首页 > 最新文献

2022 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
Joint Cache Placement and Request Routing Optimization in Heterogeneous Cellular Networks 异构蜂窝网络中的联合缓存放置与请求路由优化
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913008
Marisangila Alves, Guilherme Piĉgas Koslovski
The 5G Quality-of-Service (QoS) objectives con-tributed to the Heterogeneous Cellular Network (HCN) evolution, dictating that applications can rely on low-latency and high-bandwidth networks. However, concurrent requests of large amount of multimedia data generate a burden on the backhaul and fronthaul networks due to redundant retransmissions and pose challenges for achieving the QoS objectives. Although mobile network operators can place content closer to the HCN edge to improve the overall QoS indicators, there are still challenges to design a cache policy aware of limited storage capacity, different content popularity, device mobility, and network congestion. This work innovates by introducing a cooperative policy to join caches placement and routing users' requests atop an HCN. By combining networking and cache QoS requirements, the policy balances the fronthaul network load and dynamically maps the caches to HCN resources. We formulated the cache policy through linear programming and in-depth evaluated its performance using extensive simulation scenarios. The results indicate that the proposed network-aware policy decreases the network latency, even when subject to changes in content popularity distribution and total HCN storage capacity.
5G服务质量(QoS)目标促进了异构蜂窝网络(HCN)的发展,这决定了应用程序可以依赖于低延迟和高带宽网络。但是,大量多媒体数据的并发请求由于冗余重传给回传和前传网络带来了负担,给QoS目标的实现带来了挑战。尽管移动网络运营商可以将内容放置在更靠近HCN边缘的位置,以提高整体QoS指标,但在考虑存储容量有限、内容受欢迎程度不同、设备移动性和网络拥塞的情况下,设计缓存策略仍然存在挑战。这项工作的创新之处在于,它引入了一种合作策略,将缓存放置和用户请求路由到HCN之上。该策略结合组网和缓存QoS需求,平衡前传网络负载,并将缓存动态映射到HCN资源。我们通过线性规划制定了缓存策略,并使用广泛的模拟场景深入评估了其性能。结果表明,即使受到内容流行分布和总HCN存储容量的变化的影响,所提出的网络感知策略也能降低网络延迟。
{"title":"Joint Cache Placement and Request Routing Optimization in Heterogeneous Cellular Networks","authors":"Marisangila Alves, Guilherme Piĉgas Koslovski","doi":"10.1109/ISCC55528.2022.9913008","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913008","url":null,"abstract":"The 5G Quality-of-Service (QoS) objectives con-tributed to the Heterogeneous Cellular Network (HCN) evolution, dictating that applications can rely on low-latency and high-bandwidth networks. However, concurrent requests of large amount of multimedia data generate a burden on the backhaul and fronthaul networks due to redundant retransmissions and pose challenges for achieving the QoS objectives. Although mobile network operators can place content closer to the HCN edge to improve the overall QoS indicators, there are still challenges to design a cache policy aware of limited storage capacity, different content popularity, device mobility, and network congestion. This work innovates by introducing a cooperative policy to join caches placement and routing users' requests atop an HCN. By combining networking and cache QoS requirements, the policy balances the fronthaul network load and dynamically maps the caches to HCN resources. We formulated the cache policy through linear programming and in-depth evaluated its performance using extensive simulation scenarios. The results indicate that the proposed network-aware policy decreases the network latency, even when subject to changes in content popularity distribution and total HCN storage capacity.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134495543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of ML Algorithms for Scenario-agnostic Predictions in Healthcare 医疗保健中场景不可知预测的ML算法比较研究
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912808
Argyro Mavrogiorgou, S. Kleftakis, N. Zafeiropoulos, Konstantinos Mavrogiorgos, Athanasios Kiourtis, D. Kyriazis
The extraction of useful knowledge from collected data has always been the holy grail for enterprises and researchers, supporting efficient decision making, provided service's optimization and profit maximization. However, this task is easier said than done, since it presupposes the application of complex mathematical models/algorithms. Data Analysis has prospered due to the continuous demand to simplify and optimize the knowledge extraction process. Several mechanisms in different domains have been developed, consisting of various techniques to analyze specific data. The need for such mechanisms is even greater in healthcare, since there exist data of different complexity that may provide high-valuable knowledge, if properly analyzed. Considering these challenges, this paper proposes a mechanism for performing Data Analysis in diverse scenarios' healthcare data to extract valuable insights. The mechanism can collect data and apply several Machine Learning algorithms to ensure the best result about the prediction of certain features of the provided data.
