首页 > 最新文献

Proceedings of the 2023 ACM Southeast Conference最新文献

英文 中文
Platform-agnostic Model to Detect Sinophobia on Social Media 基于平台不可知模型的社交媒体恐华症检测
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587024
Matthew Morgan, Adita Kulkarni
Although the boom of social media in the past decade has enabled the creation, distribution, and consumption of information at a remarkable rate, it has also led to the growth of different forms of online abuse. Since the outbreak of COVID-19, hate against Chinese or Sinophobia has increased significantly in real world as well as on online platforms making it necessary to design ways to combat it. In this paper, we design a platform-agnostic model to detect Sinophobic content on social media websites automatically. We use pre-trained word embeddings with several machine learning classifiers to detect Sinophobia on three platforms---Parler, Reddit, and Twitter. Our results demonstrate that the BERT model shows the best performance among all the models by achieving an accuracy of 98.51% on Parler, 95.36% on Reddit, and 88.12% on Twitter datasets.
尽管过去十年社交媒体的蓬勃发展使信息的创造、传播和消费以惊人的速度增长,但它也导致了各种形式的网络滥用的增长。新冠肺炎疫情爆发以来,无论是在现实世界还是在网络平台上,仇视中国或恐华情绪都显著上升,因此有必要制定应对措施。在本文中,我们设计了一个平台无关的模型来自动检测社交媒体网站上的恐华内容。我们使用预先训练的词嵌入和几个机器学习分类器来检测三个平台上的恐华症——Parler、Reddit和Twitter。我们的结果表明,BERT模型在所有模型中表现最好,在Parler数据集上达到98.51%,在Reddit上达到95.36%,在Twitter上达到88.12%。
{"title":"Platform-agnostic Model to Detect Sinophobia on Social Media","authors":"Matthew Morgan, Adita Kulkarni","doi":"10.1145/3564746.3587024","DOIUrl":"https://doi.org/10.1145/3564746.3587024","url":null,"abstract":"Although the boom of social media in the past decade has enabled the creation, distribution, and consumption of information at a remarkable rate, it has also led to the growth of different forms of online abuse. Since the outbreak of COVID-19, hate against Chinese or Sinophobia has increased significantly in real world as well as on online platforms making it necessary to design ways to combat it. In this paper, we design a platform-agnostic model to detect Sinophobic content on social media websites automatically. We use pre-trained word embeddings with several machine learning classifiers to detect Sinophobia on three platforms---Parler, Reddit, and Twitter. Our results demonstrate that the BERT model shows the best performance among all the models by achieving an accuracy of 98.51% on Parler, 95.36% on Reddit, and 88.12% on Twitter datasets.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128084665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparison of Two Approaches to Support Methods Time Measurement in an Automotive Factory 某汽车制造厂支持方法时间测量的两种方法比较
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587008
Vyas Padmanabhan, Jared Harvey, Asit Singh, Jeff Gray, Sanford White
In a manufacturing factory, eliminating seconds off a task that is repeated often can reduce the overall manufacturing time and improve the profitability of each unit produced. It is advantageous to understand the average amount of time required to complete each task. In order to scientifically determine the desired time required to complete a task, the individual subtasks also can be timed. This can be made more efficient by automating the process of recording the basic physical motions of factory workers that are involved in a task. Our paper shows how it is possible to use a machine learning based approach to classify the basic motions. This paper describes two approaches that we implemented in order to automate the process of motion classification. We contrast the two approaches and analyze the tradeoffs between each approach. The context for the application of our project is Mercedes-Benz US International, a large automotive manufacturing facility in the Southeastern United States. Additionally, we discuss the limitations of the two approaches and future work that can address these issues.
