首页 > 最新文献

2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)最新文献

英文 中文
Assertion and Coverage Driven Test Generation Tool for RTL Designs RTL设计的断言和覆盖驱动测试生成工具
N. Muhammed, Nour Ali, K. Salah, Ayub Khan
RTL verification is still one the most challenging activities in digital system development as it is still the bottleneck in the time-to-market for an integrated circuit development cycle. Thus reducing verification time is one of the most important targets. In this paper, a tool is developed to generate automatic tests from SystemVerilog assertions or SystemVerilog Coverage. The proposed tool is tested using different memory modules starting from single port RAM through Multiple ports RAM, FIFO and the DDRx families. The performance, regarding the runtime, has been compared with the handcrafted test case generation process. Moreover, the performance has been compared with other automatic test generation tools. Results shows the effectiveness of the proposed design. The proposed tool excelled in terms of its run-time, complexity, and coverage percentage.
RTL验证仍然是数字系统开发中最具挑战性的活动之一,因为它仍然是集成电路开发周期中上市时间的瓶颈。因此,减少验证时间是最重要的目标之一。本文开发了一个从SystemVerilog断言或SystemVerilog Coverage生成自动测试的工具。所提出的工具使用不同的存储模块进行测试,从单端口RAM到多端口RAM, FIFO和DDRx系列。关于运行时的性能,已经与手工制作的测试用例生成过程进行了比较。并与其他自动测试生成工具进行了性能比较。结果表明了所提设计的有效性。所建议的工具在其运行时、复杂性和覆盖率方面表现出色。
{"title":"Assertion and Coverage Driven Test Generation Tool for RTL Designs","authors":"N. Muhammed, Nour Ali, K. Salah, Ayub Khan","doi":"10.1109/UEMCON51285.2020.9298118","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298118","url":null,"abstract":"RTL verification is still one the most challenging activities in digital system development as it is still the bottleneck in the time-to-market for an integrated circuit development cycle. Thus reducing verification time is one of the most important targets. In this paper, a tool is developed to generate automatic tests from SystemVerilog assertions or SystemVerilog Coverage. The proposed tool is tested using different memory modules starting from single port RAM through Multiple ports RAM, FIFO and the DDRx families. The performance, regarding the runtime, has been compared with the handcrafted test case generation process. Moreover, the performance has been compared with other automatic test generation tools. Results shows the effectiveness of the proposed design. The proposed tool excelled in terms of its run-time, complexity, and coverage percentage.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Fraudulence in Credit Card Transactions using Machine Learning on Azure ML 在Azure ML上使用机器学习检测信用卡交易中的欺诈行为
Abhishek Shivanna, Sujan Ray, Khaldoon Alshouiliy, D. Agrawal
With the advancement of mobile and cloud technologies, there is a sharp increase in online transactions. Detecting fraudulent credit card transactions on a timely basis is a very critical and challenging problem in Financial Industry. Although online transactions are very convenient, they bring the risk of fraudulence on many aspects. Some of the key challenges in detecting fraudulence in online transactions include irregular behavioral patterns, skewed dataset i.e. high normal transaction to fraudulent transaction ratio, limited availability of data and dynamically changing environment. Every year people lose millions of dollars due to credit card fraud. There is a lack of quality research in this domain. We have used a dataset comprising of European cardholders which has 284,807 transactions to model our system. In this paper, we will design and develop credit card fraudulence detection system by training and testing two ML algorithms: Decision Forest (DF) and Decision Jungle (DJ) classifiers. Our results successfully demonstrate that DJ classifier delivers higher performance compared to DF classifier.