从收集的数据中提取有用的知识一直是企业和研究人员的圣杯,支持高效决策,提供服务的优化和利润最大化。然而,这项任务说起来容易做起来难,因为它需要应用复杂的数学模型/算法。由于对知识提取过程的不断简化和优化的需求,数据分析得到了蓬勃发展。在不同的领域已经开发了几种机制,包括各种分析特定数据的技术。在医疗保健领域对这种机制的需求甚至更大,因为存在不同复杂性的数据,如果分析得当,这些数据可能提供高价值的知识。考虑到这些挑战,本文提出了一种在不同场景的医疗保健数据中执行数据分析的机制,以提取有价值的见解。该机制可以收集数据并应用几种机器学习算法,以确保对所提供数据的某些特征进行预测的最佳结果。
{"title":"A Comparative Study of ML Algorithms for Scenario-agnostic Predictions in Healthcare","authors":"Argyro Mavrogiorgou, S. Kleftakis, N. Zafeiropoulos, Konstantinos Mavrogiorgos, Athanasios Kiourtis, D. Kyriazis","doi":"10.1109/ISCC55528.2022.9912808","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912808","url":null,"abstract":"The extraction of useful knowledge from collected data has always been the holy grail for enterprises and researchers, supporting efficient decision making, provided service's optimization and profit maximization. However, this task is easier said than done, since it presupposes the application of complex mathematical models/algorithms. Data Analysis has prospered due to the continuous demand to simplify and optimize the knowledge extraction process. Several mechanisms in different domains have been developed, consisting of various techniques to analyze specific data. The need for such mechanisms is even greater in healthcare, since there exist data of different complexity that may provide high-valuable knowledge, if properly analyzed. Considering these challenges, this paper proposes a mechanism for performing Data Analysis in diverse scenarios' healthcare data to extract valuable insights. The mechanism can collect data and apply several Machine Learning algorithms to ensure the best result about the prediction of certain features of the provided data.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning 评估联邦学习中的匿名和自私搭便车攻击
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912903
Jianhua Wang, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang
Federated Learning (FL) is a distributed learning framework and gains interest due to protecting the privacy of participants. Thus, if some participants are free-riders who are attackers without contributing any computation resources and privacy data, the model faces privacy leakage and inferior performance. In this paper, we explore and define two free-rider attack scenarios, anonymous and selfish free-rider attacks. Then we propose two methods, namely novel and advanced methods, to construct these two attacks. Extensive experiment results reveal the effectiveness in terms of the less deviation with conventional FL using the novel method, and high false positive rate to puzzle defense model using the advanced method.
