首页 > 最新文献

ACM Transactions on Cyber-Physical Systems最新文献

英文 中文
EVScout2.0: Electric Vehicle Profiling Through Charging Profile EVScout2.0:通过充电配置文件分析电动汽车
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-06-30 DOI: 10.1145/3565268
Alessandro Brighente, M. Conti, Denis Donadel, F. Turrin
Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users’ privacy represents a possible threat that impairs the adoption of EVs. In particular, recent works showed the feasibility of identifying EVs based on the current exchanged during the charging phase. In fact, while the resource negotiation phase runs over secure communication protocols, the signal exchanged during the actual charging contains features peculiar to each EV. In what is commonly known as profiling, a suitable feature extractor can associate such features to each EV. In this paper, we propose EVScout2.0, an extended and improved version of our previously proposed framework to profile EVs based on their charging behavior. By exploiting the current and pilot signals exchanged during the charging phase, our scheme can extract features peculiar for each EV, hence allowing their profiling. We implemented and tested EVScout2.0 over a set of real-world measurements considering over 7500 charging sessions from a total of 137 EVs. In particular, numerical results show the superiority of EVScout2.0 with respect to the previous version. EVScout2.0 can profile EVs, attaining a maximum of 0.88 for both recall and precision scores in the case of a balanced dataset. To the best of the authors’ knowledge, these results set a new benchmark for upcoming privacy research for large datasets of EVs.
电动汽车(EV)代表了传统燃料动力汽车的绿色替代品。为了使其广泛使用,应保证技术发展和用户的安全。用户的隐私可能会威胁到电动汽车的普及。特别是,最近的工作表明了基于充电阶段交换的电流来识别电动汽车的可行性。事实上,虽然资源协商阶段通过安全通信协议运行,但在实际充电过程中交换的信号包含每个电动汽车特有的特征。在通常称为评测的过程中,合适的特征提取器可以将这些特征与每个电动汽车相关联。在本文中,我们提出了EVScout2.0,我们之前提出的基于电动汽车充电行为对其进行评测的框架的扩展和改进版本。通过利用充电阶段交换的电流和导频信号,我们的方案可以提取每辆电动汽车特有的特征,从而允许对其进行分析。我们在一组真实世界的测量中实施并测试了EVScout2.0,考虑到总共137辆电动汽车的7500多个充电会话。特别是,数值结果显示了EVScout2.0相对于先前版本的优越性。EVScout2.0可以评测电动汽车,在平衡数据集的情况下,召回率和准确率得分最高可达0.88。据作者所知,这些结果为即将进行的电动汽车大型数据集隐私研究树立了新的基准。
{"title":"EVScout2.0: Electric Vehicle Profiling Through Charging Profile","authors":"Alessandro Brighente, M. Conti, Denis Donadel, F. Turrin","doi":"10.1145/3565268","DOIUrl":"https://doi.org/10.1145/3565268","url":null,"abstract":"Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users’ privacy represents a possible threat that impairs the adoption of EVs. In particular, recent works showed the feasibility of identifying EVs based on the current exchanged during the charging phase. In fact, while the resource negotiation phase runs over secure communication protocols, the signal exchanged during the actual charging contains features peculiar to each EV. In what is commonly known as profiling, a suitable feature extractor can associate such features to each EV. In this paper, we propose EVScout2.0, an extended and improved version of our previously proposed framework to profile EVs based on their charging behavior. By exploiting the current and pilot signals exchanged during the charging phase, our scheme can extract features peculiar for each EV, hence allowing their profiling. We implemented and tested EVScout2.0 over a set of real-world measurements considering over 7500 charging sessions from a total of 137 EVs. In particular, numerical results show the superiority of EVScout2.0 with respect to the previous version. EVScout2.0 can profile EVs, attaining a maximum of 0.88 for both recall and precision scores in the case of a balanced dataset. To the best of the authors’ knowledge, these results set a new benchmark for upcoming privacy research for large datasets of EVs.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"1 1","pages":""},"PeriodicalIF":2.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47795077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
TPrune TPrune
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-04-15 DOI: 10.1145/3446640
Jiachen Mao, Huanrui Yang, Ang Li, H. Li, Yiran Chen
The invention of Transformer model structure boosts the performance of Neural Machine Translation (NMT) tasks to an unprecedented level. Many previous works have been done to make the Transformer model more execution-friendly on resource-constrained platforms. These researches can be categorized into three key fields: Model Pruning, Transfer Learning, and Efficient Transformer Variants. The family of model pruning methods are popular for their simplicity in practice and promising compression rate and have achieved great success in the field of convolution neural networks (CNNs) for many vision tasks. Nonetheless, previous Transformer pruning works did not perform a thorough model analysis and evaluation on each Transformer component on off-the-shelf mobile devices. In this work, we analyze and prune transformer models at the line-wise granularity and also implement our pruning method on real mobile platforms. We explore the properties of all Transformer components as well as their sparsity features, which are leveraged to guide Transformer model pruning. We name our whole Transformer analysis and pruning pipeline as TPrune. In TPrune, we first propose Block-wise Structured Sparsity Learning (BSSL) to analyze Transformer model property. Then, based on the characters derived from BSSL, we apply Structured Hoyer Square (SHS) to derive the final pruned models. Comparing with the state-of-the-art Transformer pruning methods, TPrune is able to achieve a higher model compression rate with less performance degradation. Experimental results show that our pruned models achieve 1.16×–1.92× speedup on mobile devices with 0%–8% BLEU score degradation compared with the original Transformer model.