在制造工厂中,消除经常重复的任务的几秒钟可以减少总体制造时间并提高每个生产单元的盈利能力。了解完成每项任务所需的平均时间是有益的。为了科学地确定完成一项任务所需的所需时间,还可以对各个子任务进行计时。通过自动化记录工厂工人从事某项任务时的基本身体动作,可以提高工作效率。我们的论文展示了如何使用基于机器学习的方法对基本运动进行分类。本文介绍了实现运动分类过程自动化的两种方法。我们对比了这两种方法,并分析了每种方法之间的权衡。本项目的应用背景是梅赛德斯-奔驰美国国际公司,这是一家位于美国东南部的大型汽车制造工厂。此外,我们还讨论了这两种方法的局限性以及可以解决这些问题的未来工作。
{"title":"A Comparison of Two Approaches to Support Methods Time Measurement in an Automotive Factory","authors":"Vyas Padmanabhan, Jared Harvey, Asit Singh, Jeff Gray, Sanford White","doi":"10.1145/3564746.3587008","DOIUrl":"https://doi.org/10.1145/3564746.3587008","url":null,"abstract":"In a manufacturing factory, eliminating seconds off a task that is repeated often can reduce the overall manufacturing time and improve the profitability of each unit produced. It is advantageous to understand the average amount of time required to complete each task. In order to scientifically determine the desired time required to complete a task, the individual subtasks also can be timed. This can be made more efficient by automating the process of recording the basic physical motions of factory workers that are involved in a task. Our paper shows how it is possible to use a machine learning based approach to classify the basic motions. This paper describes two approaches that we implemented in order to automate the process of motion classification. We contrast the two approaches and analyze the tradeoffs between each approach. The context for the application of our project is Mercedes-Benz US International, a large automotive manufacturing facility in the Southeastern United States. Additionally, we discuss the limitations of the two approaches and future work that can address these issues.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A W3H2 Analysis of Security and Privacy Issues in Telemedicine: A Survey Study 远程医疗安全与隐私问题的W3H2分析:一项调查研究
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587109
Ankur Chattopadhyay, Thuong Ho, Nahom Beyene
Technological advances have made notable changes in the way healthcare services can be received and delivered today. Telemedicine is a form of virtual healthcare service that is convenient in context of time commitments, cost, and in-person availability. Despite its benefits, the adoption of telemedicine remains challenged with technology constraints, including security and privacy issues that pose risks. Existing research literature shows that there have been some prior survey studies on the security and privacy risks in telemedicine systems. However, none of these previous works have holistically surveyed the telemedicine security and privacy issues, using their networking layer locations, their causes, and their potential impacts on information flow. In this research study, we survey existing works on telemedicine security plus privacy, and come up with a unique way of classifying the surveyed literature using a noteworthy W3H2 analysis approach, which reviews and organizes the prior literature in terms of the locations, causes, potential impacts, and remedies related to the telemedicine security issues. We also discuss existing research gaps plus open research directions on the topic. The highlight of this study is our nifty W3H2 analysis approach, which makes use of simple yet notable research questions, as well as the seven layered OSI network architecture model, unlike previous survey studies on telemedicine security. We end up creating a multi-layer, novel taxonomy framework for effective presentation plus categorization of our surveyed literature.
