首页 > 最新文献

2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)最新文献

英文 中文
Distance-Statistical Based Byzantine-Robust Algorithms in Federated Learning 联合学习中基于距离统计的拜占庭稳健算法
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454840
Francesco Colosimo, F. Rango
New machine learning (ML) paradigms are being researched thanks to the current widespread adoption of AI-based services. Since it enables several users to cooperatively train a global model without disclosing their local training data, Federated Learning (FL) represents a new distributed methodology capable of attaining stronger privacy and security guarantees than current methodologies. In this paper, a study of the properties of FL is conducted, with an emphasis on security issues. In detail, a thorough investigation of currently known vulnerabilities and their corresponding countermeasures is conducted, focusing on aggregation algorithms that provide robustness against Byzantine failures. Following this direction, new aggregation algorithms are observed on a set of simulations that recreate realistic scenarios, in the absence and presence of Byzantine adversaries. These combine the Distance-based Krum approach with the Statistical based aggregation algorithm. Achieved results demonstrate the functionality of the proposed solutions in terms of accuracy and convergence rounds in comparison with well-known federated algorithms under a correct and incorrect estimation of the attackers number.
随着人工智能服务的广泛应用,人们正在研究新的机器学习(ML)模式。由于联邦学习(FL)能让多个用户合作训练一个全局模型,而无需公开他们的本地训练数据,因此它代表了一种新的分布式方法,能比现有方法获得更强的隐私和安全保障。本文对 FL 的特性进行了研究,重点是安全问题。详细而言,本文对目前已知的漏洞及其相应的对策进行了深入研究,重点关注可提供稳健性以抵御拜占庭故障的聚合算法。循着这一方向,在一组模拟中观察了新的聚合算法,这些模拟再现了在没有和有拜占庭对手的情况下的真实场景。这些算法结合了基于距离的克鲁姆方法和基于统计的聚合算法。所取得的结果表明,在正确和错误估计攻击者数量的情况下,与著名的联合算法相比,所提出的解决方案在准确性和收敛回合方面都具有功能性。
{"title":"Distance-Statistical Based Byzantine-Robust Algorithms in Federated Learning","authors":"Francesco Colosimo, F. Rango","doi":"10.1109/CCNC51664.2024.10454840","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454840","url":null,"abstract":"New machine learning (ML) paradigms are being researched thanks to the current widespread adoption of AI-based services. Since it enables several users to cooperatively train a global model without disclosing their local training data, Federated Learning (FL) represents a new distributed methodology capable of attaining stronger privacy and security guarantees than current methodologies. In this paper, a study of the properties of FL is conducted, with an emphasis on security issues. In detail, a thorough investigation of currently known vulnerabilities and their corresponding countermeasures is conducted, focusing on aggregation algorithms that provide robustness against Byzantine failures. Following this direction, new aggregation algorithms are observed on a set of simulations that recreate realistic scenarios, in the absence and presence of Byzantine adversaries. These combine the Distance-based Krum approach with the Statistical based aggregation algorithm. Achieved results demonstrate the functionality of the proposed solutions in terms of accuracy and convergence rounds in comparison with well-known federated algorithms under a correct and incorrect estimation of the attackers number.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"9 8","pages":"1034-1035"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Natively Secure 6G IoT Using Intelligent Physical Layer Security 利用智能物理层安全技术确保 6G 物联网的本机安全
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454737
Israt Ara, Brian Kelley
Physical Layer Security (PLS) as a native signaling enhancement to Layer-l security guarantees consumer privacy at the air interface. This paper proposes applying AIIML integration to Radio Access Networks (RAN) for enhanced 6G Internet of Things (loT) security. The paper defines a AIIML based PLS system model that can guarantee security against an eavesdropper. The paper also proposes an operational overview of AIIML integrated PLS with shared key agreement protocol in an O-RAN architecture for 6G IoT, and proposed sApps, that will lead the way of a new paradigm in low latency communication scheme for the consumers. Simulations of Key Bit Error rate (BER) detection in the presence of Rayleigh fading plus noise demonstrate that the AIIML-based PLS model jointly improves security and consumer communication performance.
