首页 > 最新文献

Applied Computing Review最新文献

英文 中文
Model-Driven Integration and the OSLC Standard: a Mapping of Applied Studies 模型驱动的集成和OSLC标准:应用研究的映射
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577761
F. Basso, Bruno Marcelo Soares Ferreira, Rafael Torres, R. Z. Frantz, D. Kreutz, Maicon Bernardino, Elder de Macedo Rodrigues
Open Services for Lifecycle Collaboration (OSLC) is an open standard for tool interoperability, which allows data federation throughout Software Engineering (SE) application lifecycles. The OSLC community has been active since 2008, and there is still an open question: "What is the state-of-the-art and practice of OSLC for tool integration in Application Lifecycle Management (ALM) for Software Engineering environments?". Objective: To answer this question, our main goal is to map the state-of-the-art and practice on the adoption of OSLC in SE lifecycles. Method: This paper presents a Systematic Mapping Study (SMS) by analyzing 59 primary studies and addressing integration issues such as building SE toolchains. Results: Our findings show that OSLC has been mostly implemented with the development of adapters and MDE. Conclusions: The main advantages of OSLC are related to linked data, involving not only tool adapters for point-to-point integrations, but also proposing solutions for tool replacement in the toolchain, as well as including modifications of OSLC domain specifications and solutions for automated activities for tool integration.
生命周期协作的开放服务(OSLC)是工具互操作性的开放标准,它允许整个软件工程(SE)应用程序生命周期中的数据联合。自2008年以来,OSLC社区一直很活跃,并且仍然存在一个开放的问题:“软件工程环境中应用程序生命周期管理(ALM)中工具集成的OSLC的最新技术和实践是什么?”目的:为了回答这个问题,我们的主要目标是绘制在SE生命周期中采用OSLC的最新技术和实践。方法:本文通过分析59项主要研究并解决集成问题(如构建SE工具链),提出了系统映射研究(SMS)。结果:我们的研究结果表明,OSLC主要是随着适配器和MDE的发展而实现的。结论:OSLC的主要优势与链接数据有关,不仅涉及点对点集成的工具适配器,而且还涉及工具链中工具替换的建议解决方案,以及包括OSLC领域规范的修改和工具集成自动化活动的解决方案。
{"title":"Model-Driven Integration and the OSLC Standard: a Mapping of Applied Studies","authors":"F. Basso, Bruno Marcelo Soares Ferreira, Rafael Torres, R. Z. Frantz, D. Kreutz, Maicon Bernardino, Elder de Macedo Rodrigues","doi":"10.1145/3555776.3577761","DOIUrl":"https://doi.org/10.1145/3555776.3577761","url":null,"abstract":"Open Services for Lifecycle Collaboration (OSLC) is an open standard for tool interoperability, which allows data federation throughout Software Engineering (SE) application lifecycles. The OSLC community has been active since 2008, and there is still an open question: \"What is the state-of-the-art and practice of OSLC for tool integration in Application Lifecycle Management (ALM) for Software Engineering environments?\". Objective: To answer this question, our main goal is to map the state-of-the-art and practice on the adoption of OSLC in SE lifecycles. Method: This paper presents a Systematic Mapping Study (SMS) by analyzing 59 primary studies and addressing integration issues such as building SE toolchains. Results: Our findings show that OSLC has been mostly implemented with the development of adapters and MDE. Conclusions: The main advantages of OSLC are related to linked data, involving not only tool adapters for point-to-point integrations, but also proposing solutions for tool replacement in the toolchain, as well as including modifications of OSLC domain specifications and solutions for automated activities for tool integration.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"11 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89285469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Pain Assessment with Ultra-short Electrodermal Activity Signal 超短皮肤电活动信号自动疼痛评估
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577721
Xinwei Ji, Tianming Zhao, Wei Li, Albert Y. Zomaya
Automatic pain assessment systems can help patients get timely and effective pain relief treatment whenever needed. Such a system aims to provide the service with pain identification and pain intensity rating functions. Among the physiological signals, the electrodermal activity (EDA) signal emerges as a promising feature to support both functions in pain assessment. In this work, we propose a machine learning framework to implement pain identification and pain intensity rating using only EDA and its derived features. Our solution also explores the feasibility of using ultra-short EDA segmentation of about 5 seconds to meet real-time requirements. We evaluate our system on two datasets: Biovid, a publicly available dataset, and Apon, the one we build. Experimental results demonstrate that using just the ultra-short EDA signal as input, our algorithm outperforms state-of-the-art baselines and achieves a low regression error of 0.90.
