首页 > 最新文献

2021 IEEE World AI IoT Congress (AIIoT)最新文献

英文 中文
OCTAI: Smartphone-based Optical Coherence Tomography Image Analysis System OCTAI:基于智能手机的光学相干断层成像分析系统
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454200
A. Rao, H. Fishman
Identifying diseases in Optical Coherence Tomography (OCT) images using Deep Learning models and methods is emerging as a powerful technique to enhance clinical diagnosis. Identifying macular diseases in the eye at an early stage and preventing misdiagnosis is crucial. The current methods developed for OCT image analysis have not yet been integrated into an accessible form-factor that can be utilized in a real-life scenario by Ophthalmologists. Additionally, current methods do not employ robust multiple metric feedback. This paper proposes a highly accurate smartphone-based Deep Learning system, OCTAI, that allows a user to take an OCT picture and receive real-time feedback through on-device inference. OCTAI analyzes the input OCT image in three different ways: (1) full image analysis, (2) quadrant based analysis, and (3) disease detection based analysis. With these three analysis methods, along with an Ophthalmologist's interpretation, a robust diagnosis can potentially be made. The ultimate goal of OCTAI is to assist Ophthalmologists in making a diagnosis through a digital second opinion and enabling them to cross-check their diagnosis before making a decision based on purely manual analysis of OCT images. OCTAI has the potential to allow Ophthalmologists to improve their diagnosis and may reduce misdiagnosis rates, leading to faster treatment of diseases.
利用深度学习模型和方法在光学相干断层扫描(OCT)图像中识别疾病正成为一种增强临床诊断的强大技术。早期识别黄斑病变,防止误诊是至关重要的。目前为OCT图像分析开发的方法尚未集成到可被眼科医生在现实生活中使用的可访问的形式因素中。此外,目前的方法不采用鲁棒多度量反馈。本文提出了一种高度精确的基于智能手机的深度学习系统OCTAI,该系统允许用户拍摄OCT照片并通过设备上的推理接收实时反馈。OCTAI以三种不同的方式分析输入的OCT图像:(1)全图像分析,(2)基于象限的分析,(3)基于疾病检测的分析。有了这三种分析方法,再加上眼科医生的解释,就有可能做出可靠的诊断。OCTAI的最终目标是帮助眼科医生通过数字第二意见进行诊断,并使他们能够在基于纯手动分析OCT图像做出决定之前交叉检查他们的诊断。OCTAI有可能让眼科医生改善他们的诊断,并可能减少误诊率,从而更快地治疗疾病。
{"title":"OCTAI: Smartphone-based Optical Coherence Tomography Image Analysis System","authors":"A. Rao, H. Fishman","doi":"10.1109/AIIoT52608.2021.9454200","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454200","url":null,"abstract":"Identifying diseases in Optical Coherence Tomography (OCT) images using Deep Learning models and methods is emerging as a powerful technique to enhance clinical diagnosis. Identifying macular diseases in the eye at an early stage and preventing misdiagnosis is crucial. The current methods developed for OCT image analysis have not yet been integrated into an accessible form-factor that can be utilized in a real-life scenario by Ophthalmologists. Additionally, current methods do not employ robust multiple metric feedback. This paper proposes a highly accurate smartphone-based Deep Learning system, OCTAI, that allows a user to take an OCT picture and receive real-time feedback through on-device inference. OCTAI analyzes the input OCT image in three different ways: (1) full image analysis, (2) quadrant based analysis, and (3) disease detection based analysis. With these three analysis methods, along with an Ophthalmologist's interpretation, a robust diagnosis can potentially be made. The ultimate goal of OCTAI is to assist Ophthalmologists in making a diagnosis through a digital second opinion and enabling them to cross-check their diagnosis before making a decision based on purely manual analysis of OCT images. OCTAI has the potential to allow Ophthalmologists to improve their diagnosis and may reduce misdiagnosis rates, leading to faster treatment of diseases.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of a MATLAB Web-based Application for Calculating Ionospheric Scintillation Proxy Indexes (S4p-1 and S4p-2) and the Rate of Total Electron Content Index (RoTI) 基于MATLAB的电离层闪烁代理指数(S4p-1和S4p-2)和总电子含量指数(RoTI)计算应用程序的开发
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454235
Kyle Ezekiel S. Juadines, A. Ballado, E. Macalalad, Merlin M. Mendoza
In this paper, a web-based application for calculating ionospheric scintillation proxy indexes (S4p-l and S4p-2) and rate of total electron content index (RoTI) was developed using MATLAB. Ionospheric scintillation is a phenomenon described by rapid temporal fluctuations of incoming radio wave signals passing through irregularities in the ionosphere. Through the internet, this application can accept multiple high-rate GNSS data (compressed RINEX file) maximum of 1-day data (96 GNSS files), extracting the pseudo-range numbers, carrier-to-noise ratio (C/No) data, phase measurement data, and accept GPS daily navigational data (brdc) and then calculate and graph the ionospheric scintillation proxy indexes and RoTI.
