首页 > 最新文献

Applied Computing Review最新文献

英文 中文
MP-DDPG: Optimal Latency-Energy Dynamic Offloading Scheme in Collaborative Cloud Networks 协同云网络中最优延迟-能量动态卸载方案
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577767
Jui Mhatre, Ahyoung Lee
Growing technologies like virtualization and artificial intelligence have become more popular on mobile devices. But lack of resources faced for processing these applications is still major hurdle. Collaborative edge and cloud computing are one of the solutions to this problem. We have proposed a multi-period deep deterministic policy gradient (MP-DDPG) algorithm to find an optimal offloading policy by partitioning the task and offloading it to the collaborative cloud and edge network to reduce energy consumption. Our results show that MP-DDPG achieves the minimum latency and energy consumption in the collaborative cloud network.
像虚拟化和人工智能这样的新兴技术在移动设备上变得越来越流行。但缺乏处理这些申请所需的资源仍然是主要障碍。协作边缘和云计算是这个问题的解决方案之一。我们提出了一种多周期深度确定性策略梯度(MP-DDPG)算法,通过划分任务并将其卸载到协作云和边缘网络来寻找最优卸载策略,以降低能耗。结果表明,MP-DDPG在协同云网络中实现了最小的延迟和能耗。
{"title":"MP-DDPG: Optimal Latency-Energy Dynamic Offloading Scheme in Collaborative Cloud Networks","authors":"Jui Mhatre, Ahyoung Lee","doi":"10.1145/3555776.3577767","DOIUrl":"https://doi.org/10.1145/3555776.3577767","url":null,"abstract":"Growing technologies like virtualization and artificial intelligence have become more popular on mobile devices. But lack of resources faced for processing these applications is still major hurdle. Collaborative edge and cloud computing are one of the solutions to this problem. We have proposed a multi-period deep deterministic policy gradient (MP-DDPG) algorithm to find an optimal offloading policy by partitioning the task and offloading it to the collaborative cloud and edge network to reduce energy consumption. Our results show that MP-DDPG achieves the minimum latency and energy consumption in the collaborative cloud network.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"59 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80246251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S-ViT: Sparse Vision Transformer for Accurate Face Recognition S-ViT:用于精确人脸识别的稀疏视觉变换
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577640
Geunsu Kim, Gyudo Park, Soohyeok Kang, Simon S. Woo
Most of the existing face recognition applications using deep learning models have leveraged CNN-based architectures as the feature extractor. However, recent studies have shown that in computer vision tasks, vision transformer-based models often outperform CNN-based models. Therefore, in this work, we propose a Sparse Vision Transformer (S-ViT) based on the Vision Transformer (ViT) architecture to improve the face recognition tasks. After the model is trained, S-ViT tends to have a sparse distribution of weights compared to ViT, so we named it according to these characteristics. Unlike the conventional ViT, our proposed S-ViT adopts image Relative Positional Encoding (iRPE) method for positional encoding. Also, S-ViT has been modified so that all token embeddings, not just class token, participate in the decoding process. Through extensive experiment, we showed that S-ViT achieves better performance in closed-set than the other baseline models, and showed better performance than the baseline ViT-based models. For example, when using ArcFace as the loss function in the identification protocol, S-ViT achieved up to 3.27% higher accuracy than ResNet50. We also show that the use of ArcFace loss functions yields greater performance gains in S-ViT than in baseline models. In addition, S-ViT has an advantage in cost-performance trade-off because it tends to be more robust to the pruning technique than the underlying model, ViT. Therefore, S-ViT offers the additional advantage, which can be applied more flexibly in the target devices with limited resources.
