The results show that under different batch sizes, compared with traditional edge devices, edge devices equipped with AI chips have out-performance in throughput, power consumption ratio, and cost-effectiveness by 134×, 57×, and 32×, respectively. From system perspective, our work not only demonstrates the effective AI capabilities of those edge AI devices, but also provide suggestions for AI optimization at edge in details.
边缘人工智能的进步使得在边缘实时实现智能交通和智慧城市等新兴应用的推理深度学习成为可能。如今,不同的行业公司开发了几种具有不同架构的边缘人工智能设备。然而,由于缺乏专门用于评估这些边缘人工智能系统性能的基准测试结果和测试平台,应用程序用户很难证明如何选择适当的边缘人工智能。在本文中,我们尝试为边缘AI设备设计一个基准测试平台,并评估六种主流边缘设备,这些设备配备了不同的计算能力和AI芯片架构。选择吞吐量、功耗比和成本效益作为评估过程的性能指标。采用了三种经典的深度学习工作负载:对象检测、图像分类和自然语言处理,并采用了不同的批处理规模。结果表明,在不同批量下,与传统边缘设备相比,搭载AI芯片的边缘设备在吞吐量、功耗比和成本效益方面分别高出134倍、57倍和32倍。从系统的角度来看,我们的工作不仅展示了这些边缘人工智能设备的有效人工智能能力,而且为边缘人工智能优化提供了详细的建议。
{"title":"Choosing Appropriate AI-enabled Edge Devices, Not the Costly Ones","authors":"Ziyang Zhang, Feng Li, Changyao Lin, Shihui Wen, Xiangyu Liu, Jie Liu","doi":"10.1109/ICPADS53394.2021.00031","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00031","url":null,"abstract":"Advances in Edge AI make it possible to achieve inference deep learning for emerging applications, e.g., smart transportation and smart city on the edge in real-time. Nowadays, different industry companies have developed several edge AI devices with various architectures. However, it is hard for application users to justify how to choose the appropriate edge-AI, due to the lack of benchmark testing results and testbeds specifically used to evaluate the system performance for those edge-AI systems. In this paper, we attempt to design a benchmark test platform for the edge-AI devices and evaluate six mainstream edge devices that are equipped with different computing powers and AI chip architectures. Throughput, power consumption ratio, and cost-effectiveness are chosen as the performance metrics for the evaluation process. Three classic deep learning workloads: object detection, image classification, and natural language processing are adopted with different batch sizes. The results show that under different batch sizes, compared with traditional edge devices, edge devices equipped with AI chips have out-performance in throughput, power consumption ratio, and cost-effectiveness by 134×, 57×, and 32×, respectively. From system perspective, our work not only demonstrates the effective AI capabilities of those edge AI devices, but also provide suggestions for AI optimization at edge in details.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
xRSA: Construct Larger Bits RSA on Low-Cost Devices xRSA:在低成本设备上构造大比特RSA
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00085
Fan Dang, Lingkun Li, Jiajie Chen
As the most widely applied public-key cryptographic algorithm, RSA is now integrated into many low-cost devices such as IoT devices. Due to the limited resource, most low-cost devices only ship a 2048-bit multiplier, making the longest supported private key length as 2048 bits. Unfortunately, 2048-bit RSA keys are gradually considered insecure. Utilizing the existing 2048-bit multiplier is challenging because a 4096-bit message cannot be stored in the multiplier. In this paper, we perform a thorough study of RSA and propose a new method that achieves the 4096-bit RSA cryptography with the existing hardware. We use the Montgomery modular multiplication and the Chinese Remainder Theorem to reduce the computational cost and construct the necessary components to compute the RSA private key operation. To further validate the correctness of the method and evaluate its performance, we implement this method on a micro-controller and build a testbed named CanoKey with three commonly used cryptography protocols. The result shows that our method is over 200x faster than the naive method, a.k.a., software-based big number multiplications.
RSA作为目前应用最广泛的公钥加密算法,已被集成到物联网设备等许多低成本设备中。由于资源有限,大多数低成本设备只提供2048位乘法器,因此支持的最长私钥长度为2048位。不幸的是,2048位RSA密钥逐渐被认为是不安全的。利用现有的2048位乘法器具有挑战性,因为4096位消息不能存储在乘法器中。本文对RSA进行了深入的研究,提出了一种利用现有硬件实现4096位RSA加密的新方法。我们使用Montgomery模乘法和中国剩余定理来减少计算成本,并构造计算RSA私钥操作所需的组件。为了进一步验证该方法的正确性并评估其性能,我们在微控制器上实现了该方法,并构建了一个名为CanoKey的测试平台,其中包含三种常用的加密协议。结果表明,我们的方法比基于软件的大数乘法的朴素方法快200倍以上。
{"title":"xRSA: Construct Larger Bits RSA on Low-Cost Devices","authors":"Fan Dang, Lingkun Li, Jiajie Chen","doi":"10.1109/ICPADS53394.2021.00085","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00085","url":null,"abstract":"As the most widely applied public-key cryptographic algorithm, RSA is now integrated into many low-cost devices such as IoT devices. Due to the limited resource, most low-cost devices only ship a 2048-bit multiplier, making the longest supported private key length as 2048 bits. Unfortunately, 2048-bit RSA keys are gradually considered insecure. Utilizing the existing 2048-bit multiplier is challenging because a 4096-bit message cannot be stored in the multiplier. In this paper, we perform a thorough study of RSA and propose a new method that achieves the 4096-bit RSA cryptography with the existing hardware. We use the Montgomery modular multiplication and the Chinese Remainder Theorem to reduce the computational cost and construct the necessary components to compute the RSA private key operation. To further validate the correctness of the method and evaluate its performance, we implement this method on a micro-controller and build a testbed named CanoKey with three commonly used cryptography protocols. The result shows that our method is over 200x faster than the naive method, a.k.a., software-based big number multiplications.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1