首页 > 最新文献

Applied Computing Review最新文献

英文 中文
A formal analysis of Dutch Generic Integral Tunnel Design models 荷兰通用整体隧道设计模型的形式化分析
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577786
Kevin H. J. Jilissen, P. Dieleman, J. F. Groote
The Generic Integral Tunnel Design (GITO) contains generic models for the tunnel control systems of Rijkswaterstaat, part of the Dutch Ministry of Infrastructure and Water Management. A formal verification of these models advances the safety and reliability of GITO derived tunnel control systems. In this paper, the first known large-scale formalisation of tunnel control systems is presented which transforms GITO models to the formal specification language mCRL2. This transformation is applied to two sub-systems of the GITO to analyse the correctness of the supplied models. In this formal analysis, several deficiencies in the specifications and faults in the existing models are revealed and verified solutions are proposed. Some of the presented faults even find their origin in the legally required standards.
通用整体隧道设计(GITO)包含荷兰基础设施和水资源管理部Rijkswaterstaat隧道控制系统的通用模型。对这些模型的形式化验证提高了GITO导出的隧道控制系统的安全性和可靠性。本文提出了第一个已知的隧道控制系统的大规模形式化,它将GITO模型转换为形式化规范语言mCRL2。将此转换应用于GITO的两个子系统,以分析所提供模型的正确性。在此形式化分析中,揭示了规范中的一些不足和现有模型中的缺陷,并提出了验证的解决方案。一些出现的缺陷甚至可以在法律要求的标准中找到它们的根源。
{"title":"A formal analysis of Dutch Generic Integral Tunnel Design models","authors":"Kevin H. J. Jilissen, P. Dieleman, J. F. Groote","doi":"10.1145/3555776.3577786","DOIUrl":"https://doi.org/10.1145/3555776.3577786","url":null,"abstract":"The Generic Integral Tunnel Design (GITO) contains generic models for the tunnel control systems of Rijkswaterstaat, part of the Dutch Ministry of Infrastructure and Water Management. A formal verification of these models advances the safety and reliability of GITO derived tunnel control systems. In this paper, the first known large-scale formalisation of tunnel control systems is presented which transforms GITO models to the formal specification language mCRL2. This transformation is applied to two sub-systems of the GITO to analyse the correctness of the supplied models. In this formal analysis, several deficiencies in the specifications and faults in the existing models are revealed and verified solutions are proposed. Some of the presented faults even find their origin in the legally required standards.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"56 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74734020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning for VRUs accidents prediction using V2X data 使用V2X数据进行vru事故预测的机器学习
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578263
B. Ribeiro, M. J. Nicolau, Alexandre J. T. Santos
Intelligent Transportation Systems (ITS) are systems that consist on an complex set of technologies that are applied to road agents, aiming to provide a more efficient and safe usage of the roads. The aspect of safety is particularly important for Vulnerable Road Users (VRUs), which are entities for whose implementation of automatic safety solutions is challenging for their agility and hard to anticipate behavior. However, the usage of ML techniques on Vehicle to Anything (V2X) data has the potential to implement such systems. This paper proposes a VRUs (motorcycles) accident prediction system by using Long Short-Term Memorys (LSTMs) on top of communication data that is generated using the VEINS simulation framework (pairing SUMO and ns-3). Results show that the proposed system is able to predict 96% of the accidents on Scenario A (with a 4.53s Average Prediction Time and a 41% Correct Decision Percentage (CDP) - 78 False Positives (FP)) and 95% on Scenario B (with a 4.44s Average Prediction Time and a 43% CDP - 68 FP).
