首页 > 最新文献

2022 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
Reduction of latency of microservice based loT applications in rural areas with lack of connectivity using UAV-based networks 在使用基于无人机的网络缺乏连接的农村地区减少基于微服务的loT应用的延迟
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912865
J. Galán-Jiménez, Alejandro González Vegas, J. Berrocal
The Internet is the most powerful engine for social and economic growth, and it needs to be accessible to everybody. However, the possibilities for people living in rural areas to use digital services through broadband access are reduced compared to the inhabitants of urban zones. In this paper, digital services are brought closer to people living in rural areas where there is lack of Internet connectivity by means of an Unmanned Aerial Vehicle (UAV) based network. Decomposing loT applications into microservices and deploying them into UAV s allow to reduce their latency and hence to improve the associated quality of service, which is strict for this type of applications. Simulation results show the effectiveness of the proposed solution, comparing the latency experienced by the applications in case there is lack of Internet connectivity with the situation in which one of the UAV s is able to reach a ground base station.
互联网是社会和经济发展最强大的引擎,它需要对每个人开放。然而,与城市地区的居民相比,生活在农村地区的人们通过宽带接入使用数字服务的可能性减少了。在本文中,通过基于无人机(UAV)的网络,数字服务更接近生活在缺乏互联网连接的农村地区的人们。将loT应用程序分解为微服务并将其部署到无人机中可以减少其延迟,从而提高相关的服务质量,这对于此类应用程序来说是严格的。仿真结果表明了该方案的有效性,比较了在缺乏互联网连接的情况下应用程序所经历的延迟与其中一架无人机能够到达地面基站的情况。
{"title":"Reduction of latency of microservice based loT applications in rural areas with lack of connectivity using UAV-based networks","authors":"J. Galán-Jiménez, Alejandro González Vegas, J. Berrocal","doi":"10.1109/ISCC55528.2022.9912865","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912865","url":null,"abstract":"The Internet is the most powerful engine for social and economic growth, and it needs to be accessible to everybody. However, the possibilities for people living in rural areas to use digital services through broadband access are reduced compared to the inhabitants of urban zones. In this paper, digital services are brought closer to people living in rural areas where there is lack of Internet connectivity by means of an Unmanned Aerial Vehicle (UAV) based network. Decomposing loT applications into microservices and deploying them into UAV s allow to reduce their latency and hence to improve the associated quality of service, which is strict for this type of applications. Simulation results show the effectiveness of the proposed solution, comparing the latency experienced by the applications in case there is lack of Internet connectivity with the situation in which one of the UAV s is able to reach a ground base station.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114945155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures 使公民系统更安全:实用的加密绕过和对策
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912814
Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou
Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.
密码学用于防止未经授权的用户访问或修改信息,从而保护信息的机密性、完整性和真实性。加密技术用于保护个人或公司数据。这项工作演示了在某些条件下可以绕过加密的实际场景。通过恢复加密密钥、用于生成加密密钥的密码或加密数据的明文副本来绕过加密,可以访问从一开始就无法访问的数据。有六种绕过加密的方法:找到密钥、猜测密钥、强制密钥、利用加密方案中的漏洞、在设备使用时访问未加密的消息以及定位消息的未加密副本。在本研究中,我们利用公开可用的软件来演示属于上述大多数类别的真实场景,并展示如何在这些特定情况下成功绕过加密。此外,我们强调,只有在满足某些条件(例如,软件错误配置,对目标设备的物理访问等)时才有可能绕过加密,并且我们突出了其中的每一个,以便有效地建议对加密绕过演示技术的对策。本文的主要目的是强调如何绕过加密,从而使公民以更难以被黑客入侵的方式设置他们的系统。例如,这对那些可能知识有限/接触技术有限的公民来说尤其重要。来自某些不同群体的人,如老年人和/或低收入者。
{"title":"Making Citizens' systems more Secure: Practical Encryption Bypassing and Countermeasures","authors":"Marios Adam Sirgiannis, C. Manifavas, I. Papaefstathiou","doi":"10.1109/ISCC55528.2022.9912814","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912814","url":null,"abstract":"Cryptography is used to protect the confidentiality, integrity, and authenticity of information by preventing unauthorized users from accessing or modifying them. Encryption techniques are used to protect personal or company data. This work demonstrates practical scenarios where, under certain conditions, encryption may be bypassed. Bypassing encryption, either by recovering the encryption key, a password used to generate the encryption key, or a plaintext copy of the encrypted data, allows for accessing data which appear to be inaccessible in the first place. There are six categories for bypassing encryption: find the key, guess the key, compel