首页 > 最新文献

2022 IEEE World AI IoT Congress (AIIoT)最新文献

英文 中文
Ensemble Reinforcement Learning Framework for Sum Rate Optimization in NOMA-UAV Network 基于集成强化学习框架的NOMA-UAV网络和速率优化
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817159
S. K. Mahmud, Yue Chen, K. K. Chai
In this work we present an ensemble reinforcement learning (ERL) framework comprising of deep-Q networks (DQNs). The aim is to optimize sum rate for non orthogonal multiple access unmanned aerial network (NOMA-UAV) network. Power in downlink (DL) and bandwidth allotment for a NOMA cluster is managed over fixed UAV trajectory. The environment is dynamic and quality of service (QoS) requirements are varying for each node on ground. A comparative analysis between conventional reinforcement learning (CRL) framework and proposed ensemble of ERL yields a performance gain in undermentioned metrics. The ERL achieves 20 percent performance gain in average sum rate and the gain in spectral efficiency is 2 percent, over conventional reinforcement learning framework with single DQN. It also achieves high performance over different UAV speeds in cumulative sum rate and device coverage.
在这项工作中,我们提出了一个由深度q网络(dqn)组成的集成强化学习(ERL)框架。目的是优化非正交多址无人机网络(NOMA-UAV)的和速率。在固定的无人机轨迹上管理NOMA集群的下行链路功率(DL)和带宽分配。环境是动态的,每个节点的服务质量(QoS)需求是不同的。传统的强化学习(CRL)框架和提出的ERL集成之间的比较分析在以下指标上产生了性能增益。与具有单个DQN的传统强化学习框架相比,ERL在平均和速率方面获得了20%的性能增益,在频谱效率方面获得了2%的增益。它也在累积和速率和设备覆盖上在不同UAV速度上达到高性能。
{"title":"Ensemble Reinforcement Learning Framework for Sum Rate Optimization in NOMA-UAV Network","authors":"S. K. Mahmud, Yue Chen, K. K. Chai","doi":"10.1109/aiiot54504.2022.9817159","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817159","url":null,"abstract":"In this work we present an ensemble reinforcement learning (ERL) framework comprising of deep-Q networks (DQNs). The aim is to optimize sum rate for non orthogonal multiple access unmanned aerial network (NOMA-UAV) network. Power in downlink (DL) and bandwidth allotment for a NOMA cluster is managed over fixed UAV trajectory. The environment is dynamic and quality of service (QoS) requirements are varying for each node on ground. A comparative analysis between conventional reinforcement learning (CRL) framework and proposed ensemble of ERL yields a performance gain in undermentioned metrics. The ERL achieves 20 percent performance gain in average sum rate and the gain in spectral efficiency is 2 percent, over conventional reinforcement learning framework with single DQN. It also achieves high performance over different UAV speeds in cumulative sum rate and device coverage.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132397382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of the primary attacks on IoMT Internet of Medical Things communications protocols IoMT医疗物联网通信协议主要攻击分析
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817252
Carlos Jose Martinez, S. Galmés
Technological evolution and the current situation in the world have given rise to new emerging realities in medicine, such as point-of-care diagnosis and individualized health service without limitations such as time and place. Thanks to IoMT, new forms of contact between healthcare providers and patients have been developed using the Internet. This research aims to analyze the security of IoMT communication protocols and their limitations. For this purpose, an exhaustive review of the literature on intelligent healthcare is performed because there are many articles published in indexed journals that have addressed these issues in recent years. This review involves a bibliometric analysis of the variables Protocols, Communication, and IoMT, which bases its search on Scopus to fulfill the objective. A total of 27 documents published during the period 2015–2020 were identified as 2019, the year in which the most significant record was achieved with 11 publications; it is also established that 51.9% of the identified documents are of type Journal Article 33.3 % Conference Articles. Next, this literature is analyzed, particularly those publications emphasizing the security measures of the protocols, their vulnerabilities, and the attacks to which IoMT implementations are subjected, to make known the position of different authors regarding the subject proposed in this document. Finally, future research directions are provided to further progress in constructing theories related to the topic studied.
