首页 > 最新文献

2022 IEEE World AI IoT Congress (AIIoT)最新文献

英文 中文
Towards A Lightweight Identity Management and Secure Authentication for IoT Using Blockchain 使用区块链实现物联网的轻量级身份管理和安全认证
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817349
Shereen S. Ismail, Diana W. Dawoud, H. Reza
Handling nodes identities and authentication is one of the current critical security challenges in an Internet of Things (IoT) environment, which consists of numerous devices with limited computation, communication, storage, and power capabilities. Motivated by the need to maintain trustworthiness in IoT networks to secure node-to-node or user-to-node communication, a blockchain-based identity management and secure authentication mechanism for a Wireless Sensor Network (WSN) scenario is proposed in this paper. The considered WSN is assumed to have three types of nodes: base station, cluster heads, and monitor nodes. The WSN is connected through the base station to the IoT cloud. The proposed system employs a private blockchain for internal authentication of cluster heads and monitor nodes, while a public blockchain is deployed between the base station and the IoT cloud to authenticate communication across different WSNs and end-users. Furthermore, a machine learning-based detection module is utilized to mitigate possible denial-of-service (DoS) attacks that may target cluster head nodes, raising the registration and authentication costs for monitor nodes within its vicinity and amplifying other blockchain attacks.
处理节点身份和身份验证是当前物联网(IoT)环境中关键的安全挑战之一,物联网环境由众多计算、通信、存储和电源能力有限的设备组成。出于维护物联网网络可信度以确保节点到节点或用户到节点通信安全的需要,本文提出了一种基于区块链的无线传感器网络(WSN)场景的身份管理和安全认证机制。假设所考虑的WSN具有三种类型的节点:基站、簇头和监视节点。WSN通过基站连接到物联网云。该系统采用私有区块链对集群头和监控节点进行内部认证,而在基站和物联网云之间部署公共区块链,对不同wsn和最终用户之间的通信进行认证。此外,基于机器学习的检测模块用于减轻可能针对簇头节点的拒绝服务(DoS)攻击,这会增加其附近监控节点的注册和认证成本,并放大其他区块链攻击。
{"title":"Towards A Lightweight Identity Management and Secure Authentication for IoT Using Blockchain","authors":"Shereen S. Ismail, Diana W. Dawoud, H. Reza","doi":"10.1109/aiiot54504.2022.9817349","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817349","url":null,"abstract":"Handling nodes identities and authentication is one of the current critical security challenges in an Internet of Things (IoT) environment, which consists of numerous devices with limited computation, communication, storage, and power capabilities. Motivated by the need to maintain trustworthiness in IoT networks to secure node-to-node or user-to-node communication, a blockchain-based identity management and secure authentication mechanism for a Wireless Sensor Network (WSN) scenario is proposed in this paper. The considered WSN is assumed to have three types of nodes: base station, cluster heads, and monitor nodes. The WSN is connected through the base station to the IoT cloud. The proposed system employs a private blockchain for internal authentication of cluster heads and monitor nodes, while a public blockchain is deployed between the base station and the IoT cloud to authenticate communication across different WSNs and end-users. Furthermore, a machine learning-based detection module is utilized to mitigate possible denial-of-service (DoS) attacks that may target cluster head nodes, raising the registration and authentication costs for monitor nodes within its vicinity and amplifying other blockchain attacks.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114406940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparative Study of Sha-256 Optimization Techniques Sha-256优化技术的比较研究
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817185
Bharat S. Rawal, Lingampally Shiva Kumar, Sriram Maganti, Varun Godha
A hash function is a useful one-way trap cryptographic algorithm that converts an input of any size to an output of a fixed length of bits based on the choice of the hash function. In this paper, we compared various hash optimization techniques to reduce extra hashes while mining cryptocurrencies. Also, we introduce the concept of higher performance by splitting the hashing tasks over various servers. In most exceptionally reliable systems, subsystem or module failures that do not affect a system failure can still worsen system performance. The split system approach introduces a more effective way of offering reliability in a distributed system in general. To assess the system's reliability, this paper proposed a simple mathematical model that can capture the reliability of the system and higher throughput.
