首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios 一种异构复杂场景下的智能隐式实时步态认证系统
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-04-26 DOI: 10.1145/3594538
Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal Xiong, J. Ma
Gait authentication as a technique that can continuously provide identity recognition on mobile devices for security has been investigated by academics in the community for decades. However, most of the existing work achieves insufficient generalization to complex real-world environments due to the complexity of the noisy real-world gait data. To address this limitation, we propose an intelligent Implicit Real-time Gait Authentication (IRGA) system based on Deep Neural Networks (DNNs) for enhancing the adaptability of gait authentication in practice. In the proposed system, the gait data (whether with complex interference signals) will first be processed sequentially by the imperceptible collection module and data preprocessing module for improving data quality. In order to illustrate and verify the suitability of our proposal, we provide analysis of the impact of individual gait changes on data feature distribution. Finally, a fusion neural network composed of a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) is designed to perform feature extraction and user authentication. We evaluate the proposed IRGA system in heterogeneous complex scenarios and present start-of-the-art comparisons on three datasets. Extensive experiments demonstrate that the IRGA system achieves improved performance simultaneously in several different metrics.
步态认证作为一种可以在移动设备上持续提供身份识别以实现安全的技术,几十年来一直受到社会学者的研究。然而,由于嘈杂的真实世界步态数据的复杂性,大多数现有工作对复杂的真实世界环境的泛化能力不足。为了解决这一局限性,我们提出了一种基于深度神经网络(DNN)的智能隐式实时步态认证(IRGA)系统,以增强步态认证在实践中的适应性。在所提出的系统中,步态数据(无论是否具有复杂的干扰信号)将首先由感知采集模块和数据预处理模块顺序处理,以提高数据质量。为了说明和验证我们的建议的适用性,我们分析了个体步态变化对数据特征分布的影响。最后,设计了一个由卷积神经网络(CNN)和长短期记忆(LSTM)组成的融合神经网络来进行特征提取和用户认证。我们在异构复杂场景中评估了所提出的IRGA系统,并在三个数据集上进行了现有技术的比较。大量实验表明,IRGA系统在几个不同的指标上同时实现了性能的提高。
{"title":"IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios","authors":"Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal Xiong, J. Ma","doi":"10.1145/3594538","DOIUrl":"https://doi.org/10.1145/3594538","url":null,"abstract":"Gait authentication as a technique that can continuously provide identity recognition on mobile devices for security has been investigated by academics in the community for decades. However, most of the existing work achieves insufficient generalization to complex real-world environments due to the complexity of the noisy real-world gait data. To address this limitation, we propose an intelligent Implicit Real-time Gait Authentication (IRGA) system based on Deep Neural Networks (DNNs) for enhancing the adaptability of gait authentication in practice. In the proposed system, the gait data (whether with complex interference signals) will first be processed sequentially by the imperceptible collection module and data preprocessing module for improving data quality. In order to illustrate and verify the suitability of our proposal, we provide analysis of the impact of individual gait changes on data feature distribution. Finally, a fusion neural network composed of a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) is designed to perform feature extraction and user authentication. We evaluate the proposed IRGA system in heterogeneous complex scenarios and present start-of-the-art comparisons on three datasets. Extensive experiments demonstrate that the IRGA system achieves improved performance simultaneously in several different metrics.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43547540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking 使用以信息为中心的混合网络保护可扩展的实时多方通信
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-04-19 DOI: 10.1145/3593585
L. Muscariello, M. Papalini, Olivier Roques, M. Sardara, A. Tran Van
In this article, we consider security aspects of online meeting applications based on protocols such as WebRTC that leverage the Information-centric Networking (ICN) architecture to make the system fundamentally more scalable. If the scalability properties provided by ICN have been proved in recent literature, the security challenges and implications for real-time applications have not been reviewed. We show that this class of applications can benefit from strong security and scalability jointly without any major tradeoff and with significant performance improvements over traditional WebRTC systems. To achieve this goal, some modifications to the current ICN architecture must be implemented in the way integrity and authentication are verified. Extensive performance analysis of the architecture based on the open source implementation of Hybrid-ICN proves that real-time applications can greatly benefit from this novel network architecture in terms of strong security and scalable communications.