本文利用MATLAB开发了基于web的电离层闪烁代理指数(s4p - 1和S4p-2)和总电子含量率指数(RoTI)计算应用程序。电离层闪烁是一种现象,描述的是传入的无线电波信号通过电离层中的不规则结构时的快速时间波动。通过互联网,本应用程序可以接收多个高速率GNSS数据(压缩RINEX文件)最多1天的数据(96个GNSS文件),提取伪距离数、载波噪声比(C/No)数据、相位测量数据,接收GPS日导航数据(brdc),计算并绘制电离层闪烁代理指数和RoTI。
{"title":"Development of a MATLAB Web-based Application for Calculating Ionospheric Scintillation Proxy Indexes (S4p-1 and S4p-2) and the Rate of Total Electron Content Index (RoTI)","authors":"Kyle Ezekiel S. Juadines, A. Ballado, E. Macalalad, Merlin M. Mendoza","doi":"10.1109/AIIoT52608.2021.9454235","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454235","url":null,"abstract":"In this paper, a web-based application for calculating ionospheric scintillation proxy indexes (S4p-l and S4p-2) and rate of total electron content index (RoTI) was developed using MATLAB. Ionospheric scintillation is a phenomenon described by rapid temporal fluctuations of incoming radio wave signals passing through irregularities in the ionosphere. Through the internet, this application can accept multiple high-rate GNSS data (compressed RINEX file) maximum of 1-day data (96 GNSS files), extracting the pseudo-range numbers, carrier-to-noise ratio (C/No) data, phase measurement data, and accept GPS daily navigational data (brdc) and then calculate and graph the ionospheric scintillation proxy indexes and RoTI.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129335574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Automatic Soil Testing Machine for Accurate Fertilization 一种精确施肥的自动测土仪
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454248
N. Tasneem, Md Anik Hasan, Sumaiya Binte Akther, Mohammad Monirujjaman Khan
The work aims to propose a research and development project to prepare a device that can test sample of soil from the field and the testing sample will give suggestion about required amount of fertilizer. The device will work as a datasheet for the users. In the soil sample, the proposed device will measure the level of different nutrients in the soil NPK (nitrogen, phosphorus and potassium) values using the Beer's law method. An Arduino is used for microcontroller. Different light colors are used to light up watery soil solution under testing. Light gets bounce back from solution. It depends upon its absorbent reflectance of soil. Reflected light is received by another Light Depending Resistor (LDR) which is converted into electrical signal. With the help of Microcontroller, the proposed device can measure soil nutrients. It will be helpful for the farmers to cultivate in a smart way to get more quality products.
本工作拟提出一个研发项目,研制一种能够对田间土壤样品进行检测并根据检测样品给出所需肥料用量建议的装置。该设备将作为用户的数据表。在土壤样品中,该装置将利用比尔定律方法测量土壤中不同营养物质的NPK(氮、磷、钾)值。微控制器使用Arduino。不同颜色的光被用来照亮测试中的含水土壤溶液。光被溶液反射回来。它取决于它对土壤的吸收反射率。反射光被另一个光依赖电阻(LDR)接收,LDR被转换成电信号。在单片机的帮助下,该装置可以测量土壤养分。这将有助于农民以明智的方式种植,以获得更多的优质产品。
{"title":"An Automatic Soil Testing Machine for Accurate Fertilization","authors":"N. Tasneem, Md Anik Hasan, Sumaiya Binte Akther, Mohammad Monirujjaman Khan","doi":"10.1109/AIIoT52608.2021.9454248","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454248","url":null,"abstract":"The work aims to propose a research and development project to prepare a device that can test sample of soil from the field and the testing sample will give suggestion about required amount of fertilizer. The device will work as a datasheet for the users. In the soil sample, the proposed device will measure the level of different nutrients in the soil NPK (nitrogen, phosphorus and potassium) values using the Beer's law method. An Arduino is used for microcontroller. Different light colors are used to light up watery soil solution under testing. Light gets bounce back from solution. It depends upon its absorbent reflectance of soil. Reflected light is received by another Light Depending Resistor (LDR) which is converted into electrical signal. With the help of Microcontroller, the proposed device can measure soil nutrients. It will be helpful for the farmers to cultivate in a smart way to get more quality products.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Analysis of Lithium Ion Battery Input Profiles for Remaining Useful Life Prediction by Cascade Forward Neural Network 级联前向神经网络预测锂离子电池剩余使用寿命的输入曲线对比分析
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454234
Shaheer Ansari, A. Ayob, M. Lipu, M. Saad, A. Hussain
The Remaining Useful Life (RUL) of a battery is very important factor to allow for efficient working of all associated systems. In this paper, a Multi-Battery Input Profile (MBIP) based Cascade Forward Neural Network (CFNN) model is proposed to predict the RUL of Lithium-ion battery. The proposed model was trained by utilizing the NASA battery datasets. In addition, systematic sampling was observed to extract the data from the parameters of charging profile of the battery. Four batteries namely B0005, B0006, B0007 and B0018 are utilized and experiment was performed while training the model with 70:30 ratios. The prediction accuracy of the model in case of B0006 and B0018 was lower as compared with B0005 and B0007 due to the effect of capacity regeneration phenomena. The proposed methodology of CFNN based MBIP is validated with Single-Battery Input Profile (SBIP). Several performance metrics such as Root Mean Square Error (RMSE), Mean Squared Error (MSE) and Mean Absolute Error (MAE) are observed.
