首页 > 最新文献

2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)最新文献

英文 中文
Trust Model to Minimize the Influence of Malicious Attacks in Sharding Based Blockchain Networks 基于分片的区块链网络中最小化恶意攻击影响的信任模型
M. Halgamuge, Samurdika C. Hettikankanamge, Azeem Mohammad
A sharding mechanism could potentially be the solution to enhance the scalability of blockchain networks and makes the distributed ledger technology more feasible. Despite the scalability improvement, it increases the influence of malicious attacks on blockchain networks. We develop a comprehensive trust model by enhancing the trust score of nodes to minimize the adversary influences of malicious attacks in sharding based blockchain networks. Firstly, a penalty factor is incorporated into this trust model to decrease the probability of malicious nodes becoming leaders in the shards. Then, we examine the leader selection probability for varying penalty factors. We also observe the influence of the global reputation on the trust score for a varying number of nodes. Secondly, we increase the trustworthiness of nodes by including penalty factors and reputation scores to nodes that could then identify the malicious influence. The fair node distribution among shards is achieved by distributing the nodes with the same aggregated trustworthiness scores. Finally, we develop a probability distribution model to identify the probabilities of clustering corrupted nodes into single shards and the existence of such corrupted shards in the entire network. Uncorrupted or honest shard probability is shown to be higher in the RapidChain than the Elastico and OmniLedger sharding protocols. This could be as a result of the shard resiliency of the RapidChain (n/2) protocol being more significant than that of the Elastico (n/3) and in OmniLedger (n/3) protocols. Low message complexity of single intra-shard consensus of the RapidChain protocol $mathcal{O}(n)$ may contribute to perform security algorithms more efficiently than that of the Elastico $mathcal{O}({n^2})$ and OmniLedger $mathcal{O}(n)$ sharding protocols. The probabilities of clustering corrupted nodes into single shards can be estimated, and the existence of such corrupted shards in entire networks can be identified using the proposed model.
分片机制可能是增强区块链网络可扩展性的解决方案,并使分布式账本技术更加可行。尽管可扩展性有所提高,但它增加了恶意攻击对区块链网络的影响。我们通过提高节点的信任分数来开发一个全面的信任模型,以最大限度地减少基于分片的区块链网络中恶意攻击的对手影响。首先,在信任模型中加入惩罚因子,以降低恶意节点成为分片领导者的概率。然后,我们考察了不同惩罚因素下的领导者选择概率。我们还观察了全球声誉对不同数量节点的信任得分的影响。其次,我们通过将惩罚因素和声誉分数纳入节点,从而提高节点的可信度,从而识别恶意影响。通过分配具有相同聚合可信度分数的节点,实现分片间节点的公平分布。最后,我们建立了一个概率分布模型,以识别将损坏节点聚为单个分片的概率以及整个网络中存在此类损坏分片的概率。在RapidChain中,未损坏或诚实的分片概率比Elastico和OmniLedger分片协议更高。这可能是由于RapidChain (n/2)协议的分片弹性比Elastico (n/3)和OmniLedger (n/3)协议更重要。与Elastico $mathcal{O}({n^2})$和OmniLedger $mathcal{O}(n)$分片协议相比,RapidChain协议$mathcal{O}(n)$的单个分片内共识的低消息复杂度可能有助于更有效地执行安全算法。利用该模型可以估计损坏节点聚类成单个分片的概率,并且可以识别整个网络中是否存在损坏的分片。
{"title":"Trust Model to Minimize the Influence of Malicious Attacks in Sharding Based Blockchain Networks","authors":"M. Halgamuge, Samurdika C. Hettikankanamge, Azeem Mohammad","doi":"10.1109/AIKE48582.2020.00032","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00032","url":null,"abstract":"A sharding mechanism could potentially be the solution to enhance the scalability of blockchain networks and makes the distributed ledger technology more feasible. Despite the scalability improvement, it increases the influence of malicious attacks on blockchain networks. We develop a comprehensive trust model by enhancing the trust score of nodes to minimize the adversary influences of malicious attacks in sharding based blockchain networks. Firstly, a penalty factor is incorporated into this trust model to decrease the probability of malicious nodes becoming leaders in the shards. Then, we examine the leader selection probability for varying penalty factors. We also observe the influence of the global reputation on the trust score for a varying number of nodes. Secondly, we increase the trustworthiness of nodes by including penalty factors and reputation scores to nodes that could then identify the malicious influence. The fair node distribution among shards is achieved by distributing the nodes with the same aggregated trustworthiness scores. Finally, we develop a probability distribution model to identify the probabilities of clustering corrupted nodes into single shards and the existence of such