首页 > 最新文献

ICT Express最新文献

英文 中文
Making TSM better: Preserving foundational philosophy for efficient action recognition 改进 TSM:保留基本理念,实现高效行动识别
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.12.004
Seok Ryu , Sungjun Hong , Sangyun Lee

In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.

在本研究中,我们提出了判别时移模块(D-TSM),它是时移模块(TSM)的增强版,用于动作识别。TSM 在捕捉错综复杂的时间动态方面存在局限性,原因在于其简单的特征移动。D-TSM 通过在移位前引入减法操作来解决这一问题。这样就能提取相邻帧之间的鉴别特征,从而实现有效的动作识别,将微妙的运动作为关键线索。它保留了 TSM 的基本理念,优先考虑最小的计算开销和无附加参数。我们的实验证明,D-TSM 显著提高了 TSM 的性能,并优于其他领先的基于二维 CNN 的方法。
{"title":"Making TSM better: Preserving foundational philosophy for efficient action recognition","authors":"Seok Ryu ,&nbsp;Sungjun Hong ,&nbsp;Sangyun Lee","doi":"10.1016/j.icte.2023.12.004","DOIUrl":"10.1016/j.icte.2023.12.004","url":null,"abstract":"<div><p>In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 570-575"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001625/pdfft?md5=7071ddbe7afa0f6d6c37f5b8286e72a6&pid=1-s2.0-S2405959523001625-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139020768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of the relationship of malware detection mechanisms using Artificial Intelligence 利用人工智能研究恶意软件检测机制之间的关系
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.03.005
Jihyeon Song , Sunoh Choi , Jungtae Kim , Kyungmin Park , Cheolhee Park , Jonghyun Kim , Ikkyun Kim

Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.

利用人工智能(AI)进行恶意软件检测已成为打击不断演变的各类恶意软件的重要研究课题。研究人员利用浅层学习和深度学习模型实施了各种检测机制,以应对新的恶意软件,如今他们仍在继续开发这些机制。然而,在利用人工智能检测恶意软件领域,数据收集存在困难,很难将研究内容和绩效与相关研究进行比较。同时,条理清晰的论文数量不足以了解这些相关研究的整体研究流程。在开始新的研究之前,研究人员需要分析他们想要研究的恶意软件检测领域的研究现状。因此,根据这些要求,我们总结了与恶意软件检测相关的一般标准和检测机制分类表。此外,我们还整理了各类恶意软件检测领域的许多研究,以便一目了然。我们希望所提供的调查报告能帮助新研究人员快速了解基于人工智能的恶意软件检测领域的研究流程,并确定未来的研究方向。
{"title":"A study of the relationship of malware detection mechanisms using Artificial Intelligence","authors":"Jihyeon Song ,&nbsp;Sunoh Choi ,&nbsp;Jungtae Kim ,&nbsp;Kyungmin Park ,&nbsp;Cheolhee Park ,&nbsp;Jonghyun Kim ,&nbsp;Ikkyun Kim","doi":"10.1016/j.icte.2024.03.005","DOIUrl":"10.1016/j.icte.2024.03.005","url":null,"abstract":"<div><p>Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 632-649"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000298/pdfft?md5=8c3370dad7e696a91dedc176306bffcb&pid=1-s2.0-S2405959524000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep neural network-based clustering algorithm for multiple flying reconfigurable intelligent surfaces-supported bulk systems 基于深度神经网络的多飞行可重构智能表面支持散装系统聚类算法
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.12.009
Yuna Sim , Seungseok Sin , Jina Ma , Sangmi Moon , Young-Hwan You , Cheol Hong Kim , Intae Hwang

Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.