the key, exploit a flaw in the encryption scheme, access unencrypted message when the device is in use and locate an unencrypted copy of the message. In this study we utilize publicly available software to demonstrate real-world scenarios that fall into most of the aforementioned categories and show how, in those specific cases, encryption may be successfully bypassed. Moreover, we underline that bypassing encryption is possible only when certain conditions are met (e.g., software misconfiguration, physical access to the target device, etc.) and we highlight each one of them so as to effectively suggest countermeasures to the demonstrated techniques for encryption bypassing. The main aim of this paper is to highlight how encryption can be bypassed and thus make citizens set up their system in such a way that it would be more difficult to be hacked. This is especially important for citizens that may have limited knowledge/exposure to technology as they can be, for example. people from certain diversity groups such as elderly and/or people of very low income.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
City-Scale Fingerprint Positioning Framework based on MDT Data 基于MDT数据的城市规模指纹定位框架
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912993
Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen
Mobile positioning plays an essential role in smart city services. This paper proposes a fingerprint positioning framework based on massive Minimization of Drive Test (MDT) data to provide accurate and efficient city-scale positioning without additional equipment and measures. First, a multi-level fingerprint construction method is proposed using the Timing Advance (TA), Reference Signal Receiving Power (RSRP), and Reference Signal Receiving Quality (RSRQ) of the serving cell and neighboring cell. Then, an adaptive online fingerprint matching method is employed to extract and match online data fingerprints. Experiments show that the median positioning error is 29.97 meters with city-scale MDT data. It outperforms the reported accuracy of the state-of-the-art fingerprint positioning method.
移动定位在智慧城市服务中起着至关重要的作用。本文提出了一种基于大规模最小化驾驶测试(MDT)数据的指纹定位框架,可以在不需要额外设备和措施的情况下提供准确高效的城市规模定位。首先,利用服务小区和相邻小区的时序推进(TA)、参考信号接收功率(RSRP)和参考信号接收质量(RSRQ),提出了一种多层指纹构建方法。然后,采用自适应在线指纹匹配方法对在线数据指纹进行提取和匹配。实验表明,在城市尺度MDT数据下,定位误差中值为29.97 m。它比报道的最先进的指纹定位方法的准确性要好。
{"title":"City-Scale Fingerprint Positioning Framework based on MDT Data","authors":"Junjun Si, Zejiang Chen, Bo Tu, Shuaifu Dai, Xiangqun Chen","doi":"10.1109/ISCC55528.2022.9912993","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912993","url":null,"abstract":"Mobile positioning plays an essential role in smart city services. This paper proposes a fingerprint positioning framework based on massive Minimization of Drive Test (MDT) data to provide accurate and efficient city-scale positioning without additional equipment and measures. First, a multi-level fingerprint construction method is proposed using the Timing Advance (TA), Reference Signal Receiving Power (RSRP), and Reference Signal Receiving Quality (RSRQ) of the serving cell and neighboring cell. Then, an adaptive online fingerprint matching method is employed to extract and match online data fingerprints. Experiments show that the median positioning error is 29.97 meters with city-scale MDT data. It outperforms the reported accuracy of the state-of-the-art fingerprint positioning method.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media and Web Sensing on Interior and Urban Design 社会媒体和网络感知在室内和城市设计中的应用
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912803
E. Stathopoulos, A. Shvets, Roberto Carlini, S. Diplaris, S. Vrochidis, L. Wanner, I. Kompatsiaris
Social media and web sites provide an access to pub-lic opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. Designers have been investigating how to use them for grasping social feelings and needs associated with the arrangement of spaces that surround people in everyday life to find inspiration and come up with ideas for adaptive designs. Following this, we propose a novel design-oriented tool-set that retrieves and analyses online public information from Twitter and focused content from relevant web sites. We present the data collection pipeline and multilingual analysis algorithms like concept extraction and sentiment analysis on interior and urban design. Finally, we showcase an application of the proposed tool-set within two case studies.