corrupted shards in the entire network. Uncorrupted or honest shard probability is shown to be higher in the RapidChain than the Elastico and OmniLedger sharding protocols. This could be as a result of the shard resiliency of the RapidChain (n/2) protocol being more significant than that of the Elastico (n/3) and in OmniLedger (n/3) protocols. Low message complexity of single intra-shard consensus of the RapidChain protocol $mathcal{O}(n)$ may contribute to perform security algorithms more efficiently than that of the Elastico $mathcal{O}({n^2})$ and OmniLedger $mathcal{O}(n)$ sharding protocols. The probabilities of clustering corrupted nodes into single shards can be estimated, and the existence of such corrupted shards in entire networks can be identified using the proposed model.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Artificial Intelligence Design on Embedded Board with Edge Computing for Vehicle Applications 基于边缘计算的嵌入式板人工智能设计
Ching-Lung Su, W. Lai, Yu-Kai Zhang, Ting-Jia Guo, Yi-Jiun Hung, Hui-Chiao Chen
This article proposes advanced driver assistance system (ADAS) from neural network by YOLO v3-tiny on vehicle platform of NXP S32V234 with edge computing to detect pedestrians and knights. The implemented embedded board has limitation to perform a lot of convolution. As proposed design need to reduce the amount of operation, the considered problem of reduced precision at the same time. The proposed architecture uses method of Squeeze Net and quantization to reduce the amount of operation about 46% and the precision has only slightly reduced. The proposed methods of image to column (Im2col) and memory efficient convolution (MEC) rearranges continuous matrix space to access. The proposed hardware of APEX uses to accelerate operations can reduce execution time and increase detection speed by ten multiples compared with YOLO v3-tiny architecture.
本文在NXP S32V234车载平台上,利用YOLO v3-tiny设计了基于神经网络的高级驾驶辅助系统(ADAS),并结合边缘计算对行人和骑士进行检测。所实现的嵌入式电路板在进行大量卷积运算方面存在局限性。由于提出的设计需要减少运行量,同时考虑了精度降低的问题。该体系结构采用挤压网和量化方法,减少了约46%的运行量,精度仅略有降低。提出了图像到列(Im2col)和内存高效卷积(MEC)方法,对连续矩阵空间进行重新排列以进行访问。与YOLO v3-tiny架构相比,APEX所提出的用于加速运算的硬件可以减少执行时间,并将检测速度提高十倍。
{"title":"Artificial Intelligence Design on Embedded Board with Edge Computing for Vehicle Applications","authors":"Ching-Lung Su, W. Lai, Yu-Kai Zhang, Ting-Jia Guo, Yi-Jiun Hung, Hui-Chiao Chen","doi":"10.1109/AIKE48582.2020.00026","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00026","url":null,"abstract":"This article proposes advanced driver assistance system (ADAS) from neural network by YOLO v3-tiny on vehicle platform of NXP S32V234 with edge computing to detect pedestrians and knights. The implemented embedded board has limitation to perform a lot of convolution. As proposed design need to reduce the amount of operation, the considered problem of reduced precision at the same time. The proposed architecture uses method of Squeeze Net and quantization to reduce the amount of operation about 46% and the precision has only slightly reduced. The proposed methods of image to column (Im2col) and memory efficient convolution (MEC) rearranges continuous matrix space to access. The proposed hardware of APEX uses to accelerate operations can reduce execution time and increase detection speed by ten multiples compared with YOLO v3-tiny architecture.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114374108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data 一种利用有毒数据防御物联网机器学习中毒攻击的方法
Tomoki Chiba, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga
Machine learning is a technology with the potential to enrich our lives in many ways. It is expected to be used in various situations. However, the value of attacks on machine learning models is also increasing. Therefore, it is considered to be dangerous to use machine learning without proper planning. Poisoning attacks are one of the attacks that can be launched against machine learning models. Poisoning attacks reduce the accuracy of machine learning models by mixing training data with data created with malicious intent to attack the models. Depending on the scenario, the damage caused by poisoning attacks may lead to large-scale accidents. In this study, we propose a method to protect machine learning models from poisoning attacks. In this paper, we assume an environment in which data obtained from multiple sources is used as training data for