近来,随着无线设备需求的快速增长和数据流量的影响,数据需求也随之增加,各种支持数据需求的技术也在不断发展。其中,具有丰富频谱和高数据传输速率的毫米波(mmWave)频率存在路径损耗大的问题。因此,人们对无人驾驶飞行器(UAV)和可重构智能表面(RIS)的兴趣与日俱增,它们可以被用来重建无线通信环境。因此,本研究考虑了一个由多个用户和飞行 RIS 组成的大型系统,将无人机和 RIS 结合起来以提高算法利用率。我们提出了一种基于深度神经网络的算法,可将飞行 RIS 放置在适当的位置,以便为尽可能多的用户提供支持。仿真结果证实,与现有技术相比,所提出的技术能在大规模系统中以更高的精度和速度将飞行 RIS 放置在有效的位置。
{"title":"Deep neural network-based clustering algorithm for multiple flying reconfigurable intelligent surfaces-supported bulk systems","authors":"Yuna Sim ,&nbsp;Seungseok Sin ,&nbsp;Jina Ma ,&nbsp;Sangmi Moon ,&nbsp;Young-Hwan You ,&nbsp;Cheol Hong Kim ,&nbsp;Intae Hwang","doi":"10.1016/j.icte.2023.12.009","DOIUrl":"10.1016/j.icte.2023.12.009","url":null,"abstract":"<div><p>Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 583-587"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001674/pdfft?md5=dd4ee824a5b20f3fe5bb80495e43d67c&pid=1-s2.0-S2405959523001674-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139395104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent reinforcement learning based optimal energy sensing threshold control in distributed cognitive radio networks with directional antenna 带定向天线的分布式认知无线电网络中基于多代理强化学习的最佳能量感应阈值控制
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.01.001
Thi Thu Hien Pham , Wonjong Noh , Sungrae Cho

In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.

在 CRN 中,开发一种能持续提供准确信道状态信息的高效可靠的频谱检测器至关重要。在这项工作中,我们研究了完全分布式环境中的 CSS,在这种环境中,所有次级用户(SU)都配备了定向天线,并且仅根据其本地知识做出决策,SU 之间不共享信息。首先,我们建立了一个随机顺序优化问题(NP-hard),通过对能量感应/检测阈值的动态优化控制,最大化 SU 的检测精度。它能使 SU 在不对主网络造成干扰的情况下选择可用信道和扇区。为了在分布式环境中解决这个问题,我们将其转化为一个分布式部分观测马尔可夫决策过程(Dec-POMDP)问题。其次,为了在实际环境中确定 Dec-POMDP 的最佳控制,而无需事先了解状态-行动转换概率,我们开发了一种基于多代理深度确定性策略梯度(MADDPG)的算法,简称为 MA-DCSS。该算法采用集中训练和分散执行(CTDE)架构。第三,我们分析了该算法的计算复杂度,并通过计算复杂度的多项式(以信道、扇区和 SU 的数量为单位)展示了所提方法的可扩展性。最后,仿真证实,与基线算法相比,所提出的方案在收敛速度、精确检测和误报概率等方面都具有更高的性能。
{"title":"Multi-agent reinforcement learning based optimal energy sensing threshold control in distributed cognitive radio networks with directional antenna","authors":"Thi Thu Hien Pham ,&nbsp;Wonjong Noh ,&nbsp;Sungrae Cho","doi":"10.1016/j.icte.2024.01.001","DOIUrl":"10.1016/j.icte.2024.01.001","url":null,"abstract":"<div><p>In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 472-478"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000018/pdfft?md5=d4778771f73447943cd1a8d63fc1e1b7&pid=1-s2.0-S2405959524000018-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-aware cyber-threat attribution based on hybrid features 基于混合特征的情境感知网络威胁归因
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.04.005
Ehtsham Irshad, Abdul Basit Siddiqui

With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical & and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.

随着技术的快速发展,识别网络攻击背后的攻击者变得越来越复杂。为应对这一现象,当前的网络威胁归因过程包括战术、技术和程序(TTP)、工具、目标国家/公司和应用等特征。它们不包括攻击者的背景和动机;因此,它们需要更精细的特征。要更好地了解攻击者的背景、动机和目标,在这一过程中加入行为特征至关重要。本研究强调了在现有技术特征基础上添加行为特征对确定实际攻击者的影响。行为特征是从泰国 CERT 发布的数据集 Threat actor encyclopedia 中提取的。本研究调查还分析了混合特征(技术特征和行为特征)的影响。为此,我们采用了特征选择技术来选择最佳特征。在实证结果中,我们使用了威胁行为者百科全书(由泰国计算机应急小组发布的数据集)来提取行为属性。通过使用机器/深度学习算法进行增强,我们在准确率、精确度、召回率和 F1 测量方面分别取得了 97%、98.8%、97% 和 97.2% 的高分。
{"title":"Context-aware cyber-threat attribution based on hybrid features","authors":"Ehtsham Irshad,&nbsp;Abdul Basit Siddiqui","doi":"10.1016/j.icte.2024.04.005","DOIUrl":"10.1016/j.icte.2024.04.005","url":null,"abstract":"<div><p>With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical &amp; and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 553-569"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000420/pdfft?md5=acf5e622fa03761320f62de48e4bf144&pid=1-s2.0-S2405959524000420-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140785956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of co-channel interference on RIS empowered wireless networks amid multiple eavesdropping attempts 多重窃听尝试中的同信道干扰对 RIS 授权无线网络的影响
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.12.003
Md. Roisul Ajom Ruku , Md. Ibrahim , A.S.M. Badrudduza , Imran Shafique Ansari , Waqas Khalid , Heejung Yu

