首页 > 最新文献

2022 13th International Conference on Information and Communication Technology Convergence (ICTC)最新文献

英文 中文
Online Reinforcement Learning Based HTTP Adaptive Streaming Scheme 基于在线强化学习的HTTP自适应流方案
Jeong-Gu Kang, K. Chung
DASH is an effective way to improve the Quality of Experience (QoE) in video streaming. However, most of the existing schemes depend on heuristic algorithms, and the learning-based methods that have recently started to appear also have a problem in that their performance deteriorates in a specific environment. In this paper, we propose an adaptive streaming scheme that utilizes online reinforcement learning. The proposed scheme adapts to changes in the client's environment by upgrading the ABR model while performing video streaming when QoE degradation is confirmed. In order to adapt the ABR model to the changing network environment, the neural network model is trained with the state-of-the-art reinforcement learning algorithm. The performance of the proposed scheme is evaluated through simulation-based experiments under various network conditions. Through the experimental results, it is confirmed that the proposed scheme shows better performance than the existing schemes.
DASH是提高视频流媒体体验质量的有效途径。然而,现有的大多数方案依赖于启发式算法,而最近开始出现的基于学习的方法也存在在特定环境下性能下降的问题。在本文中,我们提出了一种利用在线强化学习的自适应流方案。提出的方案通过升级ABR模型来适应客户端环境的变化,同时在确认QoE降级时执行视频流。为了使ABR模型适应不断变化的网络环境,采用最先进的强化学习算法对神经网络模型进行训练。通过各种网络条件下的仿真实验,对所提方案的性能进行了评估。实验结果表明,该方案比现有方案具有更好的性能。
{"title":"Online Reinforcement Learning Based HTTP Adaptive Streaming Scheme","authors":"Jeong-Gu Kang, K. Chung","doi":"10.1109/ICTC55196.2022.9952767","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952767","url":null,"abstract":"DASH is an effective way to improve the Quality of Experience (QoE) in video streaming. However, most of the existing schemes depend on heuristic algorithms, and the learning-based methods that have recently started to appear also have a problem in that their performance deteriorates in a specific environment. In this paper, we propose an adaptive streaming scheme that utilizes online reinforcement learning. The proposed scheme adapts to changes in the client's environment by upgrading the ABR model while performing video streaming when QoE degradation is confirmed. In order to adapt the ABR model to the changing network environment, the neural network model is trained with the state-of-the-art reinforcement learning algorithm. The performance of the proposed scheme is evaluated through simulation-based experiments under various network conditions. Through the experimental results, it is confirmed that the proposed scheme shows better performance than the existing schemes.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124282465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A General and Robust Blockchain Storage System based on External Storage Service 基于外部存储服务的通用鲁棒区块链存储系统
Woochang Jeong, Chanik Park
Recently, blockchain technology has emerged as an important technology for executing smart contracts and storing consensus data reliably in decentralized manner. On the other hand, it is required that each node has to maintain the consensus ledger in its local storage. Due to limited storage capacity, most blockchain platforms typically adopt the techniques of checkpointing and pruning the consensus ledger database. However, in case of sensitive data such as financial, healthcare or identity information, there may be some regulations on data maintenance. Thus, we have to keep those data until a specified time interval to meet the regulation compliance. In this paper, we propose a general and robust blockchain storage system, BSS, exploiting large-scale external storage services such as Amazon S3, which stores the entire blockchain consensus ledger from the genesis block. It is general in the sense that BSS is designed to be compatible with any blockchain platform. It is robust in the sense that BSS supports the f-tolerant write operation, which tolerates the malicious behavior of blockchain nodes and external storage service. We show that the BSS meets three security properties: safety, liveness, and external validity.