machine learning models and present a method suitable for defending against poisoning attacks in such an environment. The proposed method computes the influence of the data obtained from each source on the accuracy of the machine learning model to understand how good each source is. The impact of replacing the data from each source with poisonous data is also calculated. Based on the results of these calculations, the proposed method determines the data removal rate for each data source, which represents the confidence level for determining the degree of harmfulness of the data. The proposed method prevents poisonous data from being mixed with the normal data by removing it according to the removal rate. To evaluate the performance of the proposed method, we compared existing methods with the proposed method based on the accuracy of the model after applying the proposed defensive measure. In this experiment, under the condition that the training data contains 17% of poisonous data, the accuracy of the defended model of the proposed method is 89%, which is higher than 83% obtained using the existing method. This shows that the proposed method improved the performance of the model against poisoning attacks.
机器学习是一项有潜力在许多方面丰富我们生活的技术。它有望在各种情况下使用。然而,对机器学习模型的攻击也在增加。因此,如果没有适当的计划,使用机器学习被认为是危险的。中毒攻击是针对机器学习模型的攻击之一。中毒攻击通过将训练数据与恶意攻击模型的数据混合在一起,降低了机器学习模型的准确性。根据不同的场景,中毒袭击造成的损害可能导致大规模事故。在这项研究中,我们提出了一种保护机器学习模型免受中毒攻击的方法。在本文中,我们假设从多个来源获得的数据被用作机器学习模型的训练数据的环境,并提出了一种适合在这种环境中防御中毒攻击的方法。该方法计算从每个源获得的数据对机器学习模型精度的影响,以了解每个源的好坏。还计算了用有毒数据替换每个来源的数据的影响。根据这些计算结果,提出的方法确定每个数据源的数据去除率,这代表了确定数据有害程度的置信水平。该方法根据去除率对有毒数据进行去除,防止有毒数据混入正常数据。为了评估所提方法的性能,我们在应用所提防御措施后,基于模型的准确性,将现有方法与所提方法进行了比较。在本实验中,在训练数据含有17%有毒数据的情况下,本文方法的防御模型准确率为89%,高于现有方法的83%。结果表明,该方法提高了模型抗投毒攻击的性能。
{"title":"A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data","authors":"Tomoki Chiba, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga","doi":"10.1109/AIKE48582.2020.00022","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00022","url":null,"abstract":"Machine learning is a technology with the potential to enrich our lives in many ways. It is expected to be used in various situations. However, the value of attacks on machine learning models is also increasing. Therefore, it is considered to be dangerous to use machine learning without proper planning. Poisoning attacks are one of the attacks that can be launched against machine learning models. Poisoning attacks reduce the accuracy of machine learning models by mixing training data with data created with malicious intent to attack the models. Depending on the scenario, the damage caused by poisoning attacks may lead to large-scale accidents. In this study, we propose a method to protect machine learning models from poisoning attacks. In this paper, we assume an environment in which data obtained from multiple sources is used as training data for machine learning models and present a method suitable for defending against poisoning attacks in such an environment. The proposed method computes the influence of the data obtained from each source on the accuracy of the machine learning model to understand how good each source is. The impact of replacing the data from each source with poisonous data is also calculated. Based on the results of these calculations, the proposed method determines the data removal rate for each data source, which represents the confidence level for determining the degree of harmfulness of the data. The proposed method prevents poisonous data from being mixed with the normal data by removing it according to the removal rate. To evaluate the performance of the proposed method, we compared existing methods with the proposed method based on the accuracy of the model after applying the proposed defensive measure. In this experiment, under the condition that the training data contains 17% of poisonous data, the accuracy of the defended model of the proposed method is 89%, which is higher than 83% obtained using the existing method. This shows that the proposed method improved the performance of the model against poisoning attacks.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"32 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130440063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Classification algorithms for Distributed Denial of Service Attack Detection 分布式拒绝服务攻击检测的分类算法评估
Maulik Gohil, Sathish A. P. Kumar