技术进步已经显著改变了当今接受和提供医疗保健服务的方式。远程医疗是虚拟医疗服务的一种形式,在时间承诺、成本和现场可用性方面都很方便。尽管有好处,采用远程医疗仍然受到技术限制的挑战,包括构成风险的安全和隐私问题。现有的研究文献表明,对远程医疗系统的安全和隐私风险已有一些初步的调查研究。然而,这些先前的工作都没有全面调查远程医疗安全和隐私问题,使用他们的网络层位置,他们的原因,以及他们对信息流的潜在影响。在本研究中,我们调查了现有的关于远程医疗安全与隐私的工作,并提出了一种独特的分类方法,使用值得注意的W3H2分析方法,从与远程医疗安全问题相关的位置、原因、潜在影响和补救措施等方面对先前的文献进行了回顾和整理。我们还讨论了关于该主题的现有研究差距和开放的研究方向。这项研究的亮点是我们巧妙的W3H2分析方法,它利用了简单但值得注意的研究问题,以及七层OSI网络体系结构模型,这与之前对远程医疗安全的调查研究不同。我们最终创建了一个多层的、新颖的分类框架,用于有效地展示和分类我们调查的文献。
{"title":"A W3H2 Analysis of Security and Privacy Issues in Telemedicine: A Survey Study","authors":"Ankur Chattopadhyay, Thuong Ho, Nahom Beyene","doi":"10.1145/3564746.3587109","DOIUrl":"https://doi.org/10.1145/3564746.3587109","url":null,"abstract":"Technological advances have made notable changes in the way healthcare services can be received and delivered today. Telemedicine is a form of virtual healthcare service that is convenient in context of time commitments, cost, and in-person availability. Despite its benefits, the adoption of telemedicine remains challenged with technology constraints, including security and privacy issues that pose risks. Existing research literature shows that there have been some prior survey studies on the security and privacy risks in telemedicine systems. However, none of these previous works have holistically surveyed the telemedicine security and privacy issues, using their networking layer locations, their causes, and their potential impacts on information flow. In this research study, we survey existing works on telemedicine security plus privacy, and come up with a unique way of classifying the surveyed literature using a noteworthy W3H2 analysis approach, which reviews and organizes the prior literature in terms of the locations, causes, potential impacts, and remedies related to the telemedicine security issues. We also discuss existing research gaps plus open research directions on the topic. The highlight of this study is our nifty W3H2 analysis approach, which makes use of simple yet notable research questions, as well as the seven layered OSI network architecture model, unlike previous survey studies on telemedicine security. We end up creating a multi-layer, novel taxonomy framework for effective presentation plus categorization of our surveyed literature.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
News Consumption Among CS Majors: Habits, Perceptions, and Challenges 计算机科学专业学生的新闻消费:习惯、观念和挑战
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587023
S. Barlowe, Andrew S. Scott
Improved pedagogy is urgently needed that helps computer science majors better recognize how their products will affect societies where computing is increasingly permeating all aspects of life. A more suitable approach than frequently updating materials to reflect the effect of rapidly changing computing paradigms on continuously evolving societies is to integrate the assessment of current events into the classroom and coursework. Because current events evolve so quickly, often the only source of information is the news media for which trustworthiness and accuracy have become complex issues. To accurately target instructional changes that account for both the benefits and challenges of incorporating news reporting, instructors must first understand how computer science majors consume news. Unfortunately, research addressing the habits and perceptions of computer science students when consuming news reporting is limited. To help fill this gap, we present results from a survey investigating the method, frequency, and perceptions of news consumption among CS majors at a primarily undergraduate university in the United States. We also report if students appreciate the effect of computing on current events and provide analysis from investigating the impact of news stories influenced by computing.
迫切需要改进教学方法,以帮助计算机科学专业的学生更好地认识到他们的产品将如何影响计算机日益渗透到生活的各个方面的社会。比起频繁地更新材料来反映快速变化的计算范式对不断发展的社会的影响,更合适的方法是将当前事件的评估整合到课堂和课程作业中。由于时事发展如此之快,信息的唯一来源往往是新闻媒体,而新闻媒体的可信度和准确性已成为一个复杂的问题。为了准确地定位教学变化,既考虑到合并新闻报道的好处,也考虑到挑战,教师必须首先了解计算机科学专业的学生是如何消费新闻的。不幸的是,针对计算机科学专业学生在消费新闻报道时的习惯和看法的研究是有限的。为了帮助填补这一空白,我们提出了一项调查的结果,该调查调查了美国一所主要本科大学CS专业学生的新闻消费方法、频率和观念。我们还报告学生是否欣赏计算机对时事的影响,并从调查受计算机影响的新闻故事的影响中提供分析。
{"title":"News Consumption Among CS Majors: Habits, Perceptions, and Challenges","authors":"S. Barlowe, Andrew S. Scott","doi":"10.1145/3564746.3587023","DOIUrl":"https://doi.org/10.1145/3564746.3587023","url":null,"abstract":"Improved pedagogy is urgently needed that helps computer science majors better recognize how their products will affect societies where computing is increasingly permeating all aspects of life. A more suitable approach than frequently updating materials to reflect the effect of rapidly changing computing paradigms on continuously evolving societies is to integrate the assessment of current events into the classroom and coursework. Because current events evolve so quickly, often the only source of information is the news media for which trustworthiness and accuracy have become complex issues. To accurately target instructional changes that account for both the benefits and challenges of incorporating news reporting, instructors must first understand how computer science majors consume news. Unfortunately, research addressing the habits and perceptions of computer science students when consuming news reporting is limited. To help fill this gap, we present results from a survey investigating the method, frequency, and perceptions of news consumption among CS majors at a primarily undergraduate university in the United States. We also report if students appreciate the effect of computing on current events and provide analysis from investigating the impact of news stories influenced by computing.