最近,区块链技术已经成为以分散的方式可靠地执行智能合约和存储共识数据的重要技术。另一方面,要求每个节点必须在其本地存储中维护共识分类帐。由于存储容量有限,大多数区块链平台通常采用检查点和修剪共识分类账数据库的技术。但是,对于财务、医疗保健或身份信息等敏感数据,可能会有一些关于数据维护的规定。因此,我们必须保留这些数据直到指定的时间间隔,以满足法规遵从性。在本文中,我们提出了一个通用的、健壮的区块链存储系统,BSS,利用大规模的外部存储服务,如Amazon S3,它存储了来自创世区块的整个区块链共识分类账。从某种意义上说,BSS被设计为与任何区块链平台兼容。它是健壮的,因为BSS支持f容忍写操作,可以容忍区块链节点和外部存储服务的恶意行为。我们证明了BSS满足三个安全属性:安全性、活动性和外部有效性。
{"title":"A General and Robust Blockchain Storage System based on External Storage Service","authors":"Woochang Jeong, Chanik Park","doi":"10.1109/ICTC55196.2022.9952438","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952438","url":null,"abstract":"Recently, blockchain technology has emerged as an important technology for executing smart contracts and storing consensus data reliably in decentralized manner. On the other hand, it is required that each node has to maintain the consensus ledger in its local storage. Due to limited storage capacity, most blockchain platforms typically adopt the techniques of checkpointing and pruning the consensus ledger database. However, in case of sensitive data such as financial, healthcare or identity information, there may be some regulations on data maintenance. Thus, we have to keep those data until a specified time interval to meet the regulation compliance. In this paper, we propose a general and robust blockchain storage system, BSS, exploiting large-scale external storage services such as Amazon S3, which stores the entire blockchain consensus ledger from the genesis block. It is general in the sense that BSS is designed to be compatible with any blockchain platform. It is robust in the sense that BSS supports the f-tolerant write operation, which tolerates the malicious behavior of blockchain nodes and external storage service. We show that the BSS meets three security properties: safety, liveness, and external validity.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Time-Series Forecast Model with Automated Machine Learning for Heart Rate Forecasting Problem 基于自动机器学习的时间序列预测模型的建立
Huu-Anh-Duc Cap, Trong-Hop Do, D. Lakew, Sungrae Cho
Time series forecasting is currently a very popular field of study. Easily find a variety of time series data in medicine, weather forecasting, biology, supply chain management, stock price forecasting, and more. With the proliferation of data and computing power in recent years, deep learning has become the first choice for building time series predictive models. While traditional Machine Learning models - such as autoregression (AR), Exponential smoothing, or autoregressive integrated moving average (ARIMA) - perform manual conversion of the original raw data set into a set of attributes, and the optimization of the parameter must also be based on feature selection, the Deep Learning model only learns the features directly from the data alone. As a result, it speeds up the data preparation process and can fully learn more complex data patterns. In this paper, we designed LSTM deep learning network using Automated Machine Learning (AutoML) method to predict time series data which is the heart rate data. The results of this model can be applied to the field of medicine and health care.
时间序列预测是目前一个非常热门的研究领域。轻松查找医学、天气预报、生物学、供应链管理、股票价格预测等领域的各种时间序列数据。随着近年来数据和计算能力的激增,深度学习已成为构建时间序列预测模型的首选方法。传统的机器学习模型——如自回归(AR)、指数平滑(Exponential smoothing)或自回归集成移动平均(ARIMA)——将原始原始数据集手动转换为一组属性,参数的优化也必须基于特征选择,而深度学习模型仅直接从数据中学习特征。因此,它加快了数据准备过程,可以充分学习更复杂的数据模式。本文采用自动机器学习(AutoML)方法设计LSTM深度学习网络,对时间序列数据即心率数据进行预测。该模型的结果可应用于医学和卫生保健领域。
{"title":"Building a Time-Series Forecast Model with Automated Machine Learning for Heart Rate Forecasting Problem","authors":"Huu-Anh-Duc Cap, Trong-Hop Do, D. Lakew, Sungrae Cho","doi":"10.1109/ICTC55196.2022.9952797","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952797","url":null,"abstract":"Time series forecasting is currently a very popular field of study. Easily find a variety of time series data in medicine, weather forecasting, biology, supply chain management, stock price forecasting, and more. With the proliferation of data and computing power in recent years, deep learning has become the first choice for building time series predictive models. While traditional Machine Learning models - such as autoregression (AR), Exponential smoothing, or autoregressive integrated moving average (ARIMA) - perform manual conversion of the original raw data set into a set of attributes, and the optimization of the parameter must also be based on feature selection, the Deep Learning model only learns the features directly from the data alone. As a result, it speeds up the data preparation process and can fully learn more complex data patterns. In this paper, we designed LSTM deep learning network using Automated Machine Learning (AutoML) method to predict time series data which is the heart rate data. The results of this model can be applied to the field of medicine and health care.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124992566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments 5G工业物联网环境下基于ai的网络安全增强
Jonghoon Lee, Hyunjin Kim, Chulhee Park, Youngsoo Kim, Jong-Geun Park
The recent 5G networks aim to provide higher speed, lower latency, and greater capacity; therefore, compared to the previous mobile networks, more advanced and intelligent network security is essential for 5G networks. To detect unknown and evolving 5G network intrusions, this paper presents an artificial intelligence (AI)-based network threat detection system to perform data labeling, data filtering, data preprocessing, and data learning for 5G network flow and security event data. The performance evaluations are first conducted on two well-known datasets-NSL-KDD and CICIDS 2017; then, the practical testing of proposed system is performed in 5G industrial IoT environments. To demonstrate detection against network threats in real 5G environments, this study utilizes the 5G model factory, which is downscaled to a real smart factory that comprises a number of 5G industrial IoT-based devices.