Transformer模型结构的发明将神经机器翻译(NMT)任务的性能提升到前所未有的水平。之前的许多工作都是为了使Transformer模型在资源受限的平台上更加易于执行。这些研究可以分为三个关键领域:模型修剪、迁移学习和高效变压器变体。模型修剪方法家族以其简单易行和良好的压缩率而广受欢迎,并在卷积神经网络(cnn)领域的许多视觉任务中取得了巨大成功。尽管如此,以前的Transformer修剪工作并没有对现成移动设备上的每个Transformer组件执行彻底的模型分析和评估。在这项工作中,我们以逐行粒度分析和修剪变压器模型,并在实际的移动平台上实现了我们的修剪方法。我们探索了所有Transformer组件的属性以及它们的稀疏性特征,这些特性被用来指导Transformer模型修剪。我们将整个变压器分析和修剪管道命名为TPrune。在TPrune中,我们首次提出了基于块的结构化稀疏学习(BSSL)来分析Transformer模型的属性。然后,基于BSSL衍生的特征,应用结构化霍耶平方(SHS)得到最终的剪枝模型。与最先进的变压器修剪方法相比,TPrune能够实现更高的模型压缩率和更小的性能下降。实验结果表明,与原始Transformer模型相比,我们的剪叶模型在移动设备上的加速速度提高了1.16×-1.92×, BLEU分数下降了0%-8%。
{"title":"TPrune","authors":"Jiachen Mao, Huanrui Yang, Ang Li, H. Li, Yiran Chen","doi":"10.1145/3446640","DOIUrl":"https://doi.org/10.1145/3446640","url":null,"abstract":"The invention of Transformer model structure boosts the performance of Neural Machine Translation (NMT) tasks to an unprecedented level. Many previous works have been done to make the Transformer model more execution-friendly on resource-constrained platforms. These researches can be categorized into three key fields: Model Pruning, Transfer Learning, and Efficient Transformer Variants. The family of model pruning methods are popular for their simplicity in practice and promising compression rate and have achieved great success in the field of convolution neural networks (CNNs) for many vision tasks. Nonetheless, previous Transformer pruning works did not perform a thorough model analysis and evaluation on each Transformer component on off-the-shelf mobile devices. In this work, we analyze and prune transformer models at the line-wise granularity and also implement our pruning method on real mobile platforms. We explore the properties of all Transformer components as well as their sparsity features, which are leveraged to guide Transformer model pruning. We name our whole Transformer analysis and pruning pipeline as TPrune. In TPrune, we first propose Block-wise Structured Sparsity Learning (BSSL) to analyze Transformer model property. Then, based on the characters derived from BSSL, we apply Structured Hoyer Square (SHS) to derive the final pruned models. Comparing with the state-of-the-art Transformer pruning methods, TPrune is able to achieve a higher model compression rate with less performance degradation. Experimental results show that our pruned models achieve 1.16×–1.92× speedup on mobile devices with 0%–8% BLEU score degradation compared with the original Transformer model.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"13 1","pages":"1 - 22"},"PeriodicalIF":2.3,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3446640","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64037610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
BloothAir
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-04-15 DOI: 10.1145/3448254
Kai Li, N. Lu, Jingjing Zheng, Pei Zhang, Wei Ni, E. Tovar
Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy (BLE) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.
