首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application 基于 ML 的神经肌肉失调识别技术(使用肌电信号)在情感健康领域的应用
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-14 DOI: 10.1145/3637213
Abdelouahad Achmamad, Mohamed Elfezazi, Abdellah Chehri, Imran Ahmed, Atman Jbari, Rachid Saadane

Abstract: The electromyogram (EMG), also known as an EMG, is used to assess nerve impulses in motor nerves, sensory nerves, and muscles. EMS is a versatile tool used in various biomedical applications. It is commonly employed to determine physical health, but it also finds utility in evaluating emotional well-being, such as through facial electromyography. Classification of EMG signals has attracted the interest of scientists since it is crucial for identifying neuromuscular disorders (NMDs). Recent advances in the miniaturization of biomedical sensors enable the development of medical monitoring systems. This paper presents a portable and scalable architecture for machine learning modules designed for medical diagnostics. In particular, we provide a hybrid classification model for NMDs. The proposed method combines two supervised machine learning classifiers with the discrete wavelet transform (DWT). During the online testing phase, the class label of an EMG signal is predicted using the classifiers’ optimal models, which can be identified at this stage. The simulation results demonstrate that both classifiers have an accuracy of over 98%. Finally, the proposed method was implemented using an embedded CompactRIO-9035 real-time controller.

摘要:肌电图(electromyogram, EMG),也被称为肌电图,用于评估运动神经、感觉神经和肌肉的神经冲动。EMS是一种用于各种生物医学应用的多功能工具。它通常用于确定身体健康状况,但它也可以用于评估情绪健康,例如通过面部肌电图。肌电信号的分类是识别神经肌肉疾病(nmd)的关键,因此引起了科学家们的兴趣。生物医学传感器小型化的最新进展促进了医疗监测系统的发展。本文提出了一种可移植和可扩展的机器学习模块架构,用于医疗诊断。特别地,我们提供了一个nmd的混合分类模型。该方法将两个监督机器学习分类器与离散小波变换(DWT)相结合。在在线测试阶段,使用分类器的最优模型预测肌电信号的类别标签,可以在此阶段识别。仿真结果表明,两种分类器的准确率均在98%以上。最后,在嵌入式CompactRIO-9035实时控制器上实现了该方法。
{"title":"ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application","authors":"Abdelouahad Achmamad, Mohamed Elfezazi, Abdellah Chehri, Imran Ahmed, Atman Jbari, Rachid Saadane","doi":"10.1145/3637213","DOIUrl":"https://doi.org/10.1145/3637213","url":null,"abstract":"<p><b>Abstract:</b> The electromyogram (EMG), also known as an EMG, is used to assess nerve impulses in motor nerves, sensory nerves, and muscles. EMS is a versatile tool used in various biomedical applications. It is commonly employed to determine physical health, but it also finds utility in evaluating emotional well-being, such as through facial electromyography. Classification of EMG signals has attracted the interest of scientists since it is crucial for identifying neuromuscular disorders (NMDs). Recent advances in the miniaturization of biomedical sensors enable the development of medical monitoring systems. This paper presents a portable and scalable architecture for machine learning modules designed for medical diagnostics. In particular, we provide a hybrid classification model for NMDs. The proposed method combines two supervised machine learning classifiers with the discrete wavelet transform (DWT). During the online testing phase, the class label of an EMG signal is predicted using the classifiers’ optimal models, which can be identified at this stage. The simulation results demonstrate that both classifiers have an accuracy of over 98%. Finally, the proposed method was implemented using an embedded CompactRIO-9035 real-time controller.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"7 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138629200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT and Deep Learning-Based Smart Healthcare Framework for Thyroid Cancer Detection 基于物联网和深度学习的甲状腺癌检测智能医疗框架
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-11 DOI: 10.1145/3637062
Rohit Sharma, Gautam Kumar Mahanti, Chinmay Chakraborty, Ganapati Panda, Adyasha Rath

A world of healthcare possibilities has been opened with the development of the Internet of Medical Things and related machine learning, deep learning, and artificial intelligence approaches. It has a broad range of uses: when linked to the Internet, common medical equipment and sensors may gather important data; deep learning and artificial intelligence algorithms use this data to understand symptoms and patterns and allow remote healthcare. There are a large number of people affected by thyroid disorders across the world. The ultrasound-based thyroid nodule detection using traditional methods increased the burden on the expertise. Therefore, alternate methods are required to overcome this problem. In order to facilitate early thyroid disorder detection, this research aims to offer an IoT-based ensemble learning framework. In the proposed ensemble model, three pre-trained models DeiT, Mixer-MLP and Swin Transformer, are used for feature extraction. The mRMR technique is used for relevant feature selection. A total of 24 machine learning models have been trained, and weighted average ensemble learning is employed using the Improved Jaya optimization algorithm and Coronavirus Herd Immunity optimization algorithm. The ensemble model with the improved Jaya optimization algorithm achieved excellent results. The best value for accuracy, precision, sensitivity, specificity, F2-score and ROC-AUC score are 92.83%, 87.76%, 97.66%, 88.89%, 0.9551 and 0.9357, respectively. The main focus of this research is to increase the specificity. A poor value of specificity can lead to a high false positive rate. This situation can increase anxiety and emotionally weaken the patient. The proposed ensemble model with the Improved Jaya optimization algorithm outperformed state-of-the-art techniques and can assist medical experts.