最近的5G网络旨在提供更高的速度、更低的延迟和更大的容量;因此,与以往的移动网络相比,5G网络需要更先进、更智能的网络安全。为了检测未知的和不断发展的5G网络入侵,本文提出了一种基于人工智能(AI)的网络威胁检测系统,对5G网络流和安全事件数据进行数据标记、数据过滤、数据预处理和数据学习。首先在nsl - kdd和CICIDS 2017两个知名数据集上进行绩效评估;然后,在5G工业物联网环境中对所提出的系统进行了实际测试。为了演示在真实5G环境中对网络威胁的检测,本研究利用了5G模型工厂,该模型工厂被缩小为一个真实的智能工厂,其中包括许多基于5G工业物联网的设备。
{"title":"AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments","authors":"Jonghoon Lee, Hyunjin Kim, Chulhee Park, Youngsoo Kim, Jong-Geun Park","doi":"10.1109/ICTC55196.2022.9952490","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952490","url":null,"abstract":"The recent 5G networks aim to provide higher speed, lower latency, and greater capacity; therefore, compared to the previous mobile networks, more advanced and intelligent network security is essential for 5G networks. To detect unknown and evolving 5G network intrusions, this paper presents an artificial intelligence (AI)-based network threat detection system to perform data labeling, data filtering, data preprocessing, and data learning for 5G network flow and security event data. The performance evaluations are first conducted on two well-known datasets-NSL-KDD and CICIDS 2017; then, the practical testing of proposed system is performed in 5G industrial IoT environments. To demonstrate detection against network threats in real 5G environments, this study utilizes the 5G model factory, which is downscaled to a real smart factory that comprises a number of 5G industrial IoT-based devices.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123562813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RBCA-Net: Reverse Boundary Channel Attention Network for Kidney Tumor Segmentation in CT images RBCA-Net:用于肾肿瘤CT图像分割的反边界通道关注网络
Gyeongyeon Hwang, Hakyoung Yoon, Yewon Ji, Sang Jun Lee
Recently, as the importance of early diagnosis and treatment of cancer has increased, many studies have been introduced to analyze medical images using deep learning. In medical image analysis task, the lesions segmentation methods uses a Fully Convolutional Network (FCN) architecture such as U-Net to predict the lesion area and play an auxiliary role in medical care. So many researchers are working on improving the performance of architectures. But, there are some challenges in that data is imbalanced and the size and shape of lesions are irregular. To solve these problems, we improved the segmentation performance by using a two-stage cascaded method. In stage 1, coarse region of interest (RoI) was extracted using ResUNet, In stage 2, we use Atrous Spatial Pyramid Pooling (ASPP) to extract features to contain a lot of spatial information using various receptive fields from a pretrained DenseNet-161 backbone. In addition, we introduce the RBCA module that combines Reverse, Boundary, and Channel Attention to capture various sizes and shapes of lesions. The performance of the proposed model shows high performance compared to various architectures using the KiTS19 dataset including kidney and tumor.