由于灵活的部署和出色的机动性,自主无人机最近被认为是一种有效的手段,可以作为有限或没有蜂窝基础设施的无线地面设备的空中数据中继,例如偏远地区的智能农业。由于无线信道的广播性质,无人机与地面设备之间的数据通信很容易受到窃听攻击。本文开发了一种基于蓝牙低功耗(BLE)连接的自主无人机的安全多跳空中中继系统BloothAir。为了对BloothAir中的BLE通信进行加密,提出了一种基于信道的密钥生成方法,该方法对无人机和地面设备接收到的信号强度进行量化以生成密钥。此外,研究了一种基于动态规划的信道量化方案,通过递归调整量化间隔,使无人机与地面设备的密钥位不匹配率降到最低。为了验证BloothAir的设计,我们使用MX400无人机平台和专门为无人机开发的新型轻型机载BLE通信器Gust无线电收发器建立了一个多跳空中中继试验台。大量的实际实验表明,与使用静态量化间隔的密钥生成基准相比,BloothAir系统实现了显着降低的密钥位不匹配率。此外,生成的密钥具有很高的随机性,并通过标准的NIST测试进行验证,从而有效地保护了BloothAir中的BLE通信免受窃听攻击。
{"title":"BloothAir","authors":"Kai Li, N. Lu, Jingjing Zheng, Pei Zhang, Wei Ni, E. Tovar","doi":"10.1145/3448254","DOIUrl":"https://doi.org/10.1145/3448254","url":null,"abstract":"Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy (BLE) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"4 1","pages":"1 - 22"},"PeriodicalIF":2.3,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90655146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
RIDS
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-04-01 DOI: 10.1145/3441458
Pierre-François Gimenez, Jonathan Roux, E. Alata, G. Auriol, M. Kaâniche, V. Nicomette
The expansion of the Internet-of-Things (IoT) market is visible in homes, factories, public places, and smart cities. While the massive deployment of connected devices offers opportunities to improve quality of life and to develop new services, the impact of such devices on the security of the users in a context where the level of malicious threat continues to increase is a major concern. One of the challenges is the heterogeneity and constant evolution of wireless technologies and protocols used. To overcome this problem, we propose RIDS, a Radio Intrusion Detection System that is based on the monitoring and profiling of radio communications at the physical layer level using autoencoder neural networks. RIDS is independent of the wireless protocols and modulation technologies used. Besides, it is designed to provide a threefold diagnosis of the detected anomalies: temporal (start and end date of the detected anomaly), frequential (main frequency of the anomaly), and spatial (location of the origin of the anomaly). To demonstrate the relevance and the efficiency of our approach, we collected a large dataset of radio-communications recorded with three different probes deployed in an experimental room. Multiple real-world attacks involving a wide variety of communication technologies are also injected to assess the detection and diagnosis efficiency. The results demonstrate the efficiency of RIDS in detecting and diagnosing anomalies that occurred in the 400–500 Mhz and 800–900 Mhz frequency bands. It is noteworthy that compromised devices and attacks using these communication bands are generally not easily covered by traditional solutions.
