首页 > 最新文献

IEEE INFOCOM 2023 - IEEE Conference on Computer Communications最新文献

英文 中文
Effectively Learning Moiré QR Code Decryption from Simulated Data 从模拟数据中有效学习moir<s:1>二维码解密
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229000
Yu Lu, Hao Pan, Feitong Tan, Yi-Chao Chen, Jiadi Yu, Jinghai He, Guangtao Xue
Moiré QR Code is a secure encrypted QR code system that can protect the user’s QR code displayed on the screen from being accessed by attackers. However, conventional decryption methods based on image processing techniques suffer from intensive computation and significant decryption latency in practical mobile applications. In this work, we propose a deep learning-based Moiré QR code decryption framework and achieve an excellent decryption performance. Considering the sensitivity of the Moiré phenomenon, collecting training data in the real world is extremely labor and material intensive. To overcome this issue, we develop a physical screen-imaging Moiré simulation methodology to generate a synthetic dataset that covers the entire Moiré-visible area. Extensive experiments show that the proposed decryption network can achieve a low decryption latency (0.02 seconds) and a high decryption rate (98.8%), compared with the previous decryption method with decryption latency (5.4 seconds) and decryption rate (98.6%).
moir二维码是一种安全的加密二维码系统,可以保护用户在屏幕上显示的二维码不被攻击者访问。然而,传统的基于图像处理技术的解密方法在实际的移动应用中存在计算量大、解密延迟大的问题。在这项工作中,我们提出了一个基于深度学习的moir QR码解密框架,并取得了出色的解密性能。考虑到moir现象的敏感性,在现实世界中收集训练数据是非常劳动和材料密集的。为了克服这个问题,我们开发了一种物理屏幕成像moir模拟方法来生成覆盖整个moir可见区域的合成数据集。大量实验表明,与之前解密延迟(5.4秒)和解密率(98.6%)的解密方法相比,本文提出的解密网络具有较低的解密延迟(0.02秒)和较高的解密率(98.8%)。
{"title":"Effectively Learning Moiré QR Code Decryption from Simulated Data","authors":"Yu Lu, Hao Pan, Feitong Tan, Yi-Chao Chen, Jiadi Yu, Jinghai He, Guangtao Xue","doi":"10.1109/INFOCOM53939.2023.10229000","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229000","url":null,"abstract":"Moiré QR Code is a secure encrypted QR code system that can protect the user’s QR code displayed on the screen from being accessed by attackers. However, conventional decryption methods based on image processing techniques suffer from intensive computation and significant decryption latency in practical mobile applications. In this work, we propose a deep learning-based Moiré QR code decryption framework and achieve an excellent decryption performance. Considering the sensitivity of the Moiré phenomenon, collecting training data in the real world is extremely labor and material intensive. To overcome this issue, we develop a physical screen-imaging Moiré simulation methodology to generate a synthetic dataset that covers the entire Moiré-visible area. Extensive experiments show that the proposed decryption network can achieve a low decryption latency (0.02 seconds) and a high decryption rate (98.8%), compared with the previous decryption method with decryption latency (5.4 seconds) and decryption rate (98.6%).","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117012956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Device Trust Bootstrapping Against Collaborative Signal Modification Attacks 针对协同信号修改攻击的安全设备信任引导
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229007
Xiaochan Xue, Shucheng Yu, Min Song
Bootstrapping security among wireless devices without prior-shared secrets is frequently demanded in emerging wireless and mobile applications. One promising approach for this problem is to utilize in-band physical-layer radio-frequency (RF) signals for authenticated key establishment because of the efficiency and high usability. However, existing in-band authenticated key agreement (AKA) protocols are mostly vulnerable to Man-in-the-Middle (MitM) attacks, which can be launched by modifying the transmitted wireless signals over the air. By annihilating legitimate signals and injecting malicious signals, signal modification attackers are able to completely control the communication channels and spoof victim wireless devices. State-of-the-art (SOTA) techniques addressing such attacks require additional auxiliary hardware or are limited to single attackers. This paper proposes a novel in-band security bootstrapping technique that can thwart colluding signal modification attackers. Different from SOTA solutions, our design is compatible with commodity devices without requiring additional hardware. We achieve this based on the internal randomness of each device that is unpredictable to attackers. Any modification to RF signals will be detected with high probabilities. Extensive security analysis and experimentation on the USRP platform demonstrate the effectiveness of our design under various attack strategies.