哈希函数是一种有用的单向陷阱加密算法,它根据选择的哈希函数将任意大小的输入转换为固定长度的比特输出。在本文中,我们比较了各种哈希优化技术,以减少挖掘加密货币时的额外哈希。此外,我们还通过将散列任务拆分到不同的服务器来引入更高性能的概念。在大多数异常可靠的系统中,子系统或模块故障不会影响系统故障,但仍然会使系统性能恶化。通常,分割系统方法为分布式系统提供了一种更有效的可靠性方法。为了评估系统的可靠性,本文提出了一个简单的数学模型,可以捕获系统的可靠性和更高的吞吐量。
{"title":"Comparative Study of Sha-256 Optimization Techniques","authors":"Bharat S. Rawal, Lingampally Shiva Kumar, Sriram Maganti, Varun Godha","doi":"10.1109/aiiot54504.2022.9817185","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817185","url":null,"abstract":"A hash function is a useful one-way trap cryptographic algorithm that converts an input of any size to an output of a fixed length of bits based on the choice of the hash function. In this paper, we compared various hash optimization techniques to reduce extra hashes while mining cryptocurrencies. Also, we introduce the concept of higher performance by splitting the hashing tasks over various servers. In most exceptionally reliable systems, subsystem or module failures that do not affect a system failure can still worsen system performance. The split system approach introduces a more effective way of offering reliability in a distributed system in general. To assess the system's reliability, this paper proposed a simple mathematical model that can capture the reliability of the system and higher throughput.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114583402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering and Classification Models For Student's Grit Detection in E-Learning 网络学习中学生粗粒检测的聚类与分类模型
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817177
R. R. Maaliw, K. Quing, Julie Ann B. Susa, Jed Frank S. Maraueses, A. Lagman, Rossana Adao, Ma.Corazon Fernando Raguro, Ranie B. Canlas
Grit plays a crucial role in determining high individual success more than intellectual talent alone. However, there is no existing literature that ventured into the trait identification in an e-learning environment. This study presents a comprehensive computational-driven strategy for detecting a learner's grit using machine learning. Empirical results show that DBSCAN and Random Forest models produce average accurate prediction consistency of 92.67% against the questionnaire method. Knowledge interpretation using feature importance and association mining quantifies perseverance and sustained interest as the most pressing component of grit. Correlational analysis reveals that grit has a weak connection with course grades (short-term goal) but demonstrates a strong positive association with professional achievement (long-term goal) and maturation. Collectively, our findings substantiate that breakthrough accomplishment is contingent not solely on cognitive ability but on constant interests and resilience.
在决定个人成功方面,毅力比智力本身更重要。然而,目前尚无文献对电子学习环境下的特征识别进行研究。本研究提出了一种全面的计算驱动策略,用于使用机器学习来检测学习者的毅力。实证结果表明,DBSCAN和Random Forest模型相对于问卷法的预测准确率平均达到92.67%。使用特征重要性和关联挖掘的知识解释将毅力和持续兴趣量化为砂砾最紧迫的组成部分。相关分析表明,毅力与课程成绩(短期目标)的关系较弱,但与专业成就(长期目标)和成熟度的关系较强。总的来说,我们的研究结果证实,突破性的成就不仅取决于认知能力,还取决于持续的兴趣和适应能力。
{"title":"Clustering and Classification Models For Student's Grit Detection in E-Learning","authors":"R. R. Maaliw, K. Quing, Julie Ann B. Susa, Jed Frank S. Maraueses, A. Lagman, Rossana Adao, Ma.Corazon Fernando Raguro, Ranie B. Canlas","doi":"10.1109/aiiot54504.2022.9817177","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817177","url":null,"abstract":"Grit plays a crucial role in determining high individual success more than intellectual talent alone. However, there is no existing literature that ventured into the trait identification in an e-learning environment. This study presents a comprehensive computational-driven strategy for detecting a learner's grit using machine learning. Empirical results show that DBSCAN and Random Forest models produce average accurate prediction consistency of 92.67% against the questionnaire method. Knowledge interpretation using feature importance and association mining quantifies perseverance and sustained interest as the most pressing component of grit. Correlational analysis reveals that grit has a weak connection with course grades (short-term goal) but demonstrates a strong positive association with professional achievement (long-term goal) and maturation. Collectively, our findings substantiate that breakthrough accomplishment is contingent not solely on cognitive ability but on constant interests and resilience.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116397925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Salted Egg Cleaning and Grading System Using Machine Vision 基于机器视觉的咸蛋清洗分级系统
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817366
Laily Mariz A. Bengua, Vanessa Jane D. De Guzman, Danica Mae S. Macunat, Efren D. Villaverde, Aubee T. Mahusay, R. R. Maaliw, A. Lagman, A. Alon