在家庭、工厂、公共场所、智慧城市等领域,物联网(IoT)市场正在不断扩大。虽然联网设备的大规模部署为提高生活质量和开发新服务提供了机会,但在恶意威胁水平持续增加的背景下,此类设备对用户安全的影响是一个主要问题。其中一个挑战是所使用的无线技术和协议的异构性和不断发展。为了克服这个问题,我们提出了RIDS,一个无线电入侵检测系统,它基于使用自编码器神经网络在物理层监测和分析无线电通信。rid独立于所使用的无线协议和调制技术。此外,它还提供了对检测到的异常的三重诊断:时间(检测到异常的开始和结束日期)、频率(异常的主频率)和空间(异常的起源位置)。为了证明我们的方法的相关性和效率,我们收集了一个大型的无线电通信数据集,记录了在一个实验室内部署的三种不同的探针。还注入了涉及多种通信技术的多种真实攻击,以评估检测和诊断效率。结果表明,RIDS在检测和诊断400-500 Mhz和800-900 Mhz频段的异常方面是有效的。值得注意的是,使用这些通信频段的受损设备和攻击通常不容易被传统解决方案覆盖。
{"title":"RIDS","authors":"Pierre-François Gimenez, Jonathan Roux, E. Alata, G. Auriol, M. Kaâniche, V. Nicomette","doi":"10.1145/3441458","DOIUrl":"https://doi.org/10.1145/3441458","url":null,"abstract":"The expansion of the Internet-of-Things (IoT) market is visible in homes, factories, public places, and smart cities. While the massive deployment of connected devices offers opportunities to improve quality of life and to develop new services, the impact of such devices on the security of the users in a context where the level of malicious threat continues to increase is a major concern. One of the challenges is the heterogeneity and constant evolution of wireless technologies and protocols used. To overcome this problem, we propose RIDS, a Radio Intrusion Detection System that is based on the monitoring and profiling of radio communications at the physical layer level using autoencoder neural networks. RIDS is independent of the wireless protocols and modulation technologies used. Besides, it is designed to provide a threefold diagnosis of the detected anomalies: temporal (start and end date of the detected anomaly), frequential (main frequency of the anomaly), and spatial (location of the origin of the anomaly). To demonstrate the relevance and the efficiency of our approach, we collected a large dataset of radio-communications recorded with three different probes deployed in an experimental room. Multiple real-world attacks involving a wide variety of communication technologies are also injected to assess the detection and diagnosis efficiency. The results demonstrate the efficiency of RIDS in detecting and diagnosing anomalies that occurred in the 400–500 Mhz and 800–900 Mhz frequency bands. It is noteworthy that compromised devices and attacks using these communication bands are generally not easily covered by traditional solutions.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"13 1","pages":"1 - 1"},"PeriodicalIF":2.3,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81335073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Characterization of Link Quality Fluctuation in Mobile Wireless Sensor Networks 移动无线传感器网络中链路质量波动的表征
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-04-01 DOI: 10.1145/3448737
Jianjun Wen, W. Dargie
Wireless sensor networks accommodating the mobility of nodes will play important roles in the future. In residential, rehabilitation, and clinical settings, sensor nodes can be attached to the body of a patient for long-term and uninterrupted monitoring of vital biomedical signals. Likewise, in industrial settings, workers as well as mobile robots can carry sensor nodes to augment their perception and to seamlessly interact with their environments. Nevertheless, such applications require reliable communications as well as high throughput. Considering the primary design goals of the sensing platforms (low-power, affordable cost, large-scale deployment, longevity, operating in the ISM band), maintaining reliable links is a formidable challenge. This challenge can partially be alleviated if the nature of link quality fluctuation can be known or estimated on time. Indeed, higher-level protocols such as handover and routing protocols rely on knowledge of link quality fluctuation to seamlessly transfer communication to alternative routes when the quality of existing routes deteriorates. In this article, we present the result of extensive experimental study to characterise link quality fluctuation in mobile environments. The study focuses on slow movements (<5 km h-1) signifying the movement of people and robots and transceivers complying to the IEEE 802.15.4 specification. Hence, we deployed mobile robots that interact with strategically placed stationary relay nodes. Our study considered different types of link quality characterisation metrics that provide complementary and useful insights. To demonstrate the usefulness of our experiments and observations, we implemented a link quality estimation technique using a Kalman Filter. To set up the model, we employed two link quality metrics along with the statistics we established during our experiments. The article will compare the performance of four proposed approaches with ours.