智能交通系统(ITS)是由一套应用于道路代理的复杂技术组成的系统,旨在提供更有效和更安全的道路使用。对于弱势道路使用者(vru)来说,安全方面尤为重要,因为他们的灵活性和难以预测的行为,对他们来说,实施自动安全解决方案是一项挑战。然而,在V2X数据上使用机器学习技术有可能实现这样的系统。本文提出了一种基于基于vein仿真框架(配对SUMO和ns-3)生成的通信数据的长短期记忆(LSTMs)的vru(摩托车)事故预测系统。结果表明,该系统对情景A的预测准确率为96%(平均预测时间为4.53秒,正确决策百分比(CDP)为41%,误报率为78),对情景B的预测准确率为95%(平均预测时间为4.44秒,正确决策百分比为43%,误报率为68)。
{"title":"Machine Learning for VRUs accidents prediction using V2X data","authors":"B. Ribeiro, M. J. Nicolau, Alexandre J. T. Santos","doi":"10.1145/3555776.3578263","DOIUrl":"https://doi.org/10.1145/3555776.3578263","url":null,"abstract":"Intelligent Transportation Systems (ITS) are systems that consist on an complex set of technologies that are applied to road agents, aiming to provide a more efficient and safe usage of the roads. The aspect of safety is particularly important for Vulnerable Road Users (VRUs), which are entities for whose implementation of automatic safety solutions is challenging for their agility and hard to anticipate behavior. However, the usage of ML techniques on Vehicle to Anything (V2X) data has the potential to implement such systems. This paper proposes a VRUs (motorcycles) accident prediction system by using Long Short-Term Memorys (LSTMs) on top of communication data that is generated using the VEINS simulation framework (pairing SUMO and ns-3). Results show that the proposed system is able to predict 96% of the accidents on Scenario A (with a 4.53s Average Prediction Time and a 41% Correct Decision Percentage (CDP) - 78 False Positives (FP)) and 95% on Scenario B (with a 4.44s Average Prediction Time and a 43% CDP - 68 FP).","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"25 5 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80725191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performant and Secure Single Sign-On System Using Microservices 基于微服务的高性能安全单点登录系统
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577869
Mahyar Tourchi Moghaddam, Andreas Edal Pedersen, William Walter Lillebroe Bolding, T. Worm
The Single Sign-On (SSO) method eases the authentication and authorization process. The solution substantially impacts the users' experience since they only need to authenticate once to access multiple services without re-authenticating. This paper adopts an incremental prototyping approach to develop an SSO system. The research reveals that while SSO improves users' quality of experience, it could imply performance and security issues if traditional architectures are adopted. Thus, a Microservices-based approach with containerization is subsequently proposed to overcome SSO's quality issues in practice. The SSO system is containerized using Docker and managed using Docker Compose. The results show a significant performance and security improvement.
SSO (Single Sign-On)简化了认证和授权过程。该解决方案极大地影响了用户的体验,因为他们只需要验证一次即可访问多个服务,而无需重新验证。本文采用增量原型方法开发单点登录系统。研究表明,虽然SSO提高了用户的体验质量,但如果采用传统架构,它可能意味着性能和安全问题。因此,随后提出了一种基于微服务的容器化方法,以克服SSO在实践中的质量问题。SSO系统使用Docker进行容器化,并使用Docker Compose进行管理。结果显示了显著的性能和安全性改进。
{"title":"A Performant and Secure Single Sign-On System Using Microservices","authors":"Mahyar Tourchi Moghaddam, Andreas Edal Pedersen, William Walter Lillebroe Bolding, T. Worm","doi":"10.1145/3555776.3577869","DOIUrl":"https://doi.org/10.1145/3555776.3577869","url":null,"abstract":"The Single Sign-On (SSO) method eases the authentication and authorization process. The solution substantially impacts the users' experience since they only need to authenticate once to access multiple services without re-authenticating. This paper adopts an incremental prototyping approach to develop an SSO system. The research reveals that while SSO improves users' quality of experience, it could imply performance and security issues if traditional architectures are adopted. Thus, a Microservices-based approach with containerization is subsequently proposed to overcome SSO's quality issues in practice. The SSO system is containerized using Docker and managed using Docker Compose. The results show a significant performance and security improvement.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"15 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87396157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differences in performance, scalability, and cost of using microservice and monolithic architecture 使用微服务和单片架构在性能、可伸缩性和成本上的差异
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3578725
Przemysław Jatkiewicz, Szymon Okrój
A microservices-based architecture is a set of small components that communicate with each other using a programming language-independent API [1]. It has been gaining popularity for more than a decade. One of its advantages is greater agility in software development and following modern, agile software development practices [2]. The article presents an experimental study. Two applications with the same business logic and different architecture were developed. Both applications were tested using prepared test cases on the local computer of one of the authors and the Microsoft Azure platform. The results were collected and compared using the JMeter tool. In almost all cases, the monolithic architecture proved to be more efficient. The comparable performance of both architectures occurred when queries were handled by the business logic layer for a relatively long time.