近年来,随着癌症早期诊断和治疗重要性的提高,引入了许多使用深度学习分析医学图像的研究。在医学图像分析任务中,病灶分割方法采用U-Net等全卷积网络(Fully Convolutional Network, FCN)架构来预测病灶区域,在医疗护理中起到辅助作用。因此,许多研究人员都致力于提高体系结构的性能。但是,在数据不平衡和病变大小和形状不规则方面存在一些挑战。为了解决这些问题,我们采用了两阶段级联的方法来提高分割性能。在第一阶段,我们使用ResUNet提取粗感兴趣区域(RoI),在第二阶段,我们使用阿特拉斯空间金字塔池(ASPP)从预训练的DenseNet-161主干中提取包含大量空间信息的特征。此外,我们还介绍了RBCA模块,该模块结合了反向,边界和通道注意来捕获各种大小和形状的病变。与使用KiTS19数据集(包括肾脏和肿瘤)的各种架构相比,所提出的模型的性能显示出高性能。
{"title":"RBCA-Net: Reverse Boundary Channel Attention Network for Kidney Tumor Segmentation in CT images","authors":"Gyeongyeon Hwang, Hakyoung Yoon, Yewon Ji, Sang Jun Lee","doi":"10.1109/ICTC55196.2022.9952992","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952992","url":null,"abstract":"Recently, as the importance of early diagnosis and treatment of cancer has increased, many studies have been introduced to analyze medical images using deep learning. In medical image analysis task, the lesions segmentation methods uses a Fully Convolutional Network (FCN) architecture such as U-Net to predict the lesion area and play an auxiliary role in medical care. So many researchers are working on improving the performance of architectures. But, there are some challenges in that data is imbalanced and the size and shape of lesions are irregular. To solve these problems, we improved the segmentation performance by using a two-stage cascaded method. In stage 1, coarse region of interest (RoI) was extracted using ResUNet, In stage 2, we use Atrous Spatial Pyramid Pooling (ASPP) to extract features to contain a lot of spatial information using various receptive fields from a pretrained DenseNet-161 backbone. In addition, we introduce the RBCA module that combines Reverse, Boundary, and Channel Attention to capture various sizes and shapes of lesions. The performance of the proposed model shows high performance compared to various architectures using the KiTS19 dataset including kidney and tumor.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of real-Time 4K drone images visualization to rescue for missing people base on web 基于web的失踪人员救援实时4K无人机图像可视化研究
Sang-Su Kim, Heesoo Jung, Seung-Jae Lee, Jin-ho Park, Sung-Hwan Yu, Jun-Hui Go
Recently, interest in the use of drones has increased, and drones are being actively introduced in various fields. We are trying to develop and use drones in various fields such as national defense, logistics, life safety, facility safety management, forest protection and monitoring, but there are still restrictions on the use of drones. The biggest limitation is the use of drones on land such as mountains and rivers. For example, if the police are searching for a missing person in an area with mountains, bushes, and a large river, multiple police personnel must visually check the drone footage on site every day. And then there's the problem of finding a missing person or lost article of a missing person and having to re-search where it was found. Therefore, the visualization technology proposed in this paper is a technology that visualizes real-time spatial mapping of drone images taken in real time onto a web-based 2D map. In cooperation with the missing person search AI inference function, the AI analysis result video is mapped on a web-based 2D map in real time. AI analysis results are visualized in real time on a web map using spatial information among the meta information in the video.
近年来,人们对无人机的使用兴趣有所增加,在各个领域都在积极引入无人机。我们正在尝试在国防、后勤、生命安全、设施安全管理、森林保护和监测等各个领域开发和使用无人机,但无人机的使用仍然存在限制。最大的限制是无人机在山地和河流等陆地上的使用。例如,如果警方在有山脉、灌木丛和大河的地区寻找失踪者,就需要多名警察每天在现场目视检查无人机的画面。然后是寻找失踪人口或失踪人口丢失物品的问题,并且必须研究它的发现地点。因此,本文提出的可视化技术是一种将无人机实时拍摄的图像实时空间映射到基于web的二维地图上的技术。配合失踪人员搜索AI推理功能,将AI分析结果视频实时映射到基于web的二维地图上。人工智能分析结果利用视频元信息中的空间信息在网络地图上实时可视化。
{"title":"A Study of real-Time 4K drone images visualization to rescue for missing people base on web","authors":"Sang-Su Kim, Heesoo Jung, Seung-Jae Lee, Jin-ho Park, Sung-Hwan Yu, Jun-Hui Go","doi":"10.1109/ICTC55196.2022.9952607","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952607","url":null,"abstract":"Recently, interest in the use of drones has increased, and drones are being actively introduced in various fields. We are trying to develop and use drones in various fields such as national defense, logistics, life safety, facility safety management, forest protection and monitoring, but there are still restrictions on the use of drones. The biggest limitation is the use of drones on land such as mountains and rivers. For example, if the police are searching for a missing person in an area with mountains, bushes, and a large river, multiple police personnel must visually check the drone footage on site every day. And then there's the problem of finding a missing person or lost article of a missing person and having to re-search where it was found. Therefore, the visualization technology proposed in this paper is a technology that visualizes real-time spatial mapping of drone images taken in real time onto a web-based 2D map. In cooperation with the missing person search AI inference function, the AI analysis result video is mapped on a web-based 2D map in real time. AI analysis results are visualized in real time on a web map using spatial information among the meta information in the video.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing Iterations of Grover Search Algorithm for N-Queen Problem U sing Quantum Permutation States 利用量子排列态减少n -皇后问题的Grover搜索算法的迭代