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of ECDSA's Computational Impact on IoT Network Performance ECDSA对物联网网络性能的计算影响分析
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587013
Joseph Clark, F. Ali
The Internet of Things (IoT) is transforming the world. On the one hand, its rapid integration into many systems is making automation easier, but on the other hand dependence of many processes on IoT is also making the IoT an attractive target for exploitation. One of the attacks that IoT devices can suffer from is device impersonation. To verify that the sender of a piece of information is who it claims to be, digital signatures are a solution. Applying digital signatures requires some overhead, and that overhead may impact the performance of an IoT network. In this paper, we observed the computational impact of using the Elliptic Curve Digital Signature Algorithm (ECDSA) to create and verify IoT devices' digital signatures. We used two criteria to evaluate the performance of our small IoT network: the packet loss and the average time needed to sign and verify a packet in a small IoT network. We also analyzed the same system without using digital signatures. Our evaluations show that in a small IoT sensor network, ECDSA computational impact is quite low.
物联网(IoT)正在改变世界。一方面,它与许多系统的快速集成使自动化变得更加容易,但另一方面,许多过程对物联网的依赖也使物联网成为一个有吸引力的开发目标。物联网设备可能遭受的攻击之一是设备冒充。为了验证一条信息的发送者就是它所声称的那个人,数字签名是一种解决方案。应用数字签名需要一些开销,而这些开销可能会影响物联网网络的性能。在本文中,我们观察了使用椭圆曲线数字签名算法(ECDSA)创建和验证物联网设备数字签名的计算影响。我们使用两个标准来评估小型物联网网络的性能:数据包丢失以及在小型物联网网络中签名和验证数据包所需的平均时间。我们还在不使用数字签名的情况下分析了同一个系统。我们的评估表明,在小型物联网传感器网络中,ECDSA的计算影响相当低。
{"title":"Analysis of ECDSA's Computational Impact on IoT Network Performance","authors":"Joseph Clark, F. Ali","doi":"10.1145/3564746.3587013","DOIUrl":"https://doi.org/10.1145/3564746.3587013","url":null,"abstract":"The Internet of Things (IoT) is transforming the world. On the one hand, its rapid integration into many systems is making automation easier, but on the other hand dependence of many processes on IoT is also making the IoT an attractive target for exploitation. One of the attacks that IoT devices can suffer from is device impersonation. To verify that the sender of a piece of information is who it claims to be, digital signatures are a solution. Applying digital signatures requires some overhead, and that overhead may impact the performance of an IoT network. In this paper, we observed the computational impact of using the Elliptic Curve Digital Signature Algorithm (ECDSA) to create and verify IoT devices' digital signatures. We used two criteria to evaluate the performance of our small IoT network: the packet loss and the average time needed to sign and verify a packet in a small IoT network. We also analyzed the same system without using digital signatures. Our evaluations show that in a small IoT sensor network, ECDSA computational impact is quite low.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116196453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Evaluation of the Structure of Student-Written Unit Tests 学生编写的单元测试结构的自动评估
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587002
L. Baumstark
As instructors in courses that introduce unit testing, we want to provide autograded practice problems that guide students in how they write their unit test methods, similar to how existing autograder tools can provide students with traditional coding problems. For courses taught in Java, these existing autograder systems often use instructor-supplied JUnit tests to evaluate student submissions of non-unit-test code; our approach is designed to integrate into these JUnit-based systems and expand their capabilities to include practice coding unit tests. We do this by writing special instructor-provided unit tests that evaluate students' submitted unit tests; we call these "meta-tests" to distinguish them from the students' work. This paper describes the use of meta-tests, the technology that facilitates them, and strategies for writing them. Previous work in this space focused on using coverage metrics (e.g., lines-of-code covered or numbers of bugs caught) that evaluate the aggregate performance of suites of unit tests. Our approach instead examines the internal structure of individual unit test methods and provides feedback on whether, for example, the test method creates the correct object(s), calls the correct method-under-test, and/or calls appropriate assertions.