大多数使用深度学习模型的现有人脸识别应用都利用基于cnn的架构作为特征提取器。然而,最近的研究表明,在计算机视觉任务中,基于视觉变换的模型往往优于基于cnn的模型。因此,在这项工作中,我们提出了一种基于视觉转换器(ViT)架构的稀疏视觉转换器(S-ViT)来改进人脸识别任务。经过模型训练后,S-ViT相对于ViT的权值分布趋于稀疏,所以我们根据这些特征来命名它。与传统的ViT不同,本文提出的S-ViT采用图像相对位置编码(iRPE)方法进行位置编码。此外,S-ViT已被修改,以便所有令牌嵌入,而不仅仅是类令牌,参与解码过程。通过大量的实验,我们发现S-ViT在闭集中的性能优于其他基线模型,并且优于基于基线vit的模型。例如,在识别协议中使用ArcFace作为损失函数时,S-ViT的准确率比ResNet50高出3.27%。我们还表明,使用ArcFace损失函数在S-ViT中比在基线模型中产生更大的性能收益。此外,S-ViT在成本-性能权衡方面具有优势,因为它比底层模型ViT对剪枝技术更健壮。因此,S-ViT提供了额外的优势,可以更灵活地应用于资源有限的目标设备。
{"title":"S-ViT: Sparse Vision Transformer for Accurate Face Recognition","authors":"Geunsu Kim, Gyudo Park, Soohyeok Kang, Simon S. Woo","doi":"10.1145/3555776.3577640","DOIUrl":"https://doi.org/10.1145/3555776.3577640","url":null,"abstract":"Most of the existing face recognition applications using deep learning models have leveraged CNN-based architectures as the feature extractor. However, recent studies have shown that in computer vision tasks, vision transformer-based models often outperform CNN-based models. Therefore, in this work, we propose a Sparse Vision Transformer (S-ViT) based on the Vision Transformer (ViT) architecture to improve the face recognition tasks. After the model is trained, S-ViT tends to have a sparse distribution of weights compared to ViT, so we named it according to these characteristics. Unlike the conventional ViT, our proposed S-ViT adopts image Relative Positional Encoding (iRPE) method for positional encoding. Also, S-ViT has been modified so that all token embeddings, not just class token, participate in the decoding process. Through extensive experiment, we showed that S-ViT achieves better performance in closed-set than the other baseline models, and showed better performance than the baseline ViT-based models. For example, when using ArcFace as the loss function in the identification protocol, S-ViT achieved up to 3.27% higher accuracy than ResNet50. We also show that the use of ArcFace loss functions yields greater performance gains in S-ViT than in baseline models. In addition, S-ViT has an advantage in cost-performance trade-off because it tends to be more robust to the pruning technique than the underlying model, ViT. Therefore, S-ViT offers the additional advantage, which can be applied more flexibly in the target devices with limited resources.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"18 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81609493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial Images 旋转- detr:一种基于端到端变换的航空图像定向目标检测器
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577745
Gil-beom Lee, Jinbeom Kim, Taejune Kim, Simon S. Woo
Oriented object detection in aerial images is a challenging task due to the highly complex backgrounds and objects with arbitrary oriented and usually densely arranged. Existing oriented object detection methods adopt CNN-based methods, and they can be divided into three types: two-stage, one-stage, and anchor-free methods. All of them require non-maximum suppression (NMS) to eliminate the duplicated predictions. Recently, object detectors based on the transformer remove hand-designed components by directly solving set prediction problems via performing bipartite matching, and achieve state-of-the-art performances in general object detection. Motivated by this research, we propose a transformer-based oriented object detector named Rotated DETR with oriented bounding boxes (OBBs) labeling. We embed the scoring network to reduce the tokens corresponding to the background. In addition, we apply a proposal generator and iterative proposal refinement module in order to provide proposals with angle information to the transformer decoder. Rotated DETR achieves state-of-the-art performance on the single-stage and anchor-free oriented object detectors on DOTA, UCAS-AOD, and DIOR-R datasets with only 10% feature tokens. In the experiment, we show the effectiveness of the scoring network and iterative proposal refinement module.
