首页 > 最新文献

2022 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
MobVis: A Framework for Analysis and Visualization of Mobility Traces MobVis:移动轨迹分析和可视化的框架
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912988
Lucas N. Silva, Paulo H. L. Rettore, Vinícius F. S. Mota, B. P. Santos
Due to the increasing location-aware devices, mobility traces datasets have become an essential source for smart cities planning. Given this scenario, we propose MobVis, a framework to characterize mobility traces through different metrics, allowing comparisons between different mobility traces in a simplified way. Furthermore, MobVis can extract and visualize spatial, temporal, and social aspects of mobility data through a Web interface. MobVis architecture has five main components: input data; data preparation; data processing and analysis to extract mobility metrics; visualization; and a web interface. To demonstrate the framework's process, we created a use case analyzing the characteristics of two distinct traces (Taxi and IoT-Objects). Then, through different metrics, we evaluated the data in two aspects: i) descriptive, through a set of graphics and quantitative data that enables characterizing each trace; and ii) comparative, presenting the main differences between the traces.
由于位置感知设备的增加,移动轨迹数据集已成为智能城市规划的重要来源。鉴于这种情况,我们提出了MobVis,这是一个通过不同指标来描述移动轨迹的框架,允许以简化的方式比较不同的移动轨迹。此外,MobVis可以通过Web界面提取和可视化移动数据的空间、时间和社会方面。MobVis架构有五个主要组成部分:输入数据;数据准备;数据处理和分析,提取流动性指标;可视化;还有一个网络界面。为了演示框架的过程,我们创建了一个用例,分析两个不同轨迹(出租车和物联网对象)的特征。然后,通过不同的度量,我们从两个方面评估数据:i)描述性的,通过一组图形和定量数据来表征每个痕迹;ii)比较,呈现轨迹之间的主要差异。
{"title":"MobVis: A Framework for Analysis and Visualization of Mobility Traces","authors":"Lucas N. Silva, Paulo H. L. Rettore, Vinícius F. S. Mota, B. P. Santos","doi":"10.1109/ISCC55528.2022.9912988","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912988","url":null,"abstract":"Due to the increasing location-aware devices, mobility traces datasets have become an essential source for smart cities planning. Given this scenario, we propose MobVis, a framework to characterize mobility traces through different metrics, allowing comparisons between different mobility traces in a simplified way. Furthermore, MobVis can extract and visualize spatial, temporal, and social aspects of mobility data through a Web interface. MobVis architecture has five main components: input data; data preparation; data processing and analysis to extract mobility metrics; visualization; and a web interface. To demonstrate the framework's process, we created a use case analyzing the characteristics of two distinct traces (Taxi and IoT-Objects). Then, through different metrics, we evaluated the data in two aspects: i) descriptive, through a set of graphics and quantitative data that enables characterizing each trace; and ii) comparative, presenting the main differences between the traces.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127325576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Incident Handling for Healthcare Organizations and Supply-Chains 针对医疗保健组织和供应链的事件处理
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912965
Eftychia Lakka, George Hatzivasilis, Stylianos Karagiannis, Andreas D. Alexopoulos, M. Athanatos, S. Ioannidis, Manolis Chatzimpyrros, Grigoris Kalogiannis, G. Spanoudakis
Healthcare ecosystems form a critical type of infrastructures that provide valuable services in today societies. However, the underlying sensitive information is also of interest of malicious entities around the globe, with the attack volume being continuously increasing. Safeguarding this complex computerized setting constitutes a major challenge for the involved organizations. This paper presents an incident handling system for healthcare organizations and their supply-chain. The proposed approach utilizes swarm intelligence in order to assess the current security posture in a continuous basis and respond to attacks in real-time. The overall solution is based on the related NIST 800.61 standard and implements the operations of i) preparation, ii) detection and analysis, iii) containment, eradication, and recovery, and iv) post-incident activity. The system is developed under the EU funded project AI4HEALTHSEC and is applied in the relevant healthcare pilots.