随着医疗物联网以及相关的机器学习、深度学习和人工智能方法的发展,医疗保健的世界已经开启。它具有广泛的用途:与互联网连接后,普通医疗设备和传感器可以收集重要数据;深度学习和人工智能算法利用这些数据了解症状和模式,实现远程医疗。全世界有大量甲状腺疾病患者。使用传统方法进行基于超声波的甲状腺结节检测增加了专业人员的负担。因此,需要其他方法来解决这一问题。为了促进甲状腺疾病的早期检测,本研究旨在提供一种基于物联网的集合学习框架。在提议的集合模型中,三个预先训练好的模型 DeiT、Mixer-MLP 和 Swin Transformer 被用于特征提取。mRMR 技术用于相关特征选择。共训练了 24 个机器学习模型,并使用改进的 Jaya 优化算法和冠状病毒群免疫优化算法进行加权平均集合学习。采用改进的 Jaya 优化算法的集合模型取得了优异的成绩。准确率、精确度、灵敏度、特异性、F2-score 和 ROC-AUC 评分的最佳值分别为 92.83%、87.76%、97.66%、88.89%、0.9551 和 0.9357。这项研究的重点是提高特异性。特异性值越低,假阳性率就越高。这种情况会增加患者的焦虑感,削弱患者的情绪。所提出的采用改进 Jaya 优化算法的集合模型优于最先进的技术,可以为医学专家提供帮助。
{"title":"An IoT and Deep Learning-Based Smart Healthcare Framework for Thyroid Cancer Detection","authors":"Rohit Sharma, Gautam Kumar Mahanti, Chinmay Chakraborty, Ganapati Panda, Adyasha Rath","doi":"10.1145/3637062","DOIUrl":"https://doi.org/10.1145/3637062","url":null,"abstract":"<p>A world of healthcare possibilities has been opened with the development of the Internet of Medical Things and related machine learning, deep learning, and artificial intelligence approaches. It has a broad range of uses: when linked to the Internet, common medical equipment and sensors may gather important data; deep learning and artificial intelligence algorithms use this data to understand symptoms and patterns and allow remote healthcare. There are a large number of people affected by thyroid disorders across the world. The ultrasound-based thyroid nodule detection using traditional methods increased the burden on the expertise. Therefore, alternate methods are required to overcome this problem. In order to facilitate early thyroid disorder detection, this research aims to offer an IoT-based ensemble learning framework. In the proposed ensemble model, three pre-trained models DeiT, Mixer-MLP and Swin Transformer, are used for feature extraction. The mRMR technique is used for relevant feature selection. A total of 24 machine learning models have been trained, and weighted average ensemble learning is employed using the Improved Jaya optimization algorithm and Coronavirus Herd Immunity optimization algorithm. The ensemble model with the improved Jaya optimization algorithm achieved excellent results. The best value for accuracy, precision, sensitivity, specificity, F2-score and ROC-AUC score are 92.83%, 87.76%, 97.66%, 88.89%, 0.9551 and 0.9357, respectively. The main focus of this research is to increase the specificity. A poor value of specificity can lead to a high false positive rate. This situation can increase anxiety and emotionally weaken the patient. The proposed ensemble model with the Improved Jaya optimization algorithm outperformed state-of-the-art techniques and can assist medical experts.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"68 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138567161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Softwarized Intrusion Detection System for IoT-Enabled Smart Healthcare System 面向物联网智能医疗系统的软件入侵检测系统
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-27 DOI: 10.1145/3634748
Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, Prabhat Kumar, Randhir Kumar, Alireza Jolfaei

The Internet of Things-enabled Smart Healthcare System (IoT-SHS) is a networked infrastructure of intelligent wearables, software applications, health systems, and services that continuously monitors and transmits patient-sensitive data using an open wireless channel. The conventional security mechanisms are unsuitable for detecting attacks in the dynamic IoT-SHS context due to resource limitations and heterogeneity in low-cost healthcare devices. Deep Learning (DL) solutions for Intrusion Detection System (IDS) and softwarization of the network has the potential to achieve secure network services in the IoT-SHS environment. Motivated by the aforementioned discussion, we propose an intelligent softwarized IDS for protecting