自动疼痛评估系统可以帮助患者在需要时得到及时有效的疼痛缓解治疗。该系统旨在为该服务提供疼痛识别和疼痛强度评级功能。在生理信号中,皮电活动(EDA)信号作为一种有前景的特征在疼痛评估中支持这两种功能。在这项工作中,我们提出了一个机器学习框架,仅使用EDA及其衍生特征来实现疼痛识别和疼痛强度评级。我们的解决方案还探索了使用5秒左右的超短EDA分割来满足实时需求的可行性。我们在两个数据集上评估我们的系统:Biovid(一个公开可用的数据集)和Apon(我们构建的数据集)。实验结果表明,仅使用超短EDA信号作为输入,我们的算法优于最先进的基线,并实现了0.90的低回归误差。
{"title":"Automatic Pain Assessment with Ultra-short Electrodermal Activity Signal","authors":"Xinwei Ji, Tianming Zhao, Wei Li, Albert Y. Zomaya","doi":"10.1145/3555776.3577721","DOIUrl":"https://doi.org/10.1145/3555776.3577721","url":null,"abstract":"Automatic pain assessment systems can help patients get timely and effective pain relief treatment whenever needed. Such a system aims to provide the service with pain identification and pain intensity rating functions. Among the physiological signals, the electrodermal activity (EDA) signal emerges as a promising feature to support both functions in pain assessment. In this work, we propose a machine learning framework to implement pain identification and pain intensity rating using only EDA and its derived features. Our solution also explores the feasibility of using ultra-short EDA segmentation of about 5 seconds to meet real-time requirements. We evaluate our system on two datasets: Biovid, a publicly available dataset, and Apon, the one we build. Experimental results demonstrate that using just the ultra-short EDA signal as input, our algorithm outperforms state-of-the-art baselines and achieves a low regression error of 0.90.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"103 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91301899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol rmmc - pvc:一个多客户端可复用的可验证计算协议
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577680
Gael Marcadet, P. Lafourcade, Léo Robert
The verification of computations performed by an untrusted server is a cornerstone for delegated computations, especially in multi-clients setting where inputs are provided by different parties. Assuming a common secret between clients, a garbled circuit offers the attractive property to ensure the correctness of a result computed by the untrusted server while keeping the input and the function private. Yet, this verification can be guaranteed only once. Based on the notion of multi-key homomorphic encryption (MKHE), we propose RMC-PVC a multi-client verifiable computation protocol, able to verify the correctness of computations performed by an untrusted server for inputs (encoded for a garbled circuit) provided by multiple clients. Thanks to MKHE, the garbled circuit is reusable an arbitrary number of times. In addition, each client can verify the computation by its own. Compared to a single-key FHE scheme, the MKHE usage in RMC-PVC allows to reduce the workload of the server and thus the response delay for the client. It also enforce the privacy of inputs, which are provided by different clients.