在本文中,我们考虑基于WebRTC等协议的在线会议应用程序的安全方面,这些协议利用信息中心网络(Information-centric Networking, ICN)架构使系统从根本上更具可伸缩性。如果ICN提供的可扩展性属性已经在最近的文献中得到证明,则尚未审查实时应用程序的安全挑战和影响。我们表明,这类应用程序可以从强大的安全性和可扩展性中获益,而无需任何重大权衡,并且比传统的WebRTC系统具有显著的性能改进。为了实现这一目标,必须在验证完整性和身份验证的方式上对当前ICN体系结构进行一些修改。基于Hybrid-ICN开源实现的架构的广泛性能分析证明,实时应用程序可以从这种新颖的网络架构中获得强大的安全性和可扩展的通信。
{"title":"Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking","authors":"L. Muscariello, M. Papalini, Olivier Roques, M. Sardara, A. Tran Van","doi":"10.1145/3593585","DOIUrl":"https://doi.org/10.1145/3593585","url":null,"abstract":"In this article, we consider security aspects of online meeting applications based on protocols such as WebRTC that leverage the Information-centric Networking (ICN) architecture to make the system fundamentally more scalable. If the scalability properties provided by ICN have been proved in recent literature, the security challenges and implications for real-time applications have not been reviewed. We show that this class of applications can benefit from strong security and scalability jointly without any major tradeoff and with significant performance improvements over traditional WebRTC systems. To achieve this goal, some modifications to the current ICN architecture must be implemented in the way integrity and authentication are verified. Extensive performance analysis of the architecture based on the open source implementation of Hybrid-ICN proves that real-time applications can greatly benefit from this novel network architecture in terms of strong security and scalable communications.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44912030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment NLoS声学室内环境下智能手机的高稳定融合定位系统
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-04-13 DOI: 10.1145/3589765
Hucheng Wang, Zhi Wang, Lei Zhang, Xiao-peng Luo, Xinheng Wang
Fusion positioning technology requires stable and effective positioning data, but this is often challenging to achieve in complex Non-Line-of-Sight (NLoS) environments. This paper proposes a fusion positioning method that can achieve stable and no hop points by adjusting parameters and predicting trends, even with a one-sided lack of fusion data. The method combines acoustic signal and Inertial Measurement Unit (IMU) data, exploiting their respective advantages. The fusion is achieved using the Kalman filter and Bayesian parameter estimation is performed for tuning IMU parameters and predicting motion trends. The proposed method overcomes the problem of fusion failure caused by long-term unilateral data loss in traditional fusion positioning. The positioning trajectory and error distribution analysis show that the proposed method performs optimally in severe NLoS experiments.
融合定位技术需要稳定有效的定位数据,但在复杂的非视线(NLoS)环境中实现这一点往往具有挑战性。本文提出了一种融合定位方法,即使在片面缺乏融合数据的情况下,也可以通过调整参数和预测趋势来实现稳定无跳点。该方法结合了声学信号和惯性测量单元(IMU)数据,利用了它们各自的优势。使用卡尔曼滤波器实现融合,并执行贝叶斯参数估计以调整IMU参数和预测运动趋势。该方法克服了传统融合定位中由于长期单边数据丢失而导致融合失败的问题。定位轨迹和误差分布分析表明,该方法在严重的NLoS实验中表现最佳。
{"title":"A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment","authors":"Hucheng Wang, Zhi Wang, Lei Zhang, Xiao-peng Luo, Xinheng Wang","doi":"10.1145/3589765","DOIUrl":"https://doi.org/10.1145/3589765","url":null,"abstract":"Fusion positioning technology requires stable and effective positioning data, but this is often challenging to achieve in complex Non-Line-of-Sight (NLoS) environments. This paper proposes a fusion positioning method that can achieve stable and no hop points by adjusting parameters and predicting trends, even with a one-sided lack of fusion data. The method combines acoustic signal and Inertial Measurement Unit (IMU) data, exploiting their respective advantages. The fusion is achieved using the Kalman filter and Bayesian parameter estimation is performed for tuning IMU parameters and predicting motion trends. The proposed method overcomes the problem of fusion failure caused by long-term unilateral data loss in traditional fusion positioning. The positioning trajectory and error distribution analysis show that the proposed method performs optimally in severe NLoS experiments.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48591364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction 基于文本特征提取的多类型分类器集成检测虚假评论
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-04-05 DOI: https://dl.acm.org/doi/10.1145/3568676
Gregorius Satia Budhi, Raymond Chiong

The financial impact of online reviews has prompted some fraudulent sellers to generate fake consumer reviews for either promoting their products or discrediting competing products. In this study, we propose a novel ensemble model—the Multi-type Classifier Ensemble (MtCE)—combined with a textual-based featuring method, which is relatively independent of the system, to detect fake online consumer reviews. Unlike other ensemble models that utilise only the same type of single classifier, our proposed ensemble utilises several customised machine learning classifiers (including deep learning models) as its base classifiers. The results of our experiments show that the MtCE can adequately detect fake reviews, and that it outperforms other single and ensemble methods in terms of accuracy and other measurements for all the relevant public datasets used in this study. Moreover, if set correctly, the parameters of MtCE, such as base-classifier types, the total number of base classifiers, bootstrap, and the method to vote on output (e.g., majority or priority), can further improve the performance of the proposed ensemble.