电池的剩余使用寿命(RUL)是确保所有相关系统有效工作的重要因素。本文提出了一种基于多电池输入轮廓(MBIP)的级联前向神经网络(CFNN)模型来预测锂离子电池的RUL。该模型利用NASA电池数据集进行训练。此外,通过系统采样观察,从电池充电曲线参数中提取数据。利用B0005、B0006、B0007、B0018四个电芯,在以70:30的比例训练模型的同时进行实验。由于容量再生现象的影响,模型对B0006和B0018的预测精度低于B0005和B0007。用单电池输入轮廓(ship)验证了基于CFNN的MBIP方法。观察了几个性能指标,如均方根误差(RMSE),均方误差(MSE)和平均绝对误差(MAE)。
{"title":"A Comparative Analysis of Lithium Ion Battery Input Profiles for Remaining Useful Life Prediction by Cascade Forward Neural Network","authors":"Shaheer Ansari, A. Ayob, M. Lipu, M. Saad, A. Hussain","doi":"10.1109/AIIoT52608.2021.9454234","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454234","url":null,"abstract":"The Remaining Useful Life (RUL) of a battery is very important factor to allow for efficient working of all associated systems. In this paper, a Multi-Battery Input Profile (MBIP) based Cascade Forward Neural Network (CFNN) model is proposed to predict the RUL of Lithium-ion battery. The proposed model was trained by utilizing the NASA battery datasets. In addition, systematic sampling was observed to extract the data from the parameters of charging profile of the battery. Four batteries namely B0005, B0006, B0007 and B0018 are utilized and experiment was performed while training the model with 70:30 ratios. The prediction accuracy of the model in case of B0006 and B0018 was lower as compared with B0005 and B0007 due to the effect of capacity regeneration phenomena. The proposed methodology of CFNN based MBIP is validated with Single-Battery Input Profile (SBIP). Several performance metrics such as Root Mean Square Error (RMSE), Mean Squared Error (MSE) and Mean Absolute Error (MAE) are observed.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adversarial Black-Box Attacks Against Network Intrusion Detection Systems: A Survey 针对网络入侵检测系统的对抗性黑盒攻击:综述
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454214
Huda Ali Alatwi, A. Aldweesh
Due to their massive success in various domains, deep learning techniques are increasingly used to design network intrusion detection solutions that detect and mitigate unknown and known attacks with high accuracy detection rates and minimal feature engineering. However, it has been found that deep learning models are vulnerable to data instances that can mislead the model to make incorrect classification decisions socalled adversarial examples. Such vulnerability allows attackers to target NIDSs in a black-box setting by adding small crafty perturbations to the malicious traffic to evade detection and disrupt the system's critical functionalities. Yet, little researches have addressed the risks of black-box adversarial attacks against NIDS and proposed mitigation solutions. This survey explores this research problem and identifies open issues and certain areas that demand further research for considerable impacts.