对不受信任的服务器执行的计算的验证是委托计算的基础,特别是在输入由不同方提供的多客户机设置中。假设客户机之间有一个共同的秘密,那么乱码电路提供了一个吸引人的特性,可以确保不受信任的服务器计算结果的正确性,同时保持输入和函数的私密性。然而,这种核查只能保证一次。基于多密钥同态加密(MKHE)的概念,我们提出了rmmc - pvc一种多客户端可验证计算协议,能够验证不受信任的服务器对多个客户端提供的输入(编码为乱码电路)执行的计算的正确性。多亏了MKHE,乱码电路可以重复使用任意次数。此外,每个客户端都可以自己验证计算结果。与单键FHE方案相比,rmmc - pvc中的MKHE使用允许减少服务器的工作负载,从而减少客户端的响应延迟。它还加强了输入的私密性,这些输入由不同的客户机提供。
{"title":"RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol","authors":"Gael Marcadet, P. Lafourcade, Léo Robert","doi":"10.1145/3555776.3577680","DOIUrl":"https://doi.org/10.1145/3555776.3577680","url":null,"abstract":"The verification of computations performed by an untrusted server is a cornerstone for delegated computations, especially in multi-clients setting where inputs are provided by different parties. Assuming a common secret between clients, a garbled circuit offers the attractive property to ensure the correctness of a result computed by the untrusted server while keeping the input and the function private. Yet, this verification can be guaranteed only once. Based on the notion of multi-key homomorphic encryption (MKHE), we propose RMC-PVC a multi-client verifiable computation protocol, able to verify the correctness of computations performed by an untrusted server for inputs (encoded for a garbled circuit) provided by multiple clients. Thanks to MKHE, the garbled circuit is reusable an arbitrary number of times. In addition, each client can verify the computation by its own. Compared to a single-key FHE scheme, the MKHE usage in RMC-PVC allows to reduce the workload of the server and thus the response delay for the client. It also enforce the privacy of inputs, which are provided by different clients.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"8 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87532830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AI4CITY - An Automated Machine Learning Platform for Smart Cities AI4CITY——智能城市的自动机器学习平台
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578740
P. Pereira, Carlos Gonçalves, Lara Lopes Nunes, P. Cortez, A. Pilastri
Nowadays, the general interest in Machine Learning (ML) based solutions is increasing. However, to develop and deploy a ML solution often requires experience and it involves developing large code scripts. In this paper, we propose AI4CITY, an automated technological platform that aims to reduce the complexity of designing ML solutions, with a particular focus on Smart Cities applications. We compare our solution with popular Automated ML (AutoML) tools (e.g., H2O, AutoGluon) and the results achieved by AI4CITY were quite interesting and competitive.
如今,人们对基于机器学习(ML)的解决方案越来越感兴趣。然而,开发和部署ML解决方案通常需要经验,并且涉及开发大型代码脚本。在本文中,我们提出了AI4CITY,这是一个自动化技术平台,旨在降低设计机器学习解决方案的复杂性,特别关注智慧城市应用。我们将我们的解决方案与流行的自动化机器学习(AutoML)工具(例如H2O, AutoGluon)进行了比较,AI4CITY获得的结果非常有趣且具有竞争力。
{"title":"AI4CITY - An Automated Machine Learning Platform for Smart Cities","authors":"P. Pereira, Carlos Gonçalves, Lara Lopes Nunes, P. Cortez, A. Pilastri","doi":"10.1145/3555776.3578740","DOIUrl":"https://doi.org/10.1145/3555776.3578740","url":null,"abstract":"Nowadays, the general interest in Machine Learning (ML) based solutions is increasing. However, to develop and deploy a ML solution often requires experience and it involves developing large code scripts. In this paper, we propose AI4CITY, an automated technological platform that aims to reduce the complexity of designing ML solutions, with a particular focus on Smart Cities applications. We compare our solution with popular Automated ML (AutoML) tools (e.g., H2O, AutoGluon) and the results achieved by AI4CITY were quite interesting and competitive.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"69 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83469896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedFAME: A Data Augmentation Free Framework based on Model Contrastive Learning for Federated Semi-Supervised Learning 联邦半监督学习中基于模型对比学习的数据增强自由框架
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577613
Shubham Malaviya, Manish Shukla, Pratik Korat, S. Lodha
Federated learning has emerged as a privacy-preserving technique to learn a machine learning model without requiring users to share their data. Our paper focuses on Federated Semi-Supervised Learning (FSSL) setting wherein users do not have domain expertise or incentives to label data on their device, and the server has access to some labeled data that is annotated by experts. The existing work in FSSL require data augmentation for model training. However, data augmentation is not well defined for prevalent domains like text and graphs. Moreover, non independent and identically distributed (non-i.i.d.) data across users is a significant challenge in federated learning. We propose a generalized framework based on model contrastive learning called FedFAME which does not require data augmentation, thus making it easy to adapt to different domains. Our experiments on image and text datasets show the robustness of FedFAME towards non-i.i.d. data. We have validated our approach by varying data imbalance across users and the number of labeled instances on the server.