在线评论的经济影响促使一些欺诈卖家产生虚假的消费者评论,要么推销自己的产品,要么诋毁竞争对手的产品。在这项研究中,我们提出了一种新的集成模型-多类型分类器集成(MtCE) -结合基于文本的特征方法,该方法相对独立于系统,以检测在线消费者评论的虚假。与其他仅使用相同类型的单个分类器的集成模型不同,我们提出的集成使用几个定制的机器学习分类器(包括深度学习模型)作为其基本分类器。我们的实验结果表明,MtCE可以充分检测虚假评论,并且在本研究中使用的所有相关公共数据集的准确性和其他测量方面,它优于其他单一和集成方法。此外,如果设置正确,MtCE的参数,如基本分类器类型、基本分类器总数、bootstrap和对输出进行投票的方法(例如多数或优先级),可以进一步提高所建议的集成的性能。
{"title":"A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction","authors":"Gregorius Satia Budhi, Raymond Chiong","doi":"https://dl.acm.org/doi/10.1145/3568676","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3568676","url":null,"abstract":"<p>The financial impact of online reviews has prompted some fraudulent sellers to generate fake consumer reviews for either promoting their products or discrediting competing products. In this study, we propose a novel ensemble model—the <b>Multi-type Classifier Ensemble (MtCE)</b>—combined with a textual-based featuring method, which is relatively independent of the system, to detect fake online consumer reviews. Unlike other ensemble models that utilise only the same type of single classifier, our proposed ensemble utilises several customised machine learning classifiers (including deep learning models) as its base classifiers. The results of our experiments show that the MtCE can adequately detect fake reviews, and that it outperforms other single and ensemble methods in terms of accuracy and other measurements for all the relevant public datasets used in this study. Moreover, if set correctly, the parameters of MtCE, such as base-classifier types, the total number of base classifiers, bootstrap, and the method to vote on output (e.g., majority or priority), can further improve the performance of the proposed ensemble.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time Pricing-based Resource Allocation in Open Market Environments 开放市场环境下基于实时定价的资源配置
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-04-05 DOI: https://dl.acm.org/doi/10.1145/3465237
Pankaj Mishra, Ahmed Moustafa, Takayuki Ito

Open market environments consist of a set of participants (vendors and consumers) that dynamically leave or join the market. As a result, the arising dynamism leads to uncertainties in supply and demand of the resources in these open markets. In specific, in such uncertain markets, vendors attempt to maximise their revenue by dynamically changing their selling prices according to the market demand. In this regard, an optimal resource allocation approach becomes immensely needed to optimise the selling prices based on the supply and demand of the resources in the open market. Therefore, optimal selling prices should maximise the revenue of vendors while protecting the utility of buyers. In this context, we propose a real-time pricing approach for resource allocation in open market environments. The proposed approach introduces a priority-based fairness mechanism to allocate the available resources in a reverse-auction paradigm. Finally, we compare the proposed approach with two state-of-the-art resource allocation approaches. The experimental results show that the proposed approach outperforms the other two resource allocation approaches in its ability to maximise the vendors’ revenue.