In this study, the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination is investigated. In particular, three critical issues in the design of secure RIS-assisted networks are examined: effects of interferers, operation of multiple eavesdroppers (colluding and non-colluding), and benefit of RISs. To examine their effects, the analytical expressions of secrecy outage probability are derived in a closed form. Additionally, asymptotic analyses at a high signal-to-noise ratio (SNR) regime are provided. Finally, the analytical results are validated through numerical simulations.

本研究探讨了可重构智能表面(RIS)辅助无线网络在目的地存在多个干扰器的情况下的保密性能。特别是,研究了安全 RIS 辅助网络设计中的三个关键问题:干扰者的影响、多个窃听者(共谋和非共谋)的操作以及 RIS 的益处。为了研究它们的影响,以封闭形式推导出了保密中断概率的分析表达式。此外,还提供了高信噪比(SNR)条件下的渐近分析。最后,通过数值模拟验证了分析结果。
{"title":"Effects of co-channel interference on RIS empowered wireless networks amid multiple eavesdropping attempts","authors":"Md. Roisul Ajom Ruku ,&nbsp;Md. Ibrahim ,&nbsp;A.S.M. Badrudduza ,&nbsp;Imran Shafique Ansari ,&nbsp;Waqas Khalid ,&nbsp;Heejung Yu","doi":"10.1016/j.icte.2023.12.003","DOIUrl":"https://doi.org/10.1016/j.icte.2023.12.003","url":null,"abstract":"<div><p>In this study, the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination is investigated. In particular, three critical issues in the design of secure RIS-assisted networks are examined: effects of interferers, operation of multiple eavesdroppers (colluding and non-colluding), and benefit of RISs. To examine their effects, the analytical expressions of secrecy outage probability are derived in a closed form. Additionally, asymptotic analyses at a high signal-to-noise ratio (SNR) regime are provided. Finally, the analytical results are validated through numerical simulations.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 491-497"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001613/pdfft?md5=601be4e6ac761ba8943f4ff1135e5eea&pid=1-s2.0-S2405959523001613-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141438752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey on the security of low power wide area networks for the Internet of Things 物联网低功耗广域网安全性综合调查
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.03.003
Giovanni Stanco, Annalisa Navarro, Flavio Frattini, Giorgio Ventre, Alessio Botta

While the spreading of the Internet of Things continues beyond expectations, the security of networking technologies used in this context remains an open issue. This paper provides a comprehensive overview of the state of the art on the security of Low Power Wide Area Networks (LPWANs), with a focus on Sigfox, LoRaWAN, and Narrowband Internet of Things. The paper covers five main areas: (1) security requirements and their implementation in these networks, such as authentication, encryption, access control, and key management; (2) categorization of attacks and threat modeling, with the identification of the attack vectors and the presentation of an attack categorization and analysis; (3) a detailed explanation of attacks documented on Sigfox, LoRaWAN, and Narrowband Internet of Things, examining the underlying vulnerabilities exploited, outlining potential consequences, and discussing countermeasures proposed to mitigate these attacks; (4) security enhancements proposed to address vulnerabilities in each network; (5) the integration of LPWANs with 5G and the consequent security challenges. This survey constitutes an important and missing resource for the study and the development of secure Internet of Things solutions based on Low Power Wide Area Networks, raising awareness of potential threats, and guiding future research efforts towards strengthening the security of these networks and of the broader IoT landscape.