联邦学习(FL)是一种分布式学习框架,由于保护参与者的隐私而受到关注。因此,如果一些参与者是搭便车者,他们是攻击者,而不贡献任何计算资源和隐私数据,则模型将面临隐私泄露和性能下降的问题。本文探讨并定义了两种搭便车攻击场景:匿名搭便车攻击和自私搭便车攻击。然后,我们提出了两种方法,即新颖和先进的方法来构建这两种攻击。大量的实验结果表明,新方法在与常规FL的偏差较小、迷惑防御模型的误报率较高等方面是有效的。
{"title":"Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning","authors":"Jianhua Wang, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang","doi":"10.1109/ISCC55528.2022.9912903","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912903","url":null,"abstract":"Federated Learning (FL) is a distributed learning framework and gains interest due to protecting the privacy of participants. Thus, if some participants are free-riders who are attackers without contributing any computation resources and privacy data, the model faces privacy leakage and inferior performance. In this paper, we explore and define two free-rider attack scenarios, anonymous and selfish free-rider attacks. Then we propose two methods, namely novel and advanced methods, to construct these two attacks. Extensive experiment results reveal the effectiveness in terms of the less deviation with conventional FL using the novel method, and high false positive rate to puzzle defense model using the advanced method.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134280470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluating TCP Throughput Predictability from Packet Traces using Recurrent Neural Network 利用递归神经网络从数据包轨迹评估TCP吞吐量可预测性
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912956
Ryu Kazama, H. Abe, Chunghan Lee
Congestion control algorithms using recurrent neural network (RNN) for bandwidth prediction are expected to improve throughput. Previous studies involving performance evaluations were conducted only using simulated data. However, simulation and real-world environments are largely different and rarely provide equivalent prediction accuracy. Therefore, we will verify whether our proposed method provides better prediction accuracy in a real-world environment. We measured communications in a real environment and generated training data by converting packet captured data with measurement of prediction accuracy on the generated data. The results showed that the maximum percentage of correct responses was 79.71%, which was comparable to the results obtained using simulated data.
使用递归神经网络(RNN)进行带宽预测的拥塞控制算法有望提高吞吐量。以往涉及绩效评估的研究仅使用模拟数据进行。然而,模拟和真实世界的环境有很大的不同,很少能提供相同的预测精度。因此,我们将验证我们提出的方法是否在现实环境中提供更好的预测精度。我们在真实环境中测量通信,并通过将捕获的数据包数据与生成数据的预测精度测量进行转换来生成训练数据。结果表明,该方法的最大正确率为79.71%,与模拟数据的结果相当。
{"title":"Evaluating TCP Throughput Predictability from Packet Traces using Recurrent Neural Network","authors":"Ryu Kazama, H. Abe, Chunghan Lee","doi":"10.1109/ISCC55528.2022.9912956","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912956","url":null,"abstract":"Congestion control algorithms using recurrent neural network (RNN) for bandwidth prediction are expected to improve throughput. Previous studies involving performance evaluations were conducted only using simulated data. However, simulation and real-world environments are largely different and rarely provide equivalent prediction accuracy. Therefore, we will verify whether our proposed method provides better prediction accuracy in a real-world environment. We measured communications in a real environment and generated training data by converting packet captured data with measurement of prediction accuracy on the generated data. The results showed that the maximum percentage of correct responses was 79.71%, which was comparable to the results obtained using simulated data.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132621428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GreenLoRaWAN: An energy efficient and resilient LoRaWAN communication protocol GreenLoRaWAN:一种节能、弹性的LoRaWAN通信协议
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912972
Thomas Dimakis, M. Louta, Thomas S. Kyriakidis, Alexandros-Apostolos A. Boulogeorgos, Konstantina Banti, Ioanna Karampelia, Nikos Papadimitriou
Long range wide area network (LoRaWAN) represents a promising low power wide area network (LPWAN) technology in the context of internet-of-things (IoT) that has recently attracted intense research interest. Due to the limited energy resources available on LoRaWAN constituent elements and intermittent power supply of gateways in harsh environments, an energy-efficient communication protocol is constituted of utmost importance in order to prolong network lifetime. Motivated by the aforementioned, this work presents a green, robust, and resilient communication protocol, namely GreenLoRaWAN, which increases energy efficiency, scalability and robustness of the LoRaWAN. The proposed protocol is evaluated by means of Monte Carlo simulations; Performance evaluation results acquired are very promising, revealing an important reduction in energy consumption and increase the duration of network lifetime.
