首页 > 最新文献

Information (Switzerland)最新文献

英文 中文
Interoperability-Enhanced Knowledge Management in Law Enforcement: An Integrated Data-Driven Forensic Ontological Approach to Crime Scene Analysis 执法中互操作性增强的知识管理:犯罪现场分析的综合数据驱动的法医本体论方法
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-09 DOI: 10.3390/info14110607
Alexandros Z. Spyropoulos, Charalampos Bratsas, Georgios C. Makris, Emmanouel Garoufallou, Vassilis Tsiantos
Nowadays, more and more sciences are involved in strengthening the work of law enforcement authorities. Scientific documentation is evidence highly respected by the courts in administering justice. As the involvement of science in solving crimes increases, so does human subjectivism, which often leads to wrong conclusions and, consequently, to bad judgments. From the above arises the need to create a single information system that will be fed with scientific evidence such as fingerprints, genetic material, digital data, forensic photographs, information from the forensic report, etc., and also investigative data such as information from witnesses’ statements, the apology of the accused, etc., from various crime scenes that will be able, through formal reasoning procedure, to conclude possible perpetrators. The present study examines a proposal for developing an information system that can be a basis for creating a forensic ontology—a semantic representation of the crime scene—through descriptive logic in the owl semantic language. The Interoperability-Enhanced information system to be developed could assist law enforcement authorities in solving crimes. At the same time, it would promote closer cooperation between academia, civil society, and state institutions by fostering a culture of engagement for the common good.
如今,越来越多的科学参与到加强执法部门的工作中。科学文献是法院在执行司法时高度尊重的证据。随着科学在破案中的作用越来越大,人类的主观主义也在增加,这往往导致错误的结论,从而导致错误的判断。综上所述,需要建立一个单一的信息系统,该系统将提供科学证据,如指纹、遗传物质、数字数据、法医照片、法医报告信息等,以及调查数据,如证人的陈述、被告的道歉等,这些数据来自各种犯罪现场,通过正式的推理程序,将能够断定可能的肇事者。本研究探讨了一项关于开发信息系统的建议,该系统可以作为通过猫头鹰语义语言的描述性逻辑创建法医本体(犯罪现场的语义表示)的基础。将开发的互操作性增强信息系统可协助执法当局破案。与此同时,它将通过培养一种为共同利益而参与的文化,促进学术界、民间社会和国家机构之间更密切的合作。
{"title":"Interoperability-Enhanced Knowledge Management in Law Enforcement: An Integrated Data-Driven Forensic Ontological Approach to Crime Scene Analysis","authors":"Alexandros Z. Spyropoulos, Charalampos Bratsas, Georgios C. Makris, Emmanouel Garoufallou, Vassilis Tsiantos","doi":"10.3390/info14110607","DOIUrl":"https://doi.org/10.3390/info14110607","url":null,"abstract":"Nowadays, more and more sciences are involved in strengthening the work of law enforcement authorities. Scientific documentation is evidence highly respected by the courts in administering justice. As the involvement of science in solving crimes increases, so does human subjectivism, which often leads to wrong conclusions and, consequently, to bad judgments. From the above arises the need to create a single information system that will be fed with scientific evidence such as fingerprints, genetic material, digital data, forensic photographs, information from the forensic report, etc., and also investigative data such as information from witnesses’ statements, the apology of the accused, etc., from various crime scenes that will be able, through formal reasoning procedure, to conclude possible perpetrators. The present study examines a proposal for developing an information system that can be a basis for creating a forensic ontology—a semantic representation of the crime scene—through descriptive logic in the owl semantic language. The Interoperability-Enhanced information system to be developed could assist law enforcement authorities in solving crimes. At the same time, it would promote closer cooperation between academia, civil society, and state institutions by fostering a culture of engagement for the common good.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135286573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms 基于卷积神经网络和多尺度直方图的车载网络入侵检测系统
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-08 DOI: 10.3390/info14110605
Gianmarco Baldini
Cybersecurity in modern vehicles has received increased attention from the research community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques used to detect and mitigate cybersecurity risks. This paper proposes a novel implementation of an IDS for in-vehicle security networks based on the concept of multi-scale histograms, which capture the frequencies of message identifiers in CAN-bus in-vehicle networks. In comparison to existing approaches in the literature based on a single histogram, the proposed approach widens the informative context used by the IDS for traffic analysis by taking into consideration sequences of two and three CAN-bus messages to create multi-scale dictionaries. The histograms are created from windows of in-vehicle network traffic. A preliminary multi-scale histogram model is created using only legitimate traffic. Against this model, the IDS performs traffic analysis to create a feature space based on the correlation of the histograms. Then, the created feature space is given in input to a Convolutional Neural Network (CNN) for the identification of the windows of traffic where the attack is present. The proposed approach has been evaluated on two different public data sets achieving a very competitive performance in comparison to the literature.
