首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
Interpersonal Communication Interconnection in Media Convergence Metaverse 媒体融合 Metaverse 中的人际交流互联
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-05 DOI: 10.1145/3670998
Xin Wang, Jianhui Lv, Achyut Shankar, Carsten Maple, Keqin Li, Qing Li

The metaverse aims to provide immersive virtual worlds connecting with the physical world. To enable real-time interpersonal communications between users across the globe, the metaverse places high demands on network performance, including low latency, high bandwidth, and fast network speeds. This paper proposes a novel Media Convergence Metaverse Network (MCMN) framework to address these challenges. Specifically, the META controller serves as MCMN's logically centralized control plane, responsible for holistic orchestration across edge sites and end-to-end path computation between metaverse users. We develop a model-free deep reinforcement learning-based metaverse traffic optimization algorithm that learns to route flows while satisfying the Quality of Service (QoS) boundaries. The network slicing engine leverages artificial intelligence and machine learning to create isolated, customized virtual networks tailored for metaverse traffic dynamics on demand. It employs unsupervised and reinforcement learning techniques using network telemetry from the META controller to understand application traffic patterns and train cognitive slicer agents to make quality of service -aware decisions accordingly. Optimized delivery of diverse concurrent media types necessitates routing intelligence to meet distinct requirements while mitigating clashes over a shared infrastructure. Media-aware routing enhances traditional shortest-path approaches by combining topological metrics with workflow sensitivities. We realize an edge-assisted rendering fabric to offload complex processing from bandwidth-constrained endpoints while retaining visual realism. Extensive simulations demonstrate MCMN's superior performance compared to conventional networking paradigms. MCMN shows great promise to enable seamless interconnectivity and ultra-high fidelity communications to unlock the true potential of the metaverse.

元宇宙旨在提供与物理世界相连接的身临其境的虚拟世界。为了实现全球用户之间的实时人际交流,元宇宙对网络性能提出了很高的要求,包括低延迟、高带宽和高速网络。本文提出了一个新颖的媒体融合元宇宙网络(MCMN)框架来应对这些挑战。具体来说,META 控制器作为 MCMN 的逻辑集中控制平面,负责边缘站点之间的整体协调以及元网络用户之间的端到端路径计算。我们开发了一种基于无模型深度强化学习的元数据流量优化算法,该算法可在满足服务质量(QoS)边界的前提下学习流量路由。网络切片引擎利用人工智能和机器学习来创建隔离的、定制的虚拟网络,以满足元数据流量动态需求。它利用来自 META 控制器的网络遥测数据,采用无监督和强化学习技术来了解应用流量模式,并训练认知切片代理做出相应的服务质量感知决策。优化各种并发媒体类型的传输需要路由智能,以满足不同的要求,同时减少共享基础设施上的冲突。媒体感知路由通过将拓扑指标与工作流敏感性相结合,增强了传统的最短路径方法。我们实现了边缘辅助渲染结构,以便从带宽受限的端点卸载复杂的处理过程,同时保持视觉的真实感。大量的仿真证明,与传统网络范例相比,MCMN 的性能更加卓越。MCMN 在实现无缝互联和超高保真通信以释放元宇宙的真正潜力方面大有可为。
{"title":"Interpersonal Communication Interconnection in Media Convergence Metaverse","authors":"Xin Wang, Jianhui Lv, Achyut Shankar, Carsten Maple, Keqin Li, Qing Li","doi":"10.1145/3670998","DOIUrl":"https://doi.org/10.1145/3670998","url":null,"abstract":"<p>The metaverse aims to provide immersive virtual worlds connecting with the physical world. To enable real-time interpersonal communications between users across the globe, the metaverse places high demands on network performance, including low latency, high bandwidth, and fast network speeds. This paper proposes a novel Media Convergence Metaverse Network (MCMN) framework to address these challenges. Specifically, the META controller serves as MCMN's logically centralized control plane, responsible for holistic orchestration across edge sites and end-to-end path computation between metaverse users. We develop a model-free deep reinforcement learning-based metaverse traffic optimization algorithm that learns to route flows while satisfying the Quality of Service (QoS) boundaries. The network slicing engine leverages artificial intelligence and machine learning to create isolated, customized virtual networks tailored for metaverse traffic dynamics on demand. It employs unsupervised and reinforcement learning techniques using network telemetry from the META controller to understand application traffic patterns and train cognitive slicer agents to make quality of service -aware decisions accordingly. Optimized delivery of diverse concurrent media types necessitates routing intelligence to meet distinct requirements while mitigating clashes over a shared infrastructure. Media-aware routing enhances traditional shortest-path approaches by combining topological metrics with workflow sensitivities. We realize an edge-assisted rendering fabric to offload complex processing from bandwidth-constrained endpoints while retaining visual realism. Extensive simulations demonstrate MCMN's superior performance compared to conventional networking paradigms. MCMN shows great promise to enable seamless interconnectivity and ultra-high fidelity communications to unlock the true potential of the metaverse.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"218 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Reinforcement Learning and Error Models for Drone Precision Landing 利用强化学习和误差模型实现无人机精确着陆
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-04 DOI: 10.1145/3670997
Sepehr Saryazdi, Balsam Alkouz, Athman Bouguettaya, Abdallah Lakhdari

We propose a novel framework for achieving precision landing in drone services. The proposed framework consists of two distinct decoupled modules, each designed to address a specific aspect of landing accuracy. The first module is concerned with intrinsic errors, where new error models are introduced. This includes a spherical error model that takes into account the orientation of the drone. Additionally, we propose a live position correction algorithm that employs the error models to correct for intrinsic errors in real-time. The second module focuses on external wind forces and presents an aerodynamics model with wind generation to simulate the drone’s physical environment. We utilize reinforcement learning to train the drone in simulation with the goal of landing precisely under dynamic wind conditions. Experimental results, conducted through simulations and validated in the physical world, demonstrate that our proposed framework significantly increases the landing accuracy while maintaining a low onboard computational cost.