技术的发展和世界的现状使医学领域出现了新的现实,例如即时诊断和不受时间和地点限制的个性化保健服务。多亏了IoMT,医疗保健提供者和患者之间的新联系形式已经通过互联网开发出来。本研究旨在分析物联网通信协议的安全性及其局限性。为此,我们对智能医疗保健的文献进行了详尽的回顾,因为近年来在索引期刊上发表了许多关于这些问题的文章。这篇综述包括对协议、通信和IoMT变量的文献计量学分析,它基于Scopus进行搜索以实现目标。2015-2020年期间发表的27份文件被确定为2019年,其中11份出版物达到了最重要的记录;51.9%的文献类型为期刊文章,33.3%为会议文章。接下来,对这些文献进行分析,特别是那些强调协议的安全措施,它们的漏洞和IoMT实现所遭受的攻击的出版物,以了解不同作者对本文中提出的主题的立场。最后,对未来的研究方向进行了展望,以进一步构建与本课题相关的理论。
{"title":"Analysis of the primary attacks on IoMT Internet of Medical Things communications protocols","authors":"Carlos Jose Martinez, S. Galmés","doi":"10.1109/aiiot54504.2022.9817252","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817252","url":null,"abstract":"Technological evolution and the current situation in the world have given rise to new emerging realities in medicine, such as point-of-care diagnosis and individualized health service without limitations such as time and place. Thanks to IoMT, new forms of contact between healthcare providers and patients have been developed using the Internet. This research aims to analyze the security of IoMT communication protocols and their limitations. For this purpose, an exhaustive review of the literature on intelligent healthcare is performed because there are many articles published in indexed journals that have addressed these issues in recent years. This review involves a bibliometric analysis of the variables Protocols, Communication, and IoMT, which bases its search on Scopus to fulfill the objective. A total of 27 documents published during the period 2015–2020 were identified as 2019, the year in which the most significant record was achieved with 11 publications; it is also established that 51.9% of the identified documents are of type Journal Article 33.3 % Conference Articles. Next, this literature is analyzed, particularly those publications emphasizing the security measures of the protocols, their vulnerabilities, and the attacks to which IoMT implementations are subjected, to make known the position of different authors regarding the subject proposed in this document. Finally, future research directions are provided to further progress in constructing theories related to the topic studied.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facial Detection in Low Light Environments Using OpenCV 使用OpenCV进行低光环境下的人脸检测
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817372
Christopher Le, Tauheed Khan Mohd
Detecting faces in low-light environments is an important new technology and have been under development for years. In surveillance, some security cameras with thermal technology can recognize humans based on the heat that the object radiates. However, with only thermal techniques, it is still challenging to recognize specific people. Recognizing human with heat vision makes it hard to tell the identity of the person with existing Computer Vision techniques such as CNN. In this research, we present a system to recognize human faces in a low-light environment by enhancing low-light images and applying facial detection to them. Another technique of image super-resolution will also be applied to enhance the quality of the images for better detection.
低光环境下的人脸检测是一项重要的新技术,已经发展了多年。在监控中,一些带有热成像技术的安全摄像头可以根据物体散发的热量来识别人类。然而,仅使用热成像技术,识别特定的人仍然具有挑战性。用热视觉识别人,很难用现有的计算机视觉技术(如CNN)来识别人的身份。在这项研究中,我们提出了一个在低光环境下识别人脸的系统,通过增强低光图像并对其进行人脸检测。另一种图像超分辨率技术也将被应用于提高图像质量,以便更好地检测。
{"title":"Facial Detection in Low Light Environments Using OpenCV","authors":"Christopher Le, Tauheed Khan Mohd","doi":"10.1109/aiiot54504.2022.9817372","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817372","url":null,"abstract":"Detecting faces in low-light environments is an important new technology and have been under development for years. In surveillance, some security cameras with thermal technology can recognize humans based on the heat that the object radiates. However, with only thermal techniques, it is still challenging to recognize specific people. Recognizing human with heat vision makes it hard to tell the identity of the person with existing Computer Vision techniques such as CNN. In this research, we present a system to recognize human faces in a low-light environment by enhancing low-light images and applying facial detection to them. Another technique of image super-resolution will also be applied to enhance the quality of the images for better detection.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"48 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114044062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Semantic Textual Similarity between Requirement Specification and Use Case Description Using WUP Method (Case Study: Sipjabs Application) 使用WUP方法实现需求说明和用例描述之间的语义文本相似性(案例研究:sipjab应用程序)
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817311
Elsa Jelista Sari, Y. Priyadi, Rosa Reska Riskiana
The SRS used in this study is an application called “Sipjabs”. This application processes data regarding the position of human resources to meet the needs of a company. This research aims to implement semantic textual similarity in software requirements specification through functional requirements with use case diagrams using the Wu Palmer (WUP) method in finding semantics. This research method is presented in a flow chart consisting of three main activities: research object analysis, semantic textual similarity, and validity and reliability testing. In this research, an extraction process for the Requirement Specification has been produced, divided into five documents: FR01, FR02, FR03, FR04, FR05. Then the steps performed in the use case description are divided into UD01, UD02, UD03, UD04, UD05. The highest similarity value is found in documents UD03 and FR03, where the number of similarities is 0.626640. In addition, the highest score of the sentence that has been calculated using the Wu Palmer concept is 0.8000, which is found in the words “page” and “user”. The highest kappa value with Gwet's AC1 formula is 0.02547770700636931, which means “Fair Agreement”. For the results of the calculation of the questionnaire filled in by the expert, namely 0.82022, which means “Almost Perfect”.