近年来,现代车辆的网络安全问题越来越受到研究界的关注。入侵检测系统(ids)是一种用于检测和减轻网络安全风险的技术。本文提出了一种基于多尺度直方图的车载安全网络入侵检测系统的实现方法,该方法可以捕获can总线车载网络中消息标识符的频率。与现有文献中基于单一直方图的方法相比,本文提出的方法通过考虑两个和三个can总线消息序列来创建多尺度字典,从而扩大了IDS用于流量分析的信息上下文。直方图是从车载网络流量窗口创建的。仅使用合法流量创建初步的多尺度直方图模型。针对该模型,IDS执行流量分析,根据直方图的相关性创建特征空间。然后,将创建的特征空间作为输入输入给卷积神经网络(CNN),用于识别存在攻击的流量窗口。所提出的方法已经在两个不同的公共数据集上进行了评估,与文献相比,实现了非常有竞争力的性能。
{"title":"In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms","authors":"Gianmarco Baldini","doi":"10.3390/info14110605","DOIUrl":"https://doi.org/10.3390/info14110605","url":null,"abstract":"Cybersecurity in modern vehicles has received increased attention from the research community in recent years. Intrusion Detection Systems (IDSs) are one of the techniques used to detect and mitigate cybersecurity risks. This paper proposes a novel implementation of an IDS for in-vehicle security networks based on the concept of multi-scale histograms, which capture the frequencies of message identifiers in CAN-bus in-vehicle networks. In comparison to existing approaches in the literature based on a single histogram, the proposed approach widens the informative context used by the IDS for traffic analysis by taking into consideration sequences of two and three CAN-bus messages to create multi-scale dictionaries. The histograms are created from windows of in-vehicle network traffic. A preliminary multi-scale histogram model is created using only legitimate traffic. Against this model, the IDS performs traffic analysis to create a feature space based on the correlation of the histograms. Then, the created feature space is given in input to a Convolutional Neural Network (CNN) for the identification of the windows of traffic where the attack is present. The proposed approach has been evaluated on two different public data sets achieving a very competitive performance in comparison to the literature.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135392609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POSS-CNN: An Automatically Generated Convolutional Neural Network with Precision and Operation Separable Structure Aiming at Target Recognition and Detection POSS-CNN:一种针对目标识别和检测的具有精度和操作可分结构的自动生成卷积神经网络
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-07 DOI: 10.3390/info14110604
Jia Hou, Jingyu Zhang, Qi Chen, Siwei Xiang, Yishuo Meng, Jianfei Wang, Cimang Lu, Chen Yang
Artificial intelligence is changing and influencing our world. As one of the main algorithms in the field of artificial intelligence, convolutional neural networks (CNNs) have developed rapidly in recent years. Especially after the emergence of NASNet, CNNs have gradually pushed the idea of AutoML to the public’s attention, and large numbers of new structures designed by automatic searches are appearing. These networks are usually based on reinforcement learning and evolutionary learning algorithms. However, sometimes, the blocks of these networks are complex, and there is no small model for simpler tasks. Therefore, this paper proposes POSS-CNN aiming at target recognition and detection, which employs a multi-branch CNN structure with PSNC and a method of automatic parallel selection for super parameters based on a multi-branch CNN structure. Moreover, POSS-CNN can be broken up. By choosing a single branch or the combination of two branches as the “benchmark”, as well as the overall POSS-CNN, we can achieve seven models with different precision and operations. The test accuracy of POSS-CNN for a recognition task tested on a CIFAR10 dataset can reach 86.4%, which is equivalent to AlexNet and VggNet, but the operation and parameters of the whole model in this paper are 45.9% and 45.8% of AlexNet, and 29.5% and 29.4% of VggNet. The mAP of POSS-CNN for a detection task tested on the LSVH dataset is 45.8, inferior to the 62.3 of YOLOv3. However, compared with YOLOv3, the operation and parameters of the model in this paper are reduced by 57.4% and 15.6%, respectively. After being accelerated by WRA, POSS-CNN for a detection task tested on an LSVH dataset can achieve 27 fps, and the energy efficiency is 0.42 J/f, which is 5 times and 96.6 times better than GPU 2080Ti in performance and energy efficiency, respectively.