航空图像中的定向目标检测是一项非常具有挑战性的任务,因为背景和目标的方向任意且通常排列密集。现有的面向目标检测方法采用基于cnn的方法,分为两阶段、一阶段和无锚点三种方法。它们都需要非最大抑制(NMS)来消除重复的预测。近年来,基于变压器的目标检测器通过执行二部匹配直接解决集合预测问题,从而消除了人工设计的组件,达到了一般目标检测中最先进的性能。受此研究启发,我们提出了一种基于变压器的定向目标检测器,命名为旋转DETR,带有定向边界框(OBBs)标记。我们嵌入了评分网络来减少与背景相对应的token。此外,为了向变压器解码器提供具有角度信息的提案,我们应用提案生成器和迭代提案细化模块。在DOTA、UCAS-AOD和DIOR-R数据集上,旋转DETR在单级和无锚定向目标检测器上实现了最先进的性能,只有10%的特征令牌。在实验中,我们证明了评分网络和迭代提议优化模块的有效性。
{"title":"Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial Images","authors":"Gil-beom Lee, Jinbeom Kim, Taejune Kim, Simon S. Woo","doi":"10.1145/3555776.3577745","DOIUrl":"https://doi.org/10.1145/3555776.3577745","url":null,"abstract":"Oriented object detection in aerial images is a challenging task due to the highly complex backgrounds and objects with arbitrary oriented and usually densely arranged. Existing oriented object detection methods adopt CNN-based methods, and they can be divided into three types: two-stage, one-stage, and anchor-free methods. All of them require non-maximum suppression (NMS) to eliminate the duplicated predictions. Recently, object detectors based on the transformer remove hand-designed components by directly solving set prediction problems via performing bipartite matching, and achieve state-of-the-art performances in general object detection. Motivated by this research, we propose a transformer-based oriented object detector named Rotated DETR with oriented bounding boxes (OBBs) labeling. We embed the scoring network to reduce the tokens corresponding to the background. In addition, we apply a proposal generator and iterative proposal refinement module in order to provide proposals with angle information to the transformer decoder. Rotated DETR achieves state-of-the-art performance on the single-stage and anchor-free oriented object detectors on DOTA, UCAS-AOD, and DIOR-R datasets with only 10% feature tokens. In the experiment, we show the effectiveness of the scoring network and iterative proposal refinement module.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"10 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89429724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions 弱信任假设下的可伸缩抗强制电子投票
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578730
Thomas Haines, Johannes Müller, Iñigo Querejeta-Azurmendi
Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters. Despite the multitude of existing coercion-resistant e-voting systems, to date, only few of them can handle large-scale Internet elections efficiently. One of these systems, VoteAgain (USENIX Security 2020), was originally claimed secure under similar trust assumptions to state-of-the-art e-voting systems without coercion-resistance. In this work, we review VoteAgain's security properties. We discover that, unlike originally claimed, VoteAgain is no more secure than a trivial voting system with a completely trusted election authority. In order to mitigate this issue, we propose a variant of VoteAgain which effectively mitigates trust on the election authorities and, at the same time, preserves VoteAgain's usability and efficiency. Altogether, our findings bring the state of science one step closer to the goal of scalable coercion-resistant e-voting being secure under reasonable trust assumptions.