随着移动和云技术的进步,网上交易急剧增加。及时发现信用卡欺诈交易是金融行业中一个非常关键和具有挑战性的问题。虽然网上交易非常方便,但在很多方面也带来了欺诈的风险。检测在线交易欺诈的一些关键挑战包括不规则的行为模式、倾斜的数据集(即正常交易与欺诈交易的高比率)、有限的数据可用性和动态变化的环境。每年人们因信用卡诈骗而损失数百万美元。这一领域缺乏高质量的研究。我们使用了一个由欧洲持卡人组成的数据集,其中有284,807笔交易来模拟我们的系统。在本文中,我们将通过训练和测试两种ML算法:决策森林(DF)和决策丛林(DJ)分类器来设计和开发信用卡欺诈检测系统。我们的结果成功地证明了DJ分类器比DF分类器提供了更高的性能。
{"title":"Detection of Fraudulence in Credit Card Transactions using Machine Learning on Azure ML","authors":"Abhishek Shivanna, Sujan Ray, Khaldoon Alshouiliy, D. Agrawal","doi":"10.1109/UEMCON51285.2020.9298129","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298129","url":null,"abstract":"With the advancement of mobile and cloud technologies, there is a sharp increase in online transactions. Detecting fraudulent credit card transactions on a timely basis is a very critical and challenging problem in Financial Industry. Although online transactions are very convenient, they bring the risk of fraudulence on many aspects. Some of the key challenges in detecting fraudulence in online transactions include irregular behavioral patterns, skewed dataset i.e. high normal transaction to fraudulent transaction ratio, limited availability of data and dynamically changing environment. Every year people lose millions of dollars due to credit card fraud. There is a lack of quality research in this domain. We have used a dataset comprising of European cardholders which has 284,807 transactions to model our system. In this paper, we will design and develop credit card fraudulence detection system by training and testing two ML algorithms: Decision Forest (DF) and Decision Jungle (DJ) classifiers. Our results successfully demonstrate that DJ classifier delivers higher performance compared to DF classifier.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adversarial Input Detection Using Image Processing Techniques (IPT) 基于图像处理技术(IPT)的对抗输入检测
Kishor Datta Gupta, D. Dasgupta, Z. Akhtar
Modern deep learning models for the computer vision domain are vulnerable against adversarial attacks. Image prepossessing technique based defense against malicious input is currently considered obsolete as this defense is not effective against all types of attacks. The advanced adaptive attack can easily defeat pre-processing based defenses. In this paper, we proposed a framework that will generate a set of image processing sequences (several image processing techniques in a series). We randomly select a set of Image processing technique sequences (IPTS) dynamically to answer the obscurity question in testing time. This paper outlines methodology utilizing varied datasets examined with various adversarial data manipulations. For specific attack types and dataset, it produces unique IPTS. The outcome of our empirical experiments shows that the method can efficiently employ as processing for any machine learning models. The research also showed that our process works against adaptive attacks as we are using a non-deterministic set of IPTS for each adversarial input.
计算机视觉领域的现代深度学习模型容易受到对抗性攻击。基于图像预处理技术的恶意输入防御目前被认为是过时的,因为这种防御不是对所有类型的攻击都有效。先进的自适应攻击可以很容易地击败基于预处理的防御。在本文中,我们提出了一个框架,该框架将生成一组图像处理序列(一系列中的几种图像处理技术)。我们动态随机选择一组图像处理技术序列(IPTS)来回答测试时间内的模糊问题。本文概述了利用各种数据集检查各种对抗性数据操作的方法。对于特定的攻击类型和数据集,它产生唯一的IPTS。我们的经验实验结果表明,该方法可以有效地用于任何机器学习模型的处理。研究还表明,我们的过程可以对抗自适应攻击,因为我们对每个对抗性输入使用了一组不确定的IPTS。
{"title":"Adversarial Input Detection Using Image Processing Techniques (IPT)","authors":"Kishor Datta Gupta, D. Dasgupta, Z. Akhtar","doi":"10.1109/UEMCON51285.2020.9298060","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298060","url":null,"abstract":"Modern deep learning models for the computer vision domain are vulnerable against adversarial attacks. Image prepossessing technique based defense against malicious input is currently considered obsolete as this defense is not effective against all types of attacks. The advanced adaptive attack can easily defeat pre-processing based defenses. In this paper, we proposed a framework that will generate a set of image processing sequences (several image processing techniques in a series). We randomly select a set of Image processing technique sequences (IPTS) dynamically to answer the obscurity question in testing time. This paper outlines methodology utilizing varied datasets examined with various adversarial data manipulations. For specific attack types and dataset, it produces unique IPTS. The outcome of our empirical experiments shows that the method can efficiently employ as processing for any machine learning models. The research also showed that our process works against adaptive attacks as we are using a non-deterministic set of IPTS for each adversarial input.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IEEE 802.11ad Communication Quality Measurement in In-vehicle Wireless Communication with Real Machines 基于真实机器的车载无线通信的IEEE 802.11ad通信质量测量
Ryoko Nino, T. Nishio, T. Murase
This paper demonstrates the feasibility of IEEE 802.11ad-based in-vehicle communication for a wireless harness. IEEE 802.11ad millimeter-wave (mmWave) communication enables high-speed wireless transmission, and its short communication range prevents harmful interference from other vehicles. However, in an in-vehicle environment, the received power of IEEE 802.11ad-based mmWave communications can be largely and easily attenuated by obstacles such as humans and the vehicle interior. Moreover, mmWave signals from adjacent vehicles can penetrate through vehicle windows and cause harmful interference. In this paper, we report the experimental results of in-vehicle communications using an actual vehicle and IEEE 802.11ad devices in an anechoic chamber. The experimental results demonstrate that IEEE 802.11ad-based in-vehicle communication can achieve a throughput of several hundred megabits per second, which is almost equivalent to that in achieved free space; this throughput can even be achieved when there are multiple obstacles in a vehicle and when adjacent vehicles (i.e., interferers) are in close proximity.