由于其在各个领域的巨大成功,深度学习技术越来越多地用于设计网络入侵检测解决方案,以高精度的检测率和最小的特征工程来检测和减轻未知和已知的攻击。然而,人们发现深度学习模型容易受到数据实例的影响,这些数据实例可能会误导模型做出错误的分类决策,即所谓的对抗性示例。这种漏洞允许攻击者通过在恶意流量中添加小的狡猾的扰动来逃避检测并破坏系统的关键功能,从而在黑盒设置中瞄准nids。然而,很少有研究涉及针对网络入侵防御系统的黑盒对抗性攻击的风险,并提出缓解解决方案。本调查探讨了这一研究问题,并确定了开放的问题和某些领域,需要进一步研究的重大影响。
{"title":"Adversarial Black-Box Attacks Against Network Intrusion Detection Systems: A Survey","authors":"Huda Ali Alatwi, A. Aldweesh","doi":"10.1109/AIIoT52608.2021.9454214","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454214","url":null,"abstract":"Due to their massive success in various domains, deep learning techniques are increasingly used to design network intrusion detection solutions that detect and mitigate unknown and known attacks with high accuracy detection rates and minimal feature engineering. However, it has been found that deep learning models are vulnerable to data instances that can mislead the model to make incorrect classification decisions socalled adversarial examples. Such vulnerability allows attackers to target NIDSs in a black-box setting by adding small crafty perturbations to the malicious traffic to evade detection and disrupt the system's critical functionalities. Yet, little researches have addressed the risks of black-box adversarial attacks against NIDS and proposed mitigation solutions. This survey explores this research problem and identifies open issues and certain areas that demand further research for considerable impacts.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mutually Private Verifiable Machine Learning As-a-service: A Distributed Approach 相互私有的可验证机器学习即服务:一种分布式方法
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454203
Shadan Ghaffaripour, A. Miri
Reliability is a crucial component to machine-learning-as-a-service platforms, as more and more critical applications depend on them. Thus, mechanisms employed to assure the integrity of computations performed on such platforms are pivotal to their robust functioning. Moreover, privacy protection, and performance guarantee at scale, are other major challenges surrounding these platforms that are by no means straightforward to overcome at the same time. In this paper, we have proposed a novel distributed approach, which uses specialized composable proof systems at its core, to respond to these challenges. At a high level, we adopt a divide-and-conquer approach to build efficient proof systems for machine-learning-based services in order to ensure the correctness of results. More precisely, the mathematical formulation of the machine learning task is divided into multiple parts, each of which is handled by a different specialized proof system; these proof systems are then combined with the commit-and-prove methodology to guarantee correctness as a whole. With privacy safeguards built into the design, our approach also assures that neither user data nor model parameters, which constitute the intellectual property of service providers are exposed in the process. We have showcased the usability of our approach within a machine learning service provider that offers classification services through a linear support vector machine (SVM) model. Our complexity analysis indicates that our system could be used in practical settings.
可靠性是机器学习即服务平台的关键组成部分,因为越来越多的关键应用依赖于它们。因此,用于确保在此类平台上执行的计算的完整性的机制对其稳健功能至关重要。此外,隐私保护和大规模性能保证是围绕这些平台的其他主要挑战,同时也绝非易事。在本文中,我们提出了一种新的分布式方法,它以专门的可组合证明系统为核心,来应对这些挑战。在高层次上,我们采用分而治之的方法为基于机器学习的服务构建高效的证明系统,以确保结果的正确性。更准确地说,机器学习任务的数学公式分为多个部分,每个部分由不同的专业证明系统处理;然后将这些证明系统与提交-证明方法结合起来,以保证整体上的正确性。由于在设计中内置了隐私保护措施,我们的方法还确保构成服务提供商知识产权的用户数据和模型参数不会在流程中暴露。我们已经在一个机器学习服务提供商中展示了我们方法的可用性,该服务提供商通过线性支持向量机(SVM)模型提供分类服务。我们的复杂性分析表明,我们的系统可以在实际环境中使用。
{"title":"Mutually Private Verifiable Machine Learning As-a-service: A Distributed Approach","authors":"Shadan Ghaffaripour, A. Miri","doi":"10.1109/AIIoT52608.2021.9454203","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454203","url":null,"abstract":"Reliability is a crucial component to machine-learning-as-a-service platforms, as more and more critical applications depend on them. Thus, mechanisms employed to assure the integrity of computations performed on such platforms are pivotal to their robust functioning. Moreover, privacy protection, and performance guarantee at scale, are other major challenges surrounding these platforms that are by no means straightforward to overcome at the same time. In this paper, we have proposed a novel distributed approach, which uses specialized composable proof systems at its core, to respond to these challenges. At a high level, we adopt a divide-and-conquer approach to build efficient proof systems for machine-learning-based services in order to ensure the correctness of results. More precisely, the mathematical formulation of the machine learning task is divided into multiple parts, each of which is handled by a different specialized proof system; these proof systems are then combined with the commit-and-prove methodology to guarantee correctness as a whole. With privacy safeguards built into the design, our approach also assures that neither user data nor model parameters, which constitute the intellectual property of service providers are exposed in the process. We have showcased the usability of our approach within a machine learning service provider that offers classification services through a linear support vector machine (SVM) model. Our complexity analysis indicates that our system could be used in practical settings.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative Fog Computing Architecture for Privacy-Preserving Data Aggregation 保护隐私数据聚合的协同雾计算体系结构