人工智能正在改变和影响我们的世界。卷积神经网络(convolutional neural networks, cnn)作为人工智能领域的主要算法之一,近年来发展迅速。特别是在NASNet出现之后,cnn逐渐将AutoML的思想推向了大众的视野,大量由自动搜索设计的新结构正在出现。这些网络通常基于强化学习和进化学习算法。然而,有时候,这些网络的块是复杂的,对于更简单的任务没有小的模型。因此,本文提出了针对目标识别和检测的POSS-CNN,该方法采用了一种带有PSNC的多分支CNN结构和一种基于多分支CNN结构的超参数自动并行选择方法。此外,POSS-CNN可以被分解。通过选择单个分支或两个分支的组合作为“基准”,以及整体POSS-CNN,我们可以得到7个精度和操作不同的模型。POSS-CNN在CIFAR10数据集上测试的一个识别任务的测试准确率可以达到86.4%,与AlexNet和VggNet相当,但本文整个模型的运算和参数分别为AlexNet的45.9%和45.8%,VggNet的29.5%和29.4%。POSS-CNN在LSVH数据集上测试的检测任务mAP为45.8,低于YOLOv3的62.3。但与YOLOv3相比,本文模型的运算和参数分别减少了57.4%和15.6%。经过WRA加速后,在LSVH数据集上测试的POSS-CNN检测任务可以达到27 fps,能量效率为0.42 J/f,性能和能量效率分别是GPU 2080Ti的5倍和96.6倍。
{"title":"POSS-CNN: An Automatically Generated Convolutional Neural Network with Precision and Operation Separable Structure Aiming at Target Recognition and Detection","authors":"Jia Hou, Jingyu Zhang, Qi Chen, Siwei Xiang, Yishuo Meng, Jianfei Wang, Cimang Lu, Chen Yang","doi":"10.3390/info14110604","DOIUrl":"https://doi.org/10.3390/info14110604","url":null,"abstract":"Artificial intelligence is changing and influencing our world. As one of the main algorithms in the field of artificial intelligence, convolutional neural networks (CNNs) have developed rapidly in recent years. Especially after the emergence of NASNet, CNNs have gradually pushed the idea of AutoML to the public’s attention, and large numbers of new structures designed by automatic searches are appearing. These networks are usually based on reinforcement learning and evolutionary learning algorithms. However, sometimes, the blocks of these networks are complex, and there is no small model for simpler tasks. Therefore, this paper proposes POSS-CNN aiming at target recognition and detection, which employs a multi-branch CNN structure with PSNC and a method of automatic parallel selection for super parameters based on a multi-branch CNN structure. Moreover, POSS-CNN can be broken up. By choosing a single branch or the combination of two branches as the “benchmark”, as well as the overall POSS-CNN, we can achieve seven models with different precision and operations. The test accuracy of POSS-CNN for a recognition task tested on a CIFAR10 dataset can reach 86.4%, which is equivalent to AlexNet and VggNet, but the operation and parameters of the whole model in this paper are 45.9% and 45.8% of AlexNet, and 29.5% and 29.4% of VggNet. The mAP of POSS-CNN for a detection task tested on the LSVH dataset is 45.8, inferior to the 62.3 of YOLOv3. However, compared with YOLOv3, the operation and parameters of the model in this paper are reduced by 57.4% and 15.6%, respectively. After being accelerated by WRA, POSS-CNN for a detection task tested on an LSVH dataset can achieve 27 fps, and the energy efficiency is 0.42 J/f, which is 5 times and 96.6 times better than GPU 2080Ti in performance and energy efficiency, respectively.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"174 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135480459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent Leakage 通过随机排列掩蔽增强可验证计算中的隐私保护以防止泄漏
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-06 DOI: 10.3390/info14110603
Yang Yang, Guanghua Song
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing (VC) has emerged as a secure approach, ensuring that the cloud cannot discern users’ input and output. Random permutation masking (RPM) is a widely adopted technique in VC protocols to provide robust privacy protection. This work presents a precise definition of the privacy-preserving property of RPM by employing indistinguishability experiments. Moreover, an innovative attack exploiting the greatest common divisor and the least common multiple of each row and column in the encrypted matrices is introduced against RPM. Unlike previous density-based attacks, this novel approach offers a significant advantage by allowing the reconstruction of matrix values from the ciphertext based on RPM. A comprehensive demonstration was provided to illustrate the failure of protocols based on RPM in maintaining the privacy-preserving property under this proposed attack. Furthermore, an extensive series of experiments is conducted to thoroughly validate the effectiveness and advantages of the attack against RPM. The findings of this research highlight vulnerabilities in RPM-based VC protocols and underline the pressing need for further enhancements and alternative privacy-preserving mechanisms in outsourcing computation.