The electro-mechanical salted egg grading system was developed to support producers by streamlining the cleaning process, delivering a sorted outcome, saving time, decrease human resources needs, labor costs, and minimized egg breakage, consequently boosting production efficiency. OpenCV (Open Source Computer Vision Library) was employed as a development platform and the Raspberry Pi 3 Model B as a microcomputer due to its speedier and more powerful CPU, which is required to operate the system's components and process the acquired images for classification. In addition, a Raspberry Pi camera module V2 was employed to capture the images for scanning, LED bulb for candling, and an SG90 micro servo for sorting. Furthermore, we used B66 and B35 V-belts for the conveyor assembly. An induction motor of 0.125 horse power is used to rotate the conveyor assembly, a chain, and sprocket to reduce its speed. The researchers also used soft bristles brushes which are ideal for cleaning the eggshell. For cleansing, sprinklers were used along with the water PVC pipe that holds pressurized water of 30 psi. The camera's captured images are categorized as clean, dirty, well-pickled, and spoilt eggs. Empirical results exhibited that the detection accuracy achieved 96% and 93% for cleanliness and quality, respectively. It establishes the model and prototype's robustness in cleaning, sorting, and grading salted eggs.
开发电子机械咸蛋分级系统是为了支持生产者简化清洗过程,提供分类结果,节省时间,减少人力资源需求,劳动力成本,并最大限度地减少鸡蛋破损,从而提高生产效率。采用OpenCV (Open Source Computer Vision Library)作为开发平台,采用Raspberry Pi 3 Model B作为微机,因为其CPU速度更快,功能更强大,需要对系统的组件进行操作,并对采集到的图像进行分类处理。此外,采用树莓派V2摄像模块采集图像进行扫描,LED灯泡进行烛光照射,SG90微伺服进行分选。此外,我们使用B66和B35 v带的输送机组件。一台0.125马力的感应电动机用于旋转传送带组件、链条和链轮以降低其速度。研究人员还使用了软毛刷,这是清洁蛋壳的理想选择。为了清洁,洒水器和PVC水管一起使用,PVC水管可以容纳30 psi的加压水。相机拍摄的图像分为干净鸡蛋、脏鸡蛋、腌制鸡蛋和变质鸡蛋。实验结果表明,该方法在清洁度和质量方面的检测准确率分别达到96%和93%。建立了模型和原型在咸蛋清洗、分类和分级方面的稳健性。
{"title":"Salted Egg Cleaning and Grading System Using Machine Vision","authors":"Laily Mariz A. Bengua, Vanessa Jane D. De Guzman, Danica Mae S. Macunat, Efren D. Villaverde, Aubee T. Mahusay, R. R. Maaliw, A. Lagman, A. Alon","doi":"10.1109/aiiot54504.2022.9817366","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817366","url":null,"abstract":"The electro-mechanical salted egg grading system was developed to support producers by streamlining the cleaning process, delivering a sorted outcome, saving time, decrease human resources needs, labor costs, and minimized egg breakage, consequently boosting production efficiency. OpenCV (Open Source Computer Vision Library) was employed as a development platform and the Raspberry Pi 3 Model B as a microcomputer due to its speedier and more powerful CPU, which is required to operate the system's components and process the acquired images for classification. In addition, a Raspberry Pi camera module V2 was employed to capture the images for scanning, LED bulb for candling, and an SG90 micro servo for sorting. Furthermore, we used B66 and B35 V-belts for the conveyor assembly. An induction motor of 0.125 horse power is used to rotate the conveyor assembly, a chain, and sprocket to reduce its speed. The researchers also used soft bristles brushes which are ideal for cleaning the eggshell. For cleansing, sprinklers were used along with the water PVC pipe that holds pressurized water of 30 psi. The camera's captured images are categorized as clean, dirty, well-pickled, and spoilt eggs. Empirical results exhibited that the detection accuracy achieved 96% and 93% for cleanliness and quality, respectively. It establishes the model and prototype's robustness in cleaning, sorting, and grading salted eggs.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124040105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ADMSV - A Differential Machine Learning based Steering Controller for Smart Vehicles 基于差分机器学习的智能车辆转向控制器ADMSV
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817270
B. Abegaz
Electric power-assisted steering (EPAS) is a mechanism of using electric power to enhance the efficiency, performance, and reliability of steering operations in vehicles. In the modern-day fully-autonomous and semi-autonomous vehicles, the real-time operation of EPAS systems has challenges related to the unmodeled dynamics, irregularity of the system operation, and variable road conditions. In this paper, a machine learning-based control system (ADMSV) that incorporates motion-related inputs such as direction, velocity, and torque has been developed to optimize and improve the overall efficiency of electric power-assisted steering in intelligent vehicles. The proposed system is used to calculate numerous external inputs and generate steering-related outputs (angular velocity, angular difference, output torque) which could help supply the adequate amount of torque that helps the vehicle to maneuver the wheels more easily or comfortably depending on various road and driving conditions.