the critical infrastructure of the IoT-SHS ecosystem. Specifically, the DL-based IDS is designed using a hybrid cuda Long Short-Term Memory Deep Neural Network (cuLSTM-DNN) algorithm to assist network administrators in efficient decision-making for the generated intrusions. To further bolster the system’s resilience, we suggest a deployment architecture for the proposed CUDA-powered IDS using OpenStack Tacker in a real SDN environment, ensuring that virtual machines can directly utilize the host’s NVIDIA GPU, thereby streamlining and enhancing the network’s operational efficiency. The experimental results using the CICDDoS2019 dataset confirm the effectiveness of the proposed framework over some baseline and recent state-of-the-art techniques.

支持物联网的智能医疗保健系统(IoT-SHS)是一个由智能可穿戴设备、软件应用程序、医疗系统和服务组成的网络基础设施,可使用开放的无线通道持续监控和传输患者敏感数据。由于资源限制和低成本医疗设备的异质性,传统的安全机制不适合检测动态IoT-SHS环境中的攻击。入侵检测系统(IDS)的深度学习(DL)解决方案和网络的软件化具有在IoT-SHS环境中实现安全网络服务的潜力。在上述讨论的推动下,我们提出了一种智能软件IDS,用于保护IoT-SHS生态系统的关键基础设施。具体而言,基于dl的入侵检测系统采用混合cuda长短期记忆深度神经网络(cuLSTM-DNN)算法设计,以帮助网络管理员对生成的入侵进行有效决策。为了进一步增强系统的弹性,我们建议在真实的SDN环境中使用OpenStack Tacker为提议的cuda驱动的IDS提供部署架构,确保虚拟机可以直接利用主机的NVIDIA GPU,从而简化和提高网络的运行效率。使用CICDDoS2019数据集的实验结果证实了所提出框架在一些基线和最新最先进技术上的有效性。
{"title":"A Softwarized Intrusion Detection System for IoT-Enabled Smart Healthcare System","authors":"Danish Javeed, Tianhan Gao, Muhammad Shahid Saeed, Prabhat Kumar, Randhir Kumar, Alireza Jolfaei","doi":"10.1145/3634748","DOIUrl":"https://doi.org/10.1145/3634748","url":null,"abstract":"<p>The Internet of Things-enabled Smart Healthcare System (IoT-SHS) is a networked infrastructure of intelligent wearables, software applications, health systems, and services that continuously monitors and transmits patient-sensitive data using an open wireless channel. The conventional security mechanisms are unsuitable for detecting attacks in the dynamic IoT-SHS context due to resource limitations and heterogeneity in low-cost healthcare devices. Deep Learning (DL) solutions for Intrusion Detection System (IDS) and softwarization of the network has the potential to achieve secure network services in the IoT-SHS environment. Motivated by the aforementioned discussion, we propose an intelligent softwarized IDS for protecting the critical infrastructure of the IoT-SHS ecosystem. Specifically, the DL-based IDS is designed using a hybrid cuda Long Short-Term Memory Deep Neural Network (cuLSTM-DNN) algorithm to assist network administrators in efficient decision-making for the generated intrusions. To further bolster the system’s resilience, we suggest a deployment architecture for the proposed CUDA-powered IDS using OpenStack Tacker in a real SDN environment, ensuring that virtual machines can directly utilize the host’s NVIDIA GPU, thereby streamlining and enhancing the network’s operational efficiency. The experimental results using the CICDDoS2019 dataset confirm the effectiveness of the proposed framework over some baseline and recent state-of-the-art techniques.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"363 4","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138507027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EtherShield: Time Interval Analysis for Detection of Malicious Behavior on Ethereum EtherShield:检测以太坊恶意行为的时间间隔分析
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1145/3633514
Bofeng Pan, Natalia Stakhanova, Zhongwen Zhu

Advances in blockchain technology have attracted significant attention across the world. The practical blockchain applications emerging in various domains ranging from finance, healthcare, and entertainment, have quickly become attractive targets for adversaries. The novelty of the technology coupled with the high degree of anonymity it provides made malicious activities even less visible in the blockchain environment. This made their robust detection challenging.