联邦学习已经成为一种隐私保护技术,可以在不需要用户共享数据的情况下学习机器学习模型。我们的论文关注的是联邦半监督学习(FSSL)设置,其中用户没有领域专业知识或动机在他们的设备上标记数据,服务器可以访问一些由专家注释的标记数据。现有的FSSL工作需要数据增强来进行模型训练。然而,对于文本和图形等流行领域,数据增强并没有很好地定义。此外,跨用户的非独立和同分布(non-i.i.d)数据是联邦学习中的一个重大挑战。我们提出了一个基于模型对比学习的广义框架,称为FedFAME,它不需要数据增强,从而使其易于适应不同的领域。我们在图像和文本数据集上的实验表明了FedFAME对非识别的鲁棒性。数据。我们通过改变用户之间的数据不平衡和服务器上标记实例的数量来验证我们的方法。
{"title":"FedFAME: A Data Augmentation Free Framework based on Model Contrastive Learning for Federated Semi-Supervised Learning","authors":"Shubham Malaviya, Manish Shukla, Pratik Korat, S. Lodha","doi":"10.1145/3555776.3577613","DOIUrl":"https://doi.org/10.1145/3555776.3577613","url":null,"abstract":"Federated learning has emerged as a privacy-preserving technique to learn a machine learning model without requiring users to share their data. Our paper focuses on Federated Semi-Supervised Learning (FSSL) setting wherein users do not have domain expertise or incentives to label data on their device, and the server has access to some labeled data that is annotated by experts. The existing work in FSSL require data augmentation for model training. However, data augmentation is not well defined for prevalent domains like text and graphs. Moreover, non independent and identically distributed (non-i.i.d.) data across users is a significant challenge in federated learning. We propose a generalized framework based on model contrastive learning called FedFAME which does not require data augmentation, thus making it easy to adapt to different domains. Our experiments on image and text datasets show the robustness of FedFAME towards non-i.i.d. data. We have validated our approach by varying data imbalance across users and the number of labeled instances on the server.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"18 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87588849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Hyperparameter Optimisation with Flower and Optuna 基于Flower和Optuna的联邦超参数优化
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577847
J. Parra-Ullauri, Xunzheng Zhang, A. Bravalheri, R. Nejabati, D. Simeonidou
Federated learning (FL) is an emerging distributed machine learning technique in which multiple clients collaborate to learn a model under the management of a central server. An FL system depends on a set of initial conditions (i.e., hyperparameters) that affect the system's performance. However, defining a good choice of hyperparameters for the central server and clients is a challenging problem. Hyperparameter tuning in FL often requires manual or automated searches to find optimal values. Nonetheless, a noticeable limitation is the high cost of algorithm evaluation for server and client models, making the tuning process computationally expensive and time-consuming. We propose an implementation based on integrating the FL framework Flower, and the prime optimisation software Optuna for automated and efficient hyperparameter optimisation (HPO) in FL. Through this combination, it is possible to tune hyperparameters in both clients and server online, aiming to find the optimal values at runtime. We introduce the HPO factor to describe the number of rounds that the HPO will take place, and the HPO rate that defines the frequency for updating the hyperparameters and can be used for pruning. The HPO is managed by the FL server which updates clients' hyperparameters, with an HPO rate, using state-of-the-art optimisation algorithms enabled by Optuna. We tested our approach by updating multiple client models simultaneously in popular image recognition datasets which produced promising results compared to baselines.