Jinyoung Ha, Jun Heo
In this paper, we propose a construction method of Grover's algorithm to solve the N-Queen problem. Quantum permutation state was designed and applied to the initialization and amplitude amplification process in Grover's algorithm. An oracle-level quantum circuit was constructed using Boolean algebraic expressions. We reduced the number of iterations of the Grover's algorithm by decreasing the number of superposed inputs in the initialize step using quantum permutation state. We show that our algorithm has less time complexity compared to previous study that solved the N -Queen problem using Grover's algorithm with W state as a input.
本文提出了一种求解N-Queen问题的Grover算法的构造方法。设计了量子排列态,并将其应用于Grover算法的初始化和振幅放大过程。用布尔代数表达式构造了一个神谕级量子电路。我们通过使用量子置换状态减少初始化步骤中叠加输入的数量来减少Grover算法的迭代次数。我们表明,与之前使用W状态作为输入的Grover算法解决N -Queen问题的研究相比,我们的算法具有更低的时间复杂度。
{"title":"Reducing Iterations of Grover Search Algorithm for N-Queen Problem U sing Quantum Permutation States","authors":"Jinyoung Ha, Jun Heo","doi":"10.1109/ICTC55196.2022.9952402","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952402","url":null,"abstract":"In this paper, we propose a construction method of Grover's algorithm to solve the N-Queen problem. Quantum permutation state was designed and applied to the initialization and amplitude amplification process in Grover's algorithm. An oracle-level quantum circuit was constructed using Boolean algebraic expressions. We reduced the number of iterations of the Grover's algorithm by decreasing the number of superposed inputs in the initialize step using quantum permutation state. We show that our algorithm has less time complexity compared to previous study that solved the N -Queen problem using Grover's algorithm with W state as a input.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Security Architecture for Industry 4.0 Applications based on Software-Defined Networking 基于软件定义网络的工业4.0应用增强安全架构
Anichur Rahman, K. Hasan, Seong-Ho Jeong
Software-Defined Networking (SDN) can be a good option to support Industry 4.0 (4IR) and 5G wireless networks. SDN can also be a secure networking solution that improves the security, capability, and programmability in the networks. In this paper, we present and analyze an SDN-based security architecture for 4IR with 5G. SDN is used for increasing the level of security and reliability of the network by suitably dividing the whole network into data, control, and applications planes. The SDN control layer plays a beneficial role in 4IR with 5G scenarios by managing the data flow properly. We also evaluate the performance of the proposed architecture in terms of key parameters such as data transmission rate and response time.
软件定义网络(SDN)是支持工业4.0 (4IR)和5G无线网络的一个很好的选择。SDN还可以作为一种安全的网络解决方案,提高网络的安全性、功能和可编程性。在本文中,我们提出并分析了一种基于sdn的5G 4IR安全架构。SDN将整个网络合理划分为数据平面、控制平面和应用平面,以提高网络的安全性和可靠性。SDN控制层通过正确管理数据流,在4IR和5G场景中发挥有益的作用。我们还根据数据传输速率和响应时间等关键参数评估了所提出架构的性能。
{"title":"An Enhanced Security Architecture for Industry 4.0 Applications based on Software-Defined Networking","authors":"Anichur Rahman, K. Hasan, Seong-Ho Jeong","doi":"10.1109/ICTC55196.2022.9952633","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952633","url":null,"abstract":"Software-Defined Networking (SDN) can be a good option to support Industry 4.0 (4IR) and 5G wireless networks. SDN can also be a secure networking solution that improves the security, capability, and programmability in the networks. In this paper, we present and analyze an SDN-based security architecture for 4IR with 5G. SDN is used for increasing the level of security and reliability of the network by suitably dividing the whole network into data, control, and applications planes. The SDN control layer plays a beneficial role in 4IR with 5G scenarios by managing the data flow properly. We also evaluate the performance of the proposed architecture in terms of key parameters such as data transmission rate and response time.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Vulnerabilities of Service Workers 服务工作者脆弱性调查
Yeomin Jeong, Junbeom Hur
In a Progressive Web App (PWA), a kind of application software of the web, a service worker (SW) plays a key role as a one of the fundamental components to enhance the user's browsing experiences. For this purpose, the SW supports several features such as push notification, offline access, background code execution, etc. Since the SW provides prolific capabilities, it has been the main target to abuse by malicious attackers to deliver diverse attacks through the web applications such as crypto-currency mining, history sniffing, phishing. In this paper, we introduce the SW's functionalities and vulnerabilities, and discuss the existing attack methodologies and their implications.