虽然物联网的发展速度超出了人们的预期,但在此背景下使用的网络技术的安全性仍是一个未决问题。本文全面概述了低功耗广域网(LPWAN)的安全现状,重点介绍了 Sigfox、LoRaWAN 和窄带物联网。论文涉及五个主要领域:(1) 安全要求及其在这些网络中的实施,如身份验证、加密、访问控制和密钥管理;(2) 攻击分类和威胁建模,包括攻击载体的识别以及攻击分类和分析的介绍;(3) 对记录在案的针对 Sigfox、LoRaWAN 和窄带物联网的攻击进行详细说明,检查所利用的潜在漏洞,概述潜在后果,并讨论为缓解这些攻击而提出的应对措施;(4) 针对每个网络中的漏洞而提出的安全增强措施;(5) LPWAN 与 5G 的集成以及随之而来的安全挑战。本调查报告为研究和开发基于低功耗广域网的安全物联网解决方案提供了重要的、缺失的资源,提高了人们对潜在威胁的认识,并指导未来的研究工作,以加强这些网络和更广泛的物联网环境的安全性。
{"title":"A comprehensive survey on the security of low power wide area networks for the Internet of Things","authors":"Giovanni Stanco,&nbsp;Annalisa Navarro,&nbsp;Flavio Frattini,&nbsp;Giorgio Ventre,&nbsp;Alessio Botta","doi":"10.1016/j.icte.2024.03.003","DOIUrl":"10.1016/j.icte.2024.03.003","url":null,"abstract":"<div><p>While the spreading of the Internet of Things continues beyond expectations, the security of networking technologies used in this context remains an open issue. This paper provides a comprehensive overview of the state of the art on the security of Low Power Wide Area Networks (LPWANs), with a focus on Sigfox, LoRaWAN, and Narrowband Internet of Things. The paper covers five main areas: (1) security requirements and their implementation in these networks, such as authentication, encryption, access control, and key management; (2) categorization of attacks and threat modeling, with the identification of the attack vectors and the presentation of an attack categorization and analysis; (3) a detailed explanation of attacks documented on Sigfox, LoRaWAN, and Narrowband Internet of Things, examining the underlying vulnerabilities exploited, outlining potential consequences, and discussing countermeasures proposed to mitigate these attacks; (4) security enhancements proposed to address vulnerabilities in each network; (5) the integration of LPWANs with 5G and the consequent security challenges. This survey constitutes an important and missing resource for the study and the development of secure Internet of Things solutions based on Low Power Wide Area Networks, raising awareness of potential threats, and guiding future research efforts towards strengthening the security of these networks and of the broader IoT landscape.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 519-552"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000274/pdfft?md5=794cf07bac0df7843e84d64bed01dc07&pid=1-s2.0-S2405959524000274-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140279677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient YOLO for ship detection in SAR images via channel shuffled reparameterized convolution blocks and dynamic head 通过信道洗牌重参数化卷积块和动态头,在合成孔径雷达图像中实现高效的船舶探测 YOLO
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.02.007
Chushi Yu, Yoan Shin

Synthetic aperture radar (SAR) is a crucial active imaging technology in remote sensing, offering valuable information for applications like climate monitoring, environmental analysis, and ship surveillance. Ship detection in SAR images remains challenging due to diverse vessel types and environmental interference, especially in inshore areas, despite the proven effectiveness of deep learning-based algorithms. This paper presents an efficient deep learning method named you only look once-shuffle reparameterized blocks with dynamic head (YOLO-SRBD) based on YOLOv8. Additionally, post-processing incorporates the soft non-maximum suppression to enhance precision. Experiments conducted on SAR image datasets demonstrate that the proposed method surpasses the original YOLOv8 both qualitatively and quantitatively, highlighting its feasibility for practical applications. The detection accuracy of the proposed YOLO-SRBD in the high resolution SAR images dataset rose from 89.9% to 91.3%, and the average precision increased from 66.7% to 74.3%, showing significant performance enhancement.