电子投票(e-voting)在许多国家和组织中经常用于具有法律约束力的选举。为了安全地进行这样的选举,在过去的几十年里,人们提出了许多电子投票系统。值得注意的是,其中一些系统旨在提供抗矫顽力。这一属性可以防止潜在的对手试图通过胁迫选民来影响选举。尽管现有的电子投票系统众多,但迄今为止,只有少数能够有效地处理大规模的互联网选举。其中一个系统VoteAgain (USENIX Security 2020)最初被声称在与最先进的电子投票系统类似的信任假设下是安全的,没有强制阻力。在本文中,我们将回顾VoteAgain的安全属性。我们发现,与最初声称的不同,VoteAgain并不比一个具有完全可信的选举机构的微不足道的投票系统更安全。为了缓解这个问题,我们提出了一个VoteAgain的变体,它有效地减轻了对选举当局的信任,同时保持了VoteAgain的可用性和效率。总而言之,我们的研究结果使科学状态更接近可扩展的抗强制电子投票在合理信任假设下是安全的目标。
{"title":"Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions","authors":"Thomas Haines, Johannes Müller, Iñigo Querejeta-Azurmendi","doi":"10.1145/3555776.3578730","DOIUrl":"https://doi.org/10.1145/3555776.3578730","url":null,"abstract":"Electronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these systems were designed to provide coercion-resistance. This property protects against potential adversaries trying to swing an election by coercing voters. Despite the multitude of existing coercion-resistant e-voting systems, to date, only few of them can handle large-scale Internet elections efficiently. One of these systems, VoteAgain (USENIX Security 2020), was originally claimed secure under similar trust assumptions to state-of-the-art e-voting systems without coercion-resistance. In this work, we review VoteAgain's security properties. We discover that, unlike originally claimed, VoteAgain is no more secure than a trivial voting system with a completely trusted election authority. In order to mitigate this issue, we propose a variant of VoteAgain which effectively mitigates trust on the election authorities and, at the same time, preserves VoteAgain's usability and efficiency. Altogether, our findings bring the state of science one step closer to the goal of scalable coercion-resistant e-voting being secure under reasonable trust assumptions.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"22 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89267605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Performant and Secure Single Sign-On System Using Microservices 基于微服务的高性能安全单点登录系统
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577869
Mahyar Tourchi Moghaddam, Andreas Edal Pedersen, William Walter Lillebroe Bolding, T. Worm
The Single Sign-On (SSO) method eases the authentication and authorization process. The solution substantially impacts the users' experience since they only need to authenticate once to access multiple services without re-authenticating. This paper adopts an incremental prototyping approach to develop an SSO system. The research reveals that while SSO improves users' quality of experience, it could imply performance and security issues if traditional architectures are adopted. Thus, a Microservices-based approach with containerization is subsequently proposed to overcome SSO's quality issues in practice. The SSO system is containerized using Docker and managed using Docker Compose. The results show a significant performance and security improvement.
SSO (Single Sign-On)简化了认证和授权过程。该解决方案极大地影响了用户的体验,因为他们只需要验证一次即可访问多个服务,而无需重新验证。本文采用增量原型方法开发单点登录系统。研究表明,虽然SSO提高了用户的体验质量,但如果采用传统架构,它可能意味着性能和安全问题。因此,随后提出了一种基于微服务的容器化方法,以克服SSO在实践中的质量问题。SSO系统使用Docker进行容器化,并使用Docker Compose进行管理。结果显示了显著的性能和安全性改进。
{"title":"A Performant and Secure Single Sign-On System Using Microservices","authors":"Mahyar Tourchi Moghaddam, Andreas Edal Pedersen, William Walter Lillebroe Bolding, T. Worm","doi":"10.1145/3555776.3577869","DOIUrl":"https://doi.org/10.1145/3555776.3577869","url":null,"abstract":"The Single Sign-On (SSO) method eases the authentication and authorization process. The solution substantially impacts the users' experience since they only need to authenticate once to access multiple services without re-authenticating. This paper adopts an incremental prototyping approach to develop an SSO system. The research reveals that while SSO improves users' quality of experience, it could imply performance and security issues if traditional architectures are adopted. Thus, a Microservices-based approach with containerization is subsequently proposed to overcome SSO's quality issues in practice. The SSO system is containerized using Docker and managed using Docker Compose. The results show a significant performance and security improvement.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"15 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87396157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Phenotypic Characteristics of Tuberculosis Bacteria 估计结核杆菌的表型特征
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578609
D. Sloan, E. Dombay, W. Sabiiti, B. Mtafya, Ognjen Arandelovic, Marios Zachariou
Microscopy analysis of sputum images for bacilli screening is a common method used for both diagnosis and therapy monitoring of tuberculosis (TB). Nonetheless, it is a challenging procedure, since sputum examination is time-consuming and needs highly competent personnel to provide accurate results which are important for clinical decision-making. In addition, manual fluorescence microscopy examination of sputum samples for tuberculosis diagnosis and treatment monitoring is a subjective operation. In this work, we automate the process of examining fields of view (FOVs) of TB bacteria in order to determine the lipid content, and bacterial length and width. We propose a modified version of the UNet model to rapidly localise potential bacteria inside a FOV. We introduce a novel method that uses Fourier descriptors to exclude contours that do not belong to the class of bacteria, hence minimising the amount of false positives. Finally, we propose a new feature as a means of extracting a representation fed into a support vector multi-regressor in order to estimate the length and width of each bacterium. Using a real-world data corpus, the proposed method i) outperformed previous methods, and ii) estimated the cell length and width with a root mean square error of less than 0.01%.