在新兴的无线和移动应用中,没有先前共享秘密的无线设备之间的引导安全性经常被要求。利用带内物理层射频(RF)信号建立身份验证密钥是解决该问题的一种很有前途的方法,因为它效率高,可用性高。然而,现有的带内认证密钥协议(AKA)协议大多容易受到中间人(MitM)攻击,这种攻击可以通过修改空中传输的无线信号来发起。信号修改攻击者通过湮灭合法信号和注入恶意信号,可以完全控制通信信道并欺骗受害无线设备。处理此类攻击的最先进(SOTA)技术需要额外的辅助硬件,或者仅限于单个攻击者。提出了一种新的带内安全自举技术,可以有效地阻止串通信号修改攻击者。与SOTA解决方案不同,我们的设计与商品设备兼容,无需额外的硬件。我们基于攻击者无法预测的每个设备的内部随机性来实现这一点。对射频信号的任何修改都将以高概率被检测到。在USRP平台上进行的大量安全分析和实验证明了我们的设计在各种攻击策略下的有效性。
{"title":"Secure Device Trust Bootstrapping Against Collaborative Signal Modification Attacks","authors":"Xiaochan Xue, Shucheng Yu, Min Song","doi":"10.1109/INFOCOM53939.2023.10229007","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229007","url":null,"abstract":"Bootstrapping security among wireless devices without prior-shared secrets is frequently demanded in emerging wireless and mobile applications. One promising approach for this problem is to utilize in-band physical-layer radio-frequency (RF) signals for authenticated key establishment because of the efficiency and high usability. However, existing in-band authenticated key agreement (AKA) protocols are mostly vulnerable to Man-in-the-Middle (MitM) attacks, which can be launched by modifying the transmitted wireless signals over the air. By annihilating legitimate signals and injecting malicious signals, signal modification attackers are able to completely control the communication channels and spoof victim wireless devices. State-of-the-art (SOTA) techniques addressing such attacks require additional auxiliary hardware or are limited to single attackers. This paper proposes a novel in-band security bootstrapping technique that can thwart colluding signal modification attackers. Different from SOTA solutions, our design is compatible with commodity devices without requiring additional hardware. We achieve this based on the internal randomness of each device that is unpredictable to attackers. Any modification to RF signals will be detected with high probabilities. Extensive security analysis and experimentation on the USRP platform demonstrate the effectiveness of our design under various attack strategies.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115160523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoShield: Voice Liveness Detection with Sound Field Dynamics VoShield:声场动力学的声音活力检测
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229038
Qiang Yang, Kaiyan Cui, Yuanqing Zheng
Voice assistants are widely integrated into a variety of smart devices, enabling users to easily complete daily tasks and even critical operations like online transactions with voice commands. Thus, once attackers replay a secretly-recorded voice command by loudspeakers to compromise users’ voice assistants, this operation will cause serious consequences, such as information leakage and property loss. Unfortunately, most voice liveness detection approaches against replay attacks mainly rely on detecting lip motions or subtle physiological features in speech, which are limited within a very short range. In this paper, we propose VoShield to check whether a voice command is from a genuine user or a loudspeaker imposter. VoShield measures sound field dynamics, a feature that changes fast as the human mouths dynamically open and close. In contrast, it would remain rather stable for loudspeakers due to the fixed size. This feature enables VoShield to largely extend the working distance and remain resilient to user locations. Besides, sound field dynamics are extracted from the difference between multiple microphone channels, making this feature robust to voice volume. To evaluate VoShield, we conducted comprehensive experiments with various settings in different working scenarios. The results show that VoShield can achieve a detection accuracy of 98.2% and an Equal Error Rate of 2.0%, which serves as a promising complement to current voice authentication systems for smart devices.