This paper presents EtherShield, an novel approach for identifying malicious activity on the Ethereum blockchain. By combining temporal transaction information and contract code characteristics, EtherShield can detect various types of threats and provide insight into the behavior of contracts. The time-interval based analysis used by EtherShield enables expedited detection, achieving comparable accuracy to other approaches with significantly less data. Our validation analysis, which involved over 15,000 Ethereum accounts, demonstrated that EtherShield can significantly expedite the detection of malicious activity while maintaining high accuracy levels (86.52% accuracy with 1 hour of transaction history data and 91.33% accuracy with 1 year of transaction history data).

区块链技术的进步引起了全世界的广泛关注。在金融、医疗保健和娱乐等各个领域出现的实际区块链应用已迅速成为对手的有吸引力的目标。该技术的新颖性加上它提供的高度匿名性使得恶意活动在区块链环境中更加不可见。这使得他们的稳健检测具有挑战性。本文介绍了EtherShield,一种用于识别以太坊区块链上恶意活动的新方法。通过结合临时交易信息和合约代码特征,EtherShield可以检测各种类型的威胁,并提供对合约行为的洞察。EtherShield使用的基于时间间隔的分析方法可以加快检测速度,在数据少得多的情况下达到与其他方法相当的精度。我们的验证分析涉及超过15,000个以太坊账户,结果表明,EtherShield可以显著加快恶意活动的检测速度,同时保持较高的准确率水平(1小时交易历史数据的准确率为86.52%,1年交易历史数据的准确率为91.33%)。
{"title":"EtherShield: Time Interval Analysis for Detection of Malicious Behavior on Ethereum","authors":"Bofeng Pan, Natalia Stakhanova, Zhongwen Zhu","doi":"10.1145/3633514","DOIUrl":"https://doi.org/10.1145/3633514","url":null,"abstract":"<p>Advances in blockchain technology have attracted significant attention across the world. The practical blockchain applications emerging in various domains ranging from finance, healthcare, and entertainment, have quickly become attractive targets for adversaries. The novelty of the technology coupled with the high degree of anonymity it provides made malicious activities even less visible in the blockchain environment. This made their robust detection challenging. </p><p>This paper presents EtherShield, an novel approach for identifying malicious activity on the Ethereum blockchain. By combining temporal transaction information and contract code characteristics, EtherShield can detect various types of threats and provide insight into the behavior of contracts. The time-interval based analysis used by EtherShield enables expedited detection, achieving comparable accuracy to other approaches with significantly less data. Our validation analysis, which involved over 15,000 Ethereum accounts, demonstrated that EtherShield can significantly expedite the detection of malicious activity while maintaining high accuracy levels (86.52% accuracy with 1 hour of transaction history data and 91.33% accuracy with 1 year of transaction history data).</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"364 3","pages":""},"PeriodicalIF":5.3,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138507026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Section on “Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions” 网络制造的进展:架构、挑战和未来研究方向
IF 5.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-17 DOI: 10.1145/3627990
Gautam Srivastava, Jerry Chun‐Wei Lin, Calton Pu, Yudong Zhang
{"title":"Special Section on “Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions”","authors":"Gautam Srivastava, Jerry Chun‐Wei Lin, Calton Pu, Yudong Zhang","doi":"10.1145/3627990","DOIUrl":"https://doi.org/10.1145/3627990","url":null,"abstract":"","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"10 1","pages":"1 - 4"},"PeriodicalIF":5.3,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139266401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DxHash: A Memory Saving Consistent Hashing Algorithm DxHash:一个内存保存一致哈希算法
3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-03 DOI: 10.1145/3631708
Chao Dong, Fang Wang, Dan Feng
Consistent Hashing (CH) algorithms are widely adopted in networks and distributed systems for their ability to achieve load balancing and minimize disruptions. However, the rise of the Internet of Things (IoT) has introduced new challenges for existing CH algorithms, characterized by high memory usage and update overhead. This paper presents DxHash, a novel CH algorithm based on repeated pseudo-random number generation. DxHash offers significant benefits, including a remarkably low memory footprint, high lookup throughput, and minimal update overhead. Additionally, we introduce a weighted variant of DxHash, enabling adaptable weight adjustments to handle heterogeneous load distribution. Through extensive evaluation, we demonstrate that DxHash outperforms AnchorHash, a state-of-the-art CH algorithm, in terms of the reduction of up to 98.4% in memory footprint and comparable performance in lookup and update.