物理层安全(PLS)作为第l层安全的本地信令增强功能,可在空中接口上保证消费者的隐私。本文建议将 AIIML 集成应用于无线接入网络(RAN),以增强 6G 物联网(loT)的安全性。本文定义了一个基于 AIIML 的 PLS 系统模型,该模型可确保安全,防止窃听。论文还提出了 AIIML 集成 PLS 与共享密钥协议在 6G 物联网 O-RAN 架构中的操作概述,并提出了 sApps,这将引领消费者低延迟通信方案的新范例。在存在瑞利衰减和噪声的情况下,对密钥误码率(BER)检测的仿真表明,基于 AIIML 的 PLS 模型可共同提高安全性和消费者通信性能。
{"title":"Natively Secure 6G IoT Using Intelligent Physical Layer Security","authors":"Israt Ara, Brian Kelley","doi":"10.1109/CCNC51664.2024.10454737","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454737","url":null,"abstract":"Physical Layer Security (PLS) as a native signaling enhancement to Layer-l security guarantees consumer privacy at the air interface. This paper proposes applying AIIML integration to Radio Access Networks (RAN) for enhanced 6G Internet of Things (loT) security. The paper defines a AIIML based PLS system model that can guarantee security against an eavesdropper. The paper also proposes an operational overview of AIIML integrated PLS with shared key agreement protocol in an O-RAN architecture for 6G IoT, and proposed sApps, that will lead the way of a new paradigm in low latency communication scheme for the consumers. Simulations of Key Bit Error rate (BER) detection in the presence of Rayleigh fading plus noise demonstrate that the AIIML-based PLS model jointly improves security and consumer communication performance.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"8 4","pages":"918-924"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-Money Laundering in Cryptocurrencies Through Graph Neural Networks: A Comparative Study 通过图神经网络在加密货币中反洗钱:比较研究
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454631
Simone Marasi, Stefano Ferretti
Money laundering in cryptocurrencies is a significant concern, as it facilitates and conceals crime and can distort markets and the broader financial system. To combat this issue, researchers have turned to techniques to develop effective Anti-Money Laundering (AML) frameworks. The findings contribute to the ongoing efforts to promote social good by reducing the impact of criminal activities on society. By preventing money laundering, we can also help to combat other criminal activities such as drug trafficking, corruption, and terrorism. This paper focuses on the use of Graph Neural Networks (GNNs) to classify cryptocurrencies transactions. Specifically, the study employs Graph Convolutional Networks (GCNs), Graph Attention Networks (GAT), the Chebyshev spatial convolutional neural network (ChebNet), and GraphSAGE network to classify Bitcoin transactions. The study finds that ChebNet, GraphSAGE and a variant of GAT outperform other methods and improve upon the state of the art in terms of recall and F1 scores, thus suggesting that they can be more reliable in identifying illicit transactions.