医疗保健生态系统构成了一种关键类型的基础设施,在当今社会提供有价值的服务。然而,随着攻击量的不断增加,底层的敏感信息也成为全球恶意实体的兴趣所在。保护这一复杂的计算机化环境是有关组织面临的一项重大挑战。本文为医疗保健组织及其供应链提供了一个事件处理系统。该方法利用群体智能来持续评估当前的安全状态,并实时响应攻击。整体解决方案基于相关的NIST 800.61标准,并实施i)准备、ii)检测和分析、iii)遏制、根除和恢复以及iv)事件后活动的操作。该系统是在欧盟资助的AI4HEALTHSEC项目下开发的,并在相关的医疗保健试点中应用。
{"title":"Incident Handling for Healthcare Organizations and Supply-Chains","authors":"Eftychia Lakka, George Hatzivasilis, Stylianos Karagiannis, Andreas D. Alexopoulos, M. Athanatos, S. Ioannidis, Manolis Chatzimpyrros, Grigoris Kalogiannis, G. Spanoudakis","doi":"10.1109/ISCC55528.2022.9912965","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912965","url":null,"abstract":"Healthcare ecosystems form a critical type of infrastructures that provide valuable services in today societies. However, the underlying sensitive information is also of interest of malicious entities around the globe, with the attack volume being continuously increasing. Safeguarding this complex computerized setting constitutes a major challenge for the involved organizations. This paper presents an incident handling system for healthcare organizations and their supply-chain. The proposed approach utilizes swarm intelligence in order to assess the current security posture in a continuous basis and respond to attacks in real-time. The overall solution is based on the related NIST 800.61 standard and implements the operations of i) preparation, ii) detection and analysis, iii) containment, eradication, and recovery, and iv) post-incident activity. The system is developed under the EU funded project AI4HEALTHSEC and is applied in the relevant healthcare pilots.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Blockchain-Based Architecture for Access Control Management of IoT Applications 基于区块链的物联网应用访问控制管理架构
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912781
I. Moursy, S. Ghanem, Mohamed Nazih ElDerini
Internet of Things (IoT) integrates the physical world with the Internet to facilitate sharing data among entities. These IoT applications bring security and management challenges. In this paper, using blockchain technology, an end-to-end secure architecture is proposed for an auditable tamper-proof log of sensors' data and events. A Role Based Access Control policy is enforced using smart contracts that controls access to both sensors' data and executing commands on actuators. For confidentiality, the data is kept encrypted in transit and at rest. In addition, the data is stored off-the-chain in a distributed content-based addressable network, while its address and access records are stored at the blockchain. The proposed design is suitable for real-time and mission-critical IoT applications. Finally, a proof-of-concept implementation shows the efficiency and scalability of the proposed architecture.
物联网(Internet of Things, IoT)将物理世界与互联网相结合,方便实体之间的数据共享。这些物联网应用带来了安全和管理方面的挑战。本文利用区块链技术,提出了一种端到端安全架构,用于传感器数据和事件的可审计防篡改日志。基于角色的访问控制策略使用智能合约来实施,智能合约控制对传感器数据的访问和对执行器执行命令。为了保密,数据在传输和静止时都是加密的。此外,数据存储在基于内容的分布式可寻址网络中,而其地址和访问记录存储在区块链中。提出的设计适用于实时和关键任务的物联网应用。最后,概念验证实现展示了所提出体系结构的效率和可扩展性。
{"title":"A Blockchain-Based Architecture for Access Control Management of IoT Applications","authors":"I. Moursy, S. Ghanem, Mohamed Nazih ElDerini","doi":"10.1109/ISCC55528.2022.9912781","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912781","url":null,"abstract":"Internet of Things (IoT) integrates the physical world with the Internet to facilitate sharing data among entities. These IoT applications bring security and management challenges. In this paper, using blockchain technology, an end-to-end secure architecture is proposed for an auditable tamper-proof log of sensors' data and events. A Role Based Access Control policy is enforced using smart contracts that controls access to both sensors' data and executing commands on actuators. For confidentiality, the data is kept encrypted in transit and at rest. In addition, the data is stored off-the-chain in a distributed content-based addressable network, while its address and access records are stored at the blockchain. The proposed design is suitable for real-time and mission-critical IoT applications. Finally, a proof-of-concept implementation shows the efficiency and scalability of the proposed architecture.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125375403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DyPro: Dynamic Probing Planning for In-Band Network Telemetry 带内网络遥测的动态探测规划
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912881
Leandro M. Dallanora, A. G. Castro, R. I. T. D. C. Filho, F. Rossi, A. Lorenzon, M. C. Luizelli
In-band Network Telemetry (INT) is a novel net-work monitoring mechanism that improves fine-grained net-work visibility. Despite the increasing research efforts towards the orchestration of INT data acquisition, little has yet been done to efficiently collect telemetry data from the network considering monitoring applications requirements. In this paper, we introduce DyPro - a dynamic probing planning for INT. In particular, DyP ro ensures that telemetry dependencies are always satisfied by monitoring application requirements. We theoretically formalize it as a Mixed-Integer Linear Programming (MILP) optimization model and propose a heuristic procedure to efficiently solve it. Results show that DyP ro can outperform state-of-the-art solutions by up to 5x regarding the percentage of monitoring applications satisfied.