我们提出了一个新颖的框架,用于实现无人机服务的精确着陆。建议的框架由两个不同的解耦模块组成,每个模块旨在解决着陆精度的一个特定方面。第一个模块涉及内在误差,引入了新的误差模型。其中包括一个考虑到无人机方向的球形误差模型。此外,我们还提出了一种实时位置校正算法,利用误差模型实时校正内在误差。第二个模块重点关注外部风力,并提出了一个具有风力生成功能的空气动力学模型,以模拟无人机的物理环境。我们利用强化学习对无人机进行模拟训练,目标是在动态风力条件下精确着陆。通过模拟和实际验证得出的实验结果表明,我们提出的框架在保持较低机载计算成本的同时,显著提高了着陆精度。
{"title":"Using Reinforcement Learning and Error Models for Drone Precision Landing","authors":"Sepehr Saryazdi, Balsam Alkouz, Athman Bouguettaya, Abdallah Lakhdari","doi":"10.1145/3670997","DOIUrl":"https://doi.org/10.1145/3670997","url":null,"abstract":"<p>We propose a novel framework for achieving precision landing in drone services. The proposed framework consists of two distinct decoupled modules, each designed to address a specific aspect of landing accuracy. The first module is concerned with intrinsic errors, where new error models are introduced. This includes a spherical error model that takes into account the orientation of the drone. Additionally, we propose a live position correction algorithm that employs the error models to correct for intrinsic errors in real-time. The second module focuses on external wind forces and presents an aerodynamics model with wind generation to simulate the drone’s physical environment. We utilize reinforcement learning to train the drone in simulation with the goal of landing precisely under dynamic wind conditions. Experimental results, conducted through simulations and validated in the physical world, demonstrate that our proposed framework significantly increases the landing accuracy while maintaining a low onboard computational cost.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"43 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141259291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Human-AI Teaming to Mitigate Alert Fatigue in Security Operations Centres 实现人机交互,减轻安全运营中心的警报疲劳
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-30 DOI: 10.1145/3670009
Mohan Baruwal Chhetri, Shahroz Tariq, Ronal Singh, Fateneh Jalalvand, Cecile Paris, Surya Nepal

Security Operations Centres (SOCs) play a pivotal role in defending organisations against evolving cyber threats. They function as central hubs for detecting, analysing, and responding promptly to cyber incidents with the primary objective of ensuring the confidentiality, integrity, and availability of digital assets. However, they struggle against the growing problem of alert fatigue, where the sheer volume of alerts overwhelms SOC analysts and raises the risk of overlooking critical threats. In recent times, there has been a growing call for human-AI teaming, wherein humans and AI collaborate with each other, leveraging their complementary strengths and compensating for their weaknesses. The rapid advances in AI and the growing integration of AI-enabled tools and technologies within SOCs give rise to a compelling argument for the implementation of human-AI teaming within the SOC environment. Therefore, in this position paper, we present our vision for human-AI teaming to address the problem of alert fatigue in SOC. We propose the (mathcal {A}^2mathcal {C} ) Framework, which enables flexible and dynamic decision-making by allowing seamless transitions between automated, augmented, and collaborative modes of operation. Our framework allows AI-powered automation for routine alerts, AI-driven augmentation for expedited expert decision-making, and collaborative exploration for tackling complex, novel threats. By implementing and operationalising (mathcal {A}^2mathcal {C} ), SOCs can significantly reduce alert fatigue while empowering analysts to efficiently and effectively respond to security incidents.