基于微服务的架构是一组使用独立于编程语言的API相互通信的小组件[1]。十多年来,它一直越来越受欢迎。它的优点之一是在软件开发中具有更高的敏捷性,并遵循现代的敏捷软件开发实践[2]。本文进行了实验研究。开发了两个具有相同业务逻辑和不同架构的应用程序。这两个应用程序都在一位作者的本地计算机和Microsoft Azure平台上使用准备好的测试用例进行了测试。使用JMeter工具收集和比较结果。在几乎所有的情况下,单片架构被证明是更高效的。当查询由业务逻辑层处理较长时间时,两种体系结构的性能可比较。
{"title":"Differences in performance, scalability, and cost of using microservice and monolithic architecture","authors":"Przemysław Jatkiewicz, Szymon Okrój","doi":"10.1145/3555776.3578725","DOIUrl":"https://doi.org/10.1145/3555776.3578725","url":null,"abstract":"A microservices-based architecture is a set of small components that communicate with each other using a programming language-independent API [1]. It has been gaining popularity for more than a decade. One of its advantages is greater agility in software development and following modern, agile software development practices [2]. The article presents an experimental study. Two applications with the same business logic and different architecture were developed. Both applications were tested using prepared test cases on the local computer of one of the authors and the Microsoft Azure platform. The results were collected and compared using the JMeter tool. In almost all cases, the monolithic architecture proved to be more efficient. The comparable performance of both architectures occurred when queries were handled by the business logic layer for a relatively long time.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"66 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74103822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Personalized Graph Attention Network for Multivariate Time-series Change Analysis: A Case Study on Long-term Maternal Monitoring 多变量时间序列变化分析的个性化图关注网络——以长期产妇监测为例
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577675
Yuning Wang, I. Azimi, M. Feli, A. Rahmani, P. Liljeberg
Internet-of-Things-based systems have recently emerged, enabling long-term health monitoring systems for the daily activities of individuals. The data collected from such systems are multivariate and longitudinal, which call for tailored analysis techniques to extract the trends and abnormalities in the monitoring. Different methods in the literature have been proposed to identify trends in data. However, they do not include the time dependency and cannot distinguish changes in long-term health data. Moreover, their evaluations are limited to lab settings or short-term analysis. Long-term health monitoring applications require a modeling technique to merge the multisensory data into a meaningful indicator. In this paper, we propose a personalized neural network method to track changes and abnormalities in multivariate health data. Our proposed method leverages convolutional and graph attention layers to produce personalized scores indicating the abnormality level (i.e., deviations from the baseline) of users' data throughout the monitoring. We implement and evaluate the proposed method via a case study on long-term maternal health monitoring. Sleep and stress of pregnant women are remotely monitored using a smartwatch and a mobile application during pregnancy and 3-months postpartum. Our analysis includes 46 women. We build personalized sleep and stress models for each individual using the data from the beginning of the monitoring. Then, we compare the two groups by measuring the data variations. The abnormality scores produced by the proposed method are compared with the findings from the self-report questionnaire data collected in the monitoring and abnormality scores generated by an autoencoder method. The proposed method outperforms the baseline methods in exploring the changes between high-risk and low-risk pregnancy groups. The proposed method's scores also show correlations with the self-report data. Consequently, the results indicate that the proposed method effectively detects the abnormality in multivariate long-term health monitoring.