一致性哈希(CH)算法在网络和分布式系统中被广泛采用,因为它们具有实现负载平衡和最小化中断的能力。然而,物联网(IoT)的兴起给现有的CH算法带来了新的挑战,其特点是高内存使用和更新开销。提出了一种基于重复伪随机数生成的新型CH算法DxHash。DxHash提供了显著的优势,包括非常低的内存占用、高查找吞吐量和最小的更新开销。此外,我们还引入了DxHash的加权变体,支持自适应的权重调整来处理异构负载分布。通过广泛的评估,我们证明DxHash在内存占用减少高达98.4%以及查找和更新性能方面优于最先进的CH算法AnchorHash。
{"title":"DxHash: A Memory Saving Consistent Hashing Algorithm","authors":"Chao Dong, Fang Wang, Dan Feng","doi":"10.1145/3631708","DOIUrl":"https://doi.org/10.1145/3631708","url":null,"abstract":"Consistent Hashing (CH) algorithms are widely adopted in networks and distributed systems for their ability to achieve load balancing and minimize disruptions. However, the rise of the Internet of Things (IoT) has introduced new challenges for existing CH algorithms, characterized by high memory usage and update overhead. This paper presents DxHash, a novel CH algorithm based on repeated pseudo-random number generation. DxHash offers significant benefits, including a remarkably low memory footprint, high lookup throughput, and minimal update overhead. Additionally, we introduce a weighted variant of DxHash, enabling adaptable weight adjustments to handle heterogeneous load distribution. Through extensive evaluation, we demonstrate that DxHash outperforms AnchorHash, a state-of-the-art CH algorithm, in terms of the reduction of up to 98.4% in memory footprint and comparable performance in lookup and update.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135818869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Positional Encoding-based Resident Identification in Multi-resident Smart Homes 多居民智能家居中基于位置编码的居民身份识别
3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-01 DOI: 10.1145/3631353
Zhiyi Song, Dipankar Chaki, Abdallah Lakhdari, Athman Bouguettaya
We propose a novel resident identification framework to identify residents in a multi-occupant smart environment. The proposed framework employs a feature extraction model based on the concepts of positional encoding. The feature extraction model considers the locations of homes as a graph. We design a novel algorithm to build such graphs from layout maps of smart environments. The Node2Vec algorithm is used to transform the graph into high-dimensional node embeddings. A Long Short-Term Memory (LSTM) model is introduced to predict the identities of residents using temporal sequences of sensor events with the node embeddings. Extensive experiments show that our proposed scheme effectively identifies residents in a multi-occupant environment. Evaluation results on two real-world datasets demonstrate that our proposed approach achieves 94.5% and 87.9% accuracy, respectively.