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454198
H. Qusa, Jumana Tarazi
The increased digitization of several critical infrastructure services on Internet like home banking, online payments, etc. exposes them to a range of sophisticated information security attacks. Thus, there is an urgent need for strong collaboration between all governmental and non-governmental organizations in order to form the defenses by sharing. Sharing and analyzing sensitive traffic data is an important aspect to protect critical infrastructures. However, privacy concerns of the data contributors about sharing their sensitive data prevent them from gaining the benefits from collaboration, or at least weaken it to a degree of insufficiency. To cope with those privacy concerns, we extend our preceding work about constructing an efficient framework for personal collaborative event processing permitting information sharing and processing amongst administratively and geographically disjoint organizations. The structure is able to aggregating and correlating events coming from the organizations in near real-time while preserving the privacy of sensitive data even in case of coalition among the entities in the environment. The key novelty of the structure is the use of a pseudorandom oracle capability dispensed among the use of FOG structure among the organizations collaborating to the system for obfuscating the data, that permits for achieving a good level of privacy at the same time as guaranteeing scalability in both dimensions: horizontally (range of collaborators) and vertically (range of dataset per collaborator).
互联网上一些关键基础设施服务(如家庭银行、在线支付等)的数字化程度不断提高,使它们面临一系列复杂的信息安全攻击。因此,迫切需要在所有政府组织和非政府组织之间进行强有力的合作,以便通过分享来形成防御。共享和分析敏感的交通数据是保护关键基础设施的一个重要方面。然而,数据贡献者对共享其敏感数据的隐私担忧使他们无法从协作中获益,或者至少在一定程度上削弱了协作的不足。为了解决这些隐私问题,我们扩展了之前的工作,构建了一个有效的个人协作事件处理框架,允许在管理和地理上不相关的组织之间共享和处理信息。该结构能够近乎实时地聚合和关联来自组织的事件,同时即使在环境中的实体之间联合的情况下也能保护敏感数据的隐私。该结构的关键新颖之处在于,在使用FOG结构的组织之间分配了伪随机oracle功能,这些组织与系统协作以混淆数据,这允许在保证两个维度的可伸缩性的同时实现良好的隐私级别:水平(合作者的范围)和垂直(每个合作者的数据集范围)。
{"title":"Collaborative Fog Computing Architecture for Privacy-Preserving Data Aggregation","authors":"H. Qusa, Jumana Tarazi","doi":"10.1109/AIIoT52608.2021.9454198","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454198","url":null,"abstract":"The increased digitization of several critical infrastructure services on Internet like home banking, online payments, etc. exposes them to a range of sophisticated information security attacks. Thus, there is an urgent need for strong collaboration between all governmental and non-governmental organizations in order to form the defenses by sharing. Sharing and analyzing sensitive traffic data is an important aspect to protect critical infrastructures. However, privacy concerns of the data contributors about sharing their sensitive data prevent them from gaining the benefits from collaboration, or at least weaken it to a degree of insufficiency. To cope with those privacy concerns, we extend our preceding work about constructing an efficient framework for personal collaborative event processing permitting information sharing and processing amongst administratively and geographically disjoint organizations. The structure is able to aggregating and correlating events coming from the organizations in near real-time while preserving the privacy of sensitive data even in case of coalition among the entities in the environment. The key novelty of the structure is the use of a pseudorandom oracle capability dispensed among the use of FOG structure among the organizations collaborating to the system for obfuscating the data, that permits for achieving a good level of privacy at the same time as guaranteeing scalability in both dimensions: horizontally (range of collaborators) and vertically (range of dataset per collaborator).","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"34 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120807442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Multiple Access Protocol for Multimedia Transmission over 5G Wireless Asynchronous Transfer Mode Network 基于5G无线异步传输模式网络的多媒体传输多址协议
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454218
M. Arozullah, Hong-Fang Yu
The wireless network is motivated by the rapidly increasing demand for 5G network. The 5G wireless network system is expect to support different resource services sorted Constant Bit Rate, Variable Bit Rate, Available Bit Rate and Unspecific Bit Rate Request of Services. In this paper, we propose a multiple access protocol for the signal with an integrated mix of multimedia traffic in the 5G wireless network. When the buffer of base station is empty in high speed network system, services are assigned priority class on the base of Time-to-Live (TTL) with respect to the service source types within each TTL class. There is a need of piggybacking request with the package transmissions synchronously when the packets arrive at a non-empty buffer. It also shows the transmission requests are placed collision-free. The multiple access schemes are very challenging such as more efficiency, intelligent, no subsequence collision and cybersecurity. The expect simulation results are evaluate the packet throughput, packet loss and packet delay. The results illustrate the proposed scheme has better performance than the conventional packet reservation multiple access, distributed queuing request update multiple access and adaptive request channel multiple access for the 5G wireless network.