痰图像显微镜分析用于杆菌筛查是结核病(TB)诊断和治疗监测的常用方法。然而,这是一个具有挑战性的过程,因为痰液检查耗时,需要高素质的人员提供准确的结果,这对临床决策很重要。此外,人工荧光显微镜检查痰样进行肺结核诊断和治疗监测是一种主观操作。在这项工作中,我们自动化了检查TB细菌视野(FOVs)的过程,以确定脂质含量,细菌的长度和宽度。我们提出了一个修改版本的UNet模型,以快速定位潜在细菌在视场内。我们引入了一种新的方法,使用傅里叶描述符来排除不属于细菌类的轮廓,从而最大限度地减少误报的数量。最后,我们提出了一种新的特征,作为一种提取表征的手段,该表征被输入到支持向量多回归器中,以估计每个细菌的长度和宽度。使用真实世界的数据语料库,所提出的方法i)优于先前的方法,ii)估计单元长度和宽度的均方根误差小于0.01%。
{"title":"Estimating Phenotypic Characteristics of Tuberculosis Bacteria","authors":"D. Sloan, E. Dombay, W. Sabiiti, B. Mtafya, Ognjen Arandelovic, Marios Zachariou","doi":"10.1145/3555776.3578609","DOIUrl":"https://doi.org/10.1145/3555776.3578609","url":null,"abstract":"Microscopy analysis of sputum images for bacilli screening is a common method used for both diagnosis and therapy monitoring of tuberculosis (TB). Nonetheless, it is a challenging procedure, since sputum examination is time-consuming and needs highly competent personnel to provide accurate results which are important for clinical decision-making. In addition, manual fluorescence microscopy examination of sputum samples for tuberculosis diagnosis and treatment monitoring is a subjective operation. In this work, we automate the process of examining fields of view (FOVs) of TB bacteria in order to determine the lipid content, and bacterial length and width. We propose a modified version of the UNet model to rapidly localise potential bacteria inside a FOV. We introduce a novel method that uses Fourier descriptors to exclude contours that do not belong to the class of bacteria, hence minimising the amount of false positives. Finally, we propose a new feature as a means of extracting a representation fed into a support vector multi-regressor in order to estimate the length and width of each bacterium. Using a real-world data corpus, the proposed method i) outperformed previous methods, and ii) estimated the cell length and width with a root mean square error of less than 0.01%.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"51 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85130465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realism versus Performance for Adversarial Examples Against DL-based NIDS 针对基于dl的NIDS的对抗性示例的现实性与性能
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577671
Huda Ali Alatwi, C. Morisset
The application of deep learning-based (DL) network intrusion detection systems (NIDS) enables effective automated detection of cyberattacks. Such models can extract valuable features from high-dimensional and heterogeneous network traffic with minimal feature engineering and provide high accuracy detection rates. However, it has been shown that DL can be vulnerable to adversarial examples (AEs), which mislead classification decisions at inference time, and several works have shown that AEs are indeed a threat against DL-based NIDS. In this work, we argue that these threats are not necessarily realistic. Indeed, some general techniques used to generate AE manipulate features in a way that would be inconsistent with actual network traffic. In this paper, we first implement the main AE attacks selected from the literature (FGSM, BIM, PGD, NewtonFool, CW, DeepFool, EN, Boundary, HSJ, ZOO) for two different datasets (WSN-DS and BoT-IoT) and we compare their relative performance. We then analyze the perturbation generated by these attacks and use the metrics to establish a notion of "attack unrealism". We conclude that, for these datasets, some of these attacks are performant but not realistic.