语音助手被广泛集成到各种智能设备中,用户可以通过语音命令轻松完成日常任务,甚至是在线交易等关键操作。因此,一旦攻击者通过扬声器重放秘密录制的语音命令,破坏用户的语音助手,就会造成信息泄露和财产损失等严重后果。不幸的是,大多数针对重放攻击的语音活力检测方法主要依赖于检测语音中的嘴唇运动或微妙的生理特征,这些特征的范围很短。在本文中,我们提出了VoShield来检查语音命令是来自真实用户还是扬声器冒充者。VoShield测量声场动态,这是一种随着人类嘴巴动态张开和闭合而快速变化的特征。相比之下,由于扬声器的尺寸固定,它将保持相当稳定。该功能使VoShield能够在很大程度上延长工作距离,并保持对用户位置的弹性。此外,从多个传声器通道之间的差异中提取声场动态,使该特征对语音音量具有鲁棒性。为了评估VoShield,我们在不同的工作场景下进行了各种设置的综合实验。结果表明,VoShield的检测准确率为98.2%,平均错误率为2.0%,是对现有智能设备语音认证系统的有力补充。
{"title":"VoShield: Voice Liveness Detection with Sound Field Dynamics","authors":"Qiang Yang, Kaiyan Cui, Yuanqing Zheng","doi":"10.1109/INFOCOM53939.2023.10229038","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229038","url":null,"abstract":"Voice assistants are widely integrated into a variety of smart devices, enabling users to easily complete daily tasks and even critical operations like online transactions with voice commands. Thus, once attackers replay a secretly-recorded voice command by loudspeakers to compromise users’ voice assistants, this operation will cause serious consequences, such as information leakage and property loss. Unfortunately, most voice liveness detection approaches against replay attacks mainly rely on detecting lip motions or subtle physiological features in speech, which are limited within a very short range. In this paper, we propose VoShield to check whether a voice command is from a genuine user or a loudspeaker imposter. VoShield measures sound field dynamics, a feature that changes fast as the human mouths dynamically open and close. In contrast, it would remain rather stable for loudspeakers due to the fixed size. This feature enables VoShield to largely extend the working distance and remain resilient to user locations. Besides, sound field dynamics are extracted from the difference between multiple microphone channels, making this feature robust to voice volume. To evaluate VoShield, we conducted comprehensive experiments with various settings in different working scenarios. The results show that VoShield can achieve a detection accuracy of 98.2% and an Equal Error Rate of 2.0%, which serves as a promising complement to current voice authentication systems for smart devices.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RED: Distributed Program Deployment for Resource-aware Programmable Switches RED:资源感知可编程交换机的分布式程序部署
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228974
Xingxin Jia, Fuliang Li, Songlin Chen, Chengxi Gao, Pengfei Wang, Xingwei Wang
Programmable switches allow data plane to program how packets are processed, which enables flexibility for network management tasks, e.g., packet scheduling and flow measurement. Existing studies focus on program deployment at a single switch, while deployment across the whole data plane is still a challenging issue. In this paper, we present RED, a Resource-Efficient and Distributed program deployment solution for programmable switches. First of all, we compile the data plane programs to estimate the resource utilization and divide them into two categories for further processing. Then, the proposed merging and splitting algorithms are selectively applied to merge or split the pending programs. Finally, we consolidate the scarce resources of the whole data plane to deploy the programs. Extensive experiment results show that 1) RED improves the speedup by two orders of magnitude compared to P4Visor and merges 58.64% more nodes than SPEED; 2) RED makes the overwhelmed programs run normally at a single switch and reduces 3% latency of inter-device scheduling; 3) RED achieves network-wide resource balancing in a distributed way.
可编程交换机允许数据平面对数据包的处理方式进行编程,从而为网络管理任务提供灵活性,例如数据包调度和流量测量。现有的研究主要集中在单个交换机上的程序部署,而跨整个数据平面的部署仍然是一个具有挑战性的问题。在本文中,我们提出了RED,一个资源高效和分布式程序部署解决方案的可编程交换机。首先,我们编制数据平面程序估算资源利用率,并将其分为两类进行进一步处理。然后,有选择地应用所提出的合并和分割算法对待处理程序进行合并或分割。最后,我们整合了整个数据平面的稀缺资源来部署程序。大量的实验结果表明:1)RED比P4Visor的速度提高了两个数量级,合并节点比SPEED多58.64%;2) RED使不堪重负的程序在单台交换机上正常运行,减少了3%的设备间调度延迟;3) RED以分布式方式实现全网范围的资源均衡。
{"title":"RED: Distributed Program Deployment for Resource-aware Programmable Switches","authors":"Xingxin Jia, Fuliang Li, Songlin Chen, Chengxi Gao, Pengfei Wang, Xingwei Wang","doi":"10.1109/INFOCOM53939.2023.10228974","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228974","url":null,"abstract":"Programmable switches allow data plane to program how packets are processed, which enables flexibility for network management tasks, e.g., packet scheduling and flow measurement. Existing studies focus on program deployment at a single switch, while deployment across the whole data plane is still a challenging issue. In this paper, we present RED, a Resource-Efficient and Distributed program deployment solution for programmable switches. First of all, we compile the data plane programs to estimate the resource utilization and divide them into two categories for further processing. Then, the proposed merging and splitting algorithms are selectively applied to merge or split the pending programs. Finally, we consolidate the scarce resources of the whole data plane to deploy the programs. Extensive experiment results show that 1) RED improves the speedup by two orders of magnitude compared to P4Visor and merges 58.64% more nodes than SPEED; 2) RED makes the overwhelmed programs run normally at a single switch and reduces 3% latency of inter-device scheduling; 3) RED achieves network-wide resource balancing in a distributed way.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124098172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Edge-centric Resource Provisioning for Online and Offline Services Co-location 在线和离线业务共置的动态边缘中心资源发放