Distributed Denial of Service (DDoS) attacks aims exhausting the target network with malicious traffic, which is a threat to the availability of the service. Many detection systems, specifically Intrusion Detection System (IDS) have been proposed throughout the last two decades as the Internet evolved, although users and organizations find it continuously challenging and defeated while dealing with DDoS. Though, IDS is the first point of defense for protecting critical networks against ever evolving issues of intrusive activities, however it should be up to date all the time to detect any anomalous behavior so that integrity, confidentiality and availability of the service can be preserved. But, the accuracy of new detection methods, techniques, algorithms heavily rely on the existence of well-designed datasets for training purposes and evaluation by creating the classifier model. In this work, experimentation has been carried out using major supervised classification algorithms to classify the DDoS attack accurately from the legitimate flows. Among all the classifier, tree-based classifiers and distance-based classifiers performed the best.
分布式拒绝服务(DDoS)攻击的目的是用恶意流量耗尽目标网络,威胁服务的可用性。在过去的二十年里,随着互联网的发展,许多检测系统,特别是入侵检测系统(IDS)已经被提出,尽管用户和组织在处理DDoS时发现它不断面临挑战和失败。虽然,IDS是保护关键网络免受不断演变的入侵活动问题的第一道防线,但它应该始终保持最新状态,以检测任何异常行为,从而保持服务的完整性、机密性和可用性。但是,新的检测方法、技术、算法的准确性在很大程度上依赖于设计良好的数据集的存在,用于训练目的和通过创建分类器模型进行评估。在这项工作中,使用主要的监督分类算法进行了实验,以准确地从合法流中分类DDoS攻击。在所有分类器中,基于树的分类器和基于距离的分类器表现最好。
{"title":"Evaluation of Classification algorithms for Distributed Denial of Service Attack Detection","authors":"Maulik Gohil, Sathish A. P. Kumar","doi":"10.1109/AIKE48582.2020.00028","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00028","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks aims exhausting the target network with malicious traffic, which is a threat to the availability of the service. Many detection systems, specifically Intrusion Detection System (IDS) have been proposed throughout the last two decades as the Internet evolved, although users and organizations find it continuously challenging and defeated while dealing with DDoS. Though, IDS is the first point of defense for protecting critical networks against ever evolving issues of intrusive activities, however it should be up to date all the time to detect any anomalous behavior so that integrity, confidentiality and availability of the service can be preserved. But, the accuracy of new detection methods, techniques, algorithms heavily rely on the existence of well-designed datasets for training purposes and evaluation by creating the classifier model. In this work, experimentation has been carried out using major supervised classification algorithms to classify the DDoS attack accurately from the legitimate flows. Among all the classifier, tree-based classifiers and distance-based classifiers performed the best.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116112120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Explainable and Adaptable Augmentation in Knowledge Attention Network for Multi-Agent Deep Reinforcement Learning Systems 多智能体深度强化学习系统中知识注意网络的可解释和自适应增强
Joshua Ho, Chien-Min Wang
The scale of modem Artificial Intelligence systems has been growing and entering more research territories by incorporating Deep Learning (DL) and Deep Reinforcement Learning (DRL) methods. More specifically, multi-agent DRL methods have been widely applied to address the problems of high-dimensional computation, which interpret the conditions that real-world systems mainly encounter and the issues that require resolving. However, the current approaches of DL and DRL are often challenged for their untransparent and time-consuming modeling processes in their attempt to achieve a practical and applicable inference based on human-level perspective and acceptance. This paper presents an explainable and adaptable augmented knowledge attention network for multi-agent DRL systems, which uses game theory simulation to tackle the problem of non-stationarity at the beginning, while improving the learning exploration built upon the strategic ontology to achieve the learning convergence more efficiently for autonomous agents. We anticipate that our approach will facilitate future research studies and potential research inspections of emerging multi-agent DRL systems for increasingly complex and autonomous environments.