作为单元测试课程的讲师,我们希望提供自动评分的练习问题,指导学生如何编写单元测试方法,类似于现有的自动评分工具如何为学生提供传统的编码问题。对于用Java授课的课程,这些现有的自动评分系统通常使用教师提供的JUnit测试来评估学生提交的非单元测试代码;我们的方法被设计成集成到这些基于junit的系统中,并扩展它们的功能,以包括实践编码单元测试。我们通过编写特殊的教师提供的单元测试来评估学生提交的单元测试来做到这一点;我们称这些测试为“元测试”,以区别于学生的作业。本文描述了元测试的使用,促进它们的技术,以及编写它们的策略。这个领域以前的工作集中在使用覆盖度量(例如,覆盖的代码行数或捕获的错误数量)来评估单元测试套件的总体性能。相反,我们的方法检查单个单元测试方法的内部结构,并提供反馈,例如,测试方法是否创建了正确的对象,调用了正确的被测方法,和/或调用了适当的断言。
{"title":"Automated Evaluation of the Structure of Student-Written Unit Tests","authors":"L. Baumstark","doi":"10.1145/3564746.3587002","DOIUrl":"https://doi.org/10.1145/3564746.3587002","url":null,"abstract":"As instructors in courses that introduce unit testing, we want to provide autograded practice problems that guide students in how they write their unit test methods, similar to how existing autograder tools can provide students with traditional coding problems. For courses taught in Java, these existing autograder systems often use instructor-supplied JUnit tests to evaluate student submissions of non-unit-test code; our approach is designed to integrate into these JUnit-based systems and expand their capabilities to include practice coding unit tests. We do this by writing special instructor-provided unit tests that evaluate students' submitted unit tests; we call these \"meta-tests\" to distinguish them from the students' work. This paper describes the use of meta-tests, the technology that facilitates them, and strategies for writing them. Previous work in this space focused on using coverage metrics (e.g., lines-of-code covered or numbers of bugs caught) that evaluate the aggregate performance of suites of unit tests. Our approach instead examines the internal structure of individual unit test methods and provides feedback on whether, for example, the test method creates the correct object(s), calls the correct method-under-test, and/or calls appropriate assertions.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Contract-Based Social Recovery Wallet Management Scheme for Digital Assets 基于智能合约的数字资产社会回收钱包管理方案
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587016
Allan B. Pedin, N. Siasi, Mohammad Sameni
Social recovery schemes enable the recovery of decentralized digital assets like Bitcoin and Ethereum through a social network. These schemes suffer from security issues and limitations including centralization, a conspiracy of one's network, large transaction fees for the user and network, and verifiable connections between the user and the network. To mitigate these issues, the work proposes and implements a novel social recovery scheme based on verifiable secret sharing, smart contract code, encrypted communication, and biometric encryption. The security and performance analysis versus key existing implementations is evaluated in terms of security features and gas fees.