长距离广域网(LoRaWAN)是物联网(IoT)背景下一种极具发展前景的低功耗广域网(LPWAN)技术,近年来引起了人们的广泛关注。由于LoRaWAN组成元件的可用能源有限,且网关在恶劣环境下的供电时断时续,因此构建一种节能的通信协议对于延长网络寿命至关重要。在上述激励下,本工作提出了一种绿色、鲁棒性和弹性的通信协议,即GreenLoRaWAN,提高了LoRaWAN的能源效率、可扩展性和鲁棒性。通过蒙特卡洛仿真对所提出的协议进行了评估;获得的性能评估结果非常有希望,显示出能源消耗的显著降低和网络生命周期的延长。
{"title":"GreenLoRaWAN: An energy efficient and resilient LoRaWAN communication protocol","authors":"Thomas Dimakis, M. Louta, Thomas S. Kyriakidis, Alexandros-Apostolos A. Boulogeorgos, Konstantina Banti, Ioanna Karampelia, Nikos Papadimitriou","doi":"10.1109/ISCC55528.2022.9912972","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912972","url":null,"abstract":"Long range wide area network (LoRaWAN) represents a promising low power wide area network (LPWAN) technology in the context of internet-of-things (IoT) that has recently attracted intense research interest. Due to the limited energy resources available on LoRaWAN constituent elements and intermittent power supply of gateways in harsh environments, an energy-efficient communication protocol is constituted of utmost importance in order to prolong network lifetime. Motivated by the aforementioned, this work presents a green, robust, and resilient communication protocol, namely GreenLoRaWAN, which increases energy efficiency, scalability and robustness of the LoRaWAN. The proposed protocol is evaluated by means of Monte Carlo simulations; Performance evaluation results acquired are very promising, revealing an important reduction in energy consumption and increase the duration of network lifetime.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133092890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network StinAttack:一种针对星地集成网络集成入侵防御系统的轻量级有效对抗攻击仿真
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912891
Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu, Yinlong Liu
Effective adversarial attacks simulation is essential for the deployment of ensemble Intrusion Detection Systems (en- semble IDSs) in Satellite-Terrestrial Integrated Network (STIN). This is because it can automatically generate a large amount of adversarial samples to evaluate the robustness of different classifiers. Based on the result, it can further guide the STIN engineers to select proper classifiers in ensemble IDSs. Moreover, it can help the IDSs improve detect performance by their self- learning property in the adversarial attack process. However, the existing adversarial attack approaches suffer from the problems of low success rate and high overhead of communication and calculation due to the limited computing resources and long communication links of STIN. This results in their inefficiency in STIN. To address the above problems, we provide StinAttack as a robustness evaluation scheme for STIN. First, StinAttack provides a comprehensive and automatic robustness evaluation framework for IDSs in STIN with only few times interactions between terrestrial and satellite nodes. Second, StinAttack proposes an effective adversarial attack simulation based on lightweight gradient evaluation for ensemble IDSs. Third, we conduct experiments on 11 typical IDSs, 4 baseline popular adversarial attacks and our StinAttack. Experimental results show that our approach can effectively attack ensemble IDSs and the evaluation results based on real STIN dataset are instructive for designing secure networks.
有效的对抗性攻击仿真是星地集成网络中集成入侵检测系统部署的关键。这是因为它可以自动生成大量的对抗样本来评估不同分类器的鲁棒性。在此基础上,进一步指导STIN工程师在集成ids中选择合适的分类器。此外,利用入侵防御系统在对抗攻击过程中的自学习特性,可以帮助入侵防御系统提高检测性能。然而,由于STIN的计算资源有限,通信链路较长,现有的对抗性攻击方法存在着成功率低、通信和计算开销大的问题。这导致它们在STIN中的效率低下。为了解决上述问题,我们提出了StinAttack作为STIN的鲁棒性评估方案。首先,StinAttack为地面和卫星节点之间的交互次数很少的STIN中入侵防御系统提供了一个全面、自动的鲁棒性评估框架。其次,StinAttack针对集成入侵防御系统提出了一种有效的基于轻量级梯度评估的对抗攻击仿真方法。第三,我们对11种典型的ids, 4种基线流行的对抗性攻击和我们的StinAttack进行了实验。实验结果表明,该方法可以有效地攻击集成入侵攻击,基于真实STIN数据集的评估结果对安全网络的设计具有指导意义。
{"title":"StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network","authors":"Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu, Yinlong Liu","doi":"10.1109/ISCC55528.2022.9912891","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912891","url":null,"abstract":"Effective adversarial attacks simulation is essential for the deployment of ensemble Intrusion Detection Systems (en- semble IDSs) in Satellite-Terrestrial Integrated Network (STIN). This is because it can automatically generate a large amount of adversarial samples to evaluate the robustness of different classifiers. Based on the result, it can further guide the STIN engineers to select proper classifiers in ensemble IDSs. Moreover, it can help