加密货币中的洗钱行为是一个令人严重关切的问题,因为它为犯罪提供了便利并掩盖了犯罪,可能会扭曲市场和更广泛的金融体系。为解决这一问题,研究人员已转向开发有效反洗钱(AML)框架的技术。这些研究成果有助于通过减少犯罪活动对社会的影响来促进社会公益的持续努力。通过防止洗钱,我们还可以帮助打击贩毒、腐败和恐怖主义等其他犯罪活动。本文重点研究使用图神经网络(GNN)对加密货币交易进行分类。具体来说,研究采用了图卷积网络(GCN)、图注意力网络(GAT)、切比雪夫空间卷积神经网络(ChebNet)和 GraphSAGE 网络来对比特币交易进行分类。研究发现,ChebNet、GraphSAGE 和 GAT 的一种变体在召回率和 F1 分数方面优于其他方法,并在技术水平上有所提高,从而表明它们在识别非法交易方面更加可靠。
{"title":"Anti-Money Laundering in Cryptocurrencies Through Graph Neural Networks: A Comparative Study","authors":"Simone Marasi, Stefano Ferretti","doi":"10.1109/CCNC51664.2024.10454631","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454631","url":null,"abstract":"Money laundering in cryptocurrencies is a significant concern, as it facilitates and conceals crime and can distort markets and the broader financial system. To combat this issue, researchers have turned to techniques to develop effective Anti-Money Laundering (AML) frameworks. The findings contribute to the ongoing efforts to promote social good by reducing the impact of criminal activities on society. By preventing money laundering, we can also help to combat other criminal activities such as drug trafficking, corruption, and terrorism. This paper focuses on the use of Graph Neural Networks (GNNs) to classify cryptocurrencies transactions. Specifically, the study employs Graph Convolutional Networks (GCNs), Graph Attention Networks (GAT), the Chebyshev spatial convolutional neural network (ChebNet), and GraphSAGE network to classify Bitcoin transactions. The study finds that ChebNet, GraphSAGE and a variant of GAT outperform other methods and improve upon the state of the art in terms of recall and F1 scores, thus suggesting that they can be more reliable in identifying illicit transactions.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"11 8","pages":"272-277"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Downlink RIS-NOMA with Constellation Adjustment for 6G Wireless Communication Systems 针对 6G 无线通信系统的下行 RIS-NOMA 与星座调整
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454823
Ju Yeong Baek, Young-Seok Lee, Bang Chul Jung
We consider a downlink reconfigurable intelligent surfaces-based non-orthogonal multiple access technique with constellation adjustment (RIS-NOMA-CA) for 6G wireless communication systems. We mathematically analyze the bit-error-rate (BER) performance of the RIS-NOMA-CA technique assuming the optimal joint maximum likelihood (JML) detector at receivers. To the best of our knowledge, theoretical analysis of the downlink RIS-NOMA-CA technique has not been reported in the literature. We show that the RIS-NOMA-CA technique yields a better BER performance than the conventional RIS-NOMA technique without CA through computer simulations, and our analytical result matches well with simulation results.
我们考虑了一种用于 6G 无线通信系统的基于智能表面的下行可重构非正交多址技术(RIS-NOMA-CA)。我们从数学角度分析了 RIS-NOMA-CA 技术的误码率(BER)性能,并假设接收器采用了最佳联合最大似然(JML)检测器。据我们所知,下行链路 RIS-NOMA-CA 技术的理论分析在文献中尚未见报道。我们通过计算机仿真表明,RIS-NOMA-CA 技术比传统的不带 CA 的 RIS-NOMA 技术具有更好的误码率性能,而且我们的分析结果与仿真结果非常吻合。
{"title":"Downlink RIS-NOMA with Constellation Adjustment for 6G Wireless Communication Systems","authors":"Ju Yeong Baek, Young-Seok Lee, Bang Chul Jung","doi":"10.1109/CCNC51664.2024.10454823","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454823","url":null,"abstract":"We consider a downlink reconfigurable intelligent surfaces-based non-orthogonal multiple access technique with constellation adjustment (RIS-NOMA-CA) for 6G wireless communication systems. We mathematically analyze the bit-error-rate (BER) performance of the RIS-NOMA-CA technique assuming the optimal joint maximum likelihood (JML) detector at receivers. To the best of our knowledge, theoretical analysis of the downlink RIS-NOMA-CA technique has not been reported in the literature. We show that the RIS-NOMA-CA technique yields a better BER performance than the conventional RIS-NOMA technique without CA through computer simulations, and our analytical result matches well with simulation results.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"109 2","pages":"1076-1077"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of Modeling Participant Behavior in CrowdSensing Evaluation 人群感应评估中模拟参与者行为的挑战
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454892
Christine Bassem
In crowdsensing platforms, algorithms and models for task allocation play a critical role in shaping user behaviors, engagement levels, the quality of the collected data, and the performance of the platform as a whole. Regardless of the sensing model, task allocation mechanisms are difficult to evaluate and benchmark. In contrast to evaluating deployments of crowd-sensing platforms with real crowds, they are often evaluated via simulators that are incapable of modeling the complexities of human behavior, specifically in terms of their commitment to the platform and quality of sensing, but their strength is the ability to rapidly experiment with multiple algorithms. In this paper, we abstract the general characteristics of participant behaviors in crowdsensing, and implement these characteristics within the TACSim simulation framework. Further exemplifying the extendability power of that simulation framework, and the benefits it can offer the crowdsensing community.