现代人工智能系统的规模不断扩大,并通过融合深度学习(DL)和深度强化学习(DRL)方法进入了更多的研究领域。更具体地说,多智能体DRL方法已被广泛应用于解决高维计算问题,这解释了现实世界系统主要遇到的条件和需要解决的问题。然而,目前的DL和DRL方法在试图实现基于人类层面的视角和接受度的实际和适用的推理时,往往因其不透明和耗时的建模过程而受到挑战。针对多智能体DRL系统,提出了一种可解释、自适应的增强知识关注网络,该网络采用博弈论模拟解决了初始非平稳性问题,同时改进了基于策略本体的学习探索,使自主智能体更有效地实现学习收敛。我们预计,我们的方法将促进未来的研究和潜在的研究检查新兴的多智能体DRL系统日益复杂和自主的环境。
{"title":"Explainable and Adaptable Augmentation in Knowledge Attention Network for Multi-Agent Deep Reinforcement Learning Systems","authors":"Joshua Ho, Chien-Min Wang","doi":"10.1109/AIKE48582.2020.00031","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00031","url":null,"abstract":"The scale of modem Artificial Intelligence systems has been growing and entering more research territories by incorporating Deep Learning (DL) and Deep Reinforcement Learning (DRL) methods. More specifically, multi-agent DRL methods have been widely applied to address the problems of high-dimensional computation, which interpret the conditions that real-world systems mainly encounter and the issues that require resolving. However, the current approaches of DL and DRL are often challenged for their untransparent and time-consuming modeling processes in their attempt to achieve a practical and applicable inference based on human-level perspective and acceptance. This paper presents an explainable and adaptable augmented knowledge attention network for multi-agent DRL systems, which uses game theory simulation to tackle the problem of non-stationarity at the beginning, while improving the learning exploration built upon the strategic ontology to achieve the learning convergence more efficiently for autonomous agents. We anticipate that our approach will facilitate future research studies and potential research inspections of emerging multi-agent DRL systems for increasingly complex and autonomous environments.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Method for Low-Cost Environment Partitioning Modeling in Dynamic Update 动态更新中低成本环境分区建模方法
Takuto Yamauchi, K. Tei, S. Honiden
There are systems in the field of event-driven control that require continuous operation. Continuous operation is achieved by switching from normal control to control capable of coping with faults when a fault in the system is detected. In the design phase, the developer needs to create an update controller capable of coping with all possible faults by modeling safe update procedures for any number of possible malfunction patterns. This naturally places a heavy burden on the developer. In this paper, we propose a design method that reduces the design cost of the update environment, which accounts for most of the design burden of an update controller. When designing a new update environment by reusing one that has already been designed, only the design related to the state preservation during update needs to be changed. However, the conventional design method utilizes not only the state preservation relationship but also mixes in two other concerns. Therefore, our proposed method separates the preservation relations of this state from the mixed concerns. We examined the reduction effect of our method in a reuse situation with multiple failure patterns in two systems that require continuous operation and found that the maximum design cost reduction effect was 90% or more.