在渐进式Web应用程序(Progressive Web App, PWA)中,service worker (SW)作为增强用户浏览体验的基础组件之一,发挥着关键作用。为此,软件支持推送通知、脱机访问、后台代码执行等功能。由于SW提供了丰富的功能,它一直是恶意攻击者滥用的主要目标,通过web应用程序提供各种攻击,如加密货币挖掘,历史嗅探,网络钓鱼。在本文中,我们介绍了软件的功能和漏洞,讨论了现有的攻击方法及其影响。
{"title":"A Survey on Vulnerabilities of Service Workers","authors":"Yeomin Jeong, Junbeom Hur","doi":"10.1109/ICTC55196.2022.9952818","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952818","url":null,"abstract":"In a Progressive Web App (PWA), a kind of application software of the web, a service worker (SW) plays a key role as a one of the fundamental components to enhance the user's browsing experiences. For this purpose, the SW supports several features such as push notification, offline access, background code execution, etc. Since the SW provides prolific capabilities, it has been the main target to abuse by malicious attackers to deliver diverse attacks through the web applications such as crypto-currency mining, history sniffing, phishing. In this paper, we introduce the SW's functionalities and vulnerabilities, and discuss the existing attack methodologies and their implications.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122322310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Nanophotonic Devices using Multi Objective Optimization Method 基于多目标优化方法的纳米光子器件设计
Xun Lu, Yong Kyu Kim, Seong-min Lee, Chengjun Jin, Seong-Cheol Byeon, Tasadduq Hussain, Muzahir Ali, Seok-min Kim
The performance of nanophotonic devices was very sensitive and nonlinear to the structural design parameters. In this manuscript, two examples of multi-objective optimizations using the response surface method and Kriging surrogate model with the disability function for the designing of nanophotonic devices were introduced. Although reasonable optimum design parameters could be obtained using performance expectation models after the proper selection of key design factors and ranges of design factors, a machine learning method with big data could be a powerful solution for the extensive parametric analysis and optimization in the design of nanophotonic devices.
纳米光子器件的性能对结构参数非常敏感且非线性。本文介绍了两个应用响应面法和Kriging代理模型进行纳米光子器件设计的多目标优化实例。虽然在合理选择关键设计因子和设计因子范围后,可以通过性能期望模型获得合理的优化设计参数,但基于大数据的机器学习方法可以为纳米光子器件设计中广泛的参数分析和优化提供有力的解决方案。
{"title":"Design of Nanophotonic Devices using Multi Objective Optimization Method","authors":"Xun Lu, Yong Kyu Kim, Seong-min Lee, Chengjun Jin, Seong-Cheol Byeon, Tasadduq Hussain, Muzahir Ali, Seok-min Kim","doi":"10.1109/ICTC55196.2022.9952410","DOIUrl":"https://doi.org/10.1109/ICTC55196.2022.9952410","url":null,"abstract":"The performance of nanophotonic devices was very sensitive and nonlinear to the structural design parameters. In this manuscript, two examples of multi-objective optimizations using the response surface method and Kriging surrogate model with the disability function for the designing of nanophotonic devices were introduced. Although reasonable optimum design parameters could be obtained using performance expectation models after the proper selection of key design factors and ranges of design factors, a machine learning method with big data could be a powerful solution for the extensive parametric analysis and optimization in the design of nanophotonic devices.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"615 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1