基于深度学习(DL)的网络入侵检测系统(NIDS)的应用能够有效地自动检测网络攻击。该模型可以以最小的特征工程从高维异构网络流量中提取有价值的特征,并提供较高的准确率检测率。然而,已有研究表明,深度学习可能容易受到对抗性示例(AEs)的影响,这些示例会在推理时误导分类决策,并且一些研究表明,AEs确实是对基于DL的NIDS的威胁。在这项工作中,我们认为这些威胁并不一定是现实的。实际上,一些用于生成AE的通用技术以一种与实际网络流量不一致的方式操作特征。在本文中,我们首先针对两个不同的数据集(WSN-DS和BoT-IoT)实现了从文献中选择的主要AE攻击(FGSM, BIM, PGD, NewtonFool, CW, DeepFool, EN, Boundary, HSJ, ZOO),并比较了它们的相对性能。然后,我们分析由这些攻击产生的扰动,并使用度量来建立“攻击非现实性”的概念。我们得出的结论是,对于这些数据集,其中一些攻击是有效的,但不现实。
{"title":"Realism versus Performance for Adversarial Examples Against DL-based NIDS","authors":"Huda Ali Alatwi, C. Morisset","doi":"10.1145/3555776.3577671","DOIUrl":"https://doi.org/10.1145/3555776.3577671","url":null,"abstract":"The application of deep learning-based (DL) network intrusion detection systems (NIDS) enables effective automated detection of cyberattacks. Such models can extract valuable features from high-dimensional and heterogeneous network traffic with minimal feature engineering and provide high accuracy detection rates. However, it has been shown that DL can be vulnerable to adversarial examples (AEs), which mislead classification decisions at inference time, and several works have shown that AEs are indeed a threat against DL-based NIDS. In this work, we argue that these threats are not necessarily realistic. Indeed, some general techniques used to generate AE manipulate features in a way that would be inconsistent with actual network traffic. In this paper, we first implement the main AE attacks selected from the literature (FGSM, BIM, PGD, NewtonFool, CW, DeepFool, EN, Boundary, HSJ, ZOO) for two different datasets (WSN-DS and BoT-IoT) and we compare their relative performance. We then analyze the perturbation generated by these attacks and use the metrics to establish a notion of \"attack unrealism\". We conclude that, for these datasets, some of these attacks are performant but not realistic.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"198 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86228950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Quality of Public Transportation by Dynamically Adjusting the Bus Departure Time 动态调整公交发车时间提高公共交通质量
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577596
Shuheng Cao, S. Thamrin, Arbee L. P. Chen
Nowadays, more and more smart cities around the world are being built. As a part of the smart city, intelligent public transportation plays a very important role. Improving the quality of public transportation by reducing crowdedness and total transit time is a critical issue. To this end, we propose a bus operation prediction model based on deep learning techniques, and use this model to dynamically adjust the bus departure time to improve the bus service quality. Specifically, we first combine bus fare card data and open data, such as weather conditions and traffic accidents, to build models for predicting the number of passengers who board/alight the bus at a stop, the boarding and alighting time, and the bus running time between stops. Then we combine these models to predict the operation of the bus for deciding the best bus departure time within the bus departure interval. Experimental results on real-world data of Taichung City bus route #300 show that our approach to deciding the bus departure time is effective for improving its service quality.