在事件驱动控制领域有一些系统需要连续运行。当检测到系统中的故障时,通过从正常控制切换到能够处理故障的控制来实现连续运行。在设计阶段,开发人员需要为任意数量的可能故障模式建模安全更新过程,从而创建一个能够处理所有可能故障的更新控制器。这自然会给开发人员带来沉重的负担。在本文中,我们提出了一种降低更新环境设计成本的设计方法,而更新环境占更新控制器设计负担的大部分。当通过重用已经设计好的更新环境来设计新的更新环境时,只需要更改更新期间与状态保存相关的设计。然而,传统的设计方法不仅利用了状态保存关系,还混合了另外两种考虑。因此,我们提出的方法将这种状态的保存关系从混合关注中分离出来。我们检查了我们的方法在两个需要持续运行的系统中具有多种故障模式的重用情况下的降低效果,发现最大设计成本降低效果为90%或更多。
{"title":"Method for Low-Cost Environment Partitioning Modeling in Dynamic Update","authors":"Takuto Yamauchi, K. Tei, S. Honiden","doi":"10.1109/AIKE48582.2020.00036","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00036","url":null,"abstract":"There are systems in the field of event-driven control that require continuous operation. Continuous operation is achieved by switching from normal control to control capable of coping with faults when a fault in the system is detected. In the design phase, the developer needs to create an update controller capable of coping with all possible faults by modeling safe update procedures for any number of possible malfunction patterns. This naturally places a heavy burden on the developer. In this paper, we propose a design method that reduces the design cost of the update environment, which accounts for most of the design burden of an update controller. When designing a new update environment by reusing one that has already been designed, only the design related to the state preservation during update needs to be changed. However, the conventional design method utilizes not only the state preservation relationship but also mixes in two other concerns. Therefore, our proposed method separates the preservation relations of this state from the mixed concerns. We examined the reduction effect of our method in a reuse situation with multiple failure patterns in two systems that require continuous operation and found that the maximum design cost reduction effect was 90% or more.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Chatbot Conversations 保护聊天机器人对话的隐私
Debmalya Biswas
With chatbots gaining traction and their adoption growing in different verticals, e.g. Health, Banking, Dating; and users sharing more and more private information with chatbots - studies have started to highlight the privacy risks of chatbots. In this paper, we propose two privacypreserving approaches for chatbot conversations. The first approach applies ‘entity’ based privacy filtering and transformation, and can be applied directly on the app (client) side. It however requires knowledge of the chatbot design to be enabled. We present a second scheme based on Searchable Encryption that is able to preserve user chat privacy, without requiring any knowledge of the chatbot design. Finally, we present some experimental results based on a real-life employee Help Desk chatbot that validates both the need and feasibility of the proposed approaches.