带内网络遥测(INT)是一种新型的网络监控机制,可以提高细粒度网络的可视性。尽管对INT数据采集的编排进行了越来越多的研究,但考虑到监测应用需求,从网络有效收集遥测数据的工作还很少。本文介绍了一种针对INT的动态探测规划——DyPro。特别是,dypro确保遥测依赖关系始终通过监视应用程序需求得到满足。从理论上将其形式化为混合整数线性规划(MILP)优化模型,并提出了一种有效求解的启发式方法。结果表明,在监控应用程序的满意度方面,DyP ro可以比最先进的解决方案高出5倍。
{"title":"DyPro: Dynamic Probing Planning for In-Band Network Telemetry","authors":"Leandro M. Dallanora, A. G. Castro, R. I. T. D. C. Filho, F. Rossi, A. Lorenzon, M. C. Luizelli","doi":"10.1109/ISCC55528.2022.9912881","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912881","url":null,"abstract":"In-band Network Telemetry (INT) is a novel net-work monitoring mechanism that improves fine-grained net-work visibility. Despite the increasing research efforts towards the orchestration of INT data acquisition, little has yet been done to efficiently collect telemetry data from the network considering monitoring applications requirements. In this paper, we introduce DyPro - a dynamic probing planning for INT. In particular, DyP ro ensures that telemetry dependencies are always satisfied by monitoring application requirements. We theoretically formalize it as a Mixed-Integer Linear Programming (MILP) optimization model and propose a heuristic procedure to efficiently solve it. Results show that DyP ro can outperform state-of-the-art solutions by up to 5x regarding the percentage of monitoring applications satisfied.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Opinion Leaders and Twitter: Metric Proposal and Psycholinguistic Analysis 意见领袖和推特:度量建议和心理语言学分析
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912909
M. Furini, E. Flisi
Social media and personal health might be a dan-gerous combination: people are influenced by what they read online and don't pay attention to who wrote what they read. What happened during the COVID-19 pandemic? Who were the opinion leaders on social media? What were the conversations about? How did the health institutions communicate? To under-stand this, we focus on Twitter, and we analyze more than three million of Italian-written tweets posted from January 2020 to December 2021. We propose a method to identify opinion leaders and to analyze the content of the conversations. Results show that: (i) opinion leaders are linked to what they say and when they say it; (ii) politicians, newscast, and ordinary people accounts were able to become opinion leaders during the pandemic; (iii) conversations moved from a medical focus (at the beginning of the pandemic) to a social focus (in the last months of 2021); (iv) absence of health care institutions among opinion leaders. These results show that our approach might be useful for those who want to monitor the social scenario in terms of health (e.g., to identify as soon as possible accounts against or critical to medicine or to health authorities).