在群体感应平台中,任务分配的算法和模型对用户行为、参与程度、收集数据的质量以及整个平台的性能起着至关重要的作用。无论采用哪种传感模型,任务分配机制都很难进行评估和基准测试。与使用真实人群评估人群感知平台的部署情况不同,通常是通过模拟器对其进行评估,而模拟器无法模拟人类行为的复杂性,特别是在对平台的承诺和感知质量方面,但其优势在于能够快速试验多种算法。在本文中,我们抽象出了人群感应中参与者行为的一般特征,并在 TACSim 仿真框架中实现了这些特征。这进一步体现了该仿真框架的可扩展性,以及它能为人群感应领域带来的益处。
{"title":"Challenges of Modeling Participant Behavior in CrowdSensing Evaluation","authors":"Christine Bassem","doi":"10.1109/CCNC51664.2024.10454892","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454892","url":null,"abstract":"In crowdsensing platforms, algorithms and models for task allocation play a critical role in shaping user behaviors, engagement levels, the quality of the collected data, and the performance of the platform as a whole. Regardless of the sensing model, task allocation mechanisms are difficult to evaluate and benchmark. In contrast to evaluating deployments of crowd-sensing platforms with real crowds, they are often evaluated via simulators that are incapable of modeling the complexities of human behavior, specifically in terms of their commitment to the platform and quality of sensing, but their strength is the ability to rapidly experiment with multiple algorithms. In this paper, we abstract the general characteristics of participant behaviors in crowdsensing, and implement these characteristics within the TACSim simulation framework. Further exemplifying the extendability power of that simulation framework, and the benefits it can offer the crowdsensing community.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"106 4","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework: Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp) 框架:基站参数优化和自动化的聚类驱动方法(CeDA-BatOp)
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454773
Sudharshan Paindi Jayakumar, Alberto Conte
The growing demand for fast and reliable wireless services has led to the deployment of more base stations, which has made manual optimization of base station parameters more complex and time-consuming. This can lead to suboptimal network performance and a poor user experience. To address this challenge, we propose a Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp), an automated framework for predicting optimized base station parameters. Our framework first compares three clustering algorithms: K-means, DBSCAN, and Agglomerative Clustering, selecting the most suitable one for specific scenarios based on their unique attributes. Simultaneously, our framework leverages machine learning (ML) algorithms to predict the optimal parameters for each base station with an evaluation of multiple ML models to identify the best fit for our data. It also incorporates data drift monitoring to track gradual changes in data distribution over time, ensuring ML model accuracy through periodic retraining. In the simulated scenario, our framework achieved an average of 76% reduction in memory overhead and simplified training by utilizing fewer models, effectively minimizing computational resources. The drift detection system demonstrated an exceptional accuracy of 98.87%, outperforming other cases. These results highlight the potential of our framework to significantly benefit network operators by automating base station parameter tuning, reducing human involvement, and substantially improving network performance and cost savings.