本文论证了基于IEEE 802.11ad的车载无线通信的可行性。IEEE 802.11ad毫米波(mmWave)通信实现高速无线传输,其短通信范围可防止其他车辆的有害干扰。然而,在车载环境中,基于IEEE 802.11ad的毫米波通信的接收功率很容易被人类和车辆内部等障碍物大大衰减。此外,来自相邻车辆的毫米波信号可以穿透车窗,造成有害干扰。在本文中,我们报告了在消声室中使用实际车辆和IEEE 802.11ad设备进行车载通信的实验结果。实验结果表明,基于IEEE 802.11ad的车载通信可以实现几百兆比特/秒的吞吐量,几乎等同于实现的自由空间;这种吞吐量甚至可以在车辆中有多个障碍物以及相邻车辆(即干扰物)距离很近的情况下实现。
{"title":"IEEE 802.11ad Communication Quality Measurement in In-vehicle Wireless Communication with Real Machines","authors":"Ryoko Nino, T. Nishio, T. Murase","doi":"10.1109/UEMCON51285.2020.9298087","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298087","url":null,"abstract":"This paper demonstrates the feasibility of IEEE 802.11ad-based in-vehicle communication for a wireless harness. IEEE 802.11ad millimeter-wave (mmWave) communication enables high-speed wireless transmission, and its short communication range prevents harmful interference from other vehicles. However, in an in-vehicle environment, the received power of IEEE 802.11ad-based mmWave communications can be largely and easily attenuated by obstacles such as humans and the vehicle interior. Moreover, mmWave signals from adjacent vehicles can penetrate through vehicle windows and cause harmful interference. In this paper, we report the experimental results of in-vehicle communications using an actual vehicle and IEEE 802.11ad devices in an anechoic chamber. The experimental results demonstrate that IEEE 802.11ad-based in-vehicle communication can achieve a throughput of several hundred megabits per second, which is almost equivalent to that in achieved free space; this throughput can even be achieved when there are multiple obstacles in a vehicle and when adjacent vehicles (i.e., interferers) are in close proximity.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mobile Natural Gas Concentration Intelligence Device Study for the Arctic 北极移动天然气浓缩智能装置研究
A. Lagunov, S. Zabolotniy
At present, the attention of many countries is directed to the Arctic. Many politicians argue about the boundaries in the circumpolar region. The problem is that the Arctic is very rich in hydrocarbons. Since there is practically no land in this region, it is necessary to produce hydrocarbons on the Arctic Ocean's sea shelf. For this, offshore platforms are used. It is complicated for a person to work on an offshore platform since the Arctic has shallow temperatures with extreme winds. At the same time, natural gas may appear inside the platform. Natural gas at specific concentrations mixed with oxygen can be explosive, increasing the risk of a person being on the platform. Therefore, to monitor the concentration of natural gas on the platform, special sensors register the gas level and give a control signal of danger. These sensors are not installed at all points. For those places where sensors are not installed, we have developed a particular mobile device that can determine the natural gas concentration and transmit it to the control device.