安全运营中心(SOC)在组织抵御不断变化的网络威胁方面发挥着举足轻重的作用。它们是检测、分析和及时应对网络事件的中心枢纽,主要目标是确保数字资产的保密性、完整性和可用性。然而,它们却在与日益严重的警报疲劳问题作斗争,大量的警报让 SOC 分析师应接不暇,并增加了忽视关键威胁的风险。近来,人类与人工智能合作的呼声越来越高,在这种合作中,人类与人工智能相互协作,取长补短。人工智能的飞速发展以及 SOC 中人工智能工具和技术的日益集成,为在 SOC 环境中实施人类与人工智能的协同合作提供了有力的论据。因此,在本立场文件中,我们提出了人类-人工智能团队合作的愿景,以解决 SOC 中的警报疲劳问题。我们提出了(mathcal {A}^2mathcal {C} )框架,该框架允许在自动化、增强型和协作型操作模式之间无缝转换,从而实现灵活、动态的决策。我们的框架允许人工智能驱动的自动化处理常规警报,允许人工智能驱动的增强处理加速专家决策,允许协作探索处理复杂的新型威胁。通过实施和操作 (mathcal {A}^2mathcal {C} ),SOC 可以显著减少警报疲劳,同时使分析人员能够高效、有效地应对安全事件。
{"title":"Towards Human-AI Teaming to Mitigate Alert Fatigue in Security Operations Centres","authors":"Mohan Baruwal Chhetri, Shahroz Tariq, Ronal Singh, Fateneh Jalalvand, Cecile Paris, Surya Nepal","doi":"10.1145/3670009","DOIUrl":"https://doi.org/10.1145/3670009","url":null,"abstract":"<p>Security Operations Centres (SOCs) play a pivotal role in defending organisations against evolving cyber threats. They function as central hubs for detecting, analysing, and responding promptly to cyber incidents with the primary objective of ensuring the confidentiality, integrity, and availability of digital assets. However, they struggle against the growing problem of alert fatigue, where the sheer volume of alerts overwhelms SOC analysts and raises the risk of overlooking critical threats. In recent times, there has been a growing call for human-AI teaming, wherein humans and AI collaborate with each other, leveraging their complementary strengths and compensating for their weaknesses. The rapid advances in AI and the growing integration of AI-enabled tools and technologies within SOCs give rise to a compelling argument for the implementation of human-AI teaming within the SOC environment. Therefore, in this position paper, we present our vision for human-AI teaming to address the problem of alert fatigue in SOC. We propose the (mathcal {A}^2mathcal {C} ) Framework, which enables flexible and dynamic decision-making by allowing seamless transitions between automated, augmented, and collaborative modes of operation. Our framework allows AI-powered automation for routine alerts, AI-driven augmentation for expedited expert decision-making, and collaborative exploration for tackling complex, novel threats. By implementing and operationalising (mathcal {A}^2mathcal {C} ), SOCs can significantly reduce alert fatigue while empowering analysts to efficiently and effectively respond to security incidents.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"13 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing RESP:移动边缘计算中边缘服务器安置的递归聚类方法
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-27 DOI: 10.1145/3666091
Ali Akbar Vali, Sadoon Azizi, Mohammad Shojafar

With the rapid advancement of the Internet of Things (IoT) and 5G networks in smart cities, the inevitable generation of massive amounts of data, commonly known as big data, has introduced increased latency within the traditional cloud computing paradigm. In response to this challenge, Mobile Edge Computing (MEC) has emerged as a viable solution, offloading a portion of mobile device workloads to nearby edge servers equipped with ample computational resources. Despite significant research in MEC systems, optimizing the placement of edge servers in smart cities to enhance network performance has received little attention. In this paper, we propose RESP, a novel Recursive clustering technique for Edge Server Placement in MEC environments. RESP operates based on the median of each cluster determined by the number of Base Transceiver Stations (BTSs), strategically placing edge servers to achieve workload balance and minimize network traffic between them. Our proposed clustering approach substantially improves load balancing compared to existing methods and demonstrates superior performance in handling traffic dynamics. Through experimental evaluation with real-world data from Shanghai Telecom’s base station dataset, our approach outperforms several representative techniques in terms of workload balancing and network traffic optimization. By addressing the ESP problem and introducing an advanced recursive clustering technique, this work makes a substantial contribution to optimizing mobile edge computing networks in smart cities. The proposed algorithm outperforms alternative methodologies, demonstrating a 10% average improvement in optimizing network traffic. Moreover, it achieves a 53% more suitable result in terms of computational load.

随着智能城市中物联网(IoT)和 5G 网络的快速发展,不可避免地产生了海量数据(俗称大数据),这导致传统云计算模式的延迟增加。为了应对这一挑战,移动边缘计算(MEC)作为一种可行的解决方案应运而生,它可以将移动设备的部分工作负载卸载到附近配备有充足计算资源的边缘服务器上。尽管对 MEC 系统进行了大量研究,但优化智能城市中的边缘服务器位置以提高网络性能却鲜有人关注。在本文中,我们提出了一种用于 MEC 环境中边缘服务器放置的新型递归聚类技术 RESP。RESP 根据基站(BTS)数量确定的每个群组的中位数进行操作,战略性地放置边缘服务器,以实现工作负载平衡并最大限度地减少它们之间的网络流量。与现有方法相比,我们提出的聚类方法大大改善了负载平衡,并在处理流量动态方面表现出卓越的性能。通过对上海电信基站数据集的实际数据进行实验评估,我们的方法在工作负载平衡和网络流量优化方面优于几种代表性技术。通过解决 ESP 问题并引入先进的递归聚类技术,这项工作为优化智慧城市中的移动边缘计算网络做出了重大贡献。所提出的算法优于其他方法,在优化网络流量方面平均提高了 10%。此外,在计算负荷方面,它还取得了 53% 的合适结果。
{"title":"RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing","authors":"Ali Akbar Vali, Sadoon Azizi, Mohammad Shojafar","doi":"10.1145/3666091","DOIUrl":"https://doi.org/10.1145/3666091","url":null,"abstract":"<p>With the rapid advancement of the Internet of Things (IoT) and 5G networks in smart cities, the inevitable generation of massive amounts of data, commonly known as big data, has introduced increased latency within the traditional cloud computing paradigm. In response to this challenge, Mobile Edge Computing (MEC) has emerged as a viable solution, offloading a portion of mobile device workloads to nearby edge servers equipped with ample computational resources. Despite significant research in MEC systems, optimizing the placement of edge servers in smart cities to enhance network performance has received little attention. In this paper, we propose <i>RESP</i>, a novel <b>R</b>ecursive clustering technique for <b>E</b>dge <b>S</b>erver <b>P</b>lacement in MEC environments. RESP operates based on the median of each cluster determined by the number of Base Transceiver Stations (BTSs), strategically placing edge servers to achieve workload balance and minimize network traffic between them. Our proposed clustering approach substantially improves load balancing compared to existing methods and demonstrates superior performance in handling traffic dynamics. Through experimental evaluation with real-world data from Shanghai Telecom’s base station dataset, our approach outperforms several representative techniques in terms of workload balancing and network traffic optimization. By addressing the ESP problem and introducing an advanced recursive clustering technique, this work makes a substantial contribution to optimizing mobile edge computing networks in smart cities. The proposed algorithm outperforms alternative methodologies, demonstrating a 10% average improvement in optimizing network traffic. Moreover, it achieves a 53% more suitable result in terms of computational load.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"99 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141165911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks OTI-IoT:基于区块链的多载体 DDoS 攻击行动威胁情报框架
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-11 DOI: 10.1145/3664287
Aswani Aguru, Suresh Erukala