我们提出了一种新的居民识别框架来识别多居民智能环境中的居民。该框架采用基于位置编码概念的特征提取模型。特征提取模型将房屋的位置视为一个图。我们设计了一种新的算法来从智能环境的布局图中构建这样的图。使用Node2Vec算法将图转换为高维节点嵌入。提出了一种长短期记忆(LSTM)模型,利用传感器事件的时间序列和节点嵌入来预测居民的身份。大量的实验表明,我们提出的方案可以有效地识别多居民环境中的居民。在两个真实数据集上的评估结果表明,我们提出的方法分别达到了94.5%和87.9%的准确率。
{"title":"Positional Encoding-based Resident Identification in Multi-resident Smart Homes","authors":"Zhiyi Song, Dipankar Chaki, Abdallah Lakhdari, Athman Bouguettaya","doi":"10.1145/3631353","DOIUrl":"https://doi.org/10.1145/3631353","url":null,"abstract":"We propose a novel resident identification framework to identify residents in a multi-occupant smart environment. The proposed framework employs a feature extraction model based on the concepts of positional encoding. The feature extraction model considers the locations of homes as a graph. We design a novel algorithm to build such graphs from layout maps of smart environments. The Node2Vec algorithm is used to transform the graph into high-dimensional node embeddings. A Long Short-Term Memory (LSTM) model is introduced to predict the identities of residents using temporal sequences of sensor events with the node embeddings. Extensive experiments show that our proposed scheme effectively identifies residents in a multi-occupant environment. Evaluation results on two real-world datasets demonstrate that our proposed approach achieves 94.5% and 87.9% accuracy, respectively.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"154 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polarized Communities Search via Co-guided Random Walk in Attributed Signed Networks 带属性签名网络中基于联合引导随机漫步的极化社区搜索
3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-07 DOI: 10.1145/3613449
Fanyi Yang, Huifang Ma, Cairui Yan, Zhixin Li, Liang Chang
Polarized communities search aims at locating query-dependent communities, in which mostly nodes within each community form intensive positive connections, while mostly nodes across two communities are connected by negative links. Current approaches towards polarized communities search typically model the network topology, while the key factor of node, i.e., the attributes, are largely ignored. Existing studies have shown that community formation is strongly influenced by node attributes and the formation of communities are determined by both network topology and node attributes simultaneously. However, it is nontrivial to incorporate node attributes for polarized communities search. Firstly, it is hard to handle the heterogeneous information from node attributes. Secondly, it is difficult to model the complex relations between network topology and node attributes in identifying polarized communities. To address the above challenges, we propose a novel method Co-guided Random Walk in Attributed signed networks (CoRWA) for polarized communities search by equipping with reasonable attribute setting. For the first challenge, we devise an attribute-based signed network to model the auxiliary relation between nodes and a weight assignment mechanism is designed to measure the reliability of the edges in the signed network. As to the second challenge, a co-guided random walk scheme in two signed networks is designed to explicitly model the relations between topology-based signed network and attribute-based signed network so as to enhance the search result of each other. Finally, we can identify polarized communities by a well-designed Rayleigh quotient in the signed network. Extensive experiments on three real-world datasets demonstrate the effectiveness of the proposed CoRWA. Further analysis reveals the significance of node attributes for polarized communities search.
极化社区搜索的目的是定位依赖查询的社区,其中每个社区内的大多数节点形成密集的正连接,而两个社区之间的大多数节点则通过负连接连接。目前的极化社区搜索方法主要是对网络拓扑进行建模,而忽略了节点属性这一关键因素。已有研究表明,社区的形成受节点属性的强烈影响,社区的形成是由网络拓扑和节点属性共同决定的。然而,在极化社区搜索中,结合节点属性是非常重要的。首先,节点属性中的异构信息难以处理。其次,在极化群体识别中,网络拓扑与节点属性之间的复杂关系难以建模。针对上述挑战,我们提出了一种基于属性签名网络(CoRWA)的极化社区搜索新方法,该方法通过配置合理的属性设置进行极化社区搜索。对于第一个挑战,我们设计了一个基于属性的签名网络来建模节点之间的辅助关系,并设计了一个权重分配机制来衡量签名网络中边的可靠性。针对第二个挑战,设计了两个签名网络的协同引导随机漫步方案,明确建模基于拓扑的签名网络和基于属性的签名网络之间的关系,从而增强彼此的搜索结果。最后,我们可以通过设计良好的瑞利商在签名网络中识别极化社区。在三个真实数据集上的大量实验证明了所提出的CoRWA的有效性。进一步分析揭示了节点属性对极化社区搜索的重要意义。
{"title":"Polarized Communities Search via Co-guided Random Walk in Attributed Signed Networks","authors":"Fanyi Yang, Huifang Ma, Cairui Yan, Zhixin Li, Liang Chang","doi":"10.1145/3613449","DOIUrl":"https://doi.org/10.1145/3613449","url":null,"abstract":"Polarized communities search aims at locating query-dependent communities, in which mostly nodes within each community form intensive positive connections, while mostly nodes across two communities are connected by negative links. Current approaches towards polarized communities search typically model the network topology, while the key factor of node, i.e., the attributes, are largely ignored. Existing studies have shown that community formation is strongly influenced by node attributes and the formation of communities are