电动助力转向(EPAS)是一种利用电力来提高车辆转向操作效率、性能和可靠性的机制。在现代全自动和半自动驾驶汽车中,EPAS系统的实时运行面临着未建模的动力学、系统运行的不规则性和多变的道路条件等方面的挑战。本文开发了一种基于机器学习的控制系统(ADMSV),该系统集成了方向、速度和扭矩等运动相关输入,以优化和提高智能汽车电动助力转向的整体效率。该系统用于计算大量外部输入,并产生与转向相关的输出(角速度、角差、输出扭矩),这有助于提供足够的扭矩,帮助车辆根据各种道路和驾驶条件更轻松或舒适地操纵车轮。
{"title":"ADMSV - A Differential Machine Learning based Steering Controller for Smart Vehicles","authors":"B. Abegaz","doi":"10.1109/aiiot54504.2022.9817270","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817270","url":null,"abstract":"Electric power-assisted steering (EPAS) is a mechanism of using electric power to enhance the efficiency, performance, and reliability of steering operations in vehicles. In the modern-day fully-autonomous and semi-autonomous vehicles, the real-time operation of EPAS systems has challenges related to the unmodeled dynamics, irregularity of the system operation, and variable road conditions. In this paper, a machine learning-based control system (ADMSV) that incorporates motion-related inputs such as direction, velocity, and torque has been developed to optimize and improve the overall efficiency of electric power-assisted steering in intelligent vehicles. The proposed system is used to calculate numerous external inputs and generate steering-related outputs (angular velocity, angular difference, output torque) which could help supply the adequate amount of torque that helps the vehicle to maneuver the wheels more easily or comfortably depending on various road and driving conditions.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129530726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning-based System for Monitoring Social Distancing and Mask Wearing 基于机器学习的社交距离和口罩佩戴监测系统
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817273
Mohammed Faisal Naji, C. Joumaa, Yousef Alswailem, Abdulrahman Alobthni, Rayan Albusilan
Coronavirus is a large family of viruses known to cause diseases ranging from the common cold to more serious diseases, and the methods for controlling epidemics of such viruses are difficult to deal with. One of the most dangerous things about COVID-19 is the speed with which it spreads. Therefore, we introduced a smart machine Iearning-based system for monitoring social distancing and mask wearing. The proposed system is used to monitor people and identify those who violate the rules of mask wearing or do not observe social distancing. It will help to control the epidemic, reduce the spread of COVID-19 and stress the importance of social distancing. The experimental results of the proposed system illustrate its robustness and accuracy.