社交媒体和个人健康可能是一个危险的组合:人们受到他们在网上读到的东西的影响,而不注意他们读到的东西是谁写的。COVID-19大流行期间发生了什么?谁是社交媒体上的意见领袖?谈话的内容是什么?卫生机构如何沟通?为了理解这一点,我们把重点放在推特上,分析了从2020年1月到2021年12月发布的300多万条意大利语推文。我们提出了一种方法来识别意见领袖和分析对话的内容。结果表明:(1)意见领袖与其发表言论的内容和时间相关联;(二)大流行期间,政治家、新闻广播和普通民众账户能够成为意见领袖;(三)对话从医疗焦点(大流行之初)转向社会焦点(2021年最后几个月);㈣意见领袖中缺乏保健机构。这些结果表明,我们的方法可能对那些想要在健康方面监测社会情景的人有用(例如,尽快确定对药物或卫生当局不利或至关重要的帐户)。
{"title":"Opinion Leaders and Twitter: Metric Proposal and Psycholinguistic Analysis","authors":"M. Furini, E. Flisi","doi":"10.1109/ISCC55528.2022.9912909","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912909","url":null,"abstract":"Social media and personal health might be a dan-gerous combination: people are influenced by what they read online and don't pay attention to who wrote what they read. What happened during the COVID-19 pandemic? Who were the opinion leaders on social media? What were the conversations about? How did the health institutions communicate? To under-stand this, we focus on Twitter, and we analyze more than three million of Italian-written tweets posted from January 2020 to December 2021. We propose a method to identify opinion leaders and to analyze the content of the conversations. Results show that: (i) opinion leaders are linked to what they say and when they say it; (ii) politicians, newscast, and ordinary people accounts were able to become opinion leaders during the pandemic; (iii) conversations moved from a medical focus (at the beginning of the pandemic) to a social focus (in the last months of 2021); (iv) absence of health care institutions among opinion leaders. These results show that our approach might be useful for those who want to monitor the social scenario in terms of health (e.g., to identify as soon as possible accounts against or critical to medicine or to health authorities).","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Graph Convolutional Network for Long Short-term Traffic Flow Prediction 基于动态图卷积网络的长短期交通流预测
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912866
Yan Wang, Q. Ren
Traffic prediction is a critical component of intel-ligent transportation systems. However, highly non-linear and dynamical spatial-temporal correlations propose challenges for traffic prediction, especially long-term prediction. We propose a spatial-temporal channel-attention based graph convolutional network (STCAGCN) to improve the accuracy of both long-term and short-term traffic flow prediction. Firstly we design an attention mechanism to learn complex temporal and spatial correlations. Then we develop the stacked spatial-temporal convo-lution layer to model complex temporal and spatial correlations. Each spatial-temporal convolution layer is composed of a gated time convolution network and a graph convolution network. We develop a gated time convolution network to model non-linear temporal correlations, which process long sequences through stacked dilated convolution. Moreover, the graph convolution network exploits the hidden spatial correlations via learning self-adaptive adjacency matrix. Experiment results on real-world datasets demonstrate that the proposed STCAGCN model obtains improvements over the state-of-the-art, especially for long-term traffic flow prediction.
交通预测是智能交通系统的重要组成部分。然而,高度非线性和动态的时空相关性为交通预测,特别是长期预测提出了挑战。为了提高长期和短期交通流预测的准确性,我们提出了一种基于时空通道注意力的图卷积网络(STCAGCN)。首先,我们设计了一个注意机制来学习复杂的时空相关性。然后,我们开发了堆叠的时空卷积层来模拟复杂的时空相关性。每个时空卷积层由一个门控时间卷积网络和一个图卷积网络组成。我们开发了一个门控时间卷积网络来模拟非线性时间相关性,该网络通过堆叠扩展卷积处理长序列。此外,图卷积网络通过学习自适应邻接矩阵来挖掘隐藏的空间相关性。在真实数据集上的实验结果表明,所提出的STCAGCN模型比最先进的模型得到了改进,特别是在长期交通流预测方面。
{"title":"Dynamic Graph Convolutional Network for Long Short-term Traffic Flow Prediction","authors":"Yan Wang, Q. Ren","doi":"10.1109/ISCC55528.2022.9912866","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912866","url":null,"abstract":"Traffic prediction is a critical component of intel-ligent transportation systems. However, highly non-linear and dynamical spatial-temporal correlations propose challenges for traffic prediction, especially long-term prediction. We propose a spatial-temporal channel-attention based graph convolutional network (STCAGCN) to improve the accuracy of both long-term and short-term traffic flow prediction. Firstly we design an attention mechanism to learn complex temporal and spatial correlations. Then we develop the stacked spatial-temporal convo-lution layer to model complex temporal and spatial correlations. Each spatial-temporal convolution layer is composed of a gated time convolution network and a graph convolution network. We develop a gated time convolution network to model non-linear temporal correlations, which process long sequences through stacked dilated convolution. Moreover, the graph convolution network exploits the hidden spatial correlations via learning self-adaptive adjacency matrix. Experiment results on real-world datasets demonstrate that the proposed STCAGCN model obtains improvements over the state-of-the-art, especially for long-term traffic flow prediction.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128036145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior 基于移动终端触摸行为的隐式连续认证模型