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228949
Ouyang Tao, Kongyange Zhao, Xiaoxi Zhang, Zhi Zhou, Xu Chen
Due to the penetration of edge computing, a wide variety of workloads are sunk down to the network edge to alleviate huge pressure of the cloud. With the presence of high input workload dynamics and intensive edge resource contention, it is highly non-trivial for an edge proxy to optimize the scheduling of heterogeneous services with diverse QoS requirements. In general, online services should be quickly completed in a quite stable running environment to meet their tight latency constraint, while offline services can be processed in a loose manner for their elastic soft deadlines. To well coordinate such services at the resource-limited edge cluster, in this paper, we study an edge-centric resource provisioning optimization for dynamic online and offline services co-location, where the proxy seeks to maximize timely online service performances while maintaining satisfactory long-term offline service performances. However, intricate hybrid couplings for provisioning decisions arise due to heterogeneous constraints of the co-located services and their different time-scale performances. We hence first propose a reactive provisioning approach without requiring a prior knowledge of future system dynamics, which leverages a Lagrange relaxation for devising constraint-aware stochastic subgradient algorithm to deal with the challenge of hybrid couplings. To further boost the performance by integrating the powerful machine learning techniques, we also advocate a predictive provisioning approach, where the future request arrivals can be estimated accurately. With rigorous theoretical analysis and extensive trace-driven evaluations, we show the superior performance of our proposed algorithms for online and offline services co-location at the edge.
由于边缘计算的渗透,各种各样的工作负载被下沉到网络边缘,以减轻云的巨大压力。由于存在高输入动态工作负载和密集的边缘资源争用,对具有不同QoS需求的异构服务进行调度优化是一个非常重要的问题。一般来说,在线服务需要在一个相当稳定的运行环境中快速完成,以满足其严格的延迟约束,而离线服务由于具有弹性的软期限,可以以宽松的方式处理。为了在资源有限的边缘集群中很好地协调这些服务,本文研究了一种以边缘为中心的动态在线和离线服务协同配置的资源配置优化,其中代理寻求最大化及时的在线服务性能,同时保持令人满意的长期离线服务性能。然而,由于共存服务的异构约束及其不同的时间尺度性能,供应决策产生了复杂的混合耦合。因此,我们首先提出了一种不需要预先了解未来系统动力学的反应性供应方法,该方法利用拉格朗日松弛来设计约束感知的随机子梯度算法来处理混合耦合的挑战。为了通过集成强大的机器学习技术进一步提高性能,我们还提倡一种预测供应方法,可以准确地估计未来的请求到达。通过严格的理论分析和广泛的跟踪驱动评估,我们展示了我们提出的算法在边缘的在线和离线服务协同定位方面的卓越性能。
{"title":"Dynamic Edge-centric Resource Provisioning for Online and Offline Services Co-location","authors":"Ouyang Tao, Kongyange Zhao, Xiaoxi Zhang, Zhi Zhou, Xu Chen","doi":"10.1109/INFOCOM53939.2023.10228949","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228949","url":null,"abstract":"Due to the penetration of edge computing, a wide variety of workloads are sunk down to the network edge to alleviate huge pressure of the cloud. With the presence of high input workload dynamics and intensive edge resource contention, it is highly non-trivial for an edge proxy to optimize the scheduling of heterogeneous services with diverse QoS requirements. In general, online services should be quickly completed in a quite stable running environment to meet their tight latency constraint, while offline services can be processed in a loose manner for their elastic soft deadlines. To well coordinate such services at the resource-limited edge cluster, in this paper, we study an edge-centric resource provisioning optimization for dynamic online and offline services co-location, where the proxy seeks to maximize timely online service performances while maintaining satisfactory long-term offline service performances. However, intricate hybrid couplings for provisioning decisions arise due to heterogeneous constraints of the co-located services and their different time-scale performances. We hence first propose a reactive provisioning approach without requiring a prior knowledge of future system dynamics, which leverages a Lagrange relaxation for devising constraint-aware stochastic subgradient algorithm to deal with the challenge of hybrid couplings. To further boost the performance by integrating the powerful machine learning techniques, we also advocate a predictive provisioning approach, where the future request arrivals can be estimated accurately. With rigorous theoretical analysis and extensive trace-driven evaluations, we show the superior performance of our proposed algorithms for online and offline services co-location at the edge.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130936883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Streaming and Super Resolution Adaptation for Mobile Immersive Videos 移动沉浸式视频的协同流媒体和超分辨率适应
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228906
Lei Zhang, Haotian Guo, Yanjie Dong, Fang Wang, Laizhong Cui, Victor C. M. Leung