最近出现了基于物联网的系统,使个人日常活动的长期健康监测系统成为可能。从这些系统收集的数据是多变量的和纵向的,这就需要有针对性的分析技术来提取监测中的趋势和异常。文献中提出了不同的方法来确定数据的趋势。然而,它们不包括时间依赖性,不能区分长期健康数据的变化。此外,他们的评估仅限于实验室环境或短期分析。长期健康监测应用需要一种建模技术,将多感官数据合并为有意义的指标。在本文中,我们提出了一种个性化的神经网络方法来跟踪多变量健康数据的变化和异常。我们提出的方法利用卷积和图形关注层来生成个性化分数,表明在整个监测过程中用户数据的异常水平(即与基线的偏差)。我们通过一个关于长期产妇健康监测的案例研究来实施和评估拟议的方法。在怀孕期间和产后3个月,通过智能手表和移动应用程序远程监测孕妇的睡眠和压力。我们的分析包括46名女性。我们利用监测开始时的数据为每个人建立个性化的睡眠和压力模型。然后,我们通过测量数据变化来比较两组。将该方法生成的异常分数与监测中收集的自我报告问卷数据和自动编码器方法生成的异常分数进行比较。该方法在探索高危和低危妊娠组之间的变化方面优于基线方法。该方法的得分也显示出与自我报告数据的相关性。结果表明,该方法能有效地检测出多变量长期健康监测中的异常。
{"title":"Personalized Graph Attention Network for Multivariate Time-series Change Analysis: A Case Study on Long-term Maternal Monitoring","authors":"Yuning Wang, I. Azimi, M. Feli, A. Rahmani, P. Liljeberg","doi":"10.1145/3555776.3577675","DOIUrl":"https://doi.org/10.1145/3555776.3577675","url":null,"abstract":"Internet-of-Things-based systems have recently emerged, enabling long-term health monitoring systems for the daily activities of individuals. The data collected from such systems are multivariate and longitudinal, which call for tailored analysis techniques to extract the trends and abnormalities in the monitoring. Different methods in the literature have been proposed to identify trends in data. However, they do not include the time dependency and cannot distinguish changes in long-term health data. Moreover, their evaluations are limited to lab settings or short-term analysis. Long-term health monitoring applications require a modeling technique to merge the multisensory data into a meaningful indicator. In this paper, we propose a personalized neural network method to track changes and abnormalities in multivariate health data. Our proposed method leverages convolutional and graph attention layers to produce personalized scores indicating the abnormality level (i.e., deviations from the baseline) of users' data throughout the monitoring. We implement and evaluate the proposed method via a case study on long-term maternal health monitoring. Sleep and stress of pregnant women are remotely monitored using a smartwatch and a mobile application during pregnancy and 3-months postpartum. Our analysis includes 46 women. We build personalized sleep and stress models for each individual using the data from the beginning of the monitoring. Then, we compare the two groups by measuring the data variations. The abnormality scores produced by the proposed method are compared with the findings from the self-report questionnaire data collected in the monitoring and abnormality scores generated by an autoencoder method. The proposed method outperforms the baseline methods in exploring the changes between high-risk and low-risk pregnancy groups. The proposed method's scores also show correlations with the self-report data. Consequently, the results indicate that the proposed method effectively detects the abnormality in multivariate long-term health monitoring.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"64 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85777674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topic Aware Influential Member Detection in Meetup 主题感知的Meetup中有影响力的成员检测
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577684
Arpan Dam, Surya Kumar, Debjyoti Bhattacharjee, Sayan D. Pathak, Bivas Mitra
Hosting popular Meetup events is one of the primary objectives of the Meetup organizers. This paper explores the possibility of inviting a few key influential members to attend Meetup events, who may further influence their followers to attend and boost the popularity of those Meetup events. Importantly, our pilot study reveals that topics of the Meetup events play a key role behind the effectiveness of the influential members. Leveraging this observation, in this paper, we develop Topic Aware Influencer Detection (TAID) heuristics, which recommends (i) top-k influential members Ik, and (ii) top-b influence badges Rb based on the topical interest of a Meetup group. This indicates that Ik. will be most effective in influencing the Meetup members to attend the events hosted on topic Rb. TAID heuristics contains two major blocks (a) influence propagation graph construction, and (b) recommendation generation. Rigorous evaluation of TAID on 1447 Meetup groups with three different topics reveals that TAID comfortably outperforms the baselines by influencing (on average) 15% more Meetup members.