The Internet of Things (IoT) refers to a complex network comprising interconnected devices that transmit their data via the Internet. Due to their open environment, limited computation power, and absence of built-in security, IoT environments are susceptible to various cyberattacks. Denial of service (DDoS) attacks are among the most destructive types of threats. The Multi-vector DDoS attack is a contemporary and formidable form of DDoS wherein the attacker employs a collection of compromised IoT devices as zombies to initiate numerous DDoS attacks against a target server. A Blockchain-based Operational Threat Intelligence framework, OTI-IoT, is proposed in this paper to counter multi-vector DDoS attacks in IoT networks. A ”Prevent-then-Detect” methodology was utilized to deploy the OTI-IoT framework in two distinct stages. During Phase 1, the consortium Blockchain network validators employ the IPS module, composed of a smart contract for attack prevention & access control, and Proof of Voting consensus, to thwart attacks. Validators are outfitted with deep learning-based IDS instances to detect multi-vector DDoS attacks during Phase 2. Alert messages are generated by the IDS module’s alert generation & propagation smart contract in response to identifying malicious IoT sources. The feedback loop from the IDS module to the IPS module prevents incoming traffic from malicious sources. The proposed OTI framework capabilities are realized as an outcome of combining and storing the outcomes of the IDS and IPS modules on the consortium Blockchain. Each validator maintains a shared ledger containing information regarding threat sources to ensure robust security, transparency, and integrity. The operational execution of OTI-IoT occurs on an individual Ethereum Blockchain. The empirical findings indicate that our proposed framework is most suitable for real-time applications due to its ability to lower attack detection time, decreased block validation time, and higher attack prevention rate.

物联网(IoT)是指由相互连接的设备组成的复杂网络,这些设备通过互联网传输数据。由于其开放的环境、有限的计算能力和缺乏内置的安全性,物联网环境很容易受到各种网络攻击。拒绝服务(DDoS)攻击是最具破坏性的威胁类型之一。多载体 DDoS 攻击是一种当代可怕的 DDoS 攻击形式,攻击者利用一系列受损的物联网设备作为僵尸,对目标服务器发起大量 DDoS 攻击。本文提出了一种基于区块链的运营威胁情报框架--OTI-IoT,以应对物联网网络中的多载体 DDoS 攻击。本文采用 "先预防、后检测 "的方法,分两个不同阶段部署 OTI-IoT 框架。在第一阶段,联盟区块链网络验证器采用 IPS 模块,该模块由用于攻击预防的智能合约、访问控制和投票证明共识组成,以挫败攻击。在第二阶段,验证器配备了基于深度学习的 IDS 实例,以检测多载体 DDoS 攻击。警报信息由 IDS 模块的警报生成与传播智能合约生成,以识别恶意物联网源。从 IDS 模块到 IPS 模块的反馈回路可防止来自恶意源的流量进入。将 IDS 模块和 IPS 模块的结果结合并存储在联盟区块链上,就能实现所提出的 OTI 框架功能。每个验证器都维护一个共享分类账,其中包含有关威胁源的信息,以确保强大的安全性、透明度和完整性。OTI-IoT 的操作执行发生在单个以太坊区块链上。实证研究结果表明,我们提出的框架最适合实时应用,因为它能够缩短攻击检测时间、减少区块验证时间并提高攻击防范率。
{"title":"OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks","authors":"Aswani Aguru, Suresh Erukala","doi":"10.1145/3664287","DOIUrl":"https://doi.org/10.1145/3664287","url":null,"abstract":"<p>The <b>Internet of Things (IoT)</b> refers to a complex network comprising interconnected devices that transmit their data via the Internet. Due to their open environment, limited computation power, and absence of built-in security, IoT environments are susceptible to various cyberattacks. Denial of service (DDoS) attacks are among the most destructive types of threats. The <b>Multi-vector DDoS attack</b> is a contemporary and formidable form of DDoS wherein the attacker employs a collection of compromised IoT devices as zombies to initiate numerous DDoS attacks against a target server. A Blockchain-based Operational Threat Intelligence framework, OTI-IoT, is proposed in this paper to counter multi-vector DDoS attacks in IoT networks. A <b>”Prevent-then-Detect”</b> methodology was utilized to deploy the OTI-IoT framework in two distinct stages. During Phase 1, the <b>consortium Blockchain network</b> validators employ the IPS module, composed of a smart contract for attack prevention &amp; access control, and Proof of Voting consensus, to thwart attacks. Validators are outfitted with deep learning-based IDS instances to detect multi-vector DDoS attacks during Phase 2. Alert messages are generated by the IDS module’s alert generation &amp; propagation smart contract in response to identifying malicious IoT sources. The feedback loop from the IDS module to the IPS module prevents incoming traffic from malicious sources. The proposed OTI framework capabilities are realized as an outcome of combining and storing the outcomes of the IDS and IPS modules on the consortium Blockchain. Each validator maintains a shared ledger containing information regarding threat sources to ensure robust security, transparency, and integrity. The operational execution of OTI-IoT occurs on an individual Ethereum Blockchain. The empirical findings indicate that our proposed framework is most suitable for real-time applications due to its ability to lower attack detection time, decreased block validation time, and higher attack prevention rate.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"138 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140938725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data management for continuous learning in EHR systems 电子病历系统中用于持续学习的数据管理
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-07 DOI: 10.1145/3660634
Valerio Bellandi, Paolo Ceravolo, Jonatan Maggesi, Samira Maghool