Tile-based streaming and super resolution are two representative technologies adopted to improve bandwidth efficiency of immersive video steaming. The former allows selective download of contents in the user viewport by splitting the video into multiple independently decodable tiles. The latter leverages client-side computation to reconstruct the received video into higher quality using advanced neural network models. In this work, we propose CASE, a collaborated adaptive streaming and enhancement framework for mobile immersive videos, which integrates super resolution with tile-based streaming to optimize user experience with dynamic bandwidth and limited computing capability. To coordinate the video transmission and reconstruction in CASE, we identify and address several key design issues including unified video quality assessment, computation complexity model for super resolution, and buffer analysis considering the interplay between transmission and reconstruction. We further formulate the quality-of-experience (QoE) maximization problem for mobile immersive video streaming and propose a rate adaptation algorithm to make the best decisions for download and for reconstruction based on the Lyapunov optimization theory. Extensive evaluation results validate the superiority of our proposed approach, which presents stable performance with considerable QoE improvement, while enabling trade-off between playback smoothness and video quality.
基于贴片的流媒体技术和超分辨率技术是提高沉浸式视频直播带宽效率的两种代表性技术。前者通过将视频分割成多个独立可解码的图像块,允许在用户视口中选择性地下载内容。后者利用客户端计算,利用先进的神经网络模型将接收到的视频重建为更高质量。在这项工作中,我们提出了CASE,这是一个用于移动沉浸式视频的自适应流媒体和增强框架,它将超分辨率与基于tile的流媒体集成在一起,以优化动态带宽和有限计算能力的用户体验。为了在CASE中协调视频传输和重建,我们确定并解决了几个关键的设计问题,包括统一的视频质量评估、超分辨率计算复杂度模型以及考虑传输和重建之间相互作用的缓冲区分析。我们进一步制定了移动沉浸式视频流的体验质量(QoE)最大化问题,并提出了一种基于Lyapunov优化理论的速率自适应算法,以做出下载和重建的最佳决策。广泛的评估结果验证了我们提出的方法的优越性,该方法具有稳定的性能和相当大的QoE改进,同时能够在播放平滑性和视频质量之间进行权衡。
{"title":"Collaborative Streaming and Super Resolution Adaptation for Mobile Immersive Videos","authors":"Lei Zhang, Haotian Guo, Yanjie Dong, Fang Wang, Laizhong Cui, Victor C. M. Leung","doi":"10.1109/INFOCOM53939.2023.10228906","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228906","url":null,"abstract":"Tile-based streaming and super resolution are two representative technologies adopted to improve bandwidth efficiency of immersive video steaming. The former allows selective download of contents in the user viewport by splitting the video into multiple independently decodable tiles. The latter leverages client-side computation to reconstruct the received video into higher quality using advanced neural network models. In this work, we propose CASE, a collaborated adaptive streaming and enhancement framework for mobile immersive videos, which integrates super resolution with tile-based streaming to optimize user experience with dynamic bandwidth and limited computing capability. To coordinate the video transmission and reconstruction in CASE, we identify and address several key design issues including unified video quality assessment, computation complexity model for super resolution, and buffer analysis considering the interplay between transmission and reconstruction. We further formulate the quality-of-experience (QoE) maximization problem for mobile immersive video streaming and propose a rate adaptation algorithm to make the best decisions for download and for reconstruction based on the Lyapunov optimization theory. Extensive evaluation results validate the superiority of our proposed approach, which presents stable performance with considerable QoE improvement, while enabling trade-off between playback smoothness and video quality.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128066081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Who is the Rising Star? Demystifying the Promising Streamers in Crowdsourced Live Streaming 谁是明日之星?揭秘众包直播中有前途的流媒体
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228881
Ruixiao Zhang, Tianchi Huang, Chen Wu, Lifeng Sun
Streamers are the core competency of the crowd-sourced live streaming (CLS) platform. However, little work has explored how different factors relate to their popularity evolution patterns. In this paper, we will investigate a critical problem, i.e., how to discover the promising streamers in their early stage? To tackle this problem, we first conduct large-scale measurement on a real-world CLS dataset. We find that streamers can indeed be clustered into two evolution types (i.e., rising type and normal type), and these two types of streamers will show differences in some inherent properties. Traditional time-sequential models cannot handle this problem, because they are unable to capture the complicated interactivity and extensive heterogeneity in CLS scenarios. To address their shortcomings, we further propose Niffler, a novel heterogeneous attention temporal graph framework (HATG) for predicting the evolution types of CLS streamers. Specifically, through the graph neural network (GNN) and gated-recurrent-unit (GRU) structure, Niffler can capture both the interactive features and the evolutionary dynamics. Moreover, by integrating the attention mechanism in the model design, Niffler can intelligently preserve the heterogeneity when learning different levels of node representations. We systematically compare Niffler against multiple baselines from different categories, and the experimental results show that our proposed model can achieve the best prediction performance.