合成孔径雷达(SAR)是遥感技术中一项重要的主动成像技术,可为气候监测、环境分析和船舶监视等应用提供有价值的信息。尽管基于深度学习的算法的有效性已得到证实,但由于船舶类型多样和环境干扰,特别是在近岸区域,合成孔径雷达图像中的船舶检测仍具有挑战性。本文以 YOLOv8 为基础,提出了一种高效的深度学习方法,名为 "你只看一次--带动态头的洗牌重参数化块(YOLO-SRBD)"。此外,后处理还结合了软非最大值抑制,以提高精度。在合成孔径雷达图像数据集上进行的实验表明,所提出的方法在质量和数量上都超过了原始的 YOLOv8,突出了其在实际应用中的可行性。在高分辨率合成孔径雷达图像数据集中,所提出的 YOLO-SRBD 的检测准确率从 89.9% 提高到 91.3%,平均精度从 66.7% 提高到 74.3%,表现出显著的性能提升。
{"title":"An efficient YOLO for ship detection in SAR images via channel shuffled reparameterized convolution blocks and dynamic head","authors":"Chushi Yu,&nbsp;Yoan Shin","doi":"10.1016/j.icte.2024.02.007","DOIUrl":"10.1016/j.icte.2024.02.007","url":null,"abstract":"<div><p>Synthetic aperture radar (SAR) is a crucial active imaging technology in remote sensing, offering valuable information for applications like climate monitoring, environmental analysis, and ship surveillance. Ship detection in SAR images remains challenging due to diverse vessel types and environmental interference, especially in inshore areas, despite the proven effectiveness of deep learning-based algorithms. This paper presents an efficient deep learning method named you only look once-shuffle reparameterized blocks with dynamic head (YOLO-SRBD) based on YOLOv8. Additionally, post-processing incorporates the soft non-maximum suppression to enhance precision. Experiments conducted on SAR image datasets demonstrate that the proposed method surpasses the original YOLOv8 both qualitatively and quantitatively, highlighting its feasibility for practical applications. The detection accuracy of the proposed YOLO-SRBD in the high resolution SAR images dataset rose from 89.9% to 91.3%, and the average precision increased from 66.7% to 74.3%, showing significant performance enhancement.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 673-679"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000201/pdfft?md5=2e42a950f60cf54cca6e54d60dbe6aa0&pid=1-s2.0-S2405959524000201-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140463699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Surgical instrument posture estimation and tracking based on LSTM 基于 LSTM 的手术器械姿态估计与跟踪
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.01.002
Siyu Lu , Jun Yang , Bo Yang , Xiaolu Li , Zhengtong Yin , Lirong Yin , Wenfeng Zheng

The surgical navigation system enhances surgical safety and accuracy by providing precise guidance. However, traditional pose estimation algorithms lack real-time performance and accuracy. To address this issue, a multi-average Long Short Term Memory (LSTM) prediction network is designed to maintain sensitivity in estimating the position of surgical instruments and track their random motion trends. Additionally, the spatial coordinates of positioning markers are applied back to the imaging plane, reducing the recognition range and improving algorithm running speed. Experimental results show that the average time of estimation is less than 1ms while ensuring the prediction effect.

手术导航系统通过提供精确制导来提高手术的安全性和准确性。然而,传统的姿势估计算法缺乏实时性能和准确性。为解决这一问题,设计了一个多平均长短期记忆(LSTM)预测网络,以保持估计手术器械位置的灵敏度,并跟踪其随机运动趋势。此外,定位标记的空间坐标被应用回成像平面,从而缩小了识别范围并提高了算法运行速度。实验结果表明,在保证预测效果的前提下,估计的平均时间小于 1 毫秒。
{"title":"Surgical instrument posture estimation and tracking based on LSTM","authors":"Siyu Lu ,&nbsp;Jun Yang ,&nbsp;Bo Yang ,&nbsp;Xiaolu Li ,&nbsp;Zhengtong Yin ,&nbsp;Lirong Yin ,&nbsp;Wenfeng Zheng","doi":"10.1016/j.icte.2024.01.002","DOIUrl":"10.1016/j.icte.2024.01.002","url":null,"abstract":"<div><p>The surgical navigation system enhances surgical safety and accuracy by providing precise guidance. However, traditional pose estimation algorithms lack real-time performance and accuracy. To address this issue, a multi-average Long Short Term Memory (LSTM) prediction network is designed to maintain sensitivity in estimating the position of surgical instruments and track their random motion trends. Additionally, the spatial coordinates of positioning markers are applied back to the imaging plane, reducing the recognition range and improving algorithm running speed. Experimental results show that the average time of estimation is less than 1ms while ensuring the prediction effect.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 465-471"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S240595952400002X/pdfft?md5=756714a846ef1b135648aacc1cfe6d16&pid=1-s2.0-S240595952400002X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139454739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization of phase shift and task offloading for RIS-assisted multi-access edge computing in beyond 6G communication 联合优化相移和任务卸载,实现超越 6G 通信的 RIS 辅助多址边缘计算
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.04.004
Daniar Estu Widiyanti, Krisma Asmoro, Soo Young Shin