对快速、可靠的无线服务日益增长的需求导致基站数量的增加,从而使基站参数的人工优化变得更加复杂和耗时。这可能导致网络性能不达标和用户体验不佳。为了应对这一挑战,我们提出了基站参数优化和自动化的聚类驱动方法(CeDA-BatOp),这是一个预测优化基站参数的自动化框架。我们的框架首先比较了三种聚类算法:我们的框架首先比较了三种聚类算法:K-means、DBSCAN 和聚合聚类,并根据其独特属性为特定场景选择最合适的算法。同时,我们的框架利用机器学习(ML)算法预测每个基站的最佳参数,并对多个 ML 模型进行评估,以确定最适合我们数据的模型。它还结合了数据漂移监测,以跟踪数据分布随时间的逐渐变化,通过定期再训练确保 ML 模型的准确性。在模拟场景中,我们的框架平均减少了 76% 的内存开销,并通过使用更少的模型简化了训练,有效地最大限度地减少了计算资源。漂移检测系统的准确率高达 98.87%,优于其他案例。这些结果凸显了我们的框架的潜力,它通过自动调整基站参数、减少人工参与、大幅提高网络性能和节约成本,使网络运营商受益匪浅。
{"title":"Framework: Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp)","authors":"Sudharshan Paindi Jayakumar, Alberto Conte","doi":"10.1109/CCNC51664.2024.10454773","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454773","url":null,"abstract":"The growing demand for fast and reliable wireless services has led to the deployment of more base stations, which has made manual optimization of base station parameters more complex and time-consuming. This can lead to suboptimal network performance and a poor user experience. To address this challenge, we propose a Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp), an automated framework for predicting optimized base station parameters. Our framework first compares three clustering algorithms: K-means, DBSCAN, and Agglomerative Clustering, selecting the most suitable one for specific scenarios based on their unique attributes. Simultaneously, our framework leverages machine learning (ML) algorithms to predict the optimal parameters for each base station with an evaluation of multiple ML models to identify the best fit for our data. It also incorporates data drift monitoring to track gradual changes in data distribution over time, ensuring ML model accuracy through periodic retraining. In the simulated scenario, our framework achieved an average of 76% reduction in memory overhead and simplified training by utilizing fewer models, effectively minimizing computational resources. The drift detection system demonstrated an exceptional accuracy of 98.87%, outperforming other cases. These results highlight the potential of our framework to significantly benefit network operators by automating base station parameter tuning, reducing human involvement, and substantially improving network performance and cost savings.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"102 7","pages":"1026-1029"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud-Oriented Indoor-Outdoor Real-Time Localization IoT Architecture for Industrial Environments 面向工业环境的云端室内外实时定位物联网架构
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454636
Laura Belli, Luca Davoli, Gianluigi Ferrari
Localization services for precise and continuous monitoring of the locations of both humans and vehicles in industrial environments are among the most relevant applications in Industrial Internet of Things (IIoT) contexts, to maximize safety and optimize operational activities. Unfortunately, localization in industrial scenarios is particularly challenging because targets can generally move freely in both indoor and outdoor areas. In this paper, we propose a localization monitoring architecture based on a prototypical wearable IoT device equipped with Ultra-Wide Band (UWB), inertial, and GNSS/RTK technologies for seamless localization in heterogeneous environments. We focus on a Web of Things (WoT) approach, verifying suitability and limitations in a real use case scenario. Our approach shows that the proposed architecture can effectively enhance the safety of workers, detecting potentially dangerous events and triggering alarms (e.g., via smart buzzers or gas concentration warning devices) based on a cloud WoT architecture.