determined by both network topology and node attributes simultaneously. However, it is nontrivial to incorporate node attributes for polarized communities search. Firstly, it is hard to handle the heterogeneous information from node attributes. Secondly, it is difficult to model the complex relations between network topology and node attributes in identifying polarized communities. To address the above challenges, we propose a novel method Co-guided Random Walk in Attributed signed networks (CoRWA) for polarized communities search by equipping with reasonable attribute setting. For the first challenge, we devise an attribute-based signed network to model the auxiliary relation between nodes and a weight assignment mechanism is designed to measure the reliability of the edges in the signed network. As to the second challenge, a co-guided random walk scheme in two signed networks is designed to explicitly model the relations between topology-based signed network and attribute-based signed network so as to enhance the search result of each other. Finally, we can identify polarized communities by a well-designed Rayleigh quotient in the signed network. Extensive experiments on three real-world datasets demonstrate the effectiveness of the proposed CoRWA. Further analysis reveals the significance of node attributes for polarized communities search.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135252728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious Account Identification in Social Network Platforms 社交网络平台中的恶意账户识别
3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-20 DOI: 10.1145/3625097
Loredana Caruccio, Gaetano Cimino, Stefano Cirillo, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora
Nowadays, people of all ages are increasingly using Web platforms for social interaction. Consequently, many tasks are being transferred over social networks, like advertisements, political communications, and so on, yielding vast volumes of data disseminated over the network. However, this raises several concerns regarding the truthfulness of such data and the accounts generating them. Malicious users often manipulate data in order to gain profit. For example, malicious users often create fake accounts and fake followers to increase their popularity and attract more sponsors, followers, and so on, potentially producing several negative implications that impact the whole society. To deal with these issues it is necessary to increase the capability to properly identify fake accounts and followers. By exploiting automatically extracted data correlations characterizing meaningful patterns of malicious accounts, in this paper, we propose a new feature engineering strategy to augment the social network account dataset with additional features, aiming to enhance the capability of existing machine learning strategies to discriminate fake accounts. Experimental results produced through several machine learning models on account datasets of both the Twitter and the Instagram platforms highlight the effectiveness of the proposed approach towards the automatic discrimination of fake accounts. The choice of Twitter is mainly due to its strict privacy laws, and because its the only social network platform making data of their accounts publicly available.
如今,各个年龄段的人都越来越多地使用网络平台进行社交。因此,许多任务都是通过社交网络转移的,比如广告、政治交流等等,产生了大量的数据在网络上传播。但是,这引起了对这些数据的真实性和产生这些数据的帐户的若干关切。恶意用户经常操纵数据以获取利润。例如,恶意用户经常创建虚假账户和虚假追随者,以增加自己的知名度,吸引更多的赞助商、追随者等,潜在地产生一些影响整个社会的负面影响。为了解决这些问题,有必要提高正确识别虚假账户和关注者的能力。通过利用自动提取的数据相关性来表征恶意帐户的有意义模式,本文提出了一种新的特征工程策略,以增加社交网络帐户数据集的附加特征,旨在增强现有机器学习策略识别虚假帐户的能力。通过对Twitter和Instagram平台账户数据集的几个机器学习模型产生的实验结果强调了所提出的方法在自动识别虚假账户方面的有效性。选择Twitter主要是因为其严格的隐私法,而且因为它是唯一一个公开用户账户数据的社交网络平台。
{"title":"Malicious Account Identification in Social Network Platforms","authors":"Loredana Caruccio, Gaetano Cimino, Stefano Cirillo, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora","doi":"10.1145/3625097","DOIUrl":"https://doi.org/10.1145/3625097","url":null,"abstract":"Nowadays, people of all ages are increasingly using Web platforms for social interaction. Consequently, many tasks are being transferred over social networks, like advertisements, political communications, and so on, yielding vast volumes of data disseminated over the network. However, this raises several concerns regarding the truthfulness of such data and the accounts generating them. Malicious users often manipulate data in order to gain profit. For example, malicious users often create fake accounts and fake followers to increase their popularity and attract more sponsors, followers, and so on, potentially producing several negative implications that impact the whole society. To deal with these issues it is necessary to increase the capability to properly identify fake accounts and followers. By exploiting automatically extracted data correlations characterizing meaningful patterns of malicious accounts, in this paper, we propose a new feature engineering strategy to augment the social network account dataset with additional features, aiming to enhance the capability of existing machine learning strategies to discriminate fake accounts. Experimental results produced through several machine learning models on account datasets of both the Twitter and the Instagram platforms highlight the effectiveness of the proposed approach towards the automatic discrimination of fake accounts. The choice of Twitter is mainly due to its strict privacy laws, and because its the only social network platform making data of their accounts publicly available.