the IDSs improve detect performance by their self- learning property in the adversarial attack process. However, the existing adversarial attack approaches suffer from the problems of low success rate and high overhead of communication and calculation due to the limited computing resources and long communication links of STIN. This results in their inefficiency in STIN. To address the above problems, we provide StinAttack as a robustness evaluation scheme for STIN. First, StinAttack provides a comprehensive and automatic robustness evaluation framework for IDSs in STIN with only few times interactions between terrestrial and satellite nodes. Second, StinAttack proposes an effective adversarial attack simulation based on lightweight gradient evaluation for ensemble IDSs. Third, we conduct experiments on 11 typical IDSs, 4 baseline popular adversarial attacks and our StinAttack. Experimental results show that our approach can effectively attack ensemble IDSs and the evaluation results based on real STIN dataset are instructive for designing secure networks.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132482834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: Usage Control using Controlled Privacy Aware Face Recognition 演示:使用控制隐私意识人脸识别的使用控制
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912953
Arpad Müller, Wisam Abbasi, A. Saracino
In this paper, we demonstrate an application of privacy-preserving face recognition combined with an Attribute-Based Access Control framework to regulate access from subjects to critical resources while preserving the subject's privacy. The demonstrator exploits a mechanism that dynamically computes the best trade-off between ensured privacy and data utility, based on image acquisition conditions, and a decision engine based on XACML policies to express complex and dynamic conditions. The demonstrator can handle the dynamic association of new identities, as well as modification of access conditions. Attendees of the demo session can interact with the demo in a variety of ways, including modifying the camera input, but also through the customization of rules as well as the privacy parameter.
在本文中,我们展示了一种应用保护隐私的人脸识别与基于属性的访问控制框架相结合,以规范主体对关键资源的访问,同时保护主体的隐私。演示程序利用了一种机制,该机制基于图像获取条件动态计算确保隐私和数据效用之间的最佳权衡,并利用基于XACML策略的决策引擎来表达复杂的动态条件。演示器可以处理新身份的动态关联,以及访问条件的修改。演示会话的参与者可以通过多种方式与演示交互,包括修改摄像头输入,也可以通过自定义规则以及隐私参数。
{"title":"Demo: Usage Control using Controlled Privacy Aware Face Recognition","authors":"Arpad Müller, Wisam Abbasi, A. Saracino","doi":"10.1109/ISCC55528.2022.9912953","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912953","url":null,"abstract":"In this paper, we demonstrate an application of privacy-preserving face recognition combined with an Attribute-Based Access Control framework to regulate access from subjects to critical resources while preserving the subject's privacy. The demonstrator exploits a mechanism that dynamically computes the best trade-off between ensured privacy and data utility, based on image acquisition conditions, and a decision engine based on XACML policies to express complex and dynamic conditions. The demonstrator can handle the dynamic association of new identities, as well as modification of access conditions. Attendees of the demo session can interact with the demo in a variety of ways, including modifying the camera input, but also through the customization of rules as well as the privacy parameter.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LL-VAS: Adaptation Method for Low-Latency 360-degree Video Streaming over Mobile Networks 移动网络低延迟360度视频流适配方法
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912995
D. Nguyen, L. Ngan, Lai Huyen Thuong, Truong Thu Huong
With the ability to provide an “immersive experience”, 360-degree video-based applications are becoming more and more popular nowadays. In this paper, we propose LL-VAS, a novel adaptation method for low-latency 360-degree video streaming over mobile networks. By applying tile-based streaming, the proposed method allows 360-degree video streaming over resource-constrained mobile networks. In addition, by actively monitoring network throughput at the tile level, the proposed method can detect reductions in network throughput, and adapt video content in a timely manner to avoid re-buffering. Trace-driven experiments show that the proposed method can significantly decrease the number of re-buffering and re-buffering time under strong network throughput fluctuations and small buffer size when compared to reference methods.