举办受欢迎的Meetup活动是Meetup组织者的主要目标之一。本文探讨了邀请一些关键的有影响力的成员参加Meetup活动的可能性,这些成员可能会进一步影响他们的追随者参加Meetup活动,从而提高这些Meetup活动的知名度。重要的是,我们的试点研究表明,Meetup活动的主题在有影响力的成员的有效性背后起着关键作用。利用这一观察结果,在本文中,我们开发了话题感知影响者检测(TAID)启发式方法,该方法根据Meetup小组的主题兴趣推荐(i) top-k有影响力的成员Ik和(ii) top-b有影响力的徽章Rb。这表明Ik。将最有效地影响Meetup成员参加主题Rb举办的活动。TAID启发式包含两个主要块(a)影响传播图构建和(b)推荐生成。对1447个有三个不同主题的Meetup小组的TAID进行的严格评估显示,TAID对Meetup成员的影响(平均)增加了15%,远远超过了基线。
{"title":"Topic Aware Influential Member Detection in Meetup","authors":"Arpan Dam, Surya Kumar, Debjyoti Bhattacharjee, Sayan D. Pathak, Bivas Mitra","doi":"10.1145/3555776.3577684","DOIUrl":"https://doi.org/10.1145/3555776.3577684","url":null,"abstract":"Hosting popular Meetup events is one of the primary objectives of the Meetup organizers. This paper explores the possibility of inviting a few key influential members to attend Meetup events, who may further influence their followers to attend and boost the popularity of those Meetup events. Importantly, our pilot study reveals that topics of the Meetup events play a key role behind the effectiveness of the influential members. Leveraging this observation, in this paper, we develop Topic Aware Influencer Detection (TAID) heuristics, which recommends (i) top-k influential members Ik, and (ii) top-b influence badges Rb based on the topical interest of a Meetup group. This indicates that Ik. will be most effective in influencing the Meetup members to attend the events hosted on topic Rb. TAID heuristics contains two major blocks (a) influence propagation graph construction, and (b) recommendation generation. Rigorous evaluation of TAID on 1447 Meetup groups with three different topics reveals that TAID comfortably outperforms the baselines by influencing (on average) 15% more Meetup members.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"316 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84482779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realism versus Performance for Adversarial Examples Against DL-based NIDS 针对基于dl的NIDS的对抗性示例的现实性与性能
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577671
Huda Ali Alatwi, C. Morisset
The application of deep learning-based (DL) network intrusion detection systems (NIDS) enables effective automated detection of cyberattacks. Such models can extract valuable features from high-dimensional and heterogeneous network traffic with minimal feature engineering and provide high accuracy detection rates. However, it has been shown that DL can be vulnerable to adversarial examples (AEs), which mislead classification decisions at inference time, and several works have shown that AEs are indeed a threat against DL-based NIDS. In this work, we argue that these threats are not necessarily realistic. Indeed, some general techniques used to generate AE manipulate features in a way that would be inconsistent with actual network traffic. In this paper, we first implement the main AE attacks selected from the literature (FGSM, BIM, PGD, NewtonFool, CW, DeepFool, EN, Boundary, HSJ, ZOO) for two different datasets (WSN-DS and BoT-IoT) and we compare their relative performance. We then analyze the perturbation generated by these attacks and use the metrics to establish a notion of "attack unrealism". We conclude that, for these datasets, some of these attacks are performant but not realistic.