联邦学习(FL)是一种新兴的分布式机器学习技术,其中多个客户端在中央服务器的管理下协作学习模型。FL系统依赖于一组影响系统性能的初始条件(即超参数)。然而,为中心服务器和客户机定义一个好的超参数选择是一个具有挑战性的问题。FL中的超参数调优通常需要手动或自动搜索以找到最优值。尽管如此,一个明显的限制是服务器和客户机模型的算法评估的高成本,使得优化过程在计算上昂贵且耗时。我们提出了一种基于集成FL框架Flower和主要优化软件Optuna的实现,用于FL中自动化和高效的超参数优化(HPO)。通过这种组合,可以在线调整客户端和服务器中的超参数,旨在在运行时找到最优值。我们引入了HPO因子来描述HPO将发生的轮数,以及HPO率,它定义了更新超参数的频率,并可用于修剪。HPO由FL服务器管理,该服务器使用Optuna启用的最先进的优化算法,以HPO率更新客户端的超参数。我们通过在流行的图像识别数据集中同时更新多个客户端模型来测试我们的方法,与基线相比,产生了有希望的结果。
{"title":"Federated Hyperparameter Optimisation with Flower and Optuna","authors":"J. Parra-Ullauri, Xunzheng Zhang, A. Bravalheri, R. Nejabati, D. Simeonidou","doi":"10.1145/3555776.3577847","DOIUrl":"https://doi.org/10.1145/3555776.3577847","url":null,"abstract":"Federated learning (FL) is an emerging distributed machine learning technique in which multiple clients collaborate to learn a model under the management of a central server. An FL system depends on a set of initial conditions (i.e., hyperparameters) that affect the system's performance. However, defining a good choice of hyperparameters for the central server and clients is a challenging problem. Hyperparameter tuning in FL often requires manual or automated searches to find optimal values. Nonetheless, a noticeable limitation is the high cost of algorithm evaluation for server and client models, making the tuning process computationally expensive and time-consuming. We propose an implementation based on integrating the FL framework Flower, and the prime optimisation software Optuna for automated and efficient hyperparameter optimisation (HPO) in FL. Through this combination, it is possible to tune hyperparameters in both clients and server online, aiming to find the optimal values at runtime. We introduce the HPO factor to describe the number of rounds that the HPO will take place, and the HPO rate that defines the frequency for updating the hyperparameters and can be used for pruning. The HPO is managed by the FL server which updates clients' hyperparameters, with an HPO rate, using state-of-the-art optimisation algorithms enabled by Optuna. We tested our approach by updating multiple client models simultaneously in popular image recognition datasets which produced promising results compared to baselines.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"62 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72646118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sec2vec: Anomaly Detection in HTTP Traffic and Malicious URLs Sec2vec: HTTP流量和恶意url的异常检测
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577663
Mateusz Gniewkowski, H. Maciejewski, T. Surmacz, Wiktor Walentynowicz
In this paper, we show how methods known from Natural Language Processing (NLP) can be used to detect anomalies in HTTP requests and malicious URLs. Most of the current solutions focusing on a similar problem are either rule-based or trained using manually selected features. Modern NLP methods, however, have great potential in capturing a deep understanding of samples and therefore improving the classification results. Other methods, which rely on a similar idea, often ignore the interpretability of the results, which is so important in machine learning. We are trying to fill this gap. In addition, we show to what extent the proposed solutions are resistant to concept drift. In our work, we compare three different vectorization methods: simple BoW, fastText, and the current state-of-the-art language model RoBERTa. The obtained vectors are later used in the classification task. In order to explain our results, we utilize the SHAP method. We evaluate the feasibility of our methods on four different datasets: CSIC2010, UNSW-NB15, MALICIOUSURL, and ISCX-URL2016. The first two are related to HTTP traffic, the other two contain malicious URLs. The results we show are comparable to others or better, and most importantly - interpretable.