本研究中使用的SRS是一款名为“sipjab”的应用程序。此应用程序处理有关人力资源职位的数据,以满足公司的需求。本研究旨在利用WUP (Wu Palmer)方法寻找语义,通过功能需求与用例图实现软件需求规范中的语义文本相似性。该研究方法以流程图的形式呈现,包括三个主要活动:研究对象分析、语义文本相似度和效度和信度检验。在本研究中,产生了需求说明书的提取过程,分为五个文件:FR01、FR02、FR03、FR04、FR05。然后将用例描述中执行的步骤划分为UD01、UD02、UD03、UD04、UD05。文档UD03和FR03相似度最高,相似度为0.626640。此外,使用Wu Palmer概念计算出的句子的最高分为0.8000,出现在“page”和“user”这两个词中。Gwet的AC1公式kappa值最高为0.02547770700636931,即“公平协议”。对于专家填写的问卷的计算结果,即0.82022,代表“几乎完美”。
{"title":"Implementation of Semantic Textual Similarity between Requirement Specification and Use Case Description Using WUP Method (Case Study: Sipjabs Application)","authors":"Elsa Jelista Sari, Y. Priyadi, Rosa Reska Riskiana","doi":"10.1109/aiiot54504.2022.9817311","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817311","url":null,"abstract":"The SRS used in this study is an application called “Sipjabs”. This application processes data regarding the position of human resources to meet the needs of a company. This research aims to implement semantic textual similarity in software requirements specification through functional requirements with use case diagrams using the Wu Palmer (WUP) method in finding semantics. This research method is presented in a flow chart consisting of three main activities: research object analysis, semantic textual similarity, and validity and reliability testing. In this research, an extraction process for the Requirement Specification has been produced, divided into five documents: FR01, FR02, FR03, FR04, FR05. Then the steps performed in the use case description are divided into UD01, UD02, UD03, UD04, UD05. The highest similarity value is found in documents UD03 and FR03, where the number of similarities is 0.626640. In addition, the highest score of the sentence that has been calculated using the Wu Palmer concept is 0.8000, which is found in the words “page” and “user”. The highest kappa value with Gwet's AC1 formula is 0.02547770700636931, which means “Fair Agreement”. For the results of the calculation of the questionnaire filled in by the expert, namely 0.82022, which means “Almost Perfect”.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach 使用软Actor评论家q -学习方法的中间人攻击雾计算解释器
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817151
Bhargavi Krishnamurthy, S. Shiva
Because of exponential growth in the availability of large number of Internet of Things (IoT) devices there is an increase in the latency of IoT applications that is managed by performing computation on edge devices/fog nodes. Man-in-the-Middle (MitM) attack is very much common in fog computing as the Fog computing architecture is vulnerable to MitM attack because of the positioning of fog nodes between cloud and end devices. Several machine learning approaches are designed and developed in literature for detection of MitM attacks in fog computing but they lack interpretability/explainability feature. In this paper a novel interpretable Q-learning algorithm with soft actor critic approach is designed for detecting MitM attacks in Fog computing with proper reasoning. Entropy regularized reinforcement learning is performed at each time step which prevents the loss during of every Q-function during approximation of the target. The attack detection policies formulated are of high quality as it satisfies the quality assurance metrics of robustness and correctness the conduct of the proposed interpretable Q-learning framework is encouraging towards the metrics like latency, attack detection time, energy consumption, and accuracy.