社会恢复计划可以通过社交网络恢复比特币和以太坊等分散的数字资产。这些方案存在安全问题和限制,包括中心化、网络阴谋、用户和网络的高额交易费用以及用户和网络之间的可验证连接。为了缓解这些问题,该工作提出并实现了一种基于可验证秘密共享、智能合约代码、加密通信和生物识别加密的新型社会恢复方案。安全性和性能分析与关键现有实现的对比是根据安全特性和gas费用进行评估的。
{"title":"Smart Contract-Based Social Recovery Wallet Management Scheme for Digital Assets","authors":"Allan B. Pedin, N. Siasi, Mohammad Sameni","doi":"10.1145/3564746.3587016","DOIUrl":"https://doi.org/10.1145/3564746.3587016","url":null,"abstract":"Social recovery schemes enable the recovery of decentralized digital assets like Bitcoin and Ethereum through a social network. These schemes suffer from security issues and limitations including centralization, a conspiracy of one's network, large transaction fees for the user and network, and verifiable connections between the user and the network. To mitigate these issues, the work proposes and implements a novel social recovery scheme based on verifiable secret sharing, smart contract code, encrypted communication, and biometric encryption. The security and performance analysis versus key existing implementations is evaluated in terms of security features and gas fees.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"388 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122351335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Motor Imagery Movement from EEG Signal 从脑电图信号中检测运动意象运动
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587009
ABM.Adnan Azmee, Manohar Murikipudi, Md Abdullah Al Hafiz Khan
Electroencephalography (EEG) signals can be captured with the help of Brain-Computer Interfaces. When properly analyzed and applied, the information in these EEG signals can serve various purposes. People who are paralyzed or partially paralyzed and have difficulty communicating as a result of their condition can benefit immensely from the use of EEG. By detecting the motor imagery movement from EEG, we can determine the intent of a subject who is unable to perform motor functions (e.g., paralyzed patient) but is imagining them. However, detecting motor movement from EEG signals is challenging since EEG is susceptible to noise. Moreover, the complex relationship between motor activities and EEG data makes it difficult to classify. Deep neural networks excel at comprehending intricate features and executing complex computations. Using the capabilities of deep neural networks, we develop a hybrid neural network model in this paper that can accurately detect motor activity movement from EEG data; our model outperforms the state-of-the-art models and generates a classification accuracy of 98%.
在脑机接口的帮助下,可以捕获脑电图信号。经过适当的分析和应用,这些脑电图信号中的信息可以有多种用途。瘫痪或部分瘫痪的人,由于他们的病情而有交流困难,可以从脑电图的使用中受益匪浅。通过检测EEG的运动图像运动,我们可以确定无法执行运动功能(例如,瘫痪患者)但正在想象它们的受试者的意图。然而,由于脑电图容易受到噪声的影响,从脑电图信号中检测运动是具有挑战性的。此外,运动活动与脑电数据之间的复杂关系给分类带来了困难。深度神经网络擅长理解复杂的特征和执行复杂的计算。利用深度神经网络的功能,本文开发了一种混合神经网络模型,可以准确地从脑电图数据中检测运动活动;我们的模型优于最先进的模型,并产生98%的分类准确率。
{"title":"Detecting Motor Imagery Movement from EEG Signal","authors":"ABM.Adnan Azmee, Manohar Murikipudi, Md Abdullah Al Hafiz Khan","doi":"10.1145/3564746.3587009","DOIUrl":"https://doi.org/10.1145/3564746.3587009","url":null,"abstract":"Electroencephalography (EEG) signals can be captured with the help of Brain-Computer Interfaces. When properly analyzed and applied, the information in these EEG signals can serve various purposes. People who are paralyzed or partially paralyzed and have difficulty communicating as a result of their condition can benefit immensely from the use of EEG. By detecting the motor imagery movement from EEG, we can determine the intent of a subject who is unable to perform motor functions (e.g., paralyzed patient) but is imagining them. However, detecting motor movement from EEG signals is challenging since EEG is susceptible to noise. Moreover, the complex relationship between motor activities and EEG data makes it difficult to classify. Deep neural networks excel at comprehending intricate features and executing complex computations. Using the capabilities of deep neural networks, we develop a hybrid neural network model in this paper that can accurately detect motor activity movement from EEG data; our model outperforms the state-of-the-art models and generates a classification accuracy of 98%.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Reinforcement Learning Technique for PNPSC Net Player Strategies PNPSC网络玩家策略的深度强化学习技术
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587011
E. M. Bearss, Mikel D. Petty
Petri Nets with Players, Strategies, and Costs (PNPSC) is an extension of Petri nets specifically designed to model cyberattacks. The PNPSC formalism includes a representation of the strategies for the competing "players," i.e., the attacker and defender. Developing well-performing strategies for players in PNPSC nets is challenging for both game tree and reinforcement learning algorithms. This paper presents a method of modeling the PNPSC net player strategies as a game tree and using a combination of Monte Carlo Tree Search (MCTS) and deep reinforcement learning to effectively improve the players' strategies. The performance of this combination method is compared with standard action selection with the deep Q-learning algorithm.