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913017
Rui Mao, Heming Ji, Di Cheng, Xiaoyu Wang, Yan Wang, Degang Sun
Most existing identity authentication technologies rely on some ways for the first login authentication, such as personal identification number (PIN), track, or biological characteristics. However, these ways exist plenty of security risks, which make people face password guessing attacks, trace attacks, and shoulder surfing attacks for a long time. Once the illegal users forge identity to complete authentication or bypass first login authentication, their subsequent behavior will become out of control. To solve the above problems, we propose an implicit continuous authentication model based on the touch behavior of the mobile terminal. The model uses the data collected by the accelerometer, gyroscope, and magnetometer to generate feature vectors and extracts the feature vectors containing macroscopic features, microscopic features, and joint features. And we design a convolutional bidirectional recurrent neural network model to distinguish the sensor feature vectors. On this basis, we perform various experiments on a large dataset Hand Movement, Orientation, and Grasp (HMOG) with different sensor characteristics. Compared with the most advanced models proposed recently, the results show that our model achieves an equal error rate (EER) of 0.53%, which significantly improves authentication accuracy.
大多数现有的身份验证技术都依赖于某些方式进行首次登录验证,例如个人识别号码(PIN)、轨迹或生物特征。然而,这些方式存在着大量的安全风险,使人们长期面临猜密码攻击、跟踪攻击和肩冲浪攻击。一旦非法用户伪造身份完成认证或绕过首次登录认证,其后续行为将变得不可控制。为了解决上述问题,我们提出了一种基于移动终端触摸行为的隐式连续认证模型。该模型利用加速度计、陀螺仪和磁力计采集的数据生成特征向量,提取包含宏观特征、微观特征和关节特征的特征向量。设计了一种卷积双向递归神经网络模型来区分传感器特征向量。在此基础上,我们对具有不同传感器特征的大型数据集Hand Movement, Orientation, and Grasp (HMOG)进行了各种实验。与目前最先进的模型相比,该模型的等误差率(EER)为0.53%,显著提高了认证精度。
{"title":"Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior","authors":"Rui Mao, Heming Ji, Di Cheng, Xiaoyu Wang, Yan Wang, Degang Sun","doi":"10.1109/ISCC55528.2022.9913017","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913017","url":null,"abstract":"Most existing identity authentication technologies rely on some ways for the first login authentication, such as personal identification number (PIN), track, or biological characteristics. However, these ways exist plenty of security risks, which make people face password guessing attacks, trace attacks, and shoulder surfing attacks for a long time. Once the illegal users forge identity to complete authentication or bypass first login authentication, their subsequent behavior will become out of control. To solve the above problems, we propose an implicit continuous authentication model based on the touch behavior of the mobile terminal. The model uses the data collected by the accelerometer, gyroscope, and magnetometer to generate feature vectors and extracts the feature vectors containing macroscopic features, microscopic features, and joint features. And we design a convolutional bidirectional recurrent neural network model to distinguish the sensor feature vectors. On this basis, we perform various experiments on a large dataset Hand Movement, Orientation, and Grasp (HMOG) with different sensor characteristics. Compared with the most advanced models proposed recently, the results show that our model achieves an equal error rate (EER) of 0.53%, which significantly improves authentication accuracy.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131506952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sensing Social Media to Forecast COVID-19 Cases 利用社交媒体预测COVID-19病例
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913033
C. Comito
Social media has become a key tool for spreading the news, discussing ideas and comments on world events, playing a relevant role also in public health management, especially in epidemics surveillance like seasonal flu. Online social media actually can provide an important help in monitoring disease spreading as users self-report their health-related issues. Since the very first days of COVID-19 outbreak, people exchanged news, updates, sentiment and opinion about the pandemics. The paper describes a study aiming at evaluating the correlation of tweets with official COVID-19 data. Based on the outcomes of the correlation study, the paper proposes a forecasting model to predict the number of new daily COVID-19 cases. The approach is formulated as an autoregressive model that combines tweets and official COVID-19 data. A real-word dataset of tweets is used for the correlation study and to evaluate the performance of the forecasting model. Results shown the feasibility of the approach, highlighting the improvement obtained when tweets are integrated in the forecasting model, allowing to predict new COVID-19 cases in advance, on average 4–6 days before they were confirmed.