对5G网络快速增长的需求推动了无线网络的发展。预计5G无线网络系统将支持按固定比特率、可变比特率、可用比特率和非特定比特率请求服务分类的不同资源业务。在本文中,我们提出了一种5G无线网络中多媒体业务集成混合信号的多址协议。在高速网络系统中,当基站缓冲区为空时,根据每个TTL (Time-to-Live)类中的服务源类型,为服务分配基于TTL (Time-to-Live)的优先级。当数据包到达非空缓冲区时,需要同步地承载请求与数据包传输。它还显示传输请求是无冲突的。多址方案对多址方案的高效性、智能化、无子序列冲突和网络安全提出了更高的要求。仿真结果评估了数据包吞吐量、丢包量和数据包延迟。结果表明,该方案在5G无线网络中比传统的分组保留多址、分布式排队请求更新多址和自适应请求通道多址具有更好的性能。
{"title":"A Multiple Access Protocol for Multimedia Transmission over 5G Wireless Asynchronous Transfer Mode Network","authors":"M. Arozullah, Hong-Fang Yu","doi":"10.1109/AIIoT52608.2021.9454218","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454218","url":null,"abstract":"The wireless network is motivated by the rapidly increasing demand for 5G network. The 5G wireless network system is expect to support different resource services sorted Constant Bit Rate, Variable Bit Rate, Available Bit Rate and Unspecific Bit Rate Request of Services. In this paper, we propose a multiple access protocol for the signal with an integrated mix of multimedia traffic in the 5G wireless network. When the buffer of base station is empty in high speed network system, services are assigned priority class on the base of Time-to-Live (TTL) with respect to the service source types within each TTL class. There is a need of piggybacking request with the package transmissions synchronously when the packets arrive at a non-empty buffer. It also shows the transmission requests are placed collision-free. The multiple access schemes are very challenging such as more efficiency, intelligent, no subsequence collision and cybersecurity. The expect simulation results are evaluate the packet throughput, packet loss and packet delay. The results illustrate the proposed scheme has better performance than the conventional packet reservation multiple access, distributed queuing request update multiple access and adaptive request channel multiple access for the 5G wireless network.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Audio Processing Approach using Ensemble Learning for Speech-Emotion Recognition for Children with ASD 基于集成学习的音频处理方法在ASD儿童语音情绪识别中的应用
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454174
Damian Valles, Rezwan Matin
Children with Autism Spectrum Disorder (ASD) find it difficult to detect human emotions in social interactions. A speech emotion recognition system was developed in this work, which aims to help these children to better identify the emotions of their communication partner. The system was developed using machine learning and deep learning techniques. Through the use of ensemble learning, multiple machine learning algorithms were joined to provide a final prediction on the recorded input utterances. The ensemble of models includes a Support Vector Machine (SVM), a Multi-Layer Perceptron (MLP), and a Recurrent Neural Network (RNN). All three models were trained on the Ryerson Audio-Visual Database of Emotional Speech and Songs (RAVDESS), the Toronto Emotional Speech Set (TESS), and the Crowd-sourced Emotional Multimodal Actors Dataset (CREMA-D). A fourth dataset was used, which was created by adding background noise to the clean speech files from the datasets previously mentioned. The paper describes the audio processing of the samples, the techniques used to include the background noise, and the feature extraction coefficients considered for the development and training of the models. This study presents the performance evaluation of the individual models to each of the datasets, inclusion of the background noises, and the combination of using all of the samples in all three datasets. The evaluation was made to select optimal hyperparameters configuration of the models to evaluate the performance of the ensemble learning approach through majority voting. The overall performance of the ensemble learning reached a peak accuracy of 66.5%, reaching a higher performance emotion classification accuracy than the MLP model which reached 65.7%.