基于深度学习(DL)的网络入侵检测系统(NIDS)的应用能够有效地自动检测网络攻击。该模型可以以最小的特征工程从高维异构网络流量中提取有价值的特征,并提供较高的准确率检测率。然而,已有研究表明,深度学习可能容易受到对抗性示例(AEs)的影响,这些示例会在推理时误导分类决策,并且一些研究表明,AEs确实是对基于DL的NIDS的威胁。在这项工作中,我们认为这些威胁并不一定是现实的。实际上,一些用于生成AE的通用技术以一种与实际网络流量不一致的方式操作特征。在本文中,我们首先针对两个不同的数据集(WSN-DS和BoT-IoT)实现了从文献中选择的主要AE攻击(FGSM, BIM, PGD, NewtonFool, CW, DeepFool, EN, Boundary, HSJ, ZOO),并比较了它们的相对性能。然后,我们分析由这些攻击产生的扰动,并使用度量来建立“攻击非现实性”的概念。我们得出的结论是,对于这些数据集,其中一些攻击是有效的,但不现实。
{"title":"Realism versus Performance for Adversarial Examples Against DL-based NIDS","authors":"Huda Ali Alatwi, C. Morisset","doi":"10.1145/3555776.3577671","DOIUrl":"https://doi.org/10.1145/3555776.3577671","url":null,"abstract":"The application of deep learning-based (DL) network intrusion detection systems (NIDS) enables effective automated detection of cyberattacks. Such models can extract valuable features from high-dimensional and heterogeneous network traffic with minimal feature engineering and provide high accuracy detection rates. However, it has been shown that DL can be vulnerable to adversarial examples (AEs), which mislead classification decisions at inference time, and several works have shown that AEs are indeed a threat against DL-based NIDS. In this work, we argue that these threats are not necessarily realistic. Indeed, some general techniques used to generate AE manipulate features in a way that would be inconsistent with actual network traffic. In this paper, we first implement the main AE attacks selected from the literature (FGSM, BIM, PGD, NewtonFool, CW, DeepFool, EN, Boundary, HSJ, ZOO) for two different datasets (WSN-DS and BoT-IoT) and we compare their relative performance. We then analyze the perturbation generated by these attacks and use the metrics to establish a notion of \"attack unrealism\". We conclude that, for these datasets, some of these attacks are performant but not realistic.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"198 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86228950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Quality of Public Transportation by Dynamically Adjusting the Bus Departure Time 动态调整公交发车时间提高公共交通质量
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577596
Shuheng Cao, S. Thamrin, Arbee L. P. Chen
Nowadays, more and more smart cities around the world are being built. As a part of the smart city, intelligent public transportation plays a very important role. Improving the quality of public transportation by reducing crowdedness and total transit time is a critical issue. To this end, we propose a bus operation prediction model based on deep learning techniques, and use this model to dynamically adjust the bus departure time to improve the bus service quality. Specifically, we first combine bus fare card data and open data, such as weather conditions and traffic accidents, to build models for predicting the number of passengers who board/alight the bus at a stop, the boarding and alighting time, and the bus running time between stops. Then we combine these models to predict the operation of the bus for deciding the best bus departure time within the bus departure interval. Experimental results on real-world data of Taichung City bus route #300 show that our approach to deciding the bus departure time is effective for improving its service quality.