流媒体是众包直播(CLS)平台的核心竞争力。然而,很少有研究探讨不同因素如何影响他们的受欢迎程度演变模式。在本文中,我们将探讨一个关键问题,即如何在早期发现有前途的流媒体?为了解决这个问题,我们首先在真实的CLS数据集上进行大规模测量。我们发现,流光确实可以聚为两种演化类型(即上升型和正常型),这两种类型的流光在某些固有性质上存在差异。传统的时间序列模型无法处理这个问题,因为它们无法捕捉CLS场景中复杂的交互性和广泛的异构性。为了解决它们的不足,我们进一步提出了一种新的异质注意时间图框架(HATG) Niffler,用于预测CLS streamer的进化类型。具体来说,通过图神经网络(GNN)和门控递归单元(GRU)结构,嗅嗅既能捕捉到交互特征,又能捕捉到进化动态。此外,通过在模型设计中集成注意机制,嗅嗅可以在学习不同层次节点表示时智能地保持异构性。我们将Niffler与来自不同类别的多个基线进行了系统的比较,实验结果表明,我们提出的模型能够达到最佳的预测性能。
{"title":"Who is the Rising Star? Demystifying the Promising Streamers in Crowdsourced Live Streaming","authors":"Ruixiao Zhang, Tianchi Huang, Chen Wu, Lifeng Sun","doi":"10.1109/INFOCOM53939.2023.10228881","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228881","url":null,"abstract":"Streamers are the core competency of the crowd-sourced live streaming (CLS) platform. However, little work has explored how different factors relate to their popularity evolution patterns. In this paper, we will investigate a critical problem, i.e., how to discover the promising streamers in their early stage? To tackle this problem, we first conduct large-scale measurement on a real-world CLS dataset. We find that streamers can indeed be clustered into two evolution types (i.e., rising type and normal type), and these two types of streamers will show differences in some inherent properties. Traditional time-sequential models cannot handle this problem, because they are unable to capture the complicated interactivity and extensive heterogeneity in CLS scenarios. To address their shortcomings, we further propose Niffler, a novel heterogeneous attention temporal graph framework (HATG) for predicting the evolution types of CLS streamers. Specifically, through the graph neural network (GNN) and gated-recurrent-unit (GRU) structure, Niffler can capture both the interactive features and the evolutionary dynamics. Moreover, by integrating the attention mechanism in the model design, Niffler can intelligently preserve the heterogeneity when learning different levels of node representations. We systematically compare Niffler against multiple baselines from different categories, and the experimental results show that our proposed model can achieve the best prediction performance.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126841734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast and Exact Evaluation Algorithm for the Expected Number of Connected Nodes: an Enhanced Network Reliability Measure 一种快速准确的期望连接节点数评估算法:一种增强的网络可靠性度量
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228897
Kengo Nakamura, Takeru Inoue, Masaaki Nishino, Norihito Yasuda, S. Minato
Contemporary society survives on several network infrastructures, such as communication and transportation. These network infrastructures are required to keep all nodes connected, although these nodes are occasionally disconnected due to failures. Thus, the expected number of connected node pairs (ECP) during an operation period is a reasonable reliability measure in network design. However, no work has studied ECP due to its computational hardness; we have to solve the reliability evaluation problem, which is a computationally tough problem, for O(n2) times where n is the number of nodes in a network. This paper proposes an efficient method that exactly computes ECP. Our method performs dynamic programming just once without explicit repetition for each node pair and obtains an exact ECP value weighted by the number of users at each node. A thorough complexity analysis reveals that our method is faster than an existing reliability evaluation method, which can be transferred to ECP computation, by O(n). Numerical experiments using real topologies show great efficiency; e.g., our method computes the ECP of an 821-link network in ten seconds; the existing method cannot complete it in an hour. This paper also presents two applications: critical link identification and optimal resource (e.g., a server) placement.