开放的市场环境由一组动态地离开或加入市场的参与者(供应商和消费者)组成。因此,产生的活力导致这些开放市场中资源的供求不确定。具体而言,在这种不确定的市场中,供应商试图根据市场需求动态改变销售价格,从而实现收入最大化。在这方面,迫切需要一种最优的资源配置方法,以优化公开市场中基于资源供需的销售价格。因此,最优销售价格应使卖主的收益最大化,同时保护买者的效用。在此背景下,我们提出了一种在开放市场环境中进行资源配置的实时定价方法。该方法引入了一种基于优先级的公平机制,以反向拍卖的方式分配可用资源。最后,我们将提出的方法与两种最先进的资源分配方法进行了比较。实验结果表明,该方法在实现供应商收益最大化方面优于其他两种资源分配方法。
{"title":"Real-time Pricing-based Resource Allocation in Open Market Environments","authors":"Pankaj Mishra, Ahmed Moustafa, Takayuki Ito","doi":"https://dl.acm.org/doi/10.1145/3465237","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3465237","url":null,"abstract":"<p>Open market environments consist of a set of participants (vendors and consumers) that dynamically leave or join the market. As a result, the arising dynamism leads to uncertainties in supply and demand of the resources in these open markets. In specific, in such uncertain markets, vendors attempt to maximise their revenue by dynamically changing their selling prices according to the market demand. In this regard, an optimal resource allocation approach becomes immensely needed to optimise the selling prices based on the supply and demand of the resources in the open market. Therefore, optimal selling prices should maximise the revenue of vendors while protecting the utility of buyers. In this context, we propose a real-time pricing approach for resource allocation in open market environments. The proposed approach introduces a priority-based fairness mechanism to allocate the available resources in a reverse-auction paradigm. Finally, we compare the proposed approach with two state-of-the-art resource allocation approaches. The experimental results show that the proposed approach outperforms the other two resource allocation approaches in its ability to maximise the vendors’ revenue.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding the Source in Networks: An Approach Based on Structural Entropy 在网络中寻找源:一种基于结构熵的方法
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-03-27 DOI: https://dl.acm.org/doi/10.1145/3568309
Chong Zhang, Qiang Guo, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Chenghu Zhou

The popularity of intelligent devices provides straightforward access to the Internet and online social networks. However, the quick and easy data updates from networks also benefit the risk spreading, such as rumor, malware, or computer viruses. To this end, this article studies the problem of source detection, which is to infer the source node out of an aftermath of a cascade, that is, the observed infected graph GN of the network at some time. Prior arts have adopted various statistical quantities such as degree, distance, or infection size to reflect the structural centrality of the source. In this article, we propose a new metric that we call the infected tree entropy (ITE), to utilize richer underlying structural features for source detection. Our idea of ITE is inspired by the conception of structural entropy [21], which demonstrated that the minimization of average bits to encode the network structures with different partitions is the principle for detecting the natural or true structures in real-world networks. Accordingly, our proposed ITE based estimator for the source tries to minimize the coding of network partitions brought by the infected tree rooted at all the potential sources, thus minimizing the structural deviation between the cascades from the potential sources and the actual infection process included in GN. On polynomially growing geometric trees, with increasing tree heterogeneity, the ITE estimator remarkably yields more reliable detection under only moderate infection sizes, and returns an asymptotically complete detection. In contrast, for regular expanding trees, we still observe guaranteed detection probability of ITE estimator even with an infinite infection size, thanks to the degree regularity property. We also algorithmically realize the ITE based detection that enjoys linear time complexity via a message-passing scheme, and further extend it to general graphs. Extensive experiments on synthetic and real datasets confirm the superiority of ITE to the baselines. For example, ITE returns an accuracy of 85%, ranking the source among the top 10%, far exceeding 55% of the classic algorithm on scale-free networks.