Beyond 6G services and applications demand high and efficient processing capacity due to the massive connectivity of users equipment (UEs). However, the high computational capability and energy consumption of UEs are limited, which becomes a main challenge to overcome. Multi-access edge computing (MEC) has recently been studied widely as it can potentially assist complex tasks executed at UEs. Furthermore, several techniques have been proposed to optimize task offloading among users. Thus, another challenge in MEC is emerging due to the fact that mobile users do not always have a line-of-sight (LoS) to the base station (BS) due to the blocking object. Therefore, it can affect users data rate and result in incremental energy consumption. This research introduces the concept of reconfigurable intelligence surfaces (RIS) to support multiple-input-single-output (MISO) base stations (BS) in both uplink (UL) and downlink (DL) using BCD algorithms. While previous studies concentrate on enhancing task offloading and neglecting inter-user interference, this study suggests an optimization approach for UL and DL data rates, as well as minimizing task offloading delays. The results indicate that optimizing task placement, phase shift, and precoding can reduce the duration of task offloading.

由于用户设备(UE)的大规模连接,超越 6G 的服务和应用需要高效的处理能力。然而,UE 的高计算能力和能耗受到限制,这成为需要克服的主要挑战。多接入边缘计算(MEC)最近得到了广泛的研究,因为它有可能为在 UE 上执行的复杂任务提供帮助。此外,还提出了几种技术来优化用户之间的任务卸载。因此,MEC 面临的另一个挑战是,由于遮挡物的存在,移动用户与基站(BS)的视线(LoS)并不总是一致。因此,这会影响用户的数据传输速率,并导致能耗增加。本研究引入了可重构智能面(RIS)的概念,利用 BCD 算法在上行链路(UL)和下行链路(DL)中支持多输入-单输出(MISO)基站(BS)。以往的研究主要集中在增强任务卸载和忽略用户间干扰上,而本研究则提出了一种针对上行和下行数据速率以及最小化任务卸载延迟的优化方法。结果表明,优化任务放置、相移和预编码可以缩短任务卸载的持续时间。
{"title":"Joint optimization of phase shift and task offloading for RIS-assisted multi-access edge computing in beyond 6G communication","authors":"Daniar Estu Widiyanti,&nbsp;Krisma Asmoro,&nbsp;Soo Young Shin","doi":"10.1016/j.icte.2024.04.004","DOIUrl":"10.1016/j.icte.2024.04.004","url":null,"abstract":"<div><p>Beyond 6G services and applications demand high and efficient processing capacity due to the massive connectivity of users equipment (UEs). However, the high computational capability and energy consumption of UEs are limited, which becomes a main challenge to overcome. Multi-access edge computing (MEC) has recently been studied widely as it can potentially assist complex tasks executed at UEs. Furthermore, several techniques have been proposed to optimize task offloading among users. Thus, another challenge in MEC is emerging due to the fact that mobile users do not always have a line-of-sight (LoS) to the base station (BS) due to the blocking object. Therefore, it can affect users data rate and result in incremental energy consumption. This research introduces the concept of reconfigurable intelligence surfaces (RIS) to support multiple-input-single-output (MISO) base stations (BS) in both uplink (UL) and downlink (DL) using BCD algorithms. While previous studies concentrate on enhancing task offloading and neglecting inter-user interference, this study suggests an optimization approach for UL and DL data rates, as well as minimizing task offloading delays. The results indicate that optimizing task placement, phase shift, and precoding can reduce the duration of task offloading.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 620-625"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000419/pdfft?md5=3ad3f653a2f1f8aa864d3acf87e8b4c4&pid=1-s2.0-S2405959524000419-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140770447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICT Express
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1