目前,许多国家的注意力都集中在北极。许多政治家争论绕极地区的边界问题。问题是北极蕴藏着丰富的碳氢化合物。由于该地区几乎没有陆地,因此有必要在北冰洋的大陆架上生产碳氢化合物。为此,使用了海上平台。由于北极的温度很低,而且有极端的风,在海上平台上工作对一个人来说很复杂。同时,天然气可能会出现在平台内部。特定浓度的天然气与氧气混合可能具有爆炸性,增加了平台上人员的危险。因此,为了监测平台上的天然气浓度,特殊的传感器记录气体水平并给出危险的控制信号。这些传感器并非安装在所有地点。对于那些没有安装传感器的地方,我们开发了一种特殊的移动设备,可以确定天然气浓度并将其传输到控制设备。
{"title":"Mobile Natural Gas Concentration Intelligence Device Study for the Arctic","authors":"A. Lagunov, S. Zabolotniy","doi":"10.1109/UEMCON51285.2020.9298042","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298042","url":null,"abstract":"At present, the attention of many countries is directed to the Arctic. Many politicians argue about the boundaries in the circumpolar region. The problem is that the Arctic is very rich in hydrocarbons. Since there is practically no land in this region, it is necessary to produce hydrocarbons on the Arctic Ocean's sea shelf. For this, offshore platforms are used. It is complicated for a person to work on an offshore platform since the Arctic has shallow temperatures with extreme winds. At the same time, natural gas may appear inside the platform. Natural gas at specific concentrations mixed with oxygen can be explosive, increasing the risk of a person being on the platform. Therefore, to monitor the concentration of natural gas on the platform, special sensors register the gas level and give a control signal of danger. These sensors are not installed at all points. For those places where sensors are not installed, we have developed a particular mobile device that can determine the natural gas concentration and transmit it to the control device.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bayesian Game Framework for a Semi-Supervised Allocation of the Spreading Factors in LoRa Networks LoRa网络中扩展因子半监督分配的贝叶斯博弈框架
A. Tolio, Davide Boem, Thomas Marchioro, L. Badia
LoRa networks have been gaining ground as a solution for Internet of Things because of their potential ability to handle massive number of devices. One of the most challenging problems of such networks is the need to set the Spreading Factors (SF) used by the terminals as close to a uniform distribution as possible, to guarantee reliable transmission of packets. This can be tackled through stochastic allocations based on centralized strategies, and more recently some contributions proposed fully distributed approaches based on game theory. However, these studies still consider games of complete information, where users have full knowledge on each other payoffs. In reality, it would be more appropriate to extend these approaches to Bayesian games, as we propose to do here. More precisely, we extend the game theoretic formulation to a semi-supervised allocation, where the distributed character of the allocation is retained as the nodes still act independently in choosing their SF, based on what they think it is their best preferred choice. We also utilize the central gateway as a coordinator regulating these proposals and the interaction of the nodes with the coordinator is framed as a Bayesian entry game, where nodes exploit a prior to decide whether to join the proposed allocation or not. Under this framework, nodes reach a satisfactory compromise between the assignment they receive from the network and their desired rate.