社交媒体和网站在某些方面提供了获取公众意见的途径,因此在了解目标受众方面发挥了重要作用。设计师们一直在研究如何利用它们来把握与日常生活中人们周围空间安排相关的社会感受和需求,以寻找灵感并提出适应性设计的想法。在此基础上,我们提出了一种新的面向设计的工具集,用于检索和分析来自Twitter的在线公共信息和来自相关网站的重点内容。提出了室内和城市设计的数据收集管道和概念提取、情感分析等多语言分析算法。最后,我们在两个案例研究中展示了所建议的工具集的应用。
{"title":"Social Media and Web Sensing on Interior and Urban Design","authors":"E. Stathopoulos, A. Shvets, Roberto Carlini, S. Diplaris, S. Vrochidis, L. Wanner, I. Kompatsiaris","doi":"10.1109/ISCC55528.2022.9912803","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912803","url":null,"abstract":"Social media and web sites provide an access to pub-lic opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. Designers have been investigating how to use them for grasping social feelings and needs associated with the arrangement of spaces that surround people in everyday life to find inspiration and come up with ideas for adaptive designs. Following this, we propose a novel design-oriented tool-set that retrieves and analyses online public information from Twitter and focused content from relevant web sites. We present the data collection pipeline and multilingual analysis algorithms like concept extraction and sentiment analysis on interior and urban design. Finally, we showcase an application of the proposed tool-set within two case studies.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliable Free-Space Optical Communication System Performance for Matching Multi-level Customer Needs: Using Hybrid Modulation System with Deep Reinforcement Learning 满足多级用户需求的可靠自由空间光通信系统性能:采用混合调制系统和深度强化学习
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912899
Alaa A. Algamal, A. El-Malek, H. Shalaby
In the recent decades, free-space optical (FSO) communication technology has gained significant importance owing to its promising unique features: high user capacity, license-free spectrum, ease and quick deploy-ability. However, the performance of FSO communication systems depends on the uncontrollable terrestrial atmospheric effects. The second main challenge is that the FSO system performance degrades as a line-of-Sight (LoS) technology due to the misalignment transmitter and receiver. The third challenge is the consideration of time value of money, which is central to most engineering economic analyses in employing communication systems. The opportunity cost of making one choice over another must also be considered. This paper presents a proposed FSO system design model for mitigating the three performance challenges we mentioned. The results show an enhancement by 83.34% in system efficiency in case of moderate scintillation (using gamma-gamma model). This proposed hybrid model is proved to be applicable to any atmospheric channel conditions.