智能设备的普及提供了直接访问互联网和在线社交网络的途径。然而,网络上快速便捷的数据更新也有利于风险的传播,如谣言、恶意软件或计算机病毒。为此,本文研究了源检测问题,即从级联的余波中推断出源节点,即从某一时刻观察到的网络感染图GN中推断出源节点。现有技术采用了各种统计量,如程度、距离或感染大小来反映源的结构中心性。在本文中,我们提出了一种新的度量,我们称之为感染树熵(ITE),以利用更丰富的底层结构特征进行源检测。我们对ITE的想法受到了结构熵(structural entropy)概念的启发[21],该概念证明了对不同分区的网络结构进行编码的平均比特的最小化是检测现实世界网络中自然或真实结构的原则。因此,我们提出的基于ITE的源估计器试图最小化扎根于所有潜在源的感染树所带来的网络分区编码,从而最小化来自潜在源的级联与GN中包含的实际感染过程之间的结构偏差。在多项式生长的几何树上,随着树异质性的增加,ITE估计器在中等感染规模下显著地产生更可靠的检测,并返回渐近完全检测。相比之下,对于规则扩展树,由于程度正则性,即使感染规模无限,我们仍然观察到ITE估计器的检测概率是有保证的。我们还通过消息传递方案算法实现了具有线性时间复杂度的基于ITE的检测,并将其进一步扩展到一般图中。在合成数据集和真实数据集上进行的大量实验证实了ITE相对于基线的优越性。例如,ITE返回的准确率为85%,将源排在前10%,远远超过无标度网络上经典算法的55%。
{"title":"Finding the Source in Networks: An Approach Based on Structural Entropy","authors":"Chong Zhang, Qiang Guo, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Chenghu Zhou","doi":"https://dl.acm.org/doi/10.1145/3568309","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3568309","url":null,"abstract":"<p>The popularity of intelligent devices provides straightforward access to the Internet and online social networks. However, the quick and easy data updates from networks also benefit the risk spreading, such as rumor, malware, or computer viruses. To this end, this article studies the problem of source detection, which is to infer the source node out of an aftermath of a cascade, that is, the observed infected graph <i>G<sub>N</sub></i> of the network at some time. Prior arts have adopted various statistical quantities such as degree, distance, or infection size to reflect the structural centrality of the source. In this article, we propose a new metric that we call the infected tree entropy (ITE), to utilize richer underlying structural features for source detection. Our idea of ITE is inspired by the conception of structural entropy [21], which demonstrated that the minimization of average bits to encode the network structures with different partitions is the principle for detecting the natural or true structures in real-world networks. Accordingly, our proposed ITE based estimator for the source tries to minimize the coding of network partitions brought by the infected tree rooted at all the potential sources, thus minimizing the structural deviation between the cascades from the potential sources and the actual infection process included in <i>G<sub>N</sub></i>. On polynomially growing geometric trees, with increasing tree heterogeneity, the ITE estimator remarkably yields more reliable detection under only moderate infection sizes, and returns an asymptotically complete detection. In contrast, for regular expanding trees, we still observe guaranteed detection probability of ITE estimator even with an infinite infection size, thanks to the degree regularity property. We also algorithmically realize the ITE based detection that enjoys linear time complexity via a message-passing scheme, and further extend it to general graphs. Extensive experiments on synthetic and real datasets confirm the superiority of ITE to the baselines. For example, ITE returns an accuracy of 85%, ranking the source among the top 10%, far exceeding 55% of the classic algorithm on scale-free networks.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift 软件缺陷预测中的概念漂移:一种检测和处理漂移的方法
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-03-27 DOI: 10.1145/3589342
Arvind Kumar Gangwar, Surinder Kumar
Software Defect Prediction (SDP) is crucial towards software quality assurance in software engineering. SDP analyzes the software metrics data for timely prediction of defect prone software modules. Prediction process is automated by constructing defect prediction classification models using machine learning techniques. These models are trained using metrics data from historical projects of similar types. Based on the learned experience, models are used to predict defect prone modules in currently tested software. These models perform well if the concept is stationary in a dynamic software development environment. But their performance degrades unexpectedly in the presence of change in concept (Concept Drift). Therefore, concept drift (CD) detection is an important activity for improving the overall accuracy of the prediction model. Previous studies on SDP have shown that CD may occur in software defect data and the used defect prediction model may require to be updated to deal with CD. This phenomenon of handling the CD is known as CD adaptation. It is observed that still efforts need to be done in this direction in the SDP domain. In this article, we have proposed a pair of paired learners (PoPL) approach for handling CD in SDP. We combined the drift detection capabilities of two independent paired learners and used the paired learner (PL) with the best performance in recent time for next prediction. We experimented on various publicly available software defect datasets garnered from public data repositories. Experimentation results showed that our proposed approach performed better than the existing similar works and the base PL model based on various performance measures.