随着聊天机器人越来越受欢迎,它们在不同垂直领域的应用越来越多,例如健康、银行、约会;用户与聊天机器人分享越来越多的私人信息——研究已经开始强调聊天机器人的隐私风险。在本文中,我们提出了两种用于聊天机器人对话的隐私保护方法。第一种方法应用基于“实体”的隐私过滤和转换,可以直接应用于应用(客户端)端。然而,它需要启用聊天机器人设计的知识。我们提出了基于可搜索加密的第二种方案,该方案能够保护用户的聊天隐私,而无需了解聊天机器人的设计。最后,我们给出了一些基于真实员工Help Desk聊天机器人的实验结果,验证了所提出方法的必要性和可行性。
{"title":"Privacy Preserving Chatbot Conversations","authors":"Debmalya Biswas","doi":"10.1109/AIKE48582.2020.00035","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00035","url":null,"abstract":"With chatbots gaining traction and their adoption growing in different verticals, e.g. Health, Banking, Dating; and users sharing more and more private information with chatbots - studies have started to highlight the privacy risks of chatbots. In this paper, we propose two privacypreserving approaches for chatbot conversations. The first approach applies ‘entity’ based privacy filtering and transformation, and can be applied directly on the app (client) side. It however requires knowledge of the chatbot design to be enabled. We present a second scheme based on Searchable Encryption that is able to preserve user chat privacy, without requiring any knowledge of the chatbot design. Finally, we present some experimental results based on a real-life employee Help Desk chatbot that validates both the need and feasibility of the proposed approaches.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124548532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Knowledge Graph Visualization: Challenges, Framework, and Implementation 知识图谱可视化:挑战、框架和实现
Rungsiman Nararatwong, N. Kertkeidkachorn, R. Ichise
A knowledge graph (KG) is a rich resource representing real-world facts. Visualizing a knowledge graph helps humans gain a deep understanding of the facts, leading to new insights and concepts. However, the massive and complex nature of knowledge graphs has brought many longstanding challenges, especially to attract non-expert users. This paper discusses these challenges; we turned them into a generic knowledge-graph visualization framework, namely KGViz, consisting of four dimensions: modularity, intuitive user interface, performance, and access control. Our implementation of KGViz is a high-capacity, extendable, and scalable KG visualizer, which we designed to promotes community contributions.
知识图谱(KG)是代表现实世界事实的丰富资源。可视化知识图谱可以帮助人们深入了解事实,从而产生新的见解和概念。然而,知识图谱的庞大和复杂的特性带来了许多长期的挑战,特别是吸引非专业用户。本文讨论了这些挑战;我们将它们转化为一个通用的知识图可视化框架,即KGViz,由模块化、直观用户界面、性能和访问控制四个维度组成。我们的KGViz实现是一个高容量、可扩展和可伸缩的KG可视化器,我们设计它是为了促进社区的贡献。
{"title":"Knowledge Graph Visualization: Challenges, Framework, and Implementation","authors":"Rungsiman Nararatwong, N. Kertkeidkachorn, R. Ichise","doi":"10.1109/AIKE48582.2020.00034","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00034","url":null,"abstract":"A knowledge graph (KG) is a rich resource representing real-world facts. Visualizing a knowledge graph helps humans gain a deep understanding of the facts, leading to new insights and concepts. However, the massive and complex nature of knowledge graphs has brought many longstanding challenges, especially to attract non-expert users. This paper discusses these challenges; we turned them into a generic knowledge-graph visualization framework, namely KGViz, consisting of four dimensions: modularity, intuitive user interface, performance, and access control. Our implementation of KGViz is a high-capacity, extendable, and scalable KG visualizer, which we designed to promotes community contributions.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computational Semantics: How to solve the suspense of supersense 计算语义学:如何解决超感的悬念
Aishwarya Asesh
Understanding human language is a difficult task, with varied fields of study which aim at explaining and researching the human language principles. Linguistics, Psychology and Computer Science all use domain specific tools to describe and model language. Natural Language Processing is the field which aims at using computational mechanisms to process naturally occurring human language. Modeling syntax gives language structure. Using general sense classes, or "supersenses" one can potentially enrich texts with semantic information. Given a sentence with syntactic information, and a closed set of semantic supersenses, can a supersense tagged sentence be derived? Furthermore, can one demarcate boundaries for multiword expressions? The aim of this research study is to create a multiword expression boundary and supersense labelled sentence by training with Word, part-of-speech (POS), multiword expression (MWE) and supersense tagged training data. The semantically tagged sentences can be used for many tasks such as question answering systems, information retrieval, discourse and sentiment analysis.