社交媒体已经成为传播新闻、讨论对世界事件的看法和评论的关键工具,在公共卫生管理方面也发挥着相关作用,特别是在季节性流感等流行病监测方面。在线社交媒体实际上可以在监测疾病传播方面提供重要帮助,因为用户会自我报告他们的健康问题。自2019冠状病毒病爆发的第一天起,人们就交换了有关大流行的新闻、最新情况、情绪和意见。这篇论文描述了一项旨在评估推文与官方COVID-19数据相关性的研究。基于相关研究结果,本文提出了预测日新增病例数的预测模型。该方法是将推文和官方新冠肺炎数据相结合的自回归模型。使用真实tweets数据集进行相关性研究,并评估预测模型的性能。结果显示了该方法的可行性,突出了将推文整合到预测模型中所获得的改进,可以提前预测新的COVID-19病例,平均在确诊前4-6天。
{"title":"Sensing Social Media to Forecast COVID-19 Cases","authors":"C. Comito","doi":"10.1109/ISCC55528.2022.9913033","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913033","url":null,"abstract":"Social media has become a key tool for spreading the news, discussing ideas and comments on world events, playing a relevant role also in public health management, especially in epidemics surveillance like seasonal flu. Online social media actually can provide an important help in monitoring disease spreading as users self-report their health-related issues. Since the very first days of COVID-19 outbreak, people exchanged news, updates, sentiment and opinion about the pandemics. The paper describes a study aiming at evaluating the correlation of tweets with official COVID-19 data. Based on the outcomes of the correlation study, the paper proposes a forecasting model to predict the number of new daily COVID-19 cases. The approach is formulated as an autoregressive model that combines tweets and official COVID-19 data. A real-word dataset of tweets is used for the correlation study and to evaluate the performance of the forecasting model. Results shown the feasibility of the approach, highlighting the improvement obtained when tweets are integrated in the forecasting model, allowing to predict new COVID-19 cases in advance, on average 4–6 days before they were confirmed.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131842437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast-Converging Congestion Control in Datacenter Networks 数据中心网络中的快速收敛拥塞控制
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912977
Yukun Zhou, Dezun Dong, Zhengbin Pang, Junhong Ye, Feng Jin
The widespread deployment of Remote Direct Memory Access (RDMA) in datacenter networks increases the stringency for convergence speed when congestion occurs. Fast convergence significantly reduces buffer occupancy, which in turn lessens the probability of triggering Priority-based Flow Control (PFC). Besides, the propagation delay becomes shorter with rapidly growing link speed, which correspondingly makes the queueing delay a major part of end-to-end latency. Fast convergence and low buffer occupancy become more essential for lowering queue delay and flow complete time. We present DQCC (Double-Q Congestion Control), a fast-converging congestion control scheme, which consists of two fundamental components: (i) an ECN-marking-ratio-based queue buffer occupancy estimating (QBOE) solution and (ii) a queue-building-rate driven rate adjustment (QDRA) mechanism to achieve fast convergence. We conduct extensive experiments to evaluate the performance of DQCC, and the results show that DQCC greatly accelerates the convergence process. DQCC achieves low tail latency and low buffer occupancy simultaneously.