在工业物联网(IIoT)背景下,为最大限度地提高安全性和优化运营活动,对工业环境中人和车辆的位置进行精确和持续监控的定位服务是最相关的应用之一。遗憾的是,工业场景中的定位尤其具有挑战性,因为目标通常可以在室内和室外自由移动。在本文中,我们提出了一种基于原型可穿戴物联网设备的定位监控架构,该设备配备了超宽带 (UWB)、惯性和 GNSS/RTK 技术,可在异构环境中实现无缝定位。我们将重点放在物联网(WoT)方法上,在实际使用场景中验证其适用性和局限性。我们的方法表明,基于云 WoT 架构,建议的架构可有效提高工人的安全性,检测潜在的危险事件并触发警报(例如,通过智能蜂鸣器或气体浓度警告装置)。
{"title":"A Cloud-Oriented Indoor-Outdoor Real-Time Localization IoT Architecture for Industrial Environments","authors":"Laura Belli, Luca Davoli, Gianluigi Ferrari","doi":"10.1109/CCNC51664.2024.10454636","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454636","url":null,"abstract":"Localization services for precise and continuous monitoring of the locations of both humans and vehicles in industrial environments are among the most relevant applications in Industrial Internet of Things (IIoT) contexts, to maximize safety and optimize operational activities. Unfortunately, localization in industrial scenarios is particularly challenging because targets can generally move freely in both indoor and outdoor areas. In this paper, we propose a localization monitoring architecture based on a prototypical wearable IoT device equipped with Ultra-Wide Band (UWB), inertial, and GNSS/RTK technologies for seamless localization in heterogeneous environments. We focus on a Web of Things (WoT) approach, verifying suitability and limitations in a real use case scenario. Our approach shows that the proposed architecture can effectively enhance the safety of workers, detecting potentially dangerous events and triggering alarms (e.g., via smart buzzers or gas concentration warning devices) based on a cloud WoT architecture.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"64 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Storage Workload Characterization: An Approach with Time-Series Analysis 云存储工作量特征描述:时间序列分析法
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454778
Abiola Adegboyega
The cloud hosts diverse applications with different workload characteristics. Public cloud traces provide opportunities for analysis to gain insights informing autoscaling, forecasting among other operations. This paper presents the statistical analysis of a recent Alibaba cloud storage workload. The isolation & aggregation of all read/write time-series per recorded workload was done. Application of statistical methods yielded novel distributions from which forecasting solutions integrating time-varying variance captured workload burstiness. A 25% improvement in forecasting accuracy over current methods was achieved. The set of workload time-series has been made available online for further analysis by the research community.
云承载着具有不同工作负载特征的各种应用。公共云跟踪为分析提供了机会,以便深入了解自动扩展和预测等操作。本文介绍了近期阿里巴巴云存储工作负载的统计分析。对每个记录的工作负载的所有读/写时间序列进行了隔离和聚合。统计方法的应用产生了新的分布,从这些分布中得出的预测解决方案整合了时变方差,捕捉到了工作负载的突发性。与现有方法相比,预测准确率提高了 25%。工作负载时间序列集已在线提供,供研究界进一步分析。
{"title":"Cloud Storage Workload Characterization: An Approach with Time-Series Analysis","authors":"Abiola Adegboyega","doi":"10.1109/CCNC51664.2024.10454778","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454778","url":null,"abstract":"The cloud hosts diverse applications with different workload characteristics. Public cloud traces provide opportunities for analysis to gain insights informing autoscaling, forecasting among other operations. This paper presents the statistical analysis of a recent Alibaba cloud storage workload. The isolation & aggregation of all read/write time-series per recorded workload was done. Application of statistical methods yielded novel distributions from which forecasting solutions integrating time-varying variance captured workload burstiness. A 25% improvement in forecasting accuracy over current methods was achieved. The set of workload time-series has been made available online for further analysis by the research community.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"43 9","pages":"1090-1091"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Interaction with Large Language Models for Web Accessibility: Implications and Challenges 网络无障碍与大型语言模型的互动:影响与挑战
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454680
Giovanni Delnevo, Manuel Andruccioli, S. Mirri
The widespread diffusion of Large Language Models (LLMs) has ushered in a transformative era across numerous research domains, including web accessibility. In fact, they can potentially offer automated solutions for generating accessible content, performing accessibility testing, and enhancing the overall user experience for individuals with disabilities. In this paper, we investigate how LLMs can be successfully employed to evaluate and correct web accessibility. Then, we delve into the positive implications and the current challenges derived from the interaction between developers and LLMs in this specific context. Finally, we present some future directions that could be explored to ensure that web content remains accessible to all.