冠状病毒是一个已知的病毒大家庭,可以引起从普通感冒到更严重的疾病,控制这类病毒流行的方法很难处理。COVID-19最危险的事情之一是它的传播速度。因此,我们推出了基于智能机器学习的监测社交距离和口罩佩戴情况的系统。该系统用于监控人群,并识别那些违反戴口罩规则或不遵守社交距离的人。这将有助于控制疫情,减少COVID-19的传播,并强调保持社交距离的重要性。实验结果表明,该系统具有较好的鲁棒性和准确性。
{"title":"Machine Learning-based System for Monitoring Social Distancing and Mask Wearing","authors":"Mohammed Faisal Naji, C. Joumaa, Yousef Alswailem, Abdulrahman Alobthni, Rayan Albusilan","doi":"10.1109/aiiot54504.2022.9817273","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817273","url":null,"abstract":"Coronavirus is a large family of viruses known to cause diseases ranging from the common cold to more serious diseases, and the methods for controlling epidemics of such viruses are difficult to deal with. One of the most dangerous things about COVID-19 is the speed with which it spreads. Therefore, we introduced a smart machine Iearning-based system for monitoring social distancing and mask wearing. The proposed system is used to monitor people and identify those who violate the rules of mask wearing or do not observe social distancing. It will help to control the epidemic, reduce the spread of COVID-19 and stress the importance of social distancing. The experimental results of the proposed system illustrate its robustness and accuracy.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129883941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Intrusion Detection and Prevention Systems 入侵检测与防御系统综述
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817348
Tristan Erney, M. Chowdhury
Intrusion detection and prevention are necessary security measures for modern systems and networks which provide the services we use every day. This survey will attempt to provide a comprehensive overview on modern Intrusion Detection and Prevention Systems. Included will be a summarization of the literature which was studied from and sources which aide that research. The topics which are described within this survey involve implementing new Intrusion Detection and Prevention System (IDPS) architectures, methodologies, and polymerizing different technologies to create new methods of automated detection and prevention. Among these topics are implementations of Network IDPSs, creation of algorithms for Industrial Network Intrusion Detection Systems, generation of benchmark datasets for training Machine Learning models, creating new datasets for training Machine Learning models, using Neural Network models to create automated IDPSs, protecting Smart Grid technologies using IDPS, and implementing Intrusion Detection and Prevention tools using microcomputers.
入侵检测和防御是提供我们日常使用的服务的现代系统和网络的必要安全措施。本调查将试图对现代入侵检测和防御系统提供一个全面的概述。包括将被研究的文献和来源的摘要,这有助于该研究。本调查中描述的主题包括实施新的入侵检测和防御系统(IDPS)架构、方法,以及聚合不同的技术来创建新的自动化检测和防御方法。这些主题包括网络IDPS的实现、工业网络入侵检测系统算法的创建、训练机器学习模型的基准数据集的生成、训练机器学习模型的新数据集的创建、使用神经网络模型创建自动化IDPS、使用IDPS保护智能电网技术以及使用微型计算机实现入侵检测和防御工具。
{"title":"A Survey of Intrusion Detection and Prevention Systems","authors":"Tristan Erney, M. Chowdhury","doi":"10.1109/aiiot54504.2022.9817348","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817348","url":null,"abstract":"Intrusion detection and prevention are necessary security measures for modern systems and networks which provide the services we use every day. This survey will attempt to provide a comprehensive overview on modern Intrusion Detection and Prevention Systems. Included will be a summarization of the literature which was studied from and sources which aide that research. The topics which are described within this survey involve implementing new Intrusion Detection and Prevention System (IDPS) architectures, methodologies, and polymerizing different technologies to create new methods of automated detection and prevention. Among these topics are implementations of Network IDPSs, creation of algorithms for Industrial Network Intrusion Detection Systems, generation of benchmark datasets for training Machine Learning models, creating new datasets for training Machine Learning models, using Neural Network models to create automated IDPSs, protecting Smart Grid technologies using IDPS, and implementing Intrusion Detection and Prevention tools using microcomputers.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116681994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Major threats to the continued adoption of Artificial Intelligence in today's hyperconnected world 在当今高度互联的世界中,人工智能继续采用的主要威胁
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817247
Opeoluwa Tosin Eluwole, Segun Akande, O. Adegbola
From the golden era of science fiction which dates to the late 1930s, scientific and technological advances in artificial intelligence (AI), along with one of its key subsets, machine learning (ML) have been growing significantly, especially in recent years. In 2021 alone, notable feats included an AI program capable of creating images from seen or previously unseen textual captions, an AI model that effectively integrates computer vision and natural language processing, and a novel AI framework for diagnosing dementia in 24 hours with real-world feasibility underway amongst a host of other fascinating breakthroughs. This paper briefly delves into AI/ML and recaps some key essentials, covering AI and ML subfields, ML methods, industries where AI/ML finds relevance, key stages and the common technical challenges in ML development. Importantly, the paper shifts attention from the latter to underscore the duo of transparency and ethics in AI, highlighting specifically what these are and why they are important, subsequently positing a PESTEL (Political, Economic, Social, Technological, Environmental and Legal) framework for AI design, build and implementation. It is anticipated that the upshot of this would be the facilitation of continuous adoption and long-term sustainability of AI/ML.