RDMA (Remote Direct Memory Access)技术在数据中心网络中的广泛应用,提高了在发生拥塞时收敛速度的严密性。快速收敛显著减少了缓冲区占用,从而降低了触发基于优先级的流量控制(PFC)的概率。此外,随着链路速度的快速增长,传播延迟变得越来越短,相应地,排队延迟成为端到端延迟的主要部分。快速收敛和低缓冲区占用对于降低队列延迟和流完成时间至关重要。我们提出了一种快速收敛的拥塞控制方案DQCC (Double-Q拥塞控制),它由两个基本组成部分组成:(i)基于ecn标记比率的队列缓冲区占用估计(QBOE)解决方案和(ii)实现快速收敛的队列构建速率驱动的速率调整(QDRA)机制。我们进行了大量的实验来评估DQCC的性能,结果表明DQCC大大加快了收敛过程。DQCC同时实现了低尾延迟和低缓冲区占用。
{"title":"Fast-Converging Congestion Control in Datacenter Networks","authors":"Yukun Zhou, Dezun Dong, Zhengbin Pang, Junhong Ye, Feng Jin","doi":"10.1109/ISCC55528.2022.9912977","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912977","url":null,"abstract":"The widespread deployment of Remote Direct Memory Access (RDMA) in datacenter networks increases the stringency for convergence speed when congestion occurs. Fast convergence significantly reduces buffer occupancy, which in turn lessens the probability of triggering Priority-based Flow Control (PFC). Besides, the propagation delay becomes shorter with rapidly growing link speed, which correspondingly makes the queueing delay a major part of end-to-end latency. Fast convergence and low buffer occupancy become more essential for lowering queue delay and flow complete time. We present DQCC (Double-Q Congestion Control), a fast-converging congestion control scheme, which consists of two fundamental components: (i) an ECN-marking-ratio-based queue buffer occupancy estimating (QBOE) solution and (ii) a queue-building-rate driven rate adjustment (QDRA) mechanism to achieve fast convergence. We conduct extensive experiments to evaluate the performance of DQCC, and the results show that DQCC greatly accelerates the convergence process. DQCC achieves low tail latency and low buffer occupancy simultaneously.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial-based Bayesian Hidden Markov Models with Dirichlet Mixtures for Video Anomaly Detection 基于空间的Dirichlet混合贝叶斯隐马尔可夫模型用于视频异常检测
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912983
Guojian Luo, J. Qu, Lina Zhang, Xiaoyu Fang, Yi Zhang, Tong Zhou
Increased needs for social security promote the development of video surveillance, appealing to the exigency of real-time detection of anomalous events. Considering the rarity and unpredictability of anomalous events, a classical strategy is to model normal data and detect outliers to the model. As a fundamental generative model for time series data, Hidden Markov models (HMM) have been employed in various fields such as speech recognition and video analysis. In this paper, we propose the use of Bayesian HMMs with Dirichlet mixtures which are arrayed along patched frames with Dirichlet distributions as emission probability functions. These spatially-aligned HMMs evolve in parallel, significantly reducing inference time. Learning algorithm based on Stochastic Variational Inference and Discrete Variable Enumeration is applied to our model for fast and robust inference. Experiments over the public UCSD dataset demonstrate the validity of this approach.
社会保障需求的增加促进了视频监控的发展,对实时检测异常事件提出了迫切的要求。考虑到异常事件的罕见性和不可预测性,一种经典的策略是对正常数据建模并检测模型的异常值。隐马尔可夫模型作为时间序列数据的基本生成模型,已广泛应用于语音识别和视频分析等领域。在本文中,我们提出了使用Dirichlet混合的贝叶斯hmm,这些hmm沿着带有Dirichlet分布作为发射概率函数的补丁帧排列。这些空间对齐的hmm并行发展,显著减少了推理时间。该模型采用了基于随机变分推理和离散变量枚举的学习算法,实现了快速、鲁棒的推理。在UCSD公共数据集上的实验证明了该方法的有效性。
{"title":"Spatial-based Bayesian Hidden Markov Models with Dirichlet Mixtures for Video Anomaly Detection","authors":"Guojian Luo, J. Qu, Lina Zhang, Xiaoyu Fang, Yi Zhang, Tong Zhou","doi":"10.1109/ISCC55528.2022.9912983","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912983","url":null,"abstract":"Increased needs for social security promote the development of video surveillance, appealing to the exigency of real-time detection of anomalous events. Considering the rarity and unpredictability of anomalous events, a classical strategy is to model normal data and detect outliers to the model. As a fundamental generative model for time series data, Hidden Markov models (HMM) have been employed in various fields such as speech recognition and video analysis. In this paper, we propose the use of Bayesian HMMs with Dirichlet mixtures which are arrayed along patched frames with Dirichlet distributions as emission probability functions. These spatially-aligned HMMs evolve in parallel, significantly reducing inference time. Learning algorithm based on Stochastic Variational Inference and Discrete Variable Enumeration is applied to our model for fast and robust inference. Experiments over the public UCSD dataset demonstrate the validity of this approach.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130878374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1