在软件工程中,软件缺陷预测是保证软件质量的关键。SDP分析软件度量数据,以便及时预测容易出现缺陷的软件模块。利用机器学习技术构建缺陷预测分类模型,实现了预测过程的自动化。这些模型使用来自类似类型的历史项目的度量数据进行训练。基于所学的经验,模型被用来预测当前测试软件中容易出现缺陷的模块。如果概念在动态软件开发环境中是固定的,那么这些模型表现良好。但当概念发生变化时,它们的性能会意外下降(概念漂移)。因此,概念漂移(CD)检测是提高预测模型整体精度的重要活动。以往关于SDP的研究表明,软件缺陷数据中可能出现CD,所使用的缺陷预测模型可能需要更新来处理CD。这种处理CD的现象被称为CD适应。可以观察到,在SDP领域,仍需要在这个方向上作出努力。在本文中,我们提出了一对配对学习器(PoPL)方法来处理SDP中的CD。我们结合了两个独立的配对学习器的漂移检测能力,并使用最近表现最好的配对学习器(PL)进行下一次预测。我们对从公共数据存储库中收集的各种公开可用的软件缺陷数据集进行了实验。实验结果表明,我们提出的方法比现有的类似工作和基于各种性能指标的基本PL模型表现得更好。
{"title":"Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift","authors":"Arvind Kumar Gangwar, Surinder Kumar","doi":"10.1145/3589342","DOIUrl":"https://doi.org/10.1145/3589342","url":null,"abstract":"Software Defect Prediction (SDP) is crucial towards software quality assurance in software engineering. SDP analyzes the software metrics data for timely prediction of defect prone software modules. Prediction process is automated by constructing defect prediction classification models using machine learning techniques. These models are trained using metrics data from historical projects of similar types. Based on the learned experience, models are used to predict defect prone modules in currently tested software. These models perform well if the concept is stationary in a dynamic software development environment. But their performance degrades unexpectedly in the presence of change in concept (Concept Drift). Therefore, concept drift (CD) detection is an important activity for improving the overall accuracy of the prediction model. Previous studies on SDP have shown that CD may occur in software defect data and the used defect prediction model may require to be updated to deal with CD. This phenomenon of handling the CD is known as CD adaptation. It is observed that still efforts need to be done in this direction in the SDP domain. In this article, we have proposed a pair of paired learners (PoPL) approach for handling CD in SDP. We combined the drift detection capabilities of two independent paired learners and used the paired learner (PL) with the best performance in recent time for next prediction. We experimented on various publicly available software defect datasets garnered from public data repositories. Experimentation results showed that our proposed approach performed better than the existing similar works and the base PL model based on various performance measures.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43163924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions 不确定意识的个人助理做出个性化的隐私决定
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-03-23 DOI: https://dl.acm.org/doi/10.1145/3561820
Gonul Ayci, Murat Sensoy, Arzucan Özgür, Pinar Yolum

Many software systems, such as online social networks, enable users to share information about themselves. Although the action of sharing is simple, it requires an elaborate thought process on privacy: what to share, with whom to share, and for what purposes. Thinking about these for each piece of content to be shared is tedious. Recent approaches to tackle this problem build personal assistants that can help users by learning what is private over time and recommending privacy labels such as private or public to individual content that a user considers sharing. However, privacy is inherently ambiguous and highly personal. Existing approaches to recommend privacy decisions do not address these aspects of privacy sufficiently. Ideally, a personal assistant should be able to adjust its recommendation based on a given user, considering that user’s privacy understanding. Moreover, the personal assistant should be able to assess when its recommendation would be uncertain and let the user make the decision on her own. Accordingly, this article proposes a personal assistant that uses evidential deep learning to classify content based on its privacy label. An important characteristic of the personal assistant is that it can model its uncertainty in its decisions explicitly, determine that it does not know the answer, and delegate from making a recommendation when its uncertainty is high. By factoring in the user’s own understanding of privacy, such as risk factors or own labels, the personal assistant can personalize its recommendations per user. We evaluate our proposed personal assistant using a well-known dataset. Our results show that our personal assistant can accurately identify uncertain cases, personalize them to its user’s needs, and thus helps users preserve their privacy well.