LoRa网络作为物联网的解决方案已经取得了进展,因为它们具有处理大量设备的潜在能力。这种网络最具挑战性的问题之一是需要将终端使用的传播因子(SF)设置为尽可能接近均匀分布,以保证数据包的可靠传输。这可以通过基于集中策略的随机分配来解决,最近一些贡献提出了基于博弈论的完全分布式方法。然而,这些研究仍然考虑了完全信息的游戏,即用户完全了解彼此的收益。实际上,将这些方法扩展到贝叶斯游戏中更为合适,就像我们在此提议的那样。更准确地说,我们将博弈论公式扩展到半监督分配,其中分配的分布特征被保留,因为节点仍然独立地选择他们的SF,基于他们认为这是他们的最佳选择。我们还利用中央网关作为协调器来调节这些提议,节点与协调器的交互被框架为贝叶斯进入博弈,节点利用先验来决定是否加入提议的分配。在这个框架下,节点在从网络接收到的分配和期望的速率之间达到了令人满意的折衷。
{"title":"A Bayesian Game Framework for a Semi-Supervised Allocation of the Spreading Factors in LoRa Networks","authors":"A. Tolio, Davide Boem, Thomas Marchioro, L. Badia","doi":"10.1109/UEMCON51285.2020.9298137","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298137","url":null,"abstract":"LoRa networks have been gaining ground as a solution for Internet of Things because of their potential ability to handle massive number of devices. One of the most challenging problems of such networks is the need to set the Spreading Factors (SF) used by the terminals as close to a uniform distribution as possible, to guarantee reliable transmission of packets. This can be tackled through stochastic allocations based on centralized strategies, and more recently some contributions proposed fully distributed approaches based on game theory. However, these studies still consider games of complete information, where users have full knowledge on each other payoffs. In reality, it would be more appropriate to extend these approaches to Bayesian games, as we propose to do here. More precisely, we extend the game theoretic formulation to a semi-supervised allocation, where the distributed character of the allocation is retained as the nodes still act independently in choosing their SF, based on what they think it is their best preferred choice. We also utilize the central gateway as a coordinator regulating these proposals and the interaction of the nodes with the coordinator is framed as a Bayesian entry game, where nodes exploit a prior to decide whether to join the proposed allocation or not. Under this framework, nodes reach a satisfactory compromise between the assignment they receive from the network and their desired rate.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"2006 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127335788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Enhanced BCI Technology for 3D Printing 3D打印的深度学习增强BCI技术
Jahnavi Kachhia, Rashika Natharani, K. George
The purpose of this paper is to combine Deep Learning with Brain-Computer Interface (BCI) for 3D Printing without human interference. This design will eliminate the intermediate steps and enable people to generate 3D prints faster. To collect the data, subjects are asked to wear g.Nautilus headsets and perform a mental imagery task. These collected brain waves are preprocessed using MATLAB and then are used to train different Neural Network architectures. The Neural Network model recognizes patterns in these brain waves to predict the shape imagined by the user. In this paper, we introduce CNN-LSTM that servers the purpose of classifying objects accurately. Once the shape is identified, the CAD file is generated in STL format using the predefined size. Lastly, this STL file is converted into G-code and serially transferred to the 3D Printer.
本文的目的是将深度学习与脑机接口(BCI)相结合,实现无人为干扰的3D打印。这种设计将消除中间步骤,使人们能够更快地生成3D打印。为了收集数据,研究对象被要求戴上g.s nautilus耳机,完成一项心理成像任务。利用MATLAB对采集到的脑电波进行预处理,然后用于训练不同的神经网络架构。神经网络模型识别这些脑电波中的模式,以预测用户想象的形状。本文介绍了以准确分类为目的的CNN-LSTM算法。一旦形状被识别,CAD文件生成在STL格式使用预定义的大小。最后,将此STL文件转换为g代码并串行传输到3D打印机。
{"title":"Deep Learning Enhanced BCI Technology for 3D Printing","authors":"Jahnavi Kachhia, Rashika Natharani, K. George","doi":"10.1109/UEMCON51285.2020.9298124","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298124","url":null,"abstract":"The purpose of this paper is to combine Deep Learning with Brain-Computer Interface (BCI) for 3D Printing without human interference. This design will eliminate the intermediate steps and enable people to generate 3D prints faster. To collect the data, subjects are asked to wear g.Nautilus headsets and perform a mental imagery task. These collected brain waves are preprocessed using MATLAB and then are used to train different Neural Network architectures. The Neural Network model recognizes patterns in these brain waves to predict the shape imagined by the user. In this paper, we introduce CNN-LSTM that servers the purpose of classifying objects accurately. Once the shape is identified, the CAD file is generated in STL format using the predefined size. Lastly, this STL file is converted into G-code and serially transferred to the 3D Printer.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on Classification of Cyber-attacks on IoT and IIoT devices 物联网和工业物联网设备网络攻击分类调查
Y. Shah, S. Sengupta
Internet of Things (IoT) devices have gained popularity in recent years. With the increased usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT devices must be analyzed thoroughly to develop protection mechanisms against them. An attacker’s purpose behind launching an attack is to find a weak link within a network and once discovered, the devices connected to the network become the primary target for the attackers. Industrial Internet of Things (IIoT) emerged due to the popularity of IoT devices and they are used to interconnect machines, sensors, and actuators at large manufacturing plants. By incorporating IIoT at their facilities companies have benefited by reducing operational costs and increasing productivity. However, as IIoT relies on utilizing the Internet to operate it is vulnerable to Cyber-attacks if security is not taken into consideration. After seeing the advantages of IIoT, a new version of smart industries has been introduced called Industry 4.0. Industry 4.0 combines cloud and fog computing, cyber-physical systems (CPS), and data analytics to automate the manufacturing process. This paper surveys the different classifications of attacks that an attacker can launch against these devices and mentions methods of mitigating such attacks1.