当代社会的生存依赖于几个网络基础设施,如通信和交通。这些网络基础设施需要保持所有节点的连接,尽管这些节点偶尔会由于故障而断开连接。因此,在一个运行周期内的预期连接节点对数(ECP)是网络设计中合理的可靠性度量。然而,由于ECP的计算硬度,尚无研究工作;我们需要解决O(n2)次的可靠性评估问题,这是一个计算困难的问题,其中n是网络中的节点数。本文提出了一种精确计算ECP的有效方法。该方法对每个节点对只执行一次动态规划,无需显式重复,并获得每个节点上用户数量加权的精确ECP值。通过全面的复杂性分析表明,该方法比现有的可靠性评估方法(可转换为ECP计算)快0 (n)。利用实际拓扑进行的数值实验表明,该方法具有较高的效率;例如,我们的方法在10秒内计算821链路网络的ECP;现有的方法无法在一小时内完成。本文还介绍了两个应用:关键链接识别和最优资源(例如,服务器)放置。
{"title":"A Fast and Exact Evaluation Algorithm for the Expected Number of Connected Nodes: an Enhanced Network Reliability Measure","authors":"Kengo Nakamura, Takeru Inoue, Masaaki Nishino, Norihito Yasuda, S. Minato","doi":"10.1109/INFOCOM53939.2023.10228897","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228897","url":null,"abstract":"Contemporary society survives on several network infrastructures, such as communication and transportation. These network infrastructures are required to keep all nodes connected, although these nodes are occasionally disconnected due to failures. Thus, the expected number of connected node pairs (ECP) during an operation period is a reasonable reliability measure in network design. However, no work has studied ECP due to its computational hardness; we have to solve the reliability evaluation problem, which is a computationally tough problem, for O(n2) times where n is the number of nodes in a network. This paper proposes an efficient method that exactly computes ECP. Our method performs dynamic programming just once without explicit repetition for each node pair and obtains an exact ECP value weighted by the number of users at each node. A thorough complexity analysis reveals that our method is faster than an existing reliability evaluation method, which can be transferred to ECP computation, by O(n). Numerical experiments using real topologies show great efficiency; e.g., our method computes the ECP of an 821-link network in ten seconds; the existing method cannot complete it in an hour. This paper also presents two applications: critical link identification and optimal resource (e.g., a server) placement.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Argosleep: Monitoring Sleep Posture from Commodity Millimeter-Wave Devices Argosleep:从商用毫米波设备监测睡眠姿势
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10228913
Aakriti Adhikari, Sanjib Sur
We propose Argosleep, a millimeter-wave (mmWave) wireless sensors based sleep posture monitoring system that predicts the 3D location of body joints of a person during sleep. Argosleep leverages deep learning models and knowledge of human anatomical features to solve challenges with low-resolution, specularity, and aliasing in existing mmWave devices. Argosleep builds the model by learning the relationship between mmWave reflected signals and body postures from thousands of existing samples. Since practical sleep also involves sudden toss-turns, which could introduce errors in posture prediction, Argosleep designs a state machine based on the reflected signals to classify the sleeping states into rest or toss-turn, and predict the posture only during the rest states. We evaluate Argosleep with real data collected from COTS mmWave devices for 8 volunteers of diverse ages, gender, and height performing different sleep postures. We observe that Argosleep identifies the toss-turn events accurately and predicts 3D location of body joints with accuracy on par with the existing vision-based system, unlocking the potential of mmWave systems for privacy-noninvasive at-home healthcare applications.