外包计算由于其成本效益而变得越来越流行,它使资源有限的用户能够在可能不受信任的云平台上进行大规模计算。为了保护隐私,可验证计算(VC)作为一种安全的方法出现了,它确保云无法识别用户的输入和输出。随机排列掩蔽(RPM)是VC协议中广泛采用的一种技术,用于提供健壮的隐私保护。这项工作提出了一个精确的定义的隐私保护性质的RPM采用不可区分实验。此外,针对RPM引入了一种利用加密矩阵中每行和列的最大公约数和最小公倍数的创新攻击。与以前基于密度的攻击不同,这种新颖的方法提供了一个显著的优势,它允许基于RPM从密文中重建矩阵值。通过一个全面的演示来说明基于RPM的协议在这种攻击下无法保持隐私保护特性。此外,还进行了一系列广泛的实验,以彻底验证针对RPM攻击的有效性和优势。本研究的发现突出了基于rpm的VC协议的漏洞,并强调了在外包计算中进一步增强和替代隐私保护机制的迫切需要。
{"title":"Enhancing Privacy Preservation in Verifiable Computation through Random Permutation Masking to Prevent Leakage","authors":"Yang Yang, Guanghua Song","doi":"10.3390/info14110603","DOIUrl":"https://doi.org/10.3390/info14110603","url":null,"abstract":"Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing (VC) has emerged as a secure approach, ensuring that the cloud cannot discern users’ input and output. Random permutation masking (RPM) is a widely adopted technique in VC protocols to provide robust privacy protection. This work presents a precise definition of the privacy-preserving property of RPM by employing indistinguishability experiments. Moreover, an innovative attack exploiting the greatest common divisor and the least common multiple of each row and column in the encrypted matrices is introduced against RPM. Unlike previous density-based attacks, this novel approach offers a significant advantage by allowing the reconstruction of matrix values from the ciphertext based on RPM. A comprehensive demonstration was provided to illustrate the failure of protocols based on RPM in maintaining the privacy-preserving property under this proposed attack. Furthermore, an extensive series of experiments is conducted to thoroughly validate the effectiveness and advantages of the attack against RPM. The findings of this research highlight vulnerabilities in RPM-based VC protocols and underline the pressing need for further enhancements and alternative privacy-preserving mechanisms in outsourcing computation.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"16 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135589137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trend Analysis of Large Language Models through a Developer Community: A Focus on Stack Overflow 基于开发者社区的大型语言模型趋势分析:对堆栈溢出的关注
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-06 DOI: 10.3390/info14110602
Jungha Son, Boyoung Kim
In the rapidly advancing field of large language model (LLM) research, platforms like Stack Overflow offer invaluable insights into the developer community’s perceptions, challenges, and interactions. This research aims to analyze LLM research and development trends within the professional community. Through the rigorous analysis of Stack Overflow, employing a comprehensive dataset spanning several years, the study identifies the prevailing technologies and frameworks underlining the dominance of models and platforms such as Transformer and Hugging Face. Furthermore, a thematic exploration using Latent Dirichlet Allocation unravels a spectrum of LLM discussion topics. As a result of the analysis, twenty keywords were derived, and a total of five key dimensions, “OpenAI Ecosystem and Challenges”, “LLM Training with Frameworks”, “APIs, File Handling and App Development”, “Programming Constructs and LLM Integration”, and “Data Processing and LLM Functionalities”, were identified through intertopic distance mapping. This research underscores the notable prevalence of specific Tags and technologies within the LLM discourse, particularly highlighting the influential roles of Transformer models and frameworks like Hugging Face. This dominance not only reflects the preferences and inclinations of the developer community but also illuminates the primary tools and technologies they leverage in the continually evolving field of LLMs.