如今,世界各地正在建设越来越多的智慧城市。作为智慧城市的一部分,智能公共交通扮演着非常重要的角色。通过减少拥挤和总运输时间来提高公共交通的质量是一个关键问题。为此,我们提出了一种基于深度学习技术的公交运行预测模型,并利用该模型动态调整公交发车时间,以提高公交服务质量。具体来说,我们首先将公交车费卡数据与开放数据(如天气条件和交通事故)结合起来,建立模型来预测在一个站点上/下公交车的乘客数量、上/下公交车的时间以及站点之间的公交车运行时间。然后结合这些模型对公交运行进行预测,以确定公交发车间隔内的最佳发车时间。台中市巴士300号线实际数据的实验结果显示,本方法能有效地决定巴士出发时间,提高巴士服务品质。
{"title":"Improving the Quality of Public Transportation by Dynamically Adjusting the Bus Departure Time","authors":"Shuheng Cao, S. Thamrin, Arbee L. P. Chen","doi":"10.1145/3555776.3577596","DOIUrl":"https://doi.org/10.1145/3555776.3577596","url":null,"abstract":"Nowadays, more and more smart cities around the world are being built. As a part of the smart city, intelligent public transportation plays a very important role. Improving the quality of public transportation by reducing crowdedness and total transit time is a critical issue. To this end, we propose a bus operation prediction model based on deep learning techniques, and use this model to dynamically adjust the bus departure time to improve the bus service quality. Specifically, we first combine bus fare card data and open data, such as weather conditions and traffic accidents, to build models for predicting the number of passengers who board/alight the bus at a stop, the boarding and alighting time, and the bus running time between stops. Then we combine these models to predict the operation of the bus for deciding the best bus departure time within the bus departure interval. Experimental results on real-world data of Taichung City bus route #300 show that our approach to deciding the bus departure time is effective for improving its service quality.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86297252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POI types characterization based on geographic feature embeddings 基于地理特征嵌入的POI类型表征
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577659
Salatiel Dantas Silva, C. E. Campelo, Maxwell Guimarães De Oliveira
Representing Points of Interest (POI) types, such as restaurants and shopping malls, is crucial to develop computational mechanisms that may assist in tasks such as urban planning and POI recommendation. The POI co-occurrences in different spatial regions have been used to represent POI types in high-dimensional vectors. However, such representations do not consider the geographic features (e.g. streets, buildings, rivers, parks) in the vicinity of POIs which may contribute to characterize such types. In this context, we propose the Geographic Context to Vector (GeoContext2Vec), an approach that relies on geographic features in the POIs' vicinity to generate POI types representation based on embeddings. We carried out an experiment to evaluate the GeoContext2Vec by using a POI type representation from the state-of-the-art that it does not consider geographic features. The promising results show that the geographic information provided by the GeoContext2Vec outperforms the state-of-the-art and demonstrates the relevance of surrouding geographic features on representing POI type more precisely.
表示兴趣点(POI)类型,如餐馆和购物中心,对于开发可能有助于城市规划和POI推荐等任务的计算机制至关重要。利用不同空间区域的POI共现来表示高维向量上的POI类型。然而,这种表述没有考虑到poi附近的地理特征(例如街道、建筑物、河流、公园),这些特征可能有助于描述这类类型。在这种情况下,我们提出了地理上下文到向量(GeoContext2Vec),这是一种依赖于POI附近的地理特征来基于嵌入生成POI类型表示的方法。我们进行了一项实验,通过使用不考虑地理特征的最先进的POI类型表示来评估GeoContext2Vec。结果表明,GeoContext2Vec提供的地理信息优于目前最先进的地理信息,并证明了周围地理特征与更精确地表示POI类型的相关性。
{"title":"POI types characterization based on geographic feature embeddings","authors":"Salatiel Dantas Silva, C. E. Campelo, Maxwell Guimarães De Oliveira","doi":"10.1145/3555776.3577659","DOIUrl":"https://doi.org/10.1145/3555776.3577659","url":null,"abstract":"Representing Points of Interest (POI) types, such as restaurants and shopping malls, is crucial to develop computational mechanisms that may assist in tasks such as urban planning and POI recommendation. The POI co-occurrences in different spatial regions have been used to represent POI types in high-dimensional vectors. However, such representations do not consider the geographic features (e.g. streets, buildings, rivers, parks) in the vicinity of POIs which may contribute to characterize such types. In this context, we propose the Geographic Context to Vector (GeoContext2Vec), an approach that relies on geographic features in the POIs' vicinity to generate POI types representation based on embeddings. We carried out an experiment to evaluate the GeoContext2Vec by using a POI type representation from the state-of-the-art that it does not consider geographic features. The promising results show that the geographic information provided by the GeoContext2Vec outperforms the state-of-the-art and demonstrates the relevance of surrouding geographic features on representing POI type more precisely.