大语言模型(LLMs)的广泛传播为包括网络无障碍在内的众多研究领域带来了一个变革时代。事实上,它们有可能为生成无障碍内容、执行无障碍测试以及提升残障人士的整体用户体验提供自动化解决方案。在本文中,我们将研究如何成功地利用 LLM 来评估和纠正网络无障碍性。然后,我们将深入探讨开发人员与 LLM 在这种特定情况下的互动所产生的积极意义和当前面临的挑战。最后,我们提出了一些可以探索的未来方向,以确保网络内容对所有人都是无障碍的。
{"title":"On the Interaction with Large Language Models for Web Accessibility: Implications and Challenges","authors":"Giovanni Delnevo, Manuel Andruccioli, S. Mirri","doi":"10.1109/CCNC51664.2024.10454680","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454680","url":null,"abstract":"The widespread diffusion of Large Language Models (LLMs) has ushered in a transformative era across numerous research domains, including web accessibility. In fact, they can potentially offer automated solutions for generating accessible content, performing accessibility testing, and enhancing the overall user experience for individuals with disabilities. In this paper, we investigate how LLMs can be successfully employed to evaluate and correct web accessibility. Then, we delve into the positive implications and the current challenges derived from the interaction between developers and LLMs in this specific context. Finally, we present some future directions that could be explored to ensure that web content remains accessible to all.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"83 3","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Analysis of Model Poisoning Attacks Against Blockchain-Based Federated Learning 基于区块链的联合学习的模型中毒攻击分析
Pub Date : 2024-01-06 DOI: 10.1109/CCNC51664.2024.10454875
Rukayat Olapojoye, Mohamed Baza, Tara Salman
Undoubtedly, Machine Learning (ML) has revolutionized many applications in recent years. A vast amount of heterogeneous data distributed globally is being used to build efficient and robust prediction models. This has led to the need for decentralized ML paradigms. Federated Learning (FL) has emerged as a decentralized ML paradigm that creates global models from multiple privately trained local datasets. Nevertheless, FL comes with some challenges, such as using a central server, leading to a single point of failure and trust issues. Blockchain-based Federated learning (BFL) has been proposed to resolve these challenges. However, due to the openness of the Blockchain system, malicious clients can access critical information, such as the number of participating clients, and launch attacks on the BFL system. This paper presents a practicable model poisoning attack on BFL systems. Several experiments are conducted with different attack scenarios and settings explored. The evaluations and results show the efficacy and impact of the model poisoning.
毫无疑问,机器学习(ML)近年来给许多应用带来了变革。分布在全球的大量异构数据被用来建立高效、稳健的预测模型。这导致了对分散式 ML 模式的需求。联邦学习(Federated Learning,FL)作为一种去中心化的 ML 范式已经出现,它能从多个私下训练的本地数据集创建全局模型。不过,FL 也面临一些挑战,例如使用中央服务器会导致单点故障和信任问题。为了解决这些难题,有人提出了基于区块链的联合学习(BFL)。然而,由于区块链系统的开放性,恶意客户可以获取关键信息,如参与客户的数量,并对 BFL 系统发起攻击。本文提出了一种针对 BFL 系统的实用模型中毒攻击。本文针对不同的攻击场景和设置进行了多次实验。评估和结果表明了模型中毒的功效和影响。
{"title":"On the Analysis of Model Poisoning Attacks Against Blockchain-Based Federated Learning","authors":"Rukayat Olapojoye, Mohamed Baza, Tara Salman","doi":"10.1109/CCNC51664.2024.10454875","DOIUrl":"https://doi.org/10.1109/CCNC51664.2024.10454875","url":null,"abstract":"Undoubtedly, Machine Learning (ML) has revolutionized many applications in recent years. A vast amount of heterogeneous data distributed globally is being used to build efficient and robust prediction models. This has led to the need for decentralized ML paradigms. Federated Learning (FL) has emerged as a decentralized ML paradigm that creates global models from multiple privately trained local datasets. Nevertheless, FL comes with some challenges, such as using a central server, leading to a single point of failure and trust issues. Blockchain-based Federated learning (BFL) has been proposed to resolve these challenges. However, due to the openness of the Blockchain system, malicious clients can access critical information, such as the number of participating clients, and launch attacks on the BFL system. This paper presents a practicable model poisoning attack on BFL systems. Several experiments are conducted with different attack scenarios and settings explored. The evaluations and results show the efficacy and impact of the model poisoning.","PeriodicalId":518411,"journal":{"name":"2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)","volume":"71 3","pages":"943-949"},"PeriodicalIF":0.0,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1