在本文中,我们展示了如何使用自然语言处理(NLP)中已知的方法来检测HTTP请求和恶意url中的异常情况。目前针对类似问题的大多数解决方案要么是基于规则的,要么是使用手动选择的特征进行训练的。然而,现代NLP方法在获取对样本的深入理解从而改进分类结果方面具有很大的潜力。其他依赖于类似想法的方法往往忽略了结果的可解释性,而这在机器学习中非常重要。我们正在努力填补这一空白。此外,我们还展示了所提出的解决方案在多大程度上能够抵抗概念漂移。在我们的工作中,我们比较了三种不同的矢量化方法:简单的BoW、fastText和当前最先进的语言模型RoBERTa。得到的向量稍后用于分类任务。为了解释我们的结果,我们使用了SHAP方法。我们评估了我们的方法在四个不同数据集上的可行性:CSIC2010、UNSW-NB15、MALICIOUSURL和ISCX-URL2016。前两个与HTTP流量有关,另外两个包含恶意url。我们展示的结果与他人相当或更好,最重要的是-可解释。
{"title":"Sec2vec: Anomaly Detection in HTTP Traffic and Malicious URLs","authors":"Mateusz Gniewkowski, H. Maciejewski, T. Surmacz, Wiktor Walentynowicz","doi":"10.1145/3555776.3577663","DOIUrl":"https://doi.org/10.1145/3555776.3577663","url":null,"abstract":"In this paper, we show how methods known from Natural Language Processing (NLP) can be used to detect anomalies in HTTP requests and malicious URLs. Most of the current solutions focusing on a similar problem are either rule-based or trained using manually selected features. Modern NLP methods, however, have great potential in capturing a deep understanding of samples and therefore improving the classification results. Other methods, which rely on a similar idea, often ignore the interpretability of the results, which is so important in machine learning. We are trying to fill this gap. In addition, we show to what extent the proposed solutions are resistant to concept drift. In our work, we compare three different vectorization methods: simple BoW, fastText, and the current state-of-the-art language model RoBERTa. The obtained vectors are later used in the classification task. In order to explain our results, we utilize the SHAP method. We evaluate the feasibility of our methods on four different datasets: CSIC2010, UNSW-NB15, MALICIOUSURL, and ISCX-URL2016. The first two are related to HTTP traffic, the other two contain malicious URLs. The results we show are comparable to others or better, and most importantly - interpretable.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"46 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79851654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MP-DDPG: Optimal Latency-Energy Dynamic Offloading Scheme in Collaborative Cloud Networks 协同云网络中最优延迟-能量动态卸载方案
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577767
Jui Mhatre, Ahyoung Lee
Growing technologies like virtualization and artificial intelligence have become more popular on mobile devices. But lack of resources faced for processing these applications is still major hurdle. Collaborative edge and cloud computing are one of the solutions to this problem. We have proposed a multi-period deep deterministic policy gradient (MP-DDPG) algorithm to find an optimal offloading policy by partitioning the task and offloading it to the collaborative cloud and edge network to reduce energy consumption. Our results show that MP-DDPG achieves the minimum latency and energy consumption in the collaborative cloud network.