近几十年来,自由空间光(FSO)通信技术因其具有高用户容量、免许可频谱、易于快速部署等独特特性而获得了极大的重视。然而,FSO通信系统的性能依赖于不可控的地面大气效应。第二个主要挑战是,由于发射器和接收器的不对准,FSO系统作为视距(LoS)技术的性能会下降。第三个挑战是考虑金钱的时间价值,这是大多数使用通信系统的工程经济分析的核心。还必须考虑做出一种选择而不是另一种选择的机会成本。本文提出了一个FSO系统设计模型,以减轻我们提到的三个性能挑战。结果表明,在适度闪烁的情况下(采用gamma-gamma模型),系统效率提高了83.34%。结果表明,该混合模型适用于任何大气通道条件。
{"title":"Reliable Free-Space Optical Communication System Performance for Matching Multi-level Customer Needs: Using Hybrid Modulation System with Deep Reinforcement Learning","authors":"Alaa A. Algamal, A. El-Malek, H. Shalaby","doi":"10.1109/ISCC55528.2022.9912899","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912899","url":null,"abstract":"In the recent decades, free-space optical (FSO) communication technology has gained significant importance owing to its promising unique features: high user capacity, license-free spectrum, ease and quick deploy-ability. However, the performance of FSO communication systems depends on the uncontrollable terrestrial atmospheric effects. The second main challenge is that the FSO system performance degrades as a line-of-Sight (LoS) technology due to the misalignment transmitter and receiver. The third challenge is the consideration of time value of money, which is central to most engineering economic analyses in employing communication systems. The opportunity cost of making one choice over another must also be considered. This paper presents a proposed FSO system design model for mitigating the three performance challenges we mentioned. The results show an enhancement by 83.34% in system efficiency in case of moderate scintillation (using gamma-gamma model). This proposed hybrid model is proved to be applicable to any atmospheric channel conditions.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128566916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ring-based Intelligent Reflecting Surface Placement for 5G and Beyond 5G及以后基于环的智能反射面放置
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912954
Hao Hong, Fan-Hsun Tseng
The Intelligent Reflecting Surface (IRS) is an emerging technology in mobile communication networks. It is regarded as a potential solution for the path fading problem and obstacle issue while using millimeter wave communications. Most existing researches focus on deploying few IRSs within the coverage of a macrocell. In the paper, the deployment problem of multiple macro cells and IRSs is considered. The Macrocell-first and IRS-first algorithms are proposed, and the Ring-based algorithm is further proposed to achieve the highest average utility rate of all served users. It divides a macrocell's coverage into $K$ rings, and deploys IRSs from outer ring to inner ring. Simulation-based results showed that the proposed Ring-based algorithm is superior to the Macrocell-first and IRS-first algorithms in terms of higher average utility rate with slightly fewer number of served users.
智能反射面(IRS)是移动通信网络中的一项新兴技术。它被认为是解决毫米波通信中路径衰落问题和障碍物问题的潜在解决方案。现有的研究大多集中于在一个宏细胞的覆盖范围内部署少量的irs。本文考虑了多个宏单元和红外卫星的部署问题。提出了Macrocell-first和IRS-first算法,并进一步提出了基于ring的算法,以实现所有服务用户的最高平均利用率。它将宏小区的覆盖范围划分为$K$环,并将irs从外环部署到内环。仿真结果表明,基于ring的算法在服务用户数量略少的情况下具有较高的平均利用率,优于Macrocell-first和IRS-first算法。
{"title":"Ring-based Intelligent Reflecting Surface Placement for 5G and Beyond","authors":"Hao Hong, Fan-Hsun Tseng","doi":"10.1109/ISCC55528.2022.9912954","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912954","url":null,"abstract":"The Intelligent Reflecting Surface (IRS) is an emerging technology in mobile communication networks. It is regarded as a potential solution for the path fading problem and obstacle issue while using millimeter wave communications. Most existing researches focus on deploying few IRSs within the coverage of a macrocell. In the paper, the deployment problem of multiple macro cells and IRSs is considered. The Macrocell-first and IRS-first algorithms are proposed, and the Ring-based algorithm is further proposed to achieve the highest average utility rate of all served users. It divides a macrocell's coverage into $K$ rings, and deploys IRSs from outer ring to inner ring. Simulation-based results showed that the proposed Ring-based algorithm is superior to the Macrocell-first and IRS-first algorithms in terms of higher average utility rate with slightly fewer number of served users.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130907622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention 基于水平空间注意的跳频信号识别
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912985
Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu
Frequency hopping (FH) technology is one of the most effective technologies in the field of radio countermeasures, meanwhile, the recognition of FH signal has become a research hotspot. FH signal is a typical non-stationary signal whose frequency varies nonlinearly with time and the time-frequency analysis technique provides a very effective method for processing this kind of signal. With the renaissance of deep learning, methods based on time-frequency analysis and deep learning are widely studied. Although these methods have achieved good results, the recognition accuracy still needs to be improved. Through the observation of the datasets, we found that there are still difficult samples that are difficult to identify. Through further analysis, we propose a horizontal spatial attention (HSA) block, which can generate spatial weight vector according to the signal distribution, and then readjust the feature map. The HSA block is a plug-and-play module that can be integrated into common convolutional neural network (CNN) to further improve their performance and these networks with HSA block are collectively called HANets. The HSA block also has the advantages of high recognition accuracy (especially under low SNRs), easy to implant, and almost no influence on the number of parameters. We verified our method on two datasets and a series of comparative experiments show that the proposed method achieves good results on FH datasets.