在快速发展的大型语言模型(LLM)研究领域,像Stack Overflow这样的平台为开发人员社区的看法、挑战和互动提供了宝贵的见解。本研究旨在分析法学硕士的研究和发展趋势,在专业社区。通过对Stack Overflow的严格分析,采用跨越数年的综合数据集,该研究确定了主流技术和框架,强调了模型和平台(如Transformer和hugs Face)的主导地位。此外,使用潜在狄利克雷分配的专题探索揭示了法学硕士讨论主题的频谱。分析结果得出了20个关键词,并通过主题间距离映射确定了五个关键维度:“OpenAI生态系统和挑战”、“LLM框架培训”、“api、文件处理和应用程序开发”、“编程结构和LLM集成”和“数据处理和LLM功能”。这项研究强调了法学硕士话语中特定标签和技术的显著流行,特别强调了Transformer模型和框架(如hugs Face)的重要作用。这种主导地位不仅反映了开发人员社区的偏好和倾向,也说明了他们在不断发展的llm领域中所利用的主要工具和技术。
{"title":"Trend Analysis of Large Language Models through a Developer Community: A Focus on Stack Overflow","authors":"Jungha Son, Boyoung Kim","doi":"10.3390/info14110602","DOIUrl":"https://doi.org/10.3390/info14110602","url":null,"abstract":"In the rapidly advancing field of large language model (LLM) research, platforms like Stack Overflow offer invaluable insights into the developer community’s perceptions, challenges, and interactions. This research aims to analyze LLM research and development trends within the professional community. Through the rigorous analysis of Stack Overflow, employing a comprehensive dataset spanning several years, the study identifies the prevailing technologies and frameworks underlining the dominance of models and platforms such as Transformer and Hugging Face. Furthermore, a thematic exploration using Latent Dirichlet Allocation unravels a spectrum of LLM discussion topics. As a result of the analysis, twenty keywords were derived, and a total of five key dimensions, “OpenAI Ecosystem and Challenges”, “LLM Training with Frameworks”, “APIs, File Handling and App Development”, “Programming Constructs and LLM Integration”, and “Data Processing and LLM Functionalities”, were identified through intertopic distance mapping. This research underscores the notable prevalence of specific Tags and technologies within the LLM discourse, particularly highlighting the influential roles of Transformer models and frameworks like Hugging Face. This dominance not only reflects the preferences and inclinations of the developer community but also illuminates the primary tools and technologies they leverage in the continually evolving field of LLMs.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"16 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135589139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EACH-COA: An Energy-Aware Cluster Head Selection for the Internet of Things Using the Coati Optimization Algorithm 基于Coati优化算法的物联网能量感知簇头选择
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-05 DOI: 10.3390/info14110601
Ramasubbareddy Somula, Yongyun Cho, Bhabendu Kumar Mohanta
In recent years, the Internet of Things (IoT) has transformed human life by improving quality of life and revolutionizing all business sectors. The sensor nodes in IoT are interconnected to ensure data transfer to the sink node over the network. Owing to limited battery power, the energy in the nodes is conserved with the help of the clustering technique in IoT. Cluster head (CH) selection is essential for extending network lifetime and throughput in clustering. In recent years, many existing optimization algorithms have been adapted to select the optimal CH to improve energy usage in network nodes. Hence, improper CH selection approaches require more extended convergence and drain sensor batteries quickly. To solve this problem, this paper proposed a coati optimization algorithm (EACH-COA) to improve network longevity and throughput by evaluating the fitness function over the residual energy (RER) and distance constraints. The proposed EACH-COA simulation was conducted in MATLAB 2019a. The potency of the EACH-COA approach was compared with those of the energy-efficient rabbit optimization algorithm (EECHS-ARO), improved sparrow optimization technique (EECHS-ISSADE), and hybrid sea lion algorithm (PDU-SLno). The proposed EACH-COA improved the network lifetime by 8–15% and throughput by 5–10%.