近年来,物联网(IoT)设备越来越受欢迎。随着物联网设备使用量的增加,用户更容易受到网络攻击。必须彻底分析针对物联网设备的威胁,以制定针对它们的保护机制。攻击者发起攻击的目的是寻找网络中的薄弱环节,一旦发现,连接到网络上的设备就成为攻击者的首要目标。工业物联网(IIoT)是由于物联网设备的普及而出现的,它们用于连接大型制造工厂的机器、传感器和执行器。通过将工业物联网纳入其设施,公司可以通过降低运营成本和提高生产率而受益。然而,由于工业物联网依赖于利用互联网进行操作,如果不考虑安全性,它很容易受到网络攻击。在看到IIoT的优势之后,智能工业的新版本被称为工业4.0。工业4.0结合了云和雾计算、网络物理系统(CPS)和数据分析,以实现制造过程的自动化。本文调查了攻击者可以针对这些设备发起的不同类型的攻击,并提到了减轻此类攻击的方法1。
{"title":"A survey on Classification of Cyber-attacks on IoT and IIoT devices","authors":"Y. Shah, S. Sengupta","doi":"10.1109/UEMCON51285.2020.9298138","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298138","url":null,"abstract":"Internet of Things (IoT) devices have gained popularity in recent years. With the increased usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT devices must be analyzed thoroughly to develop protection mechanisms against them. An attacker’s purpose behind launching an attack is to find a weak link within a network and once discovered, the devices connected to the network become the primary target for the attackers. Industrial Internet of Things (IIoT) emerged due to the popularity of IoT devices and they are used to interconnect machines, sensors, and actuators at large manufacturing plants. By incorporating IIoT at their facilities companies have benefited by reducing operational costs and increasing productivity. However, as IIoT relies on utilizing the Internet to operate it is vulnerable to Cyber-attacks if security is not taken into consideration. After seeing the advantages of IIoT, a new version of smart industries has been introduced called Industry 4.0. Industry 4.0 combines cloud and fog computing, cyber-physical systems (CPS), and data analytics to automate the manufacturing process. This paper surveys the different classifications of attacks that an attacker can launch against these devices and mentions methods of mitigating such attacks1.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125137835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Towards Adversarially Robust DDoS-Attack Classification 对抗鲁棒ddos攻击分类研究
Michael Guarino, Pablo Rivas, C. DeCusatis
On the frontier of cybersecurity are a class of emergent security threats that learn to find vulnerabilities in machine learning systems. A supervised machine learning classifier learns a mapping from x to y where x is the input features and y is a vector of associated labels. Neural Networks are state of the art performers on most vision, audio, and natural language processing tasks. Neural Networks have been shown to be vulnerable to adversarial perturbations of the input, which cause them to misclassify with high confidence. Adversarial perturbations are small but targeted modifications to the input often undetectable by the human eye. Adversarial perturbations pose risk to applications that rely on machine learning models. Neural Networks have been shown to be able to classify distributed denial of service (DDoS) attacks by learning a dataset of attack characteristics visualized using three-axis hive plots. In this work we present a novel application of a classifier trained to classify DDoS attacks that is robust to some of the most common, known, classes of gradient-based and gradient-free adversarial attacks.