跳频技术是无线电对抗领域中最有效的技术之一,同时跳频信号的识别也成为一个研究热点。跳频信号是一种典型的频率随时间非线性变化的非平稳信号,时频分析技术为处理这类信号提供了一种非常有效的方法。随着深度学习的复兴,基于时频分析和深度学习的方法得到了广泛的研究。虽然这些方法都取得了较好的效果,但识别精度仍有待提高。通过对数据集的观察,我们发现仍然存在难以识别的困难样本。通过进一步分析,我们提出了一种水平空间注意(HSA)块,它可以根据信号分布生成空间权重向量,然后重新调整特征映射。HSA模块是一种即插即用模块,可以集成到普通卷积神经网络(CNN)中,以进一步提高其性能,这些具有HSA模块的网络统称为hanet。HSA块还具有识别精度高(特别是在低信噪比下)、易于植入、对参数数量几乎没有影响等优点。我们在两个数据集上验证了我们的方法,一系列对比实验表明,我们的方法在FH数据集上取得了很好的效果。
{"title":"Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention","authors":"Pengcheng Liu, Zhen Han, Zhixin Shi, Meimei Li, Meichen Liu","doi":"10.1109/ISCC55528.2022.9912985","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912985","url":null,"abstract":"Frequency hopping (FH) technology is one of the most effective technologies in the field of radio countermeasures, meanwhile, the recognition of FH signal has become a research hotspot. FH signal is a typical non-stationary signal whose frequency varies nonlinearly with time and the time-frequency analysis technique provides a very effective method for processing this kind of signal. With the renaissance of deep learning, methods based on time-frequency analysis and deep learning are widely studied. Although these methods have achieved good results, the recognition accuracy still needs to be improved. Through the observation of the datasets, we found that there are still difficult samples that are difficult to identify. Through further analysis, we propose a horizontal spatial attention (HSA) block, which can generate spatial weight vector according to the signal distribution, and then readjust the feature map. The HSA block is a plug-and-play module that can be integrated into common convolutional neural network (CNN) to further improve their performance and these networks with HSA block are collectively called HANets. The HSA block also has the advantages of high recognition accuracy (especially under low SNRs), easy to implant, and almost no influence on the number of parameters. We verified our method on two datasets and a series of comparative experiments show that the proposed method achieves good results on FH datasets.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122026864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Platform for Autonomous Swarms of UAVs 无人机自主群平台
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912997
Margarida Silva, André Mourato, G. Marques, S. Sargento, A. Reis
The usage of aerial drones has become more popular as they also become more accessible, both in economic and usability terms. Nowadays, these vehicles can present reduced dimensions and a good cost-benefit ratio, which makes it possible for several services and applications supported by aerial drone networks to emerge. Taking into account the enormous diversity of use cases, many of the existing solutions for autonomous control focus on specific scenarios. Generic mission planning platforms also exist, but most of them only allow missions consisting of linear waypoints to be traversed. These situations translate into a mission support that is not very flexible. This paper proposes a modular infrastructure that can be used in various scenarios, enabling the autonomous control and monitoring of a fleet of aerial drones in a mission context. The platform allows the communication with the flight controller so that it can collect telemetry data and send movement instructions to the drone, and to monitor this data and send the commands remotely, also enabling robust mission planning with multiple drones, and enabling the interaction with internal and external sensors. The real tests performed through the platform show that the planned missions are executed exactly as they are planned in the platform.