To gain a comprehensive understanding of a patient’s health, advanced analytics must be applied to the data collected by electronic health record (EHR) systems. However, managing and curating this data requires carefully designed workflows. While digitalization and standardization enable continuous health monitoring, missing data values and technical issues can compromise the consistency and timeliness of the data. In this paper, we propose a workflow for developing prognostic models that leverages the SMART BEAR infrastructure and the capabilities of the Big Data Analytics (BDA) engine to homogenize and harmonize data points. Our workflow improves the quality of the data by evaluating different imputation algorithms and selecting one that maintains the distribution and correlation of features similar to the raw data. We applied this workflow to a subset of the data stored in the SMART BEAR repository and examined its impact on the prediction of emerging health states such as cardiovascular disease and mild depression. We also discussed the possibility of model validation by clinicians in the SMART BEAR project, the transmission of subsequent actions in the decision support system, and the estimation of the required number of data points.

要全面了解患者的健康状况,必须对电子健康记录 (EHR) 系统收集的数据进行高级分析。然而,管理和整理这些数据需要精心设计的工作流程。虽然数字化和标准化能够实现持续的健康监测,但数据值缺失和技术问题会影响数据的一致性和及时性。在本文中,我们提出了一种开发预后模型的工作流程,利用 SMART BEAR 基础设施和大数据分析(BDA)引擎的功能来统一和协调数据点。我们的工作流程通过评估不同的估算算法并选择一种能保持与原始数据相似的特征分布和相关性的算法来提高数据质量。我们将这一工作流程应用于存储在 SMART BEAR 数据库中的数据子集,并检验了它对预测心血管疾病和轻度抑郁症等新兴健康状态的影响。我们还讨论了由 SMART BEAR 项目中的临床医生对模型进行验证的可能性、决策支持系统中后续行动的传输以及所需数据点数量的估算。
{"title":"Data management for continuous learning in EHR systems","authors":"Valerio Bellandi, Paolo Ceravolo, Jonatan Maggesi, Samira Maghool","doi":"10.1145/3660634","DOIUrl":"https://doi.org/10.1145/3660634","url":null,"abstract":"<p>To gain a comprehensive understanding of a patient’s health, advanced analytics must be applied to the data collected by electronic health record (EHR) systems. However, managing and curating this data requires carefully designed workflows. While digitalization and standardization enable continuous health monitoring, missing data values and technical issues can compromise the consistency and timeliness of the data. In this paper, we propose a workflow for developing prognostic models that leverages the SMART BEAR infrastructure and the capabilities of the Big Data Analytics (BDA) engine to homogenize and harmonize data points. Our workflow improves the quality of the data by evaluating different imputation algorithms and selecting one that maintains the distribution and correlation of features similar to the raw data. We applied this workflow to a subset of the data stored in the SMART BEAR repository and examined its impact on the prediction of emerging health states such as cardiovascular disease and mild depression. We also discussed the possibility of model validation by clinicians in the SMART BEAR project, the transmission of subsequent actions in the decision support system, and the estimation of the required number of data points.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"19 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140884133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Vertical Federated Unlearning via Fast Retraining 通过快速再训练实现高效的垂直联合非学习
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-10 DOI: 10.1145/3657290
Zichen Wang, Xiangshan Gao, Cong Wang, Peng Cheng, Jiming Chen

Vertical federated learning (VFL) revolutionizes privacy-preserved collaboration for small businesses, that have distinct but complementary feature sets. However, as the scope of VFL expands, the constant entering and leaving of participants, as well as the subsequent exercise of the “right to be forgotten” pose a great challenge in practice. The question of how to efficiently erase one’s contribution from the shared model remains largely unexplored in the context of vertical federated learning. In this paper, we introduce a vertical federated unlearning framework, which integrates model checkpointing techniques with a hybrid, first-order optimization technique. The core concept is to reduce backpropagation time and improve convergence/generalization by combining the advantages of the existing optimizers. We provide in-depth theoretical analysis and time complexity to illustrate the effectiveness of the proposed design. We conduct extensive experiments on 6 public datasets and demonstrate that our method could achieve up to 6.3 × speed-up compared to the baseline, with negligible influence on the original learning task.