带有玩家、策略和成本的Petri网(PNPSC)是Petri网的扩展,专门用于模拟网络攻击。PNPSC的形式包括竞争“玩家”(即攻击者和防御者)的策略表示。为PNPSC网络中的玩家开发性能良好的策略对游戏树和强化学习算法都具有挑战性。本文提出了一种将PNPSC网络玩家策略建模为游戏树的方法,并结合蒙特卡罗树搜索(MCTS)和深度强化学习来有效地改进玩家的策略。将该组合方法的性能与基于深度q -学习的标准动作选择算法进行了比较。
{"title":"A Deep Reinforcement Learning Technique for PNPSC Net Player Strategies","authors":"E. M. Bearss, Mikel D. Petty","doi":"10.1145/3564746.3587011","DOIUrl":"https://doi.org/10.1145/3564746.3587011","url":null,"abstract":"Petri Nets with Players, Strategies, and Costs (PNPSC) is an extension of Petri nets specifically designed to model cyberattacks. The PNPSC formalism includes a representation of the strategies for the competing \"players,\" i.e., the attacker and defender. Developing well-performing strategies for players in PNPSC nets is challenging for both game tree and reinforcement learning algorithms. This paper presents a method of modeling the PNPSC net player strategies as a game tree and using a combination of Monte Carlo Tree Search (MCTS) and deep reinforcement learning to effectively improve the players' strategies. The performance of this combination method is compared with standard action selection with the deep Q-learning algorithm.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130415416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling Particle Randomness: A Pseudorandom Number Generator 粒子随机性建模:伪随机数生成器
Pub Date : 2023-04-12 DOI: 10.1145/3564746.3587025
Chloe Dunmire, Amber Wagner
This paper discusses the development of a new pseudorandom number generator (PRNG) based on chaotic billiards and particle randomness. In this new system, two massless particles bounce, teleport, and collide with each other inside of the classic Sinai Billiard. Random sequences are generated based on the collision coordinates of two particles as they bounce off of the circular center billiard wall. Three statistical tests conducted on the generated sequences indicate the generator produces sequences comparable to truly random sequences. In addition to discussing the results of the three statistical analysis, this paper details how the model is set up and how the pseudorandom sequence is produced.
讨论了一种基于混沌台球和粒子随机性的伪随机数发生器(PRNG)。在这个新系统中,两个无质量粒子在经典的西奈台球中弹跳、传送并相互碰撞。随机序列是基于两个粒子的碰撞坐标生成的,因为它们从圆形台球的中心墙上反弹。对所生成序列进行的三次统计测试表明,所生成的序列可与真正的随机序列相媲美。除了讨论三种统计分析的结果外,本文还详细介绍了如何建立模型以及如何产生伪随机序列。
{"title":"Modeling Particle Randomness: A Pseudorandom Number Generator","authors":"Chloe Dunmire, Amber Wagner","doi":"10.1145/3564746.3587025","DOIUrl":"https://doi.org/10.1145/3564746.3587025","url":null,"abstract":"This paper discusses the development of a new pseudorandom number generator (PRNG) based on chaotic billiards and particle randomness. In this new system, two massless particles bounce, teleport, and collide with each other inside of the classic Sinai Billiard. Random sequences are generated based on the collision coordinates of two particles as they bounce off of the circular center billiard wall. Three statistical tests conducted on the generated sequences indicate the generator produces sequences comparable to truly random sequences. In addition to discussing the results of the three statistical analysis, this paper details how the model is set up and how the pseudorandom sequence is produced.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127570436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2023 ACM Southeast Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1