许多软件系统,如在线社交网络,使用户能够分享自己的信息。虽然分享的行为很简单,但它需要一个详细的隐私思考过程:分享什么,与谁分享,以及为了什么目的分享。为每一条要分享的内容考虑这些是乏味的。最近解决这个问题的方法是建立个人助理,它可以帮助用户了解什么是私有的,并为用户考虑共享的个人内容推荐隐私标签,比如私有或公共。然而,隐私本质上是模糊的,是高度私人的。现有的建议隐私决策的方法没有充分解决隐私的这些方面。理想情况下,个人助理应该能够根据给定的用户调整其推荐,考虑到用户对隐私的理解。此外,个人助理应该能够评估它的建议何时是不确定的,并让用户自己做出决定。因此,本文提出了一种基于隐私标签使用证据深度学习对内容进行分类的个人助理。个人助理的一个重要特点是,它可以明确地对其决策中的不确定性进行建模,确定它不知道答案,并在不确定性较高时委托他人提出建议。通过考虑用户自己对隐私的理解,例如风险因素或自己的标签,个人助理可以为每个用户提供个性化的建议。我们使用一个众所周知的数据集来评估我们建议的个人助理。我们的研究结果表明,我们的个人助理可以准确地识别不确定情况,并根据用户的需求进行个性化处理,从而很好地保护用户的隐私。
{"title":"Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions","authors":"Gonul Ayci, Murat Sensoy, Arzucan Özgür, Pinar Yolum","doi":"https://dl.acm.org/doi/10.1145/3561820","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3561820","url":null,"abstract":"<p>Many software systems, such as online social networks, enable users to share information about themselves. Although the action of sharing is simple, it requires an elaborate thought process on privacy: what to share, with whom to share, and for what purposes. Thinking about these for each piece of content to be shared is tedious. Recent approaches to tackle this problem build personal assistants that can help users by learning what is private over time and recommending privacy labels such as private or public to individual content that a user considers sharing. However, privacy is inherently <i>ambiguous</i> and highly <i>personal</i>. Existing approaches to recommend privacy decisions do not address these aspects of privacy sufficiently. Ideally, a personal assistant should be able to adjust its recommendation based on a given user, considering that user’s privacy understanding. Moreover, the personal assistant should be able to assess when its recommendation would be uncertain and let the user make the decision on her own. Accordingly, this article proposes a personal assistant that uses evidential deep learning to classify content based on its privacy label. An important characteristic of the personal assistant is that it can model its uncertainty in its decisions explicitly, determine that it does not know the answer, and delegate from making a recommendation when its uncertainty is high. By factoring in the user’s own understanding of privacy, such as risk factors or own labels, the personal assistant can personalize its recommendations per user. We evaluate our proposed personal assistant using a well-known dataset. Our results show that our personal assistant can accurately identify uncertain cases, personalize them to its user’s needs, and thus helps users preserve their privacy well.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching 基于语义感知匹配的多回合响应选择
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-03-23 DOI: https://dl.acm.org/doi/10.1145/3545570
Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cecile Paris, Yang Xiang

Multi-turn response selection is a key issue in retrieval-based chatbots and has attracted considerable attention in the NLP (Natural Language processing) field. So far, researchers have developed many solutions that can select appropriate responses for multi-turn conversations. However, these works are still suffering from the semantic mismatch problem when responses and context share similar words with different meanings. In this article, we propose a novel chatbot model based on Semantic Awareness Matching, called SAM. SAM can capture both similarity and semantic features in the context by a two-layer matching network. Appropriate responses are selected according to the matching probability made through the aggregation of the two feature types. In the evaluation, we pick 4 widely used datasets and compare SAM’s performance to that of 12 other models. Experiment results show that SAM achieves substantial improvements, with up to 1.5% R10@1 on Ubuntu Dialogue Corpus V2, 0.5% R10@1 on Douban Conversation Corpus, and 1.3% R10@1 on E-commerce Corpus.