患有自闭症谱系障碍(ASD)的儿童很难在社会交往中察觉到人类的情绪。本研究开发了一个语音情绪识别系统,旨在帮助这些孩子更好地识别他们的交流伙伴的情绪。该系统是使用机器学习和深度学习技术开发的。通过使用集成学习,将多个机器学习算法结合起来,对记录的输入话语提供最终预测。模型集成包括支持向量机(SVM)、多层感知器(MLP)和递归神经网络(RNN)。这三个模型都是在瑞尔森情感语音和歌曲视听数据库(RAVDESS)、多伦多情感语音集(TESS)和众包情感多模态演员数据集(CREMA-D)上进行训练的。使用了第四个数据集,它是通过将背景噪声添加到前面提到的数据集的干净语音文件中来创建的。本文描述了样本的音频处理,用于包含背景噪声的技术,以及用于开发和训练模型的特征提取系数。本研究提出了对每个数据集的单个模型的性能评估,包括背景噪声,以及在所有三个数据集中使用所有样本的组合。选择模型的最优超参数配置进行评价,通过多数投票来评价集成学习方法的性能。集成学习的整体性能达到了66.5%的峰值准确率,达到了高于MLP模型65.7%的性能情绪分类准确率。
{"title":"An Audio Processing Approach using Ensemble Learning for Speech-Emotion Recognition for Children with ASD","authors":"Damian Valles, Rezwan Matin","doi":"10.1109/AIIoT52608.2021.9454174","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454174","url":null,"abstract":"Children with Autism Spectrum Disorder (ASD) find it difficult to detect human emotions in social interactions. A speech emotion recognition system was developed in this work, which aims to help these children to better identify the emotions of their communication partner. The system was developed using machine learning and deep learning techniques. Through the use of ensemble learning, multiple machine learning algorithms were joined to provide a final prediction on the recorded input utterances. The ensemble of models includes a Support Vector Machine (SVM), a Multi-Layer Perceptron (MLP), and a Recurrent Neural Network (RNN). All three models were trained on the Ryerson Audio-Visual Database of Emotional Speech and Songs (RAVDESS), the Toronto Emotional Speech Set (TESS), and the Crowd-sourced Emotional Multimodal Actors Dataset (CREMA-D). A fourth dataset was used, which was created by adding background noise to the clean speech files from the datasets previously mentioned. The paper describes the audio processing of the samples, the techniques used to include the background noise, and the feature extraction coefficients considered for the development and training of the models. This study presents the performance evaluation of the individual models to each of the datasets, inclusion of the background noises, and the combination of using all of the samples in all three datasets. The evaluation was made to select optimal hyperparameters configuration of the models to evaluate the performance of the ensemble learning approach through majority voting. The overall performance of the ensemble learning reached a peak accuracy of 66.5%, reaching a higher performance emotion classification accuracy than the MLP model which reached 65.7%.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117152820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptive Deep-Ensemble Anomaly-Based Intrusion Detection System for the Internet of Things 基于自适应深度集成异常的物联网入侵检测系统
Pub Date : 2021-05-10 DOI: 10.1109/AIIoT52608.2021.9454168
Khalid Albulayhi, Frederick T. Sheldon
Nowadays, IoT technology has become an essential part of many aspects of life and business. Nevertheless, such widespread application has come at the cost of many security concerns that threaten data privacy and diminish IoT utilization momentum in critical applications such as the smart grid and intelligent transportation systems. To address this challenge, several approaches have been proposed to detect and prevent IoT cyberthreats from materializing. Anomaly detection is one of these approaches that defines the boundaries of legitimate (normal) behavior. Any behavior that falls outside these boundaries is considered anomalous. However, these solutions should have the capability to adapt and adjust to environmental changes that prompt IoT nodal behavioral aberrations, except they only assume that these nodes show the same behavior. This assumption does not hold due to the heterogeneity of IoT nodes and the dynamic nature of an IoT network topology. Furthermore, existing adaptive solutions rely on static (pre-defined) thresholds to control the moment for retraining updates. The cost is heavy for highly dynamic environments like IoT as it leads to an unnecessary higher frequency of retraining. Consequently, the model becomes unstable and adversely affects its accuracy and robustness. This paper addresses these problems by offering an improved Adaptive Anomaly Detection (AAD) methodology that resolves the heterogeneity issues by building local profiles that define normal behavior at each IoT node. The One Class Support Vector Machines (OC-SVM) was used to build these profiles. Then, K-Means clustering was used to build a global profile that represents all network nodes. A Local-Global Ratio-Based (LGR) Anomaly Detection scheme is advanced and was enlisted to control the adaptation process by adjusting the threshold of adaptive functionality dynamically based on the “current” situation to prevent unnecessary retraining. An Ensemble of Deep Belief Networks (EDBN) is developed and used to train the anomaly detection model. Additionally, this study's proposes a new Minimized Redundancy Discriminative Feature Selection (MRD-FS) technique to resolve the issue of redundant features. The MRD-FS experimental evaluation shows detection accuracy higher than those of the related solutions including lower false alarm rates. This validates the efficacy of the proposed model for various IoT applications such as smart grids, smart homes, smart cities and intelligent transportation systems.