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"185 3 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80002939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior 行为网络中基于深度学习的自适应信任管理
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1145/3555776.3577694
Hind Bangui, Emilia Cioroaica, Mouzhi Ge, Barbora Buhnova
Internet of Behavior (IoB) has emerged as a new research paradigm within the context of digital ecosystems, with the support for understanding and positively influencing human behavior by merging behavioral sciences with information technology, and fostering mutual trust building between humans and technology. For example, when automated systems identify improper human driving behavior, IoB can support integrated behavioral adaptation to avoid driving risks that could lead to hazardous situations. In this paper, we propose an ecosystem-level self-adaptation mechanism that aims to provide runtime evidence for trust building in interaction among IoB elements. Our approach employs an indirect trust management scheme based on deep learning, which has the ability to mimic human behaviour and trust building patterns. In order to validate the model, we consider Pay-How-You-Drive vehicle insurance as a showcase of a IoB application aiming to advance the adaptation of business incentives based on improving driver behavior profiling. The experimental results show that the proposed model can identify different driving states with high accuracy, to support the IoB applications.
行为互联网(Internet of Behavior, IoB)是数字生态系统背景下的一种新的研究范式,通过将行为科学与信息技术相结合,促进人与技术之间的相互信任,支持理解和积极影响人类行为。例如,当自动系统识别出人类不当驾驶行为时,IoB可以支持综合行为适应,以避免可能导致危险情况的驾驶风险。在本文中,我们提出了一种生态系统级的自适应机制,旨在为IoB元素之间相互作用中的信任建立提供运行时证据。我们的方法采用了基于深度学习的间接信任管理方案,该方案具有模仿人类行为和信任建立模式的能力。为了验证该模型,我们将按需付费汽车保险作为IoB应用的一个展示,该应用旨在通过改进驾驶员行为分析来促进商业激励的适应。实验结果表明,该模型能较准确地识别不同的驾驶状态,支持IoB应用。
{"title":"Deep-Learning based Trust Management with Self-Adaptation in the Internet of Behavior","authors":"Hind Bangui, Emilia Cioroaica, Mouzhi Ge, Barbora Buhnova","doi":"10.1145/3555776.3577694","DOIUrl":"https://doi.org/10.1145/3555776.3577694","url":null,"abstract":"Internet of Behavior (IoB) has emerged as a new research paradigm within the context of digital ecosystems, with the support for understanding and positively influencing human behavior by merging behavioral sciences with information technology, and fostering mutual trust building between humans and technology. For example, when automated systems identify improper human driving behavior, IoB can support integrated behavioral adaptation to avoid driving risks that could lead to hazardous situations. In this paper, we propose an ecosystem-level self-adaptation mechanism that aims to provide runtime evidence for trust building in interaction among IoB elements. Our approach employs an indirect trust management scheme based on deep learning, which has the ability to mimic human behaviour and trust building patterns. In order to validate the model, we consider Pay-How-You-Drive vehicle insurance as a showcase of a IoB application aiming to advance the adaptation of business incentives based on improving driver behavior profiling. The experimental results show that the proposed model can identify different driving states with high accuracy, to support the IoB applications.","PeriodicalId":42971,"journal":{"name":"Applied Computing Review","volume":"163 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80312584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Applied Computing Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1