近年来,物联网(IoT)通过提高生活质量和彻底改变所有商业领域,改变了人类的生活。物联网中的传感器节点相互连接,确保数据通过网络传输到汇聚节点。在物联网中,由于电池电量有限,借助聚类技术可以节约节点中的能量。簇头(CH)选择对于延长集群中的网络生命周期和吞吐量至关重要。近年来,已有许多优化算法被用于选择最优CH以提高网络节点的能量利用率。因此,不当的CH选择方法需要更多的扩展收敛和快速耗尽传感器电池。为了解决这一问题,本文提出了一种coati优化算法(EACH-COA),通过评估剩余能量(RER)和距离约束下的适应度函数来提高网络寿命和吞吐量。在MATLAB 2019a中进行了所提出的EACH-COA仿真。将EACH-COA方法与节能兔子优化算法(EECHS-ARO)、改进麻雀优化技术(EECHS-ISSADE)和杂交海狮算法(PDU-SLno)的有效性进行了比较。提出的EACH-COA将网络寿命提高了8-15%,吞吐量提高了5-10%。
{"title":"EACH-COA: An Energy-Aware Cluster Head Selection for the Internet of Things Using the Coati Optimization Algorithm","authors":"Ramasubbareddy Somula, Yongyun Cho, Bhabendu Kumar Mohanta","doi":"10.3390/info14110601","DOIUrl":"https://doi.org/10.3390/info14110601","url":null,"abstract":"In recent years, the Internet of Things (IoT) has transformed human life by improving quality of life and revolutionizing all business sectors. The sensor nodes in IoT are interconnected to ensure data transfer to the sink node over the network. Owing to limited battery power, the energy in the nodes is conserved with the help of the clustering technique in IoT. Cluster head (CH) selection is essential for extending network lifetime and throughput in clustering. In recent years, many existing optimization algorithms have been adapted to select the optimal CH to improve energy usage in network nodes. Hence, improper CH selection approaches require more extended convergence and drain sensor batteries quickly. To solve this problem, this paper proposed a coati optimization algorithm (EACH-COA) to improve network longevity and throughput by evaluating the fitness function over the residual energy (RER) and distance constraints. The proposed EACH-COA simulation was conducted in MATLAB 2019a. The potency of the EACH-COA approach was compared with those of the energy-efficient rabbit optimization algorithm (EECHS-ARO), improved sparrow optimization technique (EECHS-ISSADE), and hybrid sea lion algorithm (PDU-SLno). The proposed EACH-COA improved the network lifetime by 8–15% and throughput by 5–10%.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"36 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135725298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics 探讨网络安全数据泄露中的关键问题:用基于ml的文本分析分析数据泄露诉讼
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-05 DOI: 10.3390/info14110600
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia, Viju Raghupathi
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data breach litigation cases to extract insights from the narratives contained within these cases. Our analysis shows stakeholders (e.g., litigants) are concerned about major topics related to identity theft, hacker, negligence, FCRA (Fair Credit Reporting Act), cybersecurity, insurance, phone device, TCPA (Telephone Consumer Protection Act), credit card, merchant, privacy, and others. The topics fall into four major clusters: “phone scams”, “cybersecurity”, “identity theft”, and “business data breach”. By utilizing ML, text analytics, and descriptive data visualizations, our study serves as a foundational piece for comprehensively analyzing large textual datasets. The findings hold significant implications for both researchers and practitioners in cybersecurity, especially those grappling with the challenges of data breaches.
虽然数据泄露是一种频繁而普遍的现象,但数据泄露的特征和维度尚未得到探索。在这项新颖的探索性研究中,我们将机器学习(ML)和文本分析应用于数据泄露诉讼案件的综合收集,以从这些案件中包含的叙述中提取见解。我们的分析显示,利益相关者(例如诉讼当事人)关注的主要话题涉及身份盗窃、黑客、疏忽、FCRA(公平信用报告法案)、网络安全、保险、电话设备、TCPA(电话消费者保护法)、信用卡、商家、隐私等。这些话题可分为四大类:“电话诈骗”、“网络安全”、“身份盗窃”和“商业数据泄露”。通过使用机器学习、文本分析和描述性数据可视化,我们的研究为全面分析大型文本数据集提供了基础。这些发现对网络安全领域的研究人员和从业人员,尤其是那些正在应对数据泄露挑战的人来说,都具有重要意义。
{"title":"Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics","authors":"Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia, Viju Raghupathi","doi":"10.3390/info14110600","DOIUrl":"https://doi.org/10.3390/info14110600","url":null,"abstract":"While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data breach litigation cases to extract insights from the narratives contained within these cases. Our analysis shows stakeholders (e.g., litigants) are concerned about major topics related to identity theft, hacker, negligence, FCRA (Fair Credit Reporting Act), cybersecurity, insurance, phone device, TCPA (Telephone Consumer Protection Act), credit card, merchant, privacy, and others. The topics fall into four major clusters: “phone scams”, “cybersecurity”, “identity theft”, and “business data breach”. By utilizing ML, text analytics, and descriptive data visualizations, our study serves as a foundational piece for comprehensively analyzing large textual datasets. The findings hold significant implications for both researchers and practitioners in cybersecurity, especially those grappling with the challenges of data breaches.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"38 S17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135725450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Software-Defined Radio Learning Modules and Neural Networks for Teaching Communication Systems Courses 结合软件无线电学习模块和神经网络进行通信系统课程教学
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-04 DOI: 10.3390/info14110599
Luis A. Camuñas-Mesa, José M. de la Rosa
The paradigm known as Cognitive Radio (CR) proposes a continuous sensing of the electromagnetic spectrum in order to dynamically modify transmission parameters, making intelligent use of the environment by taking advantage of different techniques such as Neural Networks. This paradigm is becoming especially relevant due to the congestion in the spectrum produced by increasing numbers of IoT (Internet of Things) devices. Nowadays, many different Software-Defined Radio (SDR) platforms provide tools to implement CR systems in a teaching laboratory environment. Within the framework of a ‘Communication Systems’ course, this paper presents a methodology for learning the fundamentals of radio transmitters and receivers in combination with Convolutional Neural Networks (CNNs).