由于大量物联网(IoT)设备的可用性呈指数级增长,通过在边缘设备/雾节点上执行计算来管理的物联网应用程序的延迟增加。中间人攻击(Man-in-the-Middle, MitM)在雾计算中非常常见,因为雾节点位于云和终端设备之间,因此雾计算架构容易受到中间人攻击。文献中设计和开发了几种机器学习方法来检测雾计算中的MitM攻击,但它们缺乏可解释性/可解释性特征。针对雾计算中的MitM攻击检测问题,设计了一种基于软行为者评价方法的可解释q学习算法。在每个时间步进行熵正则化强化学习,防止了在逼近目标过程中每个q函数的损失。所制定的攻击检测策略是高质量的,因为它满足鲁棒性和正确性的质量保证指标。所提出的可解释q -学习框架的行为对延迟、攻击检测时间、能耗和准确性等指标是令人鼓舞的。
{"title":"Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach","authors":"Bhargavi Krishnamurthy, S. Shiva","doi":"10.1109/aiiot54504.2022.9817151","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817151","url":null,"abstract":"Because of exponential growth in the availability of large number of Internet of Things (IoT) devices there is an increase in the latency of IoT applications that is managed by performing computation on edge devices/fog nodes. Man-in-the-Middle (MitM) attack is very much common in fog computing as the Fog computing architecture is vulnerable to MitM attack because of the positioning of fog nodes between cloud and end devices. Several machine learning approaches are designed and developed in literature for detection of MitM attacks in fog computing but they lack interpretability/explainability feature. In this paper a novel interpretable Q-learning algorithm with soft actor critic approach is designed for detecting MitM attacks in Fog computing with proper reasoning. Entropy regularized reinforcement learning is performed at each time step which prevents the loss during of every Q-function during approximation of the target. The attack detection policies formulated are of high quality as it satisfies the quality assurance metrics of robustness and correctness the conduct of the proposed interpretable Q-learning framework is encouraging towards the metrics like latency, attack detection time, energy consumption, and accuracy.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121773415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. Corporations 与F(M)相关的物联网隐私、信任和安全泄露事件分类。公司
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817225
Joseph Squillace, May Bantan
Advancements in technology have brought with it widespread use and utilization of the lnternet-of-Things (IoT); a catch-all moniker identifying the collection of eclectic hardware and software mediums connecting people with small electronic computing and monitoring devices, such as SMART products: television, thermostat, speaker, refrigerator, etc. As personal IoT adaptation has grown in parallel with IoT home integration, so too have IoT concerns related to Privacy, Trust, and the Security risks associated with individual end-user protection, especially from IoT devices linked to Facebook (Meta) (F), Apple (A), Amazon (A), Netflix (N), and Google (G); conversationally identifiable as F(M).A.A.N.G. corporations. As a result, the list of IoT threats, security weaknesses, and vulnerabilities has grown exponentially. Nefarious actors have taken advantage of this growing technology, reaching into homes and offices far beyond established limits set by end-users. This research will use a multiple case study approach to analyze IoT security breach events to identify current Privacy, Trust, and Security risks to end-users associated with IoT devices. Furthermore, this research will also utilize security behavioral research by Anderson and Agarwal to introduce a Safe Computing Practices Model (SCPM) that can be implemented by end-users when integrating IoT devices.