在网络安全的前沿是一类紧急安全威胁,它们学会在机器学习系统中发现漏洞。监督式机器学习分类器学习从x到y的映射,其中x是输入特征,y是相关标签的向量。神经网络是大多数视觉、音频和自然语言处理任务中最先进的表演者。神经网络已被证明容易受到输入的对抗性扰动的影响,这导致它们在高置信度下进行错误分类。对抗性扰动是对输入的微小但有针对性的修改,通常人眼无法检测到。对抗性扰动对依赖机器学习模型的应用程序构成风险。神经网络已经被证明能够通过学习使用三轴蜂巢图可视化的攻击特征数据集来对分布式拒绝服务(DDoS)攻击进行分类。在这项工作中,我们提出了一种新的分类器应用,该分类器经过训练,可以对一些最常见的、已知的基于梯度和无梯度的对抗性攻击进行稳健分类。
{"title":"Towards Adversarially Robust DDoS-Attack Classification","authors":"Michael Guarino, Pablo Rivas, C. DeCusatis","doi":"10.1109/UEMCON51285.2020.9298167","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298167","url":null,"abstract":"On the frontier of cybersecurity are a class of emergent security threats that learn to find vulnerabilities in machine learning systems. A supervised machine learning classifier learns a mapping from x to y where x is the input features and y is a vector of associated labels. Neural Networks are state of the art performers on most vision, audio, and natural language processing tasks. Neural Networks have been shown to be vulnerable to adversarial perturbations of the input, which cause them to misclassify with high confidence. Adversarial perturbations are small but targeted modifications to the input often undetectable by the human eye. Adversarial perturbations pose risk to applications that rely on machine learning models. Neural Networks have been shown to be able to classify distributed denial of service (DDoS) attacks by learning a dataset of attack characteristics visualized using three-axis hive plots. In this work we present a novel application of a classifier trained to classify DDoS attacks that is robust to some of the most common, known, classes of gradient-based and gradient-free adversarial attacks.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133710813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Unsupervised Learning Algorithm for Deep Recurrent Spiking Neural Networks 深度循环尖峰神经网络的无监督学习算法
Pangao Du, Xianghong Lin, Xiaomei Pi, Xiangwen Wang
Deep recurrent spiking neural networks (DRSNNs) are stacked with the recurrent spiking neural machine (RSNM) modules. However, because of their intricately discontinuous and complex recurrent structures, it is difficult to pre-training the synaptic weights of RSNMs by simple and effective learning method in deep recurrent network. This paper proposed a new unsupervised multi-spike learning rule and the RSNM is trained by this rule, the complex spatiotemporal pattern of spike trains are learned. The spike signal will complete the two processes of forward propagation and reverse reconstruction, and then adjust the synaptic weight according to the error. This algorithm is successfully applied to spike trains, the learning rate and neuron number in the RSNMs are analyzed. In addition, the layer-wise pre-training method of DRSNN is presented, and the reconstruction error shows the algorithm has a better learning effect.
深度循环尖峰神经网络(drsnn)由循环尖峰神经机(RSNM)模块堆叠而成。然而,由于RSNMs具有复杂的不连续和复杂的递归结构,在深度递归网络中,很难用简单有效的学习方法预训练RSNMs的突触权值。本文提出了一种新的无监督多尖峰学习规则,并利用该规则对RSNM进行训练,学习到尖峰序列的复杂时空模式。尖峰信号将完成正向传播和反向重构两个过程,然后根据误差调整突触权值。将该算法成功应用于尖峰序列,分析了rsnm的学习率和神经元数量。此外,提出了DRSNN的分层预训练方法,重构误差表明该算法具有较好的学习效果。
{"title":"An Unsupervised Learning Algorithm for Deep Recurrent Spiking Neural Networks","authors":"Pangao Du, Xianghong Lin, Xiaomei Pi, Xiangwen Wang","doi":"10.1109/UEMCON51285.2020.9298074","DOIUrl":"https://doi.org/10.1109/UEMCON51285.2020.9298074","url":null,"abstract":"Deep recurrent spiking neural networks (DRSNNs) are stacked with the recurrent spiking neural machine (RSNM) modules. However, because of their intricately discontinuous and complex recurrent structures, it is difficult to pre-training the synaptic weights of RSNMs by simple and effective learning method in deep recurrent network. This paper proposed a new unsupervised multi-spike learning rule and the RSNM is trained by this rule, the complex spatiotemporal pattern of spike trains are learned. The spike signal will complete the two processes of forward propagation and reverse reconstruction, and then adjust the synaptic weight according to the error. This algorithm is successfully applied to spike trains, the learning rate and neuron number in the RSNMs are analyzed. In addition, the layer-wise pre-training method of DRSNN is presented, and the reconstruction error shows the algorithm has a better learning effect.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1