纵向联合学习(VFL)为小型企业的隐私保护协作带来了革命性的变化,这些企业具有独特但互补的功能集。然而,随着垂直联合学习范围的扩大,参与者的不断进出以及随后 "被遗忘权 "的行使在实践中构成了巨大挑战。在垂直联合学习的背景下,如何有效地从共享模型中删除自己的贡献,这个问题在很大程度上仍未得到探讨。在本文中,我们介绍了一种垂直联合取消学习框架,它将模型检查点技术与混合一阶优化技术融为一体。其核心理念是结合现有优化器的优势,减少反向传播时间,提高收敛性/泛化。我们提供了深入的理论分析和时间复杂性,以说明所提设计的有效性。我们在 6 个公共数据集上进行了广泛的实验,证明我们的方法与基线方法相比可实现高达 6.3 倍的速度提升,而对原始学习任务的影响几乎可以忽略不计。
{"title":"Efficient Vertical Federated Unlearning via Fast Retraining","authors":"Zichen Wang, Xiangshan Gao, Cong Wang, Peng Cheng, Jiming Chen","doi":"10.1145/3657290","DOIUrl":"https://doi.org/10.1145/3657290","url":null,"abstract":"<p>Vertical federated learning (VFL) revolutionizes privacy-preserved collaboration for small businesses, that have distinct but complementary feature sets. However, as the scope of VFL expands, the constant entering and leaving of participants, as well as the subsequent exercise of the “right to be forgotten” pose a great challenge in practice. The question of how to efficiently erase one’s contribution from the shared model remains largely unexplored in the context of vertical federated learning. In this paper, we introduce a vertical federated unlearning framework, which integrates model checkpointing techniques with a hybrid, first-order optimization technique. The core concept is to reduce backpropagation time and improve convergence/generalization by combining the advantages of the existing optimizers. We provide in-depth theoretical analysis and time complexity to illustrate the effectiveness of the proposed design. We conduct extensive experiments on 6 public datasets and demonstrate that our method could achieve up to 6.3 × speed-up compared to the baseline, with negligible influence on the original learning task.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"76 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters EdgeCI:边缘集群 CNN 推断的分布式工作量分配和模型划分
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-02 DOI: 10.1145/3656041
Yanming Chen, Tong Luo, Weiwei Fang, Neal N. Xiong

Deep learning technology has grown significantly in new application scenarios such as smart cities and driverless vehicles, but its deployment needs to consume a lot of resources. It is usually difficult to execute inference task solely on resource-constrained Intelligent Internet-of-Things (IoT) devices to meet strictly service delay requirements. CNN-based inference task is usually offloaded to the edge servers or cloud. However, it maybe lead to unstable performance and privacy leaks. To address the above challenges, this paper aims to design a low latency distributed inference framework, EdgeCI, which assigns inference tasks to locally idle, connected and resource-constrained IoT device cluster networks. EdgeCI exploits two key optimization knobs, including: (1) Auction-based Workload Assignment Scheme (AWAS), which achieves the workload balance by assigning each workload partition to the more matching IoT device; (2) Fused-Layer parallelization strategy based on non-recursive Dynamic Programming (DPFL), which is aimed at further minimizing the inference time. We have implemented EdgeCI based on PyTorch and evaluated its performance with VGG-16 and ResNet-34 image recognition models. The experimental results prove that our proposed AWAS and DPFL outperform the typical state-of-the-art solutions. When they are well combined, EdgeCI can improve inference speed by 34.72% to 43.52%. EdgeCI outperforms the state-of-the art approaches on the tested platform.