认知无线电(Cognitive Radio, CR)提出了一种对电磁频谱的连续感知,以便动态修改传输参数,通过利用神经网络等不同技术,智能地利用环境。由于越来越多的IoT(物联网)设备产生的频谱拥塞,这种模式变得尤为重要。目前,许多不同的软件定义无线电(SDR)平台提供了在教学实验室环境中实现CR系统的工具。在“通信系统”课程的框架内,本文提出了一种结合卷积神经网络(cnn)学习无线电发射机和接收机基础知识的方法。
{"title":"Combining Software-Defined Radio Learning Modules and Neural Networks for Teaching Communication Systems Courses","authors":"Luis A. Camuñas-Mesa, José M. de la Rosa","doi":"10.3390/info14110599","DOIUrl":"https://doi.org/10.3390/info14110599","url":null,"abstract":"The paradigm known as Cognitive Radio (CR) proposes a continuous sensing of the electromagnetic spectrum in order to dynamically modify transmission parameters, making intelligent use of the environment by taking advantage of different techniques such as Neural Networks. This paradigm is becoming especially relevant due to the congestion in the spectrum produced by increasing numbers of IoT (Internet of Things) devices. Nowadays, many different Software-Defined Radio (SDR) platforms provide tools to implement CR systems in a teaching laboratory environment. Within the framework of a ‘Communication Systems’ course, this paper presents a methodology for learning the fundamentals of radio transmitters and receivers in combination with Convolutional Neural Networks (CNNs).","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"37 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135774473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning for Time Series Forecasting: Advances and Open Problems 时间序列预测的深度学习:进展和开放问题
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-04 DOI: 10.3390/info14110598
Angelo Casolaro, Vincenzo Capone, Gennaro Iannuzzo, Francesco Camastra
A time series is a sequence of time-ordered data, and it is generally used to describe how a phenomenon evolves over time. Time series forecasting, estimating future values of time series, allows the implementation of decision-making strategies. Deep learning, the currently leading field of machine learning, applied to time series forecasting can cope with complex and high-dimensional time series that cannot be usually handled by other machine learning techniques. The aim of the work is to provide a review of state-of-the-art deep learning architectures for time series forecasting, underline recent advances and open problems, and also pay attention to benchmark data sets. Moreover, the work presents a clear distinction between deep learning architectures that are suitable for short-term and long-term forecasting. With respect to existing literature, the major advantage of the work consists in describing the most recent architectures for time series forecasting, such as Graph Neural Networks, Deep Gaussian Processes, Generative Adversarial Networks, Diffusion Models, and Transformers.
时间序列是按时间顺序排列的数据序列,通常用于描述一种现象如何随时间演变。时间序列预测,估计时间序列的未来值,允许决策策略的实施。深度学习是目前机器学习的前沿领域,应用于时间序列预测可以处理其他机器学习技术通常无法处理的复杂和高维时间序列。这项工作的目的是为时间序列预测提供最先进的深度学习架构的回顾,强调最近的进展和开放的问题,并关注基准数据集。此外,该工作还明确区分了适合短期和长期预测的深度学习架构。就现有文献而言,这项工作的主要优势在于描述了时间序列预测的最新架构,如图神经网络、深度高斯过程、生成对抗网络、扩散模型和变形器。
{"title":"Deep Learning for Time Series Forecasting: Advances and Open Problems","authors":"Angelo Casolaro, Vincenzo Capone, Gennaro Iannuzzo, Francesco Camastra","doi":"10.3390/info14110598","DOIUrl":"https://doi.org/10.3390/info14110598","url":null,"abstract":"A time series is a sequence of time-ordered data, and it is generally used to describe how a phenomenon evolves over time. Time series forecasting, estimating future values of time series, allows the implementation of decision-making strategies. Deep learning, the currently leading field of machine learning, applied to time series forecasting can cope with complex and high-dimensional time series that cannot be usually handled by other machine learning techniques. The aim of the work is to provide a review of state-of-the-art deep learning architectures for time series forecasting, underline recent advances and open problems, and also pay attention to benchmark data sets. Moreover, the work presents a clear distinction between deep learning architectures that are suitable for short-term and long-term forecasting. With respect to existing literature, the major advantage of the work consists in describing the most recent architectures for time series forecasting, such as Graph Neural Networks, Deep Gaussian Processes, Generative Adversarial Networks, Diffusion Models, and Transformers.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"38 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135773336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Agent Reinforcement Learning for Online Food Delivery with Location Privacy Preservation 基于位置隐私保护的在线送餐多智能体强化学习