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136313989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UNION: Fault-Tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud UNION:机会移动边缘云中的容错协同计算
3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-20 DOI: 10.1145/3617994
Wenhua Xiao, Xudong Fang, Bixin Liu, Ji Wang, Xiaomin Zhu
Opportunistic Mobile Edge Cloud in which opportunistically connected mobile devices run in a cooperative way to augment the capability of single device has become a timely and essential topic due to its widespread prospect under resource-constrained scenarios (e.g., disaster rescue). Because of the mobility of devices and the uncertainty of environments, it is inevitable that failures occur among the mobile nodes. Being different from existing studies that mainly focus on either data offloading or computing offloading among mobile devices in an ideal environment, we concentrate on how to guarantee the reliability of the task execution with the consideration of both data offloading and computing offloading under opportunistically connected mobile edge cloud. To this end, an optimization of mobile task offloading when considering reliability is formulated. Then, we propose a probabilistic model for task offloading and a reliability model for task execution, which estimates the probability of successful execution for a specific opportunistic path and describes the dynamic reliability of the task execution. Based on these models, a heuristic algorithm UNION (Fa u lt-Tolera n t Cooperat i ve C o mputi n g) is proposed to solve this NP-hard problem. Theoretical analysis shows that the complexity of UNION is (mathcal {O}(|mathcal {I}|^2+|mathcal {N}|) ) with guaranteeing the reliability of 0.99. Also, extensive experiments on real-world traces validate the superiority of the proposed algorithm UNION over existing typical strategies.
机会主义移动边缘云(Opportunistic Mobile Edge Cloud)是指机会主义连接的移动设备以协作的方式运行,以增强单个设备的能力,在资源受限的场景下(如灾难救援)具有广泛的前景,因此成为一个及时而必要的话题。由于设备的移动性和环境的不确定性,移动节点之间发生故障是不可避免的。与现有研究主要关注理想环境下移动设备之间的数据卸载或计算卸载不同,我们关注的是如何在机会连接的移动边缘云下同时考虑数据卸载和计算卸载,保证任务执行的可靠性。为此,提出了考虑可靠性的移动任务卸载优化方案。然后,我们提出了任务卸载的概率模型和任务执行的可靠性模型,该模型估计了特定机会路径成功执行的概率,并描述了任务执行的动态可靠性。在这些模型的基础上,提出了一种启发式算法UNION (Fa - t- tolera - t- Cooperat)来解决这一NP-hard问题。理论分析表明,UNION的复杂度为(mathcal {O}(|mathcal {I}|^2+|mathcal {N}|) ),保证了0.99的可靠性。此外,在真实世界轨迹上的大量实验验证了所提出算法UNION优于现有典型策略的优越性。
{"title":"UNION: Fault-Tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud","authors":"Wenhua Xiao, Xudong Fang, Bixin Liu, Ji Wang, Xiaomin Zhu","doi":"10.1145/3617994","DOIUrl":"https://doi.org/10.1145/3617994","url":null,"abstract":"Opportunistic Mobile Edge Cloud in which opportunistically connected mobile devices run in a cooperative way to augment the capability of single device has become a timely and essential topic due to its widespread prospect under resource-constrained scenarios (e.g., disaster rescue). Because of the mobility of devices and the uncertainty of environments, it is inevitable that failures occur among the mobile nodes. Being different from existing studies that mainly focus on either data offloading or computing offloading among mobile devices in an ideal environment, we concentrate on how to guarantee the reliability of the task execution with the consideration of both data offloading and computing offloading under opportunistically connected mobile edge cloud. To this end, an optimization of mobile task offloading when considering reliability is formulated. Then, we propose a probabilistic model for task offloading and a reliability model for task execution, which estimates the probability of successful execution for a specific opportunistic path and describes the dynamic reliability of the task execution. Based on these models, a heuristic algorithm UNION (Fa u lt-Tolera n t Cooperat i ve C o mputi n g) is proposed to solve this NP-hard problem. Theoretical analysis shows that the complexity of UNION is (mathcal {O}(|mathcal {I}|^2+|mathcal {N}|) ) with guaranteeing the reliability of 0.99. Also, extensive experiments on real-world traces validate the superiority of the proposed algorithm UNION over existing typical strategies.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136308036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1