自20世纪30年代末科幻小说的黄金时代以来,人工智能(AI)及其关键子集之一机器学习(ML)的科技进步一直在显著增长,尤其是近年来。仅在2021年,值得注意的成就包括一个能够从看到或以前未见过的文本标题中创建图像的人工智能程序,一个有效集成计算机视觉和自然语言处理的人工智能模型,以及一个在24小时内诊断痴呆症的新型人工智能框架,以及许多其他令人着迷的突破。本文简要探讨了AI/ML,并概述了一些关键要素,涵盖AI和ML子领域,ML方法,AI/ML相关的行业,关键阶段和ML开发中的常见技术挑战。重要的是,本文将注意力从后者转移到强调人工智能的透明度和道德,特别强调了这些是什么以及它们为什么重要,随后为人工智能的设计、构建和实施提出了一个PESTEL(政治、经济、社会、技术、环境和法律)框架。预计其结果将是促进AI/ML的持续采用和长期可持续性。
{"title":"Major threats to the continued adoption of Artificial Intelligence in today's hyperconnected world","authors":"Opeoluwa Tosin Eluwole, Segun Akande, O. Adegbola","doi":"10.1109/aiiot54504.2022.9817247","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817247","url":null,"abstract":"From the golden era of science fiction which dates to the late 1930s, scientific and technological advances in artificial intelligence (AI), along with one of its key subsets, machine learning (ML) have been growing significantly, especially in recent years. In 2021 alone, notable feats included an AI program capable of creating images from seen or previously unseen textual captions, an AI model that effectively integrates computer vision and natural language processing, and a novel AI framework for diagnosing dementia in 24 hours with real-world feasibility underway amongst a host of other fascinating breakthroughs. This paper briefly delves into AI/ML and recaps some key essentials, covering AI and ML subfields, ML methods, industries where AI/ML finds relevance, key stages and the common technical challenges in ML development. Importantly, the paper shifts attention from the latter to underscore the duo of transparency and ethics in AI, highlighting specifically what these are and why they are important, subsequently positing a PESTEL (Political, Economic, Social, Technological, Environmental and Legal) framework for AI design, build and implementation. It is anticipated that the upshot of this would be the facilitation of continuous adoption and long-term sustainability of AI/ML.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132657086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning Framework 探测针对现代电网的网络攻击:一个深度学习框架
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817309
E. Naderi, A. Asrari
Modern power and energy networks include a plethora of distributed control and monitoring equipment, exchanging data through information and communication technology (ICT). Hence, such networks are a combination of physical layers and cyber layers, classified as cyber-physical systems. Although smart power grids facilitate the task of automated system operation with less involvement of people in making decisions, they can be negatively affected by cyber threats targeting security systems. Among different types of cyberattacks, false data injection (FDI) attacks are more common since they are easier to be performed. Toward this end, this paper develops a deep learning framework to protect cyber-physical power systems against cyberattacks including but not limited to FDI attacks in both forms of false positive and false negative. The proposed detection mechanism takes advantage of long short-term memory (LSTM) and deep recurrent neural network (RNN) concurrently. Moreover, the developed hybrid detection framework is able to recognize potentially malicious activities occurring in the cyber layer of a typical power grid. To demonstrate the robust performance of the proposed approach in detecting different types of cyberattacks, it is applied on 1) the CIC-IDS2017 dataset to detect denial of service (DoS) and distributed DoS (DDoS) attacks and 2) a smart power grid in the transmission level to protect the system against FDI attacks. The obtained results confirm the effectiveness of the proposed artificial intelligence-based detection framework (e.g., detection rate of 99.46%) against different types of cyberattacks targeting modern power networks.