理解人类语言是一项艰巨的任务,有各种各样的研究领域旨在解释和研究人类语言的原理。语言学、心理学和计算机科学都使用特定领域的工具来描述和建模语言。自然语言处理是一个旨在利用计算机制来处理自然发生的人类语言的领域。建模语法给出了语言结构。使用一般意义类或“超意义”,可以潜在地用语义信息丰富文本。给定一个具有句法信息的句子,以及一组封闭的语义超感觉,能否推导出一个超感觉标记句子?此外,我们可以为多词表达式划分边界吗?本研究的目的是通过对带有Word、词性(POS)、多词表达(MWE)和超意义标记的训练数据进行训练,创建一个多词表达边界和超意义标记的句子。语义标记句可以用于问答系统、信息检索、话语和情感分析等许多任务。
{"title":"Computational Semantics: How to solve the suspense of supersense","authors":"Aishwarya Asesh","doi":"10.1109/AIKE48582.2020.00024","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00024","url":null,"abstract":"Understanding human language is a difficult task, with varied fields of study which aim at explaining and researching the human language principles. Linguistics, Psychology and Computer Science all use domain specific tools to describe and model language. Natural Language Processing is the field which aims at using computational mechanisms to process naturally occurring human language. Modeling syntax gives language structure. Using general sense classes, or \"supersenses\" one can potentially enrich texts with semantic information. Given a sentence with syntactic information, and a closed set of semantic supersenses, can a supersense tagged sentence be derived? Furthermore, can one demarcate boundaries for multiword expressions? The aim of this research study is to create a multiword expression boundary and supersense labelled sentence by training with Word, part-of-speech (POS), multiword expression (MWE) and supersense tagged training data. The semantically tagged sentences can be used for many tasks such as question answering systems, information retrieval, discourse and sentiment analysis.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121018286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Techniques to Design Speed Efficient Data Warehouse Architecture for Fastening Knowledge Discovery Process
Abhishek Gupta, Arun Sahayadhas, V. Gupta
Decision-making is the key factor of any organization which decides organization’s sustainability in competitive market and its continuous growth and helps in knowledge discovery process. These decisions are taken based on analysis of historical and current data, which are managed by data warehouses (DWH). Based on the datasets provided by these DWH, crystal and ad-hoc reports are generated by BI tools. So, Speed of data warehouse architectures plays a prominent role for deriving decisions at right time. In this paper we have proposed techniques to make data warehouse architecture speed efficient. For speed optimization we have not only worked on data warehouse architecture but also, we have worked on various operations performed by data warehouse, which further boost the overall data warehouse architecture speed.
决策是任何组织的关键因素,它决定了组织在竞争市场中的可持续性和持续增长,并有助于知识发现过程。这些决策是基于对历史和当前数据的分析做出的,这些数据由数据仓库(DWH)管理。基于这些DWH提供的数据集,BI工具生成晶体报告和临时报告。因此,数据仓库体系结构的速度对于在正确的时间做出决策起着重要作用。在本文中,我们提出了提高数据仓库体系结构速度效率的技术。在速度优化方面,我们不仅研究了数据仓库架构,还研究了数据仓库执行的各种操作,这进一步提高了数据仓库架构的整体速度。
{"title":"Proposed Techniques to Design Speed Efficient Data Warehouse Architecture for Fastening Knowledge Discovery Process","authors":"Abhishek Gupta, Arun Sahayadhas, V. Gupta","doi":"10.1109/AIKE48582.2020.00039","DOIUrl":"https://doi.org/10.1109/AIKE48582.2020.00039","url":null,"abstract":"Decision-making is the key factor of any organization which decides organization’s sustainability in competitive market and its continuous growth and helps in knowledge discovery process. These decisions are taken based on analysis of historical and current data, which are managed by data warehouses (DWH). Based on the datasets provided by these DWH, crystal and ad-hoc reports are generated by BI tools. So, Speed of data warehouse architectures plays a prominent role for deriving decisions at right time. In this paper we have proposed techniques to make data warehouse architecture speed efficient. For speed optimization we have not only worked on data warehouse architecture but also, we have worked on various operations performed by data warehouse, which further boost the overall data warehouse architecture speed.","PeriodicalId":370671,"journal":{"name":"2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1