技术的进步带来了物联网(IoT)的广泛使用和利用;一个笼统的称呼,指的是将人与小型电子计算和监控设备连接起来的各种硬件和软件媒介的集合,如智能产品:电视、恒温器、扬声器、冰箱等。随着个人物联网适应与物联网家庭集成同步增长,与隐私、信任和与个人最终用户保护相关的安全风险相关的物联网问题也在增加,特别是与Facebook (Meta) (F)、苹果(A)、亚马逊(A)、Netflix (N)和谷歌(G)相关的物联网设备;谈话中可识别为F(M). a.a.n.g。公司。因此,物联网威胁、安全弱点和漏洞的清单呈指数级增长。不法分子利用这种不断发展的技术,进入家庭和办公室,远远超出了最终用户设定的限制。本研究将使用多案例研究方法来分析物联网安全漏洞事件,以确定与物联网设备相关的最终用户当前面临的隐私、信任和安全风险。此外,本研究还将利用Anderson和Agarwal的安全行为研究来引入安全计算实践模型(SCPM),该模型可由最终用户在集成物联网设备时实施。
{"title":"A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. Corporations","authors":"Joseph Squillace, May Bantan","doi":"10.1109/aiiot54504.2022.9817225","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817225","url":null,"abstract":"Advancements in technology have brought with it widespread use and utilization of the lnternet-of-Things (IoT); a catch-all moniker identifying the collection of eclectic hardware and software mediums connecting people with small electronic computing and monitoring devices, such as SMART products: television, thermostat, speaker, refrigerator, etc. As personal IoT adaptation has grown in parallel with IoT home integration, so too have IoT concerns related to Privacy, Trust, and the Security risks associated with individual end-user protection, especially from IoT devices linked to Facebook (Meta) (F), Apple (A), Amazon (A), Netflix (N), and Google (G); conversationally identifiable as F(M).A.A.N.G. corporations. As a result, the list of IoT threats, security weaknesses, and vulnerabilities has grown exponentially. Nefarious actors have taken advantage of this growing technology, reaching into homes and offices far beyond established limits set by end-users. This research will use a multiple case study approach to analyze IoT security breach events to identify current Privacy, Trust, and Security risks to end-users associated with IoT devices. Furthermore, this research will also utilize security behavioral research by Anderson and Agarwal to introduce a Safe Computing Practices Model (SCPM) that can be implemented by end-users when integrating IoT devices.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft 蛮力攻击T-Mobile导致sim卡劫持和身份盗窃的研究
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817175
Christopher Faircloth, Gavin Hartzell, Nathan Callahan, S. Bhunia
The 2021 T-Mobile breach conducted by John Erin Binns resulted in the theft of 54 million customers' personal data. The attacker gained entry into T-Mobile's systems through an unprotected router and used brute force techniques to access the sensitive information stored on the internal servers. The data stolen included names, addresses, Social Security Numbers, birthdays, driver's license numbers, ID information, IMEIs, and IMSIs. We analyze the data breach and how it opens the door to identity theft and many other forms of hacking such as SIM Hijacking. SIM Hijacking is a form of hacking in which bad actors can take control of a victim's phone number allowing them means to bypass additional safety measures currently in place to prevent fraud. This paper thoroughly reviews the attack methodology, impact, and attempts to provide an understanding of important measures and possible defense solutions against future attacks. We also detail other social engineering attacks that can be incurred from releasing the leaked data.
2021年,约翰·艾琳·宾斯(John Erin Binns)对T-Mobile进行了入侵,导致5400万客户的个人数据被盗。攻击者通过未受保护的路由器进入T-Mobile的系统,并使用暴力破解技术访问存储在内部服务器上的敏感信息。被盗的数据包括姓名、地址、社会安全号码、生日、驾照号码、身份证信息、imei和imsi。我们分析了数据泄露,以及它如何为身份盗窃和许多其他形式的黑客行为(如SIM卡劫持)打开大门。SIM卡劫持是一种黑客行为,坏人可以控制受害者的电话号码,从而绕过目前为防止欺诈而采取的额外安全措施。本文全面回顾了攻击方法、影响,并试图提供对未来攻击的重要措施和可能的防御解决方案的理解。我们还详细介绍了释放泄露数据可能引发的其他社会工程攻击。
{"title":"A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft","authors":"Christopher Faircloth, Gavin Hartzell, Nathan Callahan, S. Bhunia","doi":"10.1109/aiiot54504.2022.9817175","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817175","url":null,"abstract":"The 2021 T-Mobile breach conducted by John Erin Binns resulted in the theft of 54 million customers' personal data. The attacker gained entry into T-Mobile's systems through an unprotected router and used brute force techniques to access the sensitive information stored on the internal servers. The data stolen included names, addresses, Social Security Numbers, birthdays, driver's license numbers, ID information, IMEIs, and IMSIs. We analyze the data breach and how it opens the door to identity theft and many other forms of hacking such as SIM Hijacking. SIM Hijacking is a form of hacking in which bad actors can take control of a victim's phone number allowing them means to bypass additional safety measures currently in place to prevent fraud. This paper thoroughly reviews the attack methodology, impact, and attempts to provide an understanding of important measures and possible defense solutions against future attacks. We also detail other social engineering attacks that can be incurred from releasing the leaked data.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129954984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of Task Performance and User Satisfaction Between Holographic and Standard QWERTY Keyboard 全息和标准QWERTY键盘的任务性能和用户满意度比较