现代电力和能源网络包括大量的分布式控制和监测设备,通过信息和通信技术(ICT)交换数据。因此,这种网络是物理层和网络层的结合,被归类为网络物理系统。虽然智能电网促进了自动化系统运行的任务,减少了人们参与决策,但它们可能会受到针对安全系统的网络威胁的负面影响。在不同类型的网络攻击中,虚假数据注入(FDI)攻击更为常见,因为它们更容易实施。为此,本文开发了一个深度学习框架,以保护网络物理电力系统免受网络攻击,包括但不限于假阳性和假阴性两种形式的FDI攻击。该检测机制同时利用了长短期记忆(LSTM)和深度递归神经网络(RNN)。此外,所开发的混合检测框架能够识别发生在典型电网网络层的潜在恶意活动。为了证明所提出的方法在检测不同类型网络攻击方面的鲁棒性,该方法应用于1)CIC-IDS2017数据集来检测拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击,以及2)传输级别的智能电网来保护系统免受FDI攻击。所获得的结果证实了所提出的基于人工智能的检测框架(例如,检测率为99.46%)对针对现代电网的不同类型网络攻击的有效性。
{"title":"Toward Detecting Cyberattacks Targeting Modern Power Grids: A Deep Learning Framework","authors":"E. Naderi, A. Asrari","doi":"10.1109/aiiot54504.2022.9817309","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817309","url":null,"abstract":"Modern power and energy networks include a plethora of distributed control and monitoring equipment, exchanging data through information and communication technology (ICT). Hence, such networks are a combination of physical layers and cyber layers, classified as cyber-physical systems. Although smart power grids facilitate the task of automated system operation with less involvement of people in making decisions, they can be negatively affected by cyber threats targeting security systems. Among different types of cyberattacks, false data injection (FDI) attacks are more common since they are easier to be performed. Toward this end, this paper develops a deep learning framework to protect cyber-physical power systems against cyberattacks including but not limited to FDI attacks in both forms of false positive and false negative. The proposed detection mechanism takes advantage of long short-term memory (LSTM) and deep recurrent neural network (RNN) concurrently. Moreover, the developed hybrid detection framework is able to recognize potentially malicious activities occurring in the cyber layer of a typical power grid. To demonstrate the robust performance of the proposed approach in detecting different types of cyberattacks, it is applied on 1) the CIC-IDS2017 dataset to detect denial of service (DoS) and distributed DoS (DDoS) attacks and 2) a smart power grid in the transmission level to protect the system against FDI attacks. The obtained results confirm the effectiveness of the proposed artificial intelligence-based detection framework (e.g., detection rate of 99.46%) against different types of cyberattacks targeting modern power networks.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134634971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Automated Determination of Mushroom Edibility Using an Augmented Dataset 使用增强数据集的蘑菇可食性自动测定
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817321
S. Chawathe
This paper studies methods and datasets for automated classification of mushrooms as edible or poisonous based on easily observable properties such as colors, textures, and dimensions of mushroom parts. The focus is on data-intensive methods that build upon recent work that has led to an augmented database of mushroom features. This dataset is studied in detail with the goal of explicating properties and easing further use of the dataset by others. The merit of the database features for the classification task is quantified using several metrics. Results quantify the accuracy and efficiency of classification using all and only a few of the features.
本文研究了基于蘑菇部分的颜色、纹理和尺寸等易于观察的特性,对蘑菇进行可食用或有毒自动分类的方法和数据集。重点是建立在最近的工作基础上的数据密集型方法,这些工作导致了蘑菇特征的增强数据库。对该数据集进行了详细的研究,目的是解释数据集的属性并简化其他人对数据集的进一步使用。数据库特征对分类任务的优点使用几个指标进行量化。结果量化了使用所有或仅使用少数特征的分类的准确性和效率。
{"title":"Automated Determination of Mushroom Edibility Using an Augmented Dataset","authors":"S. Chawathe","doi":"10.1109/aiiot54504.2022.9817321","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817321","url":null,"abstract":"This paper studies methods and datasets for automated classification of mushrooms as edible or poisonous based on easily observable properties such as colors, textures, and dimensions of mushroom parts. The focus is on data-intensive methods that build upon recent work that has led to an augmented database of mushroom features. This dataset is studied in detail with the goal of explicating properties and easing further use of the dataset by others. The merit of the database features for the classification task is quantified using several metrics. Results quantify the accuracy and efficiency of classification using all and only a few of the features.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE World AI IoT Congress (AIIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1