如今,物联网技术已经成为生活和商业许多方面的重要组成部分。然而,这种广泛的应用是以许多安全问题为代价的,这些问题威胁到数据隐私,并削弱了智能电网和智能交通系统等关键应用中的物联网利用势头。为了应对这一挑战,已经提出了几种方法来检测和防止物联网网络威胁的实现。异常检测是定义合法(正常)行为边界的方法之一。任何超出这些界限的行为都被认为是异常的。然而,这些解决方案应该具有适应和调整环境变化的能力,这些变化会促使物联网节点行为异常,除非它们只假设这些节点表现出相同的行为。由于物联网节点的异质性和物联网网络拓扑的动态性,这种假设并不成立。此外,现有的自适应解决方案依赖于静态(预定义)阈值来控制再训练更新的时刻。对于像物联网这样的高度动态环境来说,成本很高,因为它会导致不必要的更高频率的再培训。因此,模型变得不稳定,影响了模型的准确性和鲁棒性。本文通过提供一种改进的自适应异常检测(AAD)方法来解决这些问题,该方法通过构建定义每个物联网节点正常行为的本地配置文件来解决异构问题。使用一类支持向量机(OC-SVM)来构建这些配置文件。然后,使用K-Means聚类构建代表所有网络节点的全局概要。提出了一种基于局部-全局比率的LGR异常检测方案,该方案通过根据“当前”情况动态调整自适应功能的阈值来控制自适应过程,以防止不必要的再训练。提出了一种基于深度信念网络的集成方法,并将其用于异常检测模型的训练。此外,本研究提出了一种新的最小化冗余判别特征选择(MRD-FS)技术来解决冗余特征的问题。MRD-FS实验评估表明,检测精度高于相关解决方案,且虚警率较低。这验证了所提出模型在智能电网、智能家居、智能城市和智能交通系统等各种物联网应用中的有效性。
{"title":"An Adaptive Deep-Ensemble Anomaly-Based Intrusion Detection System for the Internet of Things","authors":"Khalid Albulayhi, Frederick T. Sheldon","doi":"10.1109/AIIoT52608.2021.9454168","DOIUrl":"https://doi.org/10.1109/AIIoT52608.2021.9454168","url":null,"abstract":"Nowadays, IoT technology has become an essential part of many aspects of life and business. Nevertheless, such widespread application has come at the cost of many security concerns that threaten data privacy and diminish IoT utilization momentum in critical applications such as the smart grid and intelligent transportation systems. To address this challenge, several approaches have been proposed to detect and prevent IoT cyberthreats from materializing. Anomaly detection is one of these approaches that defines the boundaries of legitimate (normal) behavior. Any behavior that falls outside these boundaries is considered anomalous. However, these solutions should have the capability to adapt and adjust to environmental changes that prompt IoT nodal behavioral aberrations, except they only assume that these nodes show the same behavior. This assumption does not hold due to the heterogeneity of IoT nodes and the dynamic nature of an IoT network topology. Furthermore, existing adaptive solutions rely on static (pre-defined) thresholds to control the moment for retraining updates. The cost is heavy for highly dynamic environments like IoT as it leads to an unnecessary higher frequency of retraining. Consequently, the model becomes unstable and adversely affects its accuracy and robustness. This paper addresses these problems by offering an improved Adaptive Anomaly Detection (AAD) methodology that resolves the heterogeneity issues by building local profiles that define normal behavior at each IoT node. The One Class Support Vector Machines (OC-SVM) was used to build these profiles. Then, K-Means clustering was used to build a global profile that represents all network nodes. A Local-Global Ratio-Based (LGR) Anomaly Detection scheme is advanced and was enlisted to control the adaptation process by adjusting the threshold of adaptive functionality dynamically based on the “current” situation to prevent unnecessary retraining. An Ensemble of Deep Belief Networks (EDBN) is developed and used to train the anomaly detection model. Additionally, this study's proposes a new Minimized Redundancy Discriminative Feature Selection (MRD-FS) technique to resolve the issue of redundant features. The MRD-FS experimental evaluation shows detection accuracy higher than those of the related solutions including lower false alarm rates. This validates the efficacy of the proposed model for various IoT applications such as smart grids, smart homes, smart cities and intelligent transportation systems.","PeriodicalId":443405,"journal":{"name":"2021 IEEE World AI IoT Congress (AIIoT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128080879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2021 IEEE World AI IoT Congress (AIIoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1