空中无人机的使用变得越来越流行,因为它们在经济和可用性方面也变得更容易获得。如今,这些飞行器可以呈现出较小的尺寸和良好的成本效益比,这使得由空中无人机网络支持的几种服务和应用成为可能。考虑到用例的巨大多样性,许多现有的自主控制解决方案都侧重于特定的场景。一般的任务规划平台也存在,但大多数只允许由线性路径点组成的任务被遍历。这些情况导致特派团支助不是很灵活。本文提出了一种可用于各种场景的模块化基础设施,能够在任务环境中自主控制和监视一组空中无人机。该平台允许与飞行控制器通信,以便它可以收集遥测数据并向无人机发送运动指令,并监控这些数据并远程发送命令,还可以实现多架无人机的强大任务规划,并实现与内部和外部传感器的交互。通过该平台进行的实际测试表明,计划的任务完全按照计划在平台中执行。
{"title":"A Platform for Autonomous Swarms of UAVs","authors":"Margarida Silva, André Mourato, G. Marques, S. Sargento, A. Reis","doi":"10.1109/ISCC55528.2022.9912997","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912997","url":null,"abstract":"The usage of aerial drones has become more popular as they also become more accessible, both in economic and usability terms. Nowadays, these vehicles can present reduced dimensions and a good cost-benefit ratio, which makes it possible for several services and applications supported by aerial drone networks to emerge. Taking into account the enormous diversity of use cases, many of the existing solutions for autonomous control focus on specific scenarios. Generic mission planning platforms also exist, but most of them only allow missions consisting of linear waypoints to be traversed. These situations translate into a mission support that is not very flexible. This paper proposes a modular infrastructure that can be used in various scenarios, enabling the autonomous control and monitoring of a fleet of aerial drones in a mission context. The platform allows the communication with the flight controller so that it can collect telemetry data and send movement instructions to the drone, and to monitor this data and send the commands remotely, also enabling robust mission planning with multiple drones, and enabling the interaction with internal and external sensors. The real tests performed through the platform show that the planned missions are executed exactly as they are planned in the platform.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems 双极化天线通信系统中基于全信道信息的物理层认证
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912912
Yuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng
In this paper, we propose a physical authentication scheme based on the full channel information (FCI) in dual-polarized antenna communication systems. Different from channel impulse response (CIR) and channel frequency response (CFR), which only characterize the spatial fading of the channel, FCI reflects the spatial fading and polarization fading of channel, and completely characterizes the channel. Specifically, we use the least square (LS) to estimate channel spatial fading and polarization fading separately. Then based on statistical signal processing and binary hypothesis model, we establish an authen-tication scheme based on FCI and theoretically deduce the false alarm probability, detection probability, and optimal threshold of the proposed scheme. Besides, we conduct numerous simulation analysis on the proposed scheme. The simulation results show that the proposed scheme has higher authentication accuracy than that of CFR based schemes, especially in the case of low SNR.