像虚拟化和人工智能这样的新兴技术在移动设备上变得越来越流行。但缺乏处理这些申请所需的资源仍然是主要障碍。协作边缘和云计算是这个问题的解决方案之一。我们提出了一种多周期深度确定性策略梯度(MP-DDPG)算法,通过划分任务并将其卸载到协作云和边缘网络来寻找最优卸载策略,以降低能耗。结果表明,MP-DDPG在协同云网络中实现了最小的延迟和能耗。
{"title":"MP-DDPG: Optimal Latency-Energy Dynamic Offloading Scheme in Collaborative Cloud Networks","authors":"Jui Mhatre, Ahyoung Lee","doi":"10.1145/3555776.3577767","DOIUrl":"https://doi.org/10.1145/3555776.3577767","url":null,"abstract":"Growing technologies like virtualization and artificial intelligence have become more popular on mobile devices. But lack of resources faced for processing these applications is still major hurdle. Collaborative edge and cloud computing are one of the solutions to this problem. We have proposed a multi-period deep deterministic policy gradient (MP-DDPG) algorithm to find an optimal offloading policy by partitioning the task and offloading it to the collaborative cloud and edge network to reduce energy consumption. Our results show that MP-DDPG achieves the minimum latency and energy consumption in the collaborative cloud network.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"59 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80246251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semantic Evidence-based Approach to Continuous Cloud Service Certification 基于语义证据的持续云服务认证方法
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577600
Christian Banse, Immanuel Kunz, Nico Haas, Angelika Schneider
Continuous certification of cloud services requires a high degree of automation in collecting and evaluating evidences. Prior approaches to this topic are often specific to a cloud provider or a certain certification catalog. This makes it costly and complex to achieve conformance to multiple certification schemes and covering multi-cloud solutions. In this paper, we present a novel approach to continuous certification which is scheme- and vendor-independent. Leveraging an ontology of cloud resources and their security features, we generalize vendor- and scheme-specific terminology into a new model of so-called semantic evidence. In combination with generalized metrics that we elicited out of requirements from the EUCS and the CCMv4, we present a framework for the collection and assessment of such semantic evidence across multiple cloud providers. This allows to conduct continuous cloud certification while achieving re-usability of metrics and evidences in multiple certification schemes. The performance benchmark of the framework's prototype implementation shows that up to 200,000 evidences can be processed in less than a minute, making it suitable for short time intervals used in continuous certification.
云服务的持续认证要求证据的收集和评估高度自动化。此主题的先前方法通常特定于云提供商或某个认证目录。这使得实现与多个认证方案的一致性并覆盖多云解决方案的成本高昂且复杂。本文提出了一种独立于方案和供应商的连续认证方法。利用云资源本体及其安全特性,我们将特定于供应商和方案的术语概括为所谓的语义证据的新模型。结合我们从EUCS和CCMv4的需求中得出的广义指标,我们提出了一个框架,用于跨多个云提供商收集和评估此类语义证据。这允许进行持续的云认证,同时在多个认证方案中实现指标和证据的可重用性。该框架原型实现的性能基准表明,在不到一分钟的时间内可以处理多达20万个证据,适用于短时间间隔的连续认证。
{"title":"A Semantic Evidence-based Approach to Continuous Cloud Service Certification","authors":"Christian Banse, Immanuel Kunz, Nico Haas, Angelika Schneider","doi":"10.1145/3555776.3577600","DOIUrl":"https://doi.org/10.1145/3555776.3577600","url":null,"abstract":"Continuous certification of cloud services requires a high degree of automation in collecting and evaluating evidences. Prior approaches to this topic are often specific to a cloud provider or a certain certification catalog. This makes it costly and complex to achieve conformance to multiple certification schemes and covering multi-cloud solutions. In this paper, we present a novel approach to continuous certification which is scheme- and vendor-independent. Leveraging an ontology of cloud resources and their security features, we generalize vendor- and scheme-specific terminology into a new model of so-called semantic evidence. In combination with generalized metrics that we elicited out of requirements from the EUCS and the CCMv4, we present a framework for the collection and assessment of such semantic evidence across multiple cloud providers. This allows to conduct continuous cloud certification while achieving re-usability of metrics and evidences in multiple certification schemes. The performance benchmark of the framework's prototype implementation shows that up to 200,000 evidences can be processed in less than a minute, making it suitable for short time intervals used in continuous certification.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"16 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79252397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability Windows Nioh-PT:针对漏洞窗口的敏捷保护的虚拟I/O过滤
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577687
Mana Senuki, Ken-Ichi Ishiguro, K. Kono
Hypervisor vulnerabilities cause severe security issues in multi-tenant cloud environments because hypervisors guarantee isolation among virtual machines (VMs). Unfortunately, hypervisor vulnerabilities are continuously reported, and device emulation in hypervisors is one of the hotbeds because of its complexity. Although applying patches to fix the vulnerabilities is a common way to protect hypervisors, it takes time to develop the patches because the internal knowledge on hypervisors is mandatory. The hypervisors are exposed to the threat of the vulnerabilities exploitation until the patches are released. This paper proposes Nioh-PT, a framework for filtering illegal I/O requests, which reduces the vulnerability windows of the device emulation. The key insight of Nioh-PT is that malicious I/O requests contain illegal I/O sequences, a series of I/O requests that are not issued during normal I/O operations. Nioh-PT filters out those illegal I/O sequences and protects device emulators against the exploitation. The filtering rules, which define illegal I/O sequences for virtual device exploits, can be specified without the knowledge on the internal implementation of hypervisors and virtual devices, because Nioh-PT is decoupled from hypervisors and the device emulators. We develop 11 filtering rules against four real-world vulnerabilities in device emulation, including CVE-2015-3456 (VENOM) and CVE-2016-7909. We demonstrate that Nioh-PT with these filtering rules protects against the virtual device exploits and introduces negligible overhead by up to 8% for filesystem and storage benchmarks.