深度学习技术在智慧城市和无人驾驶汽车等新应用场景中得到了长足发展,但其部署需要消耗大量资源。通常,仅在资源受限的智能物联网(IoT)设备上执行推理任务很难满足严格的服务延迟要求。基于 CNN 的推理任务通常被卸载到边缘服务器或云端。然而,这可能会导致性能不稳定和隐私泄露。为应对上述挑战,本文旨在设计一种低延迟分布式推理框架 EdgeCI,将推理任务分配给本地闲置、已连接且资源受限的物联网设备集群网络。EdgeCI 利用了两个关键的优化工具,包括:(1)基于拍卖的工作量分配方案(AWAS),通过将每个工作量分区分配给更匹配的物联网设备来实现工作量平衡;(2)基于非递归动态编程(DPFL)的融合层并行化策略,旨在进一步减少推理时间。我们基于 PyTorch 实现了 EdgeCI,并利用 VGG-16 和 ResNet-34 图像识别模型对其性能进行了评估。实验结果证明,我们提出的 AWAS 和 DPFL 优于最先进的典型解决方案。如果将它们很好地结合起来,EdgeCI 可以将推理速度提高 34.72% 到 43.52%。在测试平台上,EdgeCI 的表现优于最先进的方法。
{"title":"EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters","authors":"Yanming Chen, Tong Luo, Weiwei Fang, Neal N. Xiong","doi":"10.1145/3656041","DOIUrl":"https://doi.org/10.1145/3656041","url":null,"abstract":"<p>Deep learning technology has grown significantly in new application scenarios such as smart cities and driverless vehicles, but its deployment needs to consume a lot of resources. It is usually difficult to execute inference task solely on resource-constrained Intelligent Internet-of-Things (IoT) devices to meet strictly service delay requirements. CNN-based inference task is usually offloaded to the edge servers or cloud. However, it maybe lead to unstable performance and privacy leaks. To address the above challenges, this paper aims to design a low latency distributed inference framework, EdgeCI, which assigns inference tasks to locally idle, connected and resource-constrained IoT device cluster networks. EdgeCI exploits two key optimization knobs, including: (1) Auction-based Workload Assignment Scheme (AWAS), which achieves the workload balance by assigning each workload partition to the more matching IoT device; (2) Fused-Layer parallelization strategy based on non-recursive Dynamic Programming (DPFL), which is aimed at further minimizing the inference time. We have implemented EdgeCI based on PyTorch and evaluated its performance with VGG-16 and ResNet-34 image recognition models. The experimental results prove that our proposed AWAS and DPFL outperform the typical state-of-the-art solutions. When they are well combined, EdgeCI can improve inference speed by 34.72% to 43.52%. EdgeCI outperforms the state-of-the art approaches on the tested platform.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"24 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VORTEX : Visual phishing detectiOns aRe Through EXplanations VORTEX:通过 EXplanations 进行可视化网络钓鱼检测
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1145/3654665
Fabien Charmet, Tomohiro Morikawa, Akira Tanaka, Takeshi Takahashi

Phishing attacks reached a record high in 2022, as reported by the Anti-Phishing Work Group [1], following an upward trend accelerated during the pandemic. Attackers employ increasingly sophisticated tools in their attempts to deceive unaware users into divulging confidential information. Recently, the research community has turned to the utilization of screenshots of legitimate and malicious websites to identify the brands that attackers aim to impersonate. In the field of Computer Vision, convolutional neural networks (CNNs) have been employed to analyze the visual rendering of websites, addressing the problem of phishing detection. However, along with the development of these new models, arose the need to understand their inner workings and the rationale behind each prediction. Answering the question, “How is this website attempting to steal the identity of a well-known brand?” becomes crucial when protecting end-users from such threats. In cybersecurity, the application of explainable AI (XAI) is an emerging approach that aims to answer such questions. In this paper, we propose VORTEX, a phishing website detection solution equipped with the capability to explain how a screenshot attempts to impersonate a specific brand. We conduct an extensive analysis of XAI methods for the phishing detection problem and demonstrate that VORTEX provides meaningful explanations regarding the detection results. Additionally, we evaluate the robustness of our model against Adversarial Example attacks. We adapt these attacks to the VORTEX architecture and evaluate their efficacy across multiple models and datasets. Our results show that VORTEX achieves superior accuracy compared to previous models, and learns semantically meaningful patterns to provide actionable explanations about phishing websites. Finally, VORTEX demonstrates an acceptable level of robustness against adversarial example attacks.

根据反钓鱼工作组的报告[1],网络钓鱼攻击在大流行病期间呈加速上升趋势,并在 2022 年创下新高。攻击者使用越来越复杂的工具,试图欺骗不知情的用户泄露机密信息。最近,研究界转而利用合法网站和恶意网站的截图来识别攻击者旨在冒充的品牌。在计算机视觉领域,卷积神经网络(CNN)被用于分析网站的视觉渲染,以解决网络钓鱼检测问题。然而,随着这些新模型的开发,人们需要了解它们的内部工作原理以及每次预测背后的原理。在保护最终用户免受此类威胁时,回答 "这个网站是如何试图窃取知名品牌的身份信息的?"这个问题变得至关重要。在网络安全领域,可解释人工智能(XAI)的应用是一种旨在回答此类问题的新兴方法。在本文中,我们提出了 VORTEX,这是一种钓鱼网站检测解决方案,具有解释截图如何试图冒充特定品牌的能力。我们针对网络钓鱼检测问题对 XAI 方法进行了广泛分析,结果表明 VORTEX 能对检测结果做出有意义的解释。此外,我们还评估了我们的模型对逆向示例攻击的鲁棒性。我们将这些攻击调整为 VORTEX 架构,并在多个模型和数据集上评估其功效。我们的结果表明,与以前的模型相比,VORTEX 实现了更高的准确性,并能学习有语义意义的模式,从而提供有关钓鱼网站的可行解释。最后,VORTEX 在对抗恶意示例攻击方面表现出了可接受的鲁棒性。
{"title":"VORTEX : Visual phishing detectiOns aRe Through EXplanations","authors":"Fabien Charmet, Tomohiro Morikawa, Akira Tanaka, Takeshi Takahashi","doi":"10.1145/3654665","DOIUrl":"https://doi.org/10.1145/3654665","url":null,"abstract":"<p>Phishing attacks reached a record high in 2022, as reported by the Anti-Phishing Work Group [1], following an upward trend accelerated during the pandemic. Attackers employ increasingly sophisticated tools in their attempts to deceive unaware users into divulging confidential information. Recently, the research community has turned to the utilization of screenshots of legitimate and malicious websites to identify the brands that attackers aim to impersonate. In the field of Computer Vision, convolutional neural networks (CNNs) have been employed to analyze the visual rendering of websites, addressing the problem of phishing detection. However, along with the development of these new models, arose the need to understand their inner workings and the rationale behind each prediction. Answering the question, “How is this website attempting to steal the identity of a well-known brand?” becomes crucial when protecting end-users from such threats. In cybersecurity, the application of explainable AI (XAI) is an emerging approach that aims to answer such questions. In this paper, we propose VORTEX, a phishing website detection solution equipped with the capability to explain how a screenshot attempts to impersonate a specific brand. We conduct an extensive analysis of XAI methods for the phishing detection problem and demonstrate that VORTEX provides meaningful explanations regarding the detection results. Additionally, we evaluate the robustness of our model against Adversarial Example attacks. We adapt these attacks to the VORTEX architecture and evaluate their efficacy across multiple models and datasets. Our results show that VORTEX achieves superior accuracy compared to previous models, and learns semantically meaningful patterns to provide actionable explanations about phishing websites. Finally, VORTEX demonstrates an acceptable level of robustness against adversarial example attacks.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"58 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140325162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Think Transformer for Enhancing Emotional Health 增强情感健康的多元思维转换器
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-18 DOI: 10.1145/3652512
Jiarong Wang, Jiaji Wu, Shaohong Chen, Xiangyu Han, Mingzhou Tan, Jianguo Yu