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-03 DOI: 10.3390/info14110597
Suleiman Abahussein, Dayong Ye, Congcong Zhu, Zishuo Cheng, Umer Siddique, Sheng Shen
Online food delivery services today are considered an essential service that gets significant attention worldwide. Many companies and individuals are involved in this field as it offers good income and numerous jobs to the community. In this research, we consider the problem of online food delivery services and how we can increase the number of received orders by couriers and thereby increase their income. Multi-agent reinforcement learning (MARL) is employed to guide the couriers to areas with high demand for food delivery requests. A map of the city is divided into small grids, and each grid represents a small area of the city that has different demand for online food delivery orders. The MARL agent trains and learns which grid has the highest demand and then selects it. Thus, couriers can get more food delivery orders and thereby increase long-term income. While increasing the number of received orders is important, protecting customer location is also essential. Therefore, the Protect User Location Method (PULM) is proposed in this research in order to protect customer location information. The PULM injects differential privacy (DP) Laplace noise based on two parameters: city area size and customer frequency of online food delivery orders. We use two datasets—Shenzhen, China, and Iowa, USA—to demonstrate the results of our experiments. The results show an increase in the number of received orders in the Shenzhen and Iowa City datasets. We also show the similarity and data utility of courier trajectories after we use our obfuscation (PULM) method.
如今,在线送餐服务被认为是一项重要的服务,在全球范围内受到了极大的关注。许多公司和个人都参与了这个领域,因为它为社区提供了良好的收入和大量的就业机会。在本研究中,我们考虑在线外卖服务的问题,以及如何增加快递员收到的订单数量,从而增加他们的收入。采用多智能体强化学习(MARL)将快递员引导到外卖需求高的地区。城市地图被划分成小网格,每个网格代表城市的一小块区域,这些区域对在线外卖订单有不同的需求。MARL智能体训练并学习需求最大的网格,然后选择它。因此,快递员可以获得更多的外卖订单,从而增加长期收入。虽然增加收到的订单数量很重要,但保护客户位置也很重要。因此,本研究提出保护用户位置方法(protection User Location Method, PULM)来保护客户位置信息。该PULM基于城市面积和在线外卖订单的客户频率两个参数注入差分隐私(DP)拉普拉斯噪声。我们使用两个数据集——中国深圳和美国爱荷华——来展示我们的实验结果。结果显示,深圳和爱荷华城市数据集中收到的订单数量有所增加。我们还展示了使用我们的混淆(PULM)方法后的快递轨迹的相似性和数据效用。
{"title":"Multi-Agent Reinforcement Learning for Online Food Delivery with Location Privacy Preservation","authors":"Suleiman Abahussein, Dayong Ye, Congcong Zhu, Zishuo Cheng, Umer Siddique, Sheng Shen","doi":"10.3390/info14110597","DOIUrl":"https://doi.org/10.3390/info14110597","url":null,"abstract":"Online food delivery services today are considered an essential service that gets significant attention worldwide. Many companies and individuals are involved in this field as it offers good income and numerous jobs to the community. In this research, we consider the problem of online food delivery services and how we can increase the number of received orders by couriers and thereby increase their income. Multi-agent reinforcement learning (MARL) is employed to guide the couriers to areas with high demand for food delivery requests. A map of the city is divided into small grids, and each grid represents a small area of the city that has different demand for online food delivery orders. The MARL agent trains and learns which grid has the highest demand and then selects it. Thus, couriers can get more food delivery orders and thereby increase long-term income. While increasing the number of received orders is important, protecting customer location is also essential. Therefore, the Protect User Location Method (PULM) is proposed in this research in order to protect customer location information. The PULM injects differential privacy (DP) Laplace noise based on two parameters: city area size and customer frequency of online food delivery orders. We use two datasets—Shenzhen, China, and Iowa, USA—to demonstrate the results of our experiments. The results show an increase in the number of received orders in the Shenzhen and Iowa City datasets. We also show the similarity and data utility of courier trajectories after we use our obfuscation (PULM) method.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135775127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Information (Switzerland)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1