本文提出了一种基于全信道信息(FCI)的双极化天线通信系统物理认证方案。与信道脉冲响应(CIR)和信道频率响应(CFR)仅表征信道的空间衰落不同,FCI反映了信道的空间衰落和极化衰落,完整地表征了信道。具体来说,我们使用最小二乘法分别估计信道空间衰落和极化衰落。然后基于统计信号处理和二值假设模型,建立了基于FCI的认证方案,并从理论上推导出了该方案的虚警概率、检测概率和最优阈值。此外,我们对所提出的方案进行了大量的仿真分析。仿真结果表明,该方案比基于CFR的方案具有更高的认证精度,特别是在低信噪比的情况下。
{"title":"Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems","authors":"Yuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng","doi":"10.1109/ISCC55528.2022.9912912","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912912","url":null,"abstract":"In this paper, we propose a physical authentication scheme based on the full channel information (FCI) in dual-polarized antenna communication systems. Different from channel impulse response (CIR) and channel frequency response (CFR), which only characterize the spatial fading of the channel, FCI reflects the spatial fading and polarization fading of channel, and completely characterizes the channel. Specifically, we use the least square (LS) to estimate channel spatial fading and polarization fading separately. Then based on statistical signal processing and binary hypothesis model, we establish an authen-tication scheme based on FCI and theoretically deduce the false alarm probability, detection probability, and optimal threshold of the proposed scheme. Besides, we conduct numerous simulation analysis on the proposed scheme. The simulation results show that the proposed scheme has higher authentication accuracy than that of CFR based schemes, especially in the case of low SNR.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132663380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BMKS: A Blockchain Based Multi-Keyword Search Scheme for Medical Data Sharing BMKS:一种基于区块链的医疗数据共享多关键词搜索方案
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912935
Guangjun Wu, Bing-lian Zhu, Jun Li
In recent years, electronic medical records(EMRs) sharing has played a vital role in formulating optimized treatment plans, providing data sets for researchers, and accelerating the development of biomedical science. However, This unprecedented era of technological confluence poses significant data security and privacy challenges. To solve these problems, we propose a blockchain-based multi-keyword search scheme for medical data sharing called BMKS, focusing on ensuring medical data confidentiality and realizing secure data retrieval. In BMKS, we introduce a two-level search scheme to achieve efficient and verifiable keyword searches. The introduction of the improved Bloom filter significantly improves query efficiency. In addition, we take advantage of blockchain technology to realize ciphertext search and pre-decryption, which reduces user's decryption overhead. Moreover, blockchain's transparency and tamper-preventing characteristics help record the access control process in a traceable and auditable way. The performance evaluation and security analysis show that BMKS is comprehensively safe, efficient, and practical.
近年来,电子病历共享在制定优化治疗方案、为科研人员提供数据集、促进生物医学科学发展等方面发挥了重要作用。然而,这个前所未有的技术融合时代带来了重大的数据安全和隐私挑战。针对这些问题,我们提出了一种基于区块链的医疗数据共享多关键字搜索方案BMKS,重点保证医疗数据的保密性,实现数据的安全检索。在BMKS中,我们引入了一个两级搜索方案来实现高效和可验证的关键字搜索。改进的Bloom过滤器的引入显著提高了查询效率。此外,我们利用区块链技术实现密文搜索和预解密,减少了用户的解密开销。此外,区块链的透明性和防篡改特性有助于以可跟踪和可审计的方式记录访问控制过程。性能评价和安全性分析表明,BMKS具有综合安全、高效、实用的特点。
{"title":"BMKS: A Blockchain Based Multi-Keyword Search Scheme for Medical Data Sharing","authors":"Guangjun Wu, Bing-lian Zhu, Jun Li","doi":"10.1109/ISCC55528.2022.9912935","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912935","url":null,"abstract":"In recent years, electronic medical records(EMRs) sharing has played a vital role in formulating optimized treatment plans, providing data sets for researchers, and accelerating the development of biomedical science. However, This unprecedented era of technological confluence poses significant data security and privacy challenges. To solve these problems, we propose a blockchain-based multi-keyword search scheme for medical data sharing called BMKS, focusing on ensuring medical data confidentiality and realizing secure data retrieval. In BMKS, we introduce a two-level search scheme to achieve efficient and verifiable keyword searches. The introduction of the improved Bloom filter significantly improves query efficiency. In addition, we take advantage of blockchain technology to realize ciphertext search and pre-decryption, which reduces user's decryption overhead. Moreover, blockchain's transparency and tamper-preventing characteristics help record the access control process in a traceable and auditable way. The performance evaluation and security analysis show that BMKS is comprehensively safe, efficient, and practical.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE Symposium on Computers and Communications (ISCC)
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1