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817288
Talha Hassan, Tauheed Khan Mohd
Advancements in Internet of things (IoT) and sensor technologies along with deep learning techniques have enabled the design of several types of virtual keyboards including holographic keyboards. However, there is a need to better understand how its performance compares against the standard QWERTY keyboard in order to identify specific aspects of performance that are better as well as others than need to be further optimized. We conducted an initial two-part study. The first part was a controlled experimental study with 12 participants to see how a holographic keyboard compares with a QWERTY keyboard as a text entry tool on various metrics including task success, speed, and user satisfaction. The second part consisted of a short semi-structured interview with the participants, specifically based on the observations made by the researchers during the first part. Our initial findings indicate that although there is a speed advantage when users initially use standard QWERTY keyboard, there is a learning effect on speed with holographic keyboard and participants improve over time. Participants also indicated they would learn the holographic Keyboard quickly on a system usability sub-scale. This is still a work in progress and we aim to improve the design of the holographic keyboard based on the feedback from participants, and conduct a final summative evaluation.
物联网(IoT)和传感器技术的进步以及深度学习技术使包括全息键盘在内的几种虚拟键盘的设计成为可能。但是,有必要更好地了解其性能与标准QWERTY键盘的比较,以便确定性能的特定方面,哪些方面更好,哪些方面不需要进一步优化。我们进行了初步的两部分研究。第一部分是一项有12名参与者参与的对照实验研究,以观察全息键盘与QWERTY键盘作为文本输入工具在任务成功、速度和用户满意度等各种指标上的比较。第二部分包括对参与者进行简短的半结构化访谈,具体基于研究人员在第一部分中所做的观察。我们的初步研究结果表明,虽然用户最初使用标准QWERTY键盘时存在速度优势,但使用全息键盘会对速度产生学习效应,并且参与者会随着时间的推移而提高速度。参与者还表示,他们将在系统可用性量表上快速学习全息键盘。这项工作仍在进行中,我们的目标是根据参与者的反馈对全息键盘的设计进行改进,并进行最终的总结性评估。
{"title":"Comparison of Task Performance and User Satisfaction Between Holographic and Standard QWERTY Keyboard","authors":"Talha Hassan, Tauheed Khan Mohd","doi":"10.1109/aiiot54504.2022.9817288","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817288","url":null,"abstract":"Advancements in Internet of things (IoT) and sensor technologies along with deep learning techniques have enabled the design of several types of virtual keyboards including holographic keyboards. However, there is a need to better understand how its performance compares against the standard QWERTY keyboard in order to identify specific aspects of performance that are better as well as others than need to be further optimized. We conducted an initial two-part study. The first part was a controlled experimental study with 12 participants to see how a holographic keyboard compares with a QWERTY keyboard as a text entry tool on various metrics including task success, speed, and user satisfaction. The second part consisted of a short semi-structured interview with the participants, specifically based on the observations made by the researchers during the first part. Our initial findings indicate that although there is a speed advantage when users initially use standard QWERTY keyboard, there is a learning effect on speed with holographic keyboard and participants improve over time. Participants also indicated they would learn the holographic Keyboard quickly on a system usability sub-scale. This is still a work in progress and we aim to improve the design of the holographic keyboard based on the feedback from participants, and conduct a final summative evaluation.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Auditing Framework for Analyzing Fairness of Spatial-Temporal Federated Learning Applications 时空联邦学习应用公平性分析的审计框架
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817283
A. Mashhadi, Ali Tabaraei, Yuting Zhan, R. Parizi
Federated learning enables remote devices such as smartphones to train statistical models while ensuring that data remains private and secure. Performing privacy-preserving data analysis becomes increasingly crucial as our model is potentially being trained within heterogeneous and massive networks. While federated learning offers the potential to boost diversity in many existing models through on-device learning and enabling a wider range of users to participate, developing fair federated learning models is a challenging task. Throughout this paper, we propose a fairness auditing system for FL models that rely on spatial-temporal data. Borrowing tenets from mobility literature, we propose a set of metrics to define individual fairness using spatial-temporal data. We also introduce a set of approaches for measuring these metrics in distributed settings, as well as building a framework that can monitor the fairness of FL models dynamically.