由于能够提供“身临其境的体验”,基于360度视频的应用程序如今变得越来越受欢迎。在本文中,我们提出了一种新的适应移动网络低延迟360度视频流的方法- LL-VAS。通过应用基于tile的流,该方法允许在资源受限的移动网络上进行360度视频流。此外,通过在块级主动监控网络吞吐量,该方法可以检测到网络吞吐量的减少,并及时调整视频内容以避免重新缓冲。跟踪驱动实验表明,与参考方法相比,在网络吞吐量波动较大、缓冲区大小较小的情况下,该方法可以显著减少再缓冲次数和再缓冲时间。
{"title":"LL-VAS: Adaptation Method for Low-Latency 360-degree Video Streaming over Mobile Networks","authors":"D. Nguyen, L. Ngan, Lai Huyen Thuong, Truong Thu Huong","doi":"10.1109/ISCC55528.2022.9912995","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912995","url":null,"abstract":"With the ability to provide an “immersive experience”, 360-degree video-based applications are becoming more and more popular nowadays. In this paper, we propose LL-VAS, a novel adaptation method for low-latency 360-degree video streaming over mobile networks. By applying tile-based streaming, the proposed method allows 360-degree video streaming over resource-constrained mobile networks. In addition, by actively monitoring network throughput at the tile level, the proposed method can detect reductions in network throughput, and adapt video content in a timely manner to avoid re-buffering. Trace-driven experiments show that the proposed method can significantly decrease the number of re-buffering and re-buffering time under strong network throughput fluctuations and small buffer size when compared to reference methods.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130072239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Reinforcement Learning based Mobility-Aware Service Migration for Multi-access Edge Computing Environment 基于深度强化学习的多访问边缘计算环境下移动感知业务迁移
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912842
Yaqiang Zhang, Rengang Li, Yaqian Zhao, Ruyang Li
Multi-access Edge Computing (MEC) plays an im-portant role for providing end users with high reliability and low latency services at the edge of mobile network. In the scenario of Internet of Vehicles (IoV), vehicle users continually access nearby base stations to offload real-time tasks for reducing their computing overhead, while the ongoing services on current deployed edge nodes may be far away from users with the vehicles moving, potentially resulting in a high delay of data transmission. To address this challenge, in this paper, we propose a Deep Reinforcement Learning (DRL)-based mobility-aware service migration mechanism for effectively reducing the service delay and migration delay of the network. The proposed technique is adopted by re-calibrating required services at edge locations near the mobile user. Edge network state and user movement information are considered to ensure the generation of real-time service migration decision. Extensive experiments are conducted, and evaluation results demonstrate that our proposed DRL-based technique can effectively reduce the long-term average delay of the MEC system, compared with the state-of-the-art techniques.