我们提出了Argosleep,这是一个基于毫米波(mmWave)无线传感器的睡眠姿势监测系统,可以预测人在睡眠期间身体关节的3D位置。Argosleep利用深度学习模型和人体解剖特征知识来解决现有毫米波设备中的低分辨率、镜面和混叠问题。Argosleep通过从数千个现有样本中学习毫米波反射信号和身体姿势之间的关系来建立模型。由于实际睡眠中也会出现突然的翻身,这可能会给姿势预测带来误差,因此Argosleep设计了一个基于反射信号的状态机,将睡眠状态分为休息状态和翻身状态,只在休息状态下预测姿势。我们使用COTS毫米波设备收集的真实数据对8名不同年龄、性别和身高的志愿者进行了不同的睡眠姿势评估Argosleep。我们观察到,Argosleep可以准确识别翻转事件,并预测身体关节的3D位置,其精度与现有的基于视觉的系统相当,从而释放了毫米波系统在隐私无创家庭医疗应用中的潜力。
{"title":"Argosleep: Monitoring Sleep Posture from Commodity Millimeter-Wave Devices","authors":"Aakriti Adhikari, Sanjib Sur","doi":"10.1109/INFOCOM53939.2023.10228913","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10228913","url":null,"abstract":"We propose Argosleep, a millimeter-wave (mmWave) wireless sensors based sleep posture monitoring system that predicts the 3D location of body joints of a person during sleep. Argosleep leverages deep learning models and knowledge of human anatomical features to solve challenges with low-resolution, specularity, and aliasing in existing mmWave devices. Argosleep builds the model by learning the relationship between mmWave reflected signals and body postures from thousands of existing samples. Since practical sleep also involves sudden toss-turns, which could introduce errors in posture prediction, Argosleep designs a state machine based on the reflected signals to classify the sleeping states into rest or toss-turn, and predict the posture only during the rest states. We evaluate Argosleep with real data collected from COTS mmWave devices for 8 volunteers of diverse ages, gender, and height performing different sleep postures. We observe that Argosleep identifies the toss-turn events accurately and predicts 3D location of body joints with accuracy on par with the existing vision-based system, unlocking the potential of mmWave systems for privacy-noninvasive at-home healthcare applications.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127166801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Middlebox Channel over TLS and its Resiliency against Middlebox Compromise 基于TLS的安全中间箱通道及其对中间箱妥协的弹性
Pub Date : 2023-05-17 DOI: 10.1109/INFOCOM53939.2023.10229081
Kentaro Kita, Junji Takemasa, Y. Koizumi, T. Hasegawa
A large portion of Internet traffic passes through middleboxes that read or modify messages. However, as more traffic is protected with TLS, middleboxes are becoming unable to provide their functions. To leverage middlebox functionality while preserving communication security, secure middlebox channel protocols have been designed as extensions of TLS. A key idea is that the endpoints explicitly incorporate middleboxes into the TLS handshake and grant each middlebox either the read or the write permission for their messages. Because each middlebox has the least data access privilege, these protocols are resilient against the compromise of a single middlebox. However, the existing studies have not comprehensively analyzed the communication security under the scenarios where multiple middleboxes are compromised. In this paper, we present novel attacks that break the security of the existing protocols under such scenarios and then modify maTLS, the state-of-the-art protocol, so that all the attacks are prevented with marginal overhead.
很大一部分互联网流量通过读取或修改消息的中间框。然而,随着越来越多的流量受到TLS的保护,中间盒正变得无法提供它们的功能。为了在保持通信安全性的同时利用中间盒功能,安全的中间盒通道协议被设计为TLS的扩展。一个关键思想是,端点显式地将中间层合并到TLS握手中,并授予每个中间层对其消息的读或写权限。由于每个中间盒具有最少的数据访问权限,因此这些协议具有抵御单个中间盒破坏的弹性。然而,现有的研究并没有全面分析多个中间盒被攻破情况下的通信安全问题。在本文中,我们提出了一种新的攻击方法,在这种情况下破坏现有协议的安全性,然后修改最先进的协议maTLS,以便以边际开销阻止所有攻击。
{"title":"Secure Middlebox Channel over TLS and its Resiliency against Middlebox Compromise","authors":"Kentaro Kita, Junji Takemasa, Y. Koizumi, T. Hasegawa","doi":"10.1109/INFOCOM53939.2023.10229081","DOIUrl":"https://doi.org/10.1109/INFOCOM53939.2023.10229081","url":null,"abstract":"A large portion of Internet traffic passes through middleboxes that read or modify messages. However, as more traffic is protected with TLS, middleboxes are becoming unable to provide their functions. To leverage middlebox functionality while preserving communication security, secure middlebox channel protocols have been designed as extensions of TLS. A key idea is that the endpoints explicitly incorporate middleboxes into the TLS handshake and grant each middlebox either the read or the write permission for their messages. Because each middlebox has the least data access privilege, these protocols are resilient against the compromise of a single middlebox. However, the existing studies have not comprehensively analyzed the communication security under the scenarios where multiple middleboxes are compromised. In this paper, we present novel attacks that break the security of the existing protocols under such scenarios and then modify maTLS, the state-of-the-art protocol, so that all the attacks are prevented with marginal overhead.","PeriodicalId":387707,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128958641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1