多回合响应选择是基于检索的聊天机器人的一个关键问题,在自然语言处理领域备受关注。到目前为止,研究人员已经开发了许多解决方案,可以为多回合对话选择合适的回答。然而,这些作品仍然存在着语义不匹配的问题,即当回应和语境中有相似的词但含义不同时。在本文中,我们提出了一种新的基于语义感知匹配的聊天机器人模型,称为SAM。SAM可以通过两层匹配网络同时捕获上下文中的相似性和语义特征。根据两种特征类型聚合得到的匹配概率选择合适的响应。在评估中,我们选择了4个广泛使用的数据集,并将SAM的性能与其他12个模型的性能进行比较。实验结果表明,SAM在Ubuntu对话语料库V2上达到了1.5% R10@1,在豆瓣对话语料库上达到0.5% R10@1,在电子商务语料库上达到1.3% R10@1。
{"title":"SAM: Multi-turn Response Selection Based on Semantic Awareness Matching","authors":"Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cecile Paris, Yang Xiang","doi":"https://dl.acm.org/doi/10.1145/3545570","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3545570","url":null,"abstract":"<p>Multi-turn response selection is a key issue in retrieval-based chatbots and has attracted considerable attention in the NLP (Natural Language processing) field. So far, researchers have developed many solutions that can select appropriate responses for multi-turn conversations. However, these works are still suffering from the semantic mismatch problem when responses and context share similar words with different meanings. In this article, we propose a novel chatbot model based on Semantic Awareness Matching, called SAM. SAM can capture both similarity and semantic features in the context by a two-layer matching network. Appropriate responses are selected according to the matching probability made through the aggregation of the two feature types. In the evaluation, we pick 4 widely used datasets and compare SAM’s performance to that of 12 other models. Experiment results show that SAM achieves substantial improvements, with up to 1.5% <i>R</i><sub>10</sub>@1 on Ubuntu Dialogue Corpus V2, 0.5% <i>R</i><sub>10</sub>@1 on Douban Conversation Corpus, and 1.3% <i>R</i><sub>10</sub>@1 on E-commerce Corpus.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time Pricing-based Resource Allocation in Open Market Environments 开放市场环境下基于实时定价的资源配置
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-03-14 DOI: 10.1145/3465237
P. Mishra, Ahmed Moustafa, T. Ito
Open market environments consist of a set of participants (vendors and consumers) that dynamically leave or join the market. As a result, the arising dynamism leads to uncertainties in supply and demand of the resources in these open markets. In specific, in such uncertain markets, vendors attempt to maximise their revenue by dynamically changing their selling prices according to the market demand. In this regard, an optimal resource allocation approach becomes immensely needed to optimise the selling prices based on the supply and demand of the resources in the open market. Therefore, optimal selling prices should maximise the revenue of vendors while protecting the utility of buyers. In this context, we propose a real-time pricing approach for resource allocation in open market environments. The proposed approach introduces a priority-based fairness mechanism to allocate the available resources in a reverse-auction paradigm. Finally, we compare the proposed approach with two state-of-the-art resource allocation approaches. The experimental results show that the proposed approach outperforms the other two resource allocation approaches in its ability to maximise the vendors’ revenue.
开放市场环境由一组动态离开或加入市场的参与者(供应商和消费者)组成。因此,不断增长的活力导致了这些开放市场资源供需的不确定性。具体而言,在这种不确定的市场中,供应商试图通过根据市场需求动态改变售价来实现收入最大化。在这方面,迫切需要一种最佳资源分配方法,以根据公开市场中资源的供需来优化售价。因此,最佳销售价格应最大限度地提高供应商的收入,同时保护买家的效用。在此背景下,我们提出了一种在公开市场环境中进行资源配置的实时定价方法。所提出的方法引入了一种基于优先级的公平机制,以在反向拍卖模式中分配可用资源。最后,我们将所提出的方法与两种最先进的资源分配方法进行了比较。实验结果表明,该方法在最大化供应商收入方面优于其他两种资源分配方法。
{"title":"Real-time Pricing-based Resource Allocation in Open Market Environments","authors":"P. Mishra, Ahmed Moustafa, T. Ito","doi":"10.1145/3465237","DOIUrl":"https://doi.org/10.1145/3465237","url":null,"abstract":"Open market environments consist of a set of participants (vendors and consumers) that dynamically leave or join the market. As a result, the arising dynamism leads to uncertainties in supply and demand of the resources in these open markets. In specific, in such uncertain markets, vendors attempt to maximise their revenue by dynamically changing their selling prices according to the market demand. In this regard, an optimal resource allocation approach becomes immensely needed to optimise the selling prices based on the supply and demand of the resources in the open market. Therefore, optimal selling prices should maximise the revenue of vendors while protecting the utility of buyers. In this context, we propose a real-time pricing approach for resource allocation in open market environments. The proposed approach introduces a priority-based fairness mechanism to allocate the available resources in a reverse-auction paradigm. Finally, we compare the proposed approach with two state-of-the-art resource allocation approaches. The experimental results show that the proposed approach outperforms the other two resource allocation approaches in its ability to maximise the vendors’ revenue.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46098084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1