在多租户云环境中,Hypervisor的漏洞会导致严重的安全问题,因为Hypervisor保证了虚拟机之间的隔离。不幸的是,管理程序漏洞不断被报道,管理程序中的设备模拟由于其复杂性而成为温床之一。尽管应用补丁来修复漏洞是保护管理程序的常用方法,但是开发补丁需要时间,因为管理程序的内部知识是强制性的。在补丁发布之前,管理程序暴露在漏洞利用的威胁之下。本文提出了Nioh-PT框架来过滤非法I/O请求,减少了设备仿真的漏洞窗口。Nioh-PT的关键洞察是,恶意I/O请求包含非法I/O序列,即在正常I/O操作期间不发出的一系列I/O请求。Nioh-PT过滤掉那些非法的I/O序列,并保护设备模拟器免受利用。过滤规则为虚拟设备漏洞定义了非法I/O序列,可以在不了解管理程序和虚拟设备的内部实现的情况下指定,因为Nioh-PT与管理程序和设备模拟器解耦。我们针对设备仿真中的四个真实漏洞开发了11个过滤规则,包括CVE-2015-3456 (VENOM)和CVE-2016-7909。我们证明了Nioh-PT使用这些过滤规则可以防止虚拟设备被利用,并为文件系统和存储基准测试引入了高达8%的可忽略不计的开销。
{"title":"Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability Windows","authors":"Mana Senuki, Ken-Ichi Ishiguro, K. Kono","doi":"10.1145/3555776.3577687","DOIUrl":"https://doi.org/10.1145/3555776.3577687","url":null,"abstract":"Hypervisor vulnerabilities cause severe security issues in multi-tenant cloud environments because hypervisors guarantee isolation among virtual machines (VMs). Unfortunately, hypervisor vulnerabilities are continuously reported, and device emulation in hypervisors is one of the hotbeds because of its complexity. Although applying patches to fix the vulnerabilities is a common way to protect hypervisors, it takes time to develop the patches because the internal knowledge on hypervisors is mandatory. The hypervisors are exposed to the threat of the vulnerabilities exploitation until the patches are released. This paper proposes Nioh-PT, a framework for filtering illegal I/O requests, which reduces the vulnerability windows of the device emulation. The key insight of Nioh-PT is that malicious I/O requests contain illegal I/O sequences, a series of I/O requests that are not issued during normal I/O operations. Nioh-PT filters out those illegal I/O sequences and protects device emulators against the exploitation. The filtering rules, which define illegal I/O sequences for virtual device exploits, can be specified without the knowledge on the internal implementation of hypervisors and virtual devices, because Nioh-PT is decoupled from hypervisors and the device emulators. We develop 11 filtering rules against four real-world vulnerabilities in device emulation, including CVE-2015-3456 (VENOM) and CVE-2016-7909. We demonstrate that Nioh-PT with these filtering rules protects against the virtual device exploits and introduces negligible overhead by up to 8% for filesystem and storage benchmarks.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"13 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76072650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1