多接入边缘计算(Multi-access Edge Computing, MEC)在为终端用户提供高可靠性、低时延的移动网络边缘服务方面发挥着重要作用。在车联网场景下,车辆用户不断访问附近的基站,以卸载实时任务,以减少其计算开销,而当前部署的边缘节点上正在进行的业务可能随着车辆的移动而远离用户,可能导致数据传输的高延迟。为了解决这一挑战,本文提出了一种基于深度强化学习(DRL)的移动感知服务迁移机制,以有效降低网络的服务延迟和迁移延迟。该技术通过在移动用户附近的边缘位置重新校准所需的服务来实现。考虑边缘网络状态和用户移动信息,确保实时业务迁移决策的生成。实验结果表明,与现有技术相比,我们提出的基于drl的技术可以有效地降低MEC系统的长期平均延迟。
{"title":"Deep Reinforcement Learning based Mobility-Aware Service Migration for Multi-access Edge Computing Environment","authors":"Yaqiang Zhang, Rengang Li, Yaqian Zhao, Ruyang Li","doi":"10.1109/ISCC55528.2022.9912842","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912842","url":null,"abstract":"Multi-access Edge Computing (MEC) plays an im-portant role for providing end users with high reliability and low latency services at the edge of mobile network. In the scenario of Internet of Vehicles (IoV), vehicle users continually access nearby base stations to offload real-time tasks for reducing their computing overhead, while the ongoing services on current deployed edge nodes may be far away from users with the vehicles moving, potentially resulting in a high delay of data transmission. To address this challenge, in this paper, we propose a Deep Reinforcement Learning (DRL)-based mobility-aware service migration mechanism for effectively reducing the service delay and migration delay of the network. The proposed technique is adopted by re-calibrating required services at edge locations near the mobile user. Edge network state and user movement information are considered to ensure the generation of real-time service migration decision. Extensive experiments are conducted, and evaluation results demonstrate that our proposed DRL-based technique can effectively reduce the long-term average delay of the MEC system, compared with the state-of-the-art techniques.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134491463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Study on Shared Precomputed Restoration and Shared Backup Path Protection in EONs EONs共享预计算恢复与共享备份路径保护的比较研究
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912774
F. Arpanaei, Shayan Hajipour, H. Beyranvand, J. A. Hernández, D. Larrabeiti
This paper proposes a shared precomputed restoration (SPR) mechanism for link failures in translucent elastic optical networks (EONs). We present SPR with a heuristic algorithm that aims to minimize a cost function. The cost function depends on the number of transceivers and frequency slots (FSs) used to establish a working/protection lightpath (LP) with a tunable parameter that determines the weight of the number of transceivers and FSs in the cost function. SPR precalculates a protection LP for all links of each working LP. As a result, non-link-disjoint working LPs can share protection spectrum and transceivers on newly eased conditions. Like shared backup path protection (SBPP) and dedicated protection (1+1), SPR guarantees single link failure recovery. Our simulation results reveal that SPR outperforms SBPP in terms of recovered bandwidth in multiple link failures. Furthermore, SPR uses fewer transceivers compared to SBPP and 1+1 protection.
提出了一种针对半透明弹性光网络中链路故障的共享预计算恢复机制。我们提出了一个启发式算法,旨在最小化成本函数的SPR。代价函数取决于用于建立工作/保护光路(LP)的收发器和频率槽位(FSs)的数量,该参数可调,该参数决定收发器和FSs数量在代价函数中的权重。SPR为每个工作LP的所有链路预先计算一个保护LP。因此,在新放宽的条件下,非链路断开的工作lp可以共享保护频谱和收发器。与共享备份路径保护(SBPP)和专用保护(1+1)一样,SPR保证单链路故障恢复。仿真结果表明,SPR在多链路故障恢复带宽方面优于SBPP。此外,与SBPP和1+1保护相比,SPR使用更少的收发器。
{"title":"A Comparative Study on Shared Precomputed Restoration and Shared Backup Path Protection in EONs","authors":"F. Arpanaei, Shayan Hajipour, H. Beyranvand, J. A. Hernández, D. Larrabeiti","doi":"10.1109/ISCC55528.2022.9912774","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912774","url":null,"abstract":"This paper proposes a shared precomputed restoration (SPR) mechanism for link failures in translucent elastic optical networks (EONs). We present SPR with a heuristic algorithm that aims to minimize a cost function. The cost function depends on the number of transceivers and frequency slots (FSs) used to establish a working/protection lightpath (LP) with a tunable parameter that determines the weight of the number of transceivers and FSs in the cost function. SPR precalculates a protection LP for all links of each working LP. As a result, non-link-disjoint working LPs can share protection spectrum and transceivers on newly eased conditions. Like shared backup path protection (SBPP) and dedicated protection (1+1), SPR guarantees single link failure recovery. Our simulation results reveal that SPR outperforms SBPP in terms of recovered bandwidth in multiple link failures. Furthermore, SPR uses fewer transceivers compared to SBPP and 1+1 protection.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1