联邦学习使智能手机等远程设备能够训练统计模型,同时确保数据的私密性和安全性。执行保护隐私的数据分析变得越来越重要,因为我们的模型可能在异构和大规模网络中进行训练。虽然联邦学习有可能通过设备上的学习来提高许多现有模型的多样性,并允许更广泛的用户参与,但开发公平的联邦学习模型是一项具有挑战性的任务。在本文中,我们提出了一个基于时空数据的FL模型公平性审计系统。借用流动性文献的原则,我们提出了一套使用时空数据来定义个人公平性的指标。我们还介绍了一组用于在分布式设置中测量这些指标的方法,以及构建一个可以动态监控FL模型公平性的框架。
{"title":"An Auditing Framework for Analyzing Fairness of Spatial-Temporal Federated Learning Applications","authors":"A. Mashhadi, Ali Tabaraei, Yuting Zhan, R. Parizi","doi":"10.1109/aiiot54504.2022.9817283","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817283","url":null,"abstract":"Federated learning enables remote devices such as smartphones to train statistical models while ensuring that data remains private and secure. Performing privacy-preserving data analysis becomes increasingly crucial as our model is potentially being trained within heterogeneous and massive networks. While federated learning offers the potential to boost diversity in many existing models through on-device learning and enabling a wider range of users to participate, developing fair federated learning models is a challenging task. Throughout this paper, we propose a fairness auditing system for FL models that rely on spatial-temporal data. Borrowing tenets from mobility literature, we propose a set of metrics to define individual fairness using spatial-temporal data. We also introduce a set of approaches for measuring these metrics in distributed settings, as well as building a framework that can monitor the fairness of FL models dynamically.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Suicidal Ideation Detection Based on Machine Learning and Deep Learning Techniques 基于机器学习和深度学习技术的自杀意念检测研究进展
Pub Date : 2022-06-06 DOI: 10.1109/aiiot54504.2022.9817373
Tanya Bhardwaj, Paridhi Gupta, Akshita Goyal, Akanksha Nagpal, Vivekanand Jha
In recent years, the number of deaths due to suicide has increased. Suicide is becoming one of the major causes of death across the whole world. This has led to an alarming situation as it is endangering the human life. A lot of studies have been done to find the reason behind such suicides and its prevention. The literature has suggested that the detection of suicide thoughts at an early stage can help to rescue the life of people. The idea of early detection has led various researchers to carry out research in this direction. Many such studies have used machine learning and deep learning models to predict the idea of suicide. So, this paper reviews the existing study that has been performed towards detection of suicidal thoughts using machine learning and deep learning techniques.
近年来,死于自杀的人数有所增加。自杀正在成为全世界死亡的主要原因之一。这导致了一个令人震惊的局面,因为它正在危及人类的生命。很多研究都在寻找自杀背后的原因和预防方法。文献表明,在早期阶段发现自杀念头有助于挽救人们的生命。早期检测的理念促使许多研究人员朝这个方向开展研究。许多这样的研究都使用机器学习和深度学习模型来预测自杀的想法。因此,本文回顾了使用机器学习和深度学习技术检测自杀念头的现有研究。
{"title":"A Review on Suicidal Ideation Detection Based on Machine Learning and Deep Learning Techniques","authors":"Tanya Bhardwaj, Paridhi Gupta, Akshita Goyal, Akanksha Nagpal, Vivekanand Jha","doi":"10.1109/aiiot54504.2022.9817373","DOIUrl":"https://doi.org/10.1109/aiiot54504.2022.9817373","url":null,"abstract":"In recent years, the number of deaths due to suicide has increased. Suicide is becoming one of the major causes of death across the whole world. This has led to an alarming situation as it is endangering the human life. A lot of studies have been done to find the reason behind such suicides and its prevention. The literature has suggested that the detection of suicide thoughts at an early stage can help to rescue the life of people. The idea of early detection has led various researchers to carry out research in this direction. Many such studies have used machine learning and deep learning models to predict the idea of suicide. So, this paper reviews the existing study that has been performed towards detection of suicidal thoughts using machine learning and deep learning techniques.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE World AI IoT Congress (AIIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1