The smart healthcare system not only focuses on physical health but also on emotional health. Music therapy, as a non-pharmacological treatment method, has been widely used in clinical treatment, but music selection and generation still require manual intervention. AI music generation technology can assist people in relieving stress and providing more personalized and efficient music therapy support. However, existing AI music generation highly relies on the note generated at the current time to produce the note at the next time. This will lead to disharmonious results. The first reason is the small errors being ignored at the current generated note. This error will accumulate and spread continuously, and finally make the music become random. To solve this problem, we propose a music selection module to filter the errors of generated note. The multi-think mechanism is proposed to filter the result multiple times, so that the generated note is as accurate as possible, eliminating the impact of the results on the next generation process. The second reason is that the results of multiple generation of each music clip are not the same or even do not follow the same music rules. Therefore, in the inference phase, a voting mechanism is proposed in this paper to select the note that follow the music rules that most experimental results follow as the final result. The subjective and objective evaluations demonstrate the superiority of our proposed model in generation of more smooth music that conforms to music rules. This model provides strong support for clinical music therapy, and provides new ideas for the research and practice of emotional health therapy based on the Internet of Things.

智能医疗系统不仅关注身体健康,也关注情感健康。音乐疗法作为一种非药物治疗方法,已广泛应用于临床治疗,但音乐的选择和生成仍需要人工干预。人工智能音乐生成技术可以帮助人们缓解压力,提供更加个性化和高效的音乐治疗支持。然而,现有的人工智能音乐生成技术高度依赖于当前生成的音符来生成下一次的音符。这将导致不和谐的结果。第一个原因是当前生成的音符会忽略一些小错误。这种误差会不断累积和扩散,最终使音乐变得随机。为了解决这个问题,我们提出了一个音乐选择模块来过滤生成音符的错误。我们提出了多重思考机制,对结果进行多次过滤,使生成的音符尽可能准确,消除了结果对下一次生成过程的影响。第二个原因是,每个音乐片段多次生成的结果并不相同,甚至不遵循相同的音乐规则。因此,在推理阶段,本文提出了一种投票机制,选择大多数实验结果遵循音乐规则的音符作为最终结果。主观和客观评估结果表明,我们提出的模型在生成符合音乐规则的更流畅的音乐方面具有优越性。该模型为临床音乐治疗提供了有力支持,也为基于物联网的情绪健康治疗研究与实践提供了新思路。
{"title":"Multi-Think Transformer for Enhancing Emotional Health","authors":"Jiarong Wang, Jiaji Wu, Shaohong Chen, Xiangyu Han, Mingzhou Tan, Jianguo Yu","doi":"10.1145/3652512","DOIUrl":"https://doi.org/10.1145/3652512","url":null,"abstract":"<p>The smart healthcare system not only focuses on physical health but also on emotional health. Music therapy, as a non-pharmacological treatment method, has been widely used in clinical treatment, but music selection and generation still require manual intervention. AI music generation technology can assist people in relieving stress and providing more personalized and efficient music therapy support. However, existing AI music generation highly relies on the note generated at the current time to produce the note at the next time. This will lead to disharmonious results. The first reason is the small errors being ignored at the current generated note. This error will accumulate and spread continuously, and finally make the music become random. To solve this problem, we propose a music selection module to filter the errors of generated note. The multi-think mechanism is proposed to filter the result multiple times, so that the generated note is as accurate as possible, eliminating the impact of the results on the next generation process. The second reason is that the results of multiple generation of each music clip are not the same or even do not follow the same music rules. Therefore, in the inference phase, a voting mechanism is proposed in this paper to select the note that follow the music rules that most experimental results follow as the final result. The subjective and objective evaluations demonstrate the superiority of our proposed model in generation of more smooth music that conforms to music rules. This model provides strong support for clinical music therapy, and provides new ideas for the research and practice of emotional health therapy based on the Internet of Things.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"94 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140149829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1