如今,世界各地正在建设越来越多的智慧城市。作为智慧城市的一部分,智能公共交通扮演着非常重要的角色。通过减少拥挤和总运输时间来提高公共交通的质量是一个关键问题。为此,我们提出了一种基于深度学习技术的公交运行预测模型,并利用该模型动态调整公交发车时间,以提高公交服务质量。具体来说,我们首先将公交车费卡数据与开放数据(如天气条件和交通事故)结合起来,建立模型来预测在一个站点上/下公交车的乘客数量、上/下公交车的时间以及站点之间的公交车运行时间。然后结合这些模型对公交运行进行预测,以确定公交发车间隔内的最佳发车时间。台中市巴士300号线实际数据的实验结果显示,本方法能有效地决定巴士出发时间,提高巴士服务品质。
{"title":"Improving the Quality of Public Transportation by Dynamically Adjusting the Bus Departure Time","authors":"Shuheng Cao, S. Thamrin, Arbee L. P. Chen","doi":"10.1145/3555776.3577596","DOIUrl":"https://doi.org/10.1145/3555776.3577596","url":null,"abstract":"Nowadays, more and more smart cities around the world are being built. As a part of the smart city, intelligent public transportation plays a very important role. Improving the quality of public transportation by reducing crowdedness and total transit time is a critical issue. To this end, we propose a bus operation prediction model based on deep learning techniques, and use this model to dynamically adjust the bus departure time to improve the bus service quality. Specifically, we first combine bus fare card data and open data, such as weather conditions and traffic accidents, to build models for predicting the number of passengers who board/alight the bus at a stop, the boarding and alighting time, and the bus running time between stops. Then we combine these models to predict the operation of the bus for deciding the best bus departure time within the bus departure interval. Experimental results on real-world data of Taichung City bus route #300 show that our approach to deciding the bus departure time is effective for improving its service quality.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86297252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Effect of Low-Ranked Documents: A New Sampling Function for Selective Gradient Boosting 关于低排序文档的效果:一种新的用于选择性梯度增强的抽样函数
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577597
C. Lucchese, Federico Marcuzzi, S. Orlando
Learning to Rank is the task of learning a ranking function from a set of query-documents pairs. Generally, documents within a query are thousands but not all documents are informative for the learning phase. Different strategies were designed to select the most informative documents from the training set. However, most of them focused on reducing the size of the training set to speed up the learning phase, sacrificing effectiveness. A first attempt in this direction was achieved by Selective Gradient Boosting a learning algorithm that makes use of customisable sampling strategy to train effective ranking models. In this work, we propose a new sampling strategy called High_Low_Sampl for selecting negative examples applicable to Selective Gradient Boosting, without compromising model effectiveness. The proposed sampling strategy allows Selective Gradient Boosting to compose a new training set by selecting from the original one three document classes: the positive examples, high-ranked negative examples and low-ranked negative examples. The resulting dataset aims at minimizing the mis-ranking risk, i.e., enhancing the discriminative power of the learned model and maintaining generalisation to unseen instances. We demonstrated through an extensive experimental analysis on publicly available datasets, that the proposed selection algorithm is able to make the most of the negative examples within the training set and leads to models capable of obtaining statistically significant improvements in terms of NDCG, compared to the state of the art.
学习排序是从一组查询文档对中学习排序函数的任务。通常,一个查询中的文档有数千个,但并不是所有文档都对学习阶段提供信息。设计了不同的策略来从训练集中选择信息量最大的文档。然而,他们中的大多数人都专注于减少训练集的大小来加快学习阶段,牺牲了效率。在这个方向上的第一次尝试是通过选择性梯度增强学习算法实现的,该算法利用可定制的采样策略来训练有效的排名模型。在这项工作中,我们提出了一种新的采样策略,称为High_Low_Sampl,用于选择适用于选择性梯度增强的负例,而不影响模型的有效性。所提出的采样策略允许选择性梯度增强从原始的三个文档类别中选择一个新的训练集:正例、高阶负例和低阶负例。生成的数据集旨在最大限度地降低错误排序的风险,即增强学习模型的判别能力,并保持对未见实例的泛化。通过对公开可用数据集的广泛实验分析,我们证明了所提出的选择算法能够在训练集中充分利用负面示例,并导致模型能够在NDCG方面获得统计上显着的改进,与最先进的状态相比。
{"title":"On the Effect of Low-Ranked Documents: A New Sampling Function for Selective Gradient Boosting","authors":"C. Lucchese, Federico Marcuzzi, S. Orlando","doi":"10.1145/3555776.3577597","DOIUrl":"https://doi.org/10.1145/3555776.3577597","url":null,"abstract":"Learning to Rank is the task of learning a ranking function from a set of query-documents pairs. Generally, documents within a query are thousands but not all documents are informative for the learning phase. Different strategies were designed to select the most informative documents from the training set. However, most of them focused on reducing the size of the training set to speed up the learning phase, sacrificing effectiveness. A first attempt in this direction was achieved by Selective Gradient Boosting a learning algorithm that makes use of customisable sampling strategy to train effective ranking models. In this work, we propose a new sampling strategy called High_Low_Sampl for selecting negative examples applicable to Selective Gradient Boosting, without compromising model effectiveness. The proposed sampling strategy allows Selective Gradient Boosting to compose a new training set by selecting from the original one three document classes: the positive examples, high-ranked negative examples and low-ranked negative examples. The resulting dataset aims at minimizing the mis-ranking risk, i.e., enhancing the discriminative power of the learned model and maintaining generalisation to unseen instances. We demonstrated through an extensive experimental analysis on publicly available datasets, that the proposed selection algorithm is able to make the most of the negative examples within the training set and leads to models capable of obtaining statistically significant improvements in terms of NDCG, compared to the state of the art.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"18 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81259953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Sanitization Design for LSM-based Key-Value Store over 3D MLC NAND Flash 基于lsm的3D MLC NAND闪存键值存储的高效消毒设计
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577780
Liang-Chi Chen, Shu-Qi Yu, Chien-Chung Ho, Wei-Chen Wang, Yung-Chun Li
Conventional LSM tree designs delete data by inserting a delete mark to the specified key, and they thus it leaves several out-of-date values to the specified key on the LSM tree. As a result, the LSM tree encounters a serious data security issue due to the undeleted values when there arises the need for data sanitization. Sanitization is a time-consuming process that involves completely removing sensitive data from storage devices. Flash-based SSDs are widely used in many systems, but they lack an in-place update feature, which makes it difficult for LSM trees to maintain both privacy and performance on these devices. This work proposes an efficient sanitizable LSM-tree design for LSM-based key-value store over 3D NAND flash memories. Our proposed efficient sanitizable LSM-tree design focuses on integrating the processes of key-value pair updating and the execution of sanitization by exploiting our proposed influence-conscious programming method. The capability of the proposed design is evaluated by a series of experiments, for which we have very encouraging results.
传统的LSM树设计通过在指定的键中插入删除标记来删除数据,因此会在LSM树中为指定的键留下一些过期的值。因此,当需要进行数据清理时,由于未删除的值,LSM树会遇到严重的数据安全问题。消毒处理是一个耗时的过程,需要从存储设备中完全移除敏感数据。基于闪存的ssd广泛应用于许多系统,但它们缺乏就地更新功能,这使得LSM树难以在这些设备上同时维护隐私和性能。本研究提出了一种高效的可清理lsm树设计,用于基于lsm的键值存储在3D NAND闪存上。我们提出的高效的可清理的lsm树设计侧重于通过利用我们提出的影响意识编程方法集成键值对更新和清理的执行过程。通过一系列实验对所提出设计的性能进行了评价,得到了令人鼓舞的结果。
{"title":"Efficient Sanitization Design for LSM-based Key-Value Store over 3D MLC NAND Flash","authors":"Liang-Chi Chen, Shu-Qi Yu, Chien-Chung Ho, Wei-Chen Wang, Yung-Chun Li","doi":"10.1145/3555776.3577780","DOIUrl":"https://doi.org/10.1145/3555776.3577780","url":null,"abstract":"Conventional LSM tree designs delete data by inserting a delete mark to the specified key, and they thus it leaves several out-of-date values to the specified key on the LSM tree. As a result, the LSM tree encounters a serious data security issue due to the undeleted values when there arises the need for data sanitization. Sanitization is a time-consuming process that involves completely removing sensitive data from storage devices. Flash-based SSDs are widely used in many systems, but they lack an in-place update feature, which makes it difficult for LSM trees to maintain both privacy and performance on these devices. This work proposes an efficient sanitizable LSM-tree design for LSM-based key-value store over 3D NAND flash memories. Our proposed efficient sanitizable LSM-tree design focuses on integrating the processes of key-value pair updating and the execution of sanitization by exploiting our proposed influence-conscious programming method. The capability of the proposed design is evaluated by a series of experiments, for which we have very encouraging results.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"11 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90538526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1