适应节点移动性的无线传感器网络将在未来发挥重要作用。在住宅、康复和临床环境中,传感器节点可以连接到患者的身体上,长期不间断地监测重要的生物医学信号。同样,在工业环境中,工人和移动机器人可以携带传感器节点来增强他们的感知能力,并与他们的环境无缝交互。然而,这样的应用需要可靠的通信和高吞吐量。考虑到传感平台的主要设计目标(低功耗,可承受的成本,大规模部署,寿命长,在ISM频段运行),维护可靠的链路是一项艰巨的挑战。如果能够及时了解或估计链路质量波动的性质,可以部分缓解这一挑战。事实上,切换和路由协议等高级协议依赖于链路质量波动的知识,在现有路由质量恶化时无缝地将通信转移到替代路由上。在这篇文章中,我们提出了广泛的实验研究的结果,以表征移动环境中的链路质量波动。这项研究的重点是慢速运动(<5公里每小时),这意味着人和机器人的运动以及符合IEEE 802.15.4规范的收发器。因此,我们部署了移动机器人,与战略性放置的固定中继节点进行交互。我们的研究考虑了不同类型的链接质量表征指标,这些指标提供了互补和有用的见解。为了证明我们的实验和观察的有效性,我们使用卡尔曼滤波器实现了一种链路质量估计技术。为了建立模型,我们采用了两个链路质量指标以及我们在实验中建立的统计数据。本文将比较四种提出的方法与我们的方法的性能。
{"title":"Characterization of Link Quality Fluctuation in Mobile Wireless Sensor Networks","authors":"Jianjun Wen, W. Dargie","doi":"10.1145/3448737","DOIUrl":"https://doi.org/10.1145/3448737","url":null,"abstract":"Wireless sensor networks accommodating the mobility of nodes will play important roles in the future. In residential, rehabilitation, and clinical settings, sensor nodes can be attached to the body of a patient for long-term and uninterrupted monitoring of vital biomedical signals. Likewise, in industrial settings, workers as well as mobile robots can carry sensor nodes to augment their perception and to seamlessly interact with their environments. Nevertheless, such applications require reliable communications as well as high throughput. Considering the primary design goals of the sensing platforms (low-power, affordable cost, large-scale deployment, longevity, operating in the ISM band), maintaining reliable links is a formidable challenge. This challenge can partially be alleviated if the nature of link quality fluctuation can be known or estimated on time. Indeed, higher-level protocols such as handover and routing protocols rely on knowledge of link quality fluctuation to seamlessly transfer communication to alternative routes when the quality of existing routes deteriorates. In this article, we present the result of extensive experimental study to characterise link quality fluctuation in mobile environments. The study focuses on slow movements (<5 km h-1) signifying the movement of people and robots and transceivers complying to the IEEE 802.15.4 specification. Hence, we deployed mobile robots that interact with strategically placed stationary relay nodes. Our study considered different types of link quality characterisation metrics that provide complementary and useful insights. To demonstrate the usefulness of our experiments and observations, we implemented a link quality estimation technique using a Kalman Filter. To set up the model, we employed two link quality metrics along with the statistics we established during our experiments. The article will compare the performance of four proposed approaches with ours.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 24"},"PeriodicalIF":2.3,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3448737","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45561528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Metagames and Hypergames for Deception-Robust Control 用于欺骗-鲁棒控制的元游戏和超游戏
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.1145/3439430
Craig Bakker, Arnab Bhattacharya, S. Chatterjee, D. Vrabie
Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable to deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy attacks such as Stuxnet can be described as Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames and APTs to develop hypergame-based defender strategies that are robust to deception and do not rely on attack detection. These strategies provide provable bounds—and provably optimal bounds—on the attacker payoff. Strategies based on Bayesian priors do not provide such bounds. We then numerically demonstrate our approach on a building control subsystem and discuss next steps in extending this approach toward an operational capability.
越来越多的人连接到互联网进行远程监测和控制,这使得网络物理系统更容易受到蓄意攻击;因此,纯粹的网络攻击可能会造成物理后果。像Stuxnet这样的长期、隐蔽的攻击可以被描述为高级持续威胁(apt)。在这里,我们扩展了之前在超博弈和apt方面的工作,以开发基于超博弈的防御策略,这些策略对欺骗具有鲁棒性,并且不依赖于攻击检测。这些策略提供了攻击者收益的可证明边界——以及可证明的最优边界。基于贝叶斯先验的策略不提供这样的界限。然后,我们在建筑控制子系统上用数字演示了我们的方法,并讨论了将该方法扩展到操作能力的下一步步骤。
{"title":"Metagames and Hypergames for Deception-Robust Control","authors":"Craig Bakker, Arnab Bhattacharya, S. Chatterjee, D. Vrabie","doi":"10.1145/3439430","DOIUrl":"https://doi.org/10.1145/3439430","url":null,"abstract":"Increasing connectivity to the Internet for remote monitoring and control has made cyber-physical systems more vulnerable to deliberate attacks; purely cyber attacks can thereby have physical consequences. Long-term, stealthy attacks such as Stuxnet can be described as Advanced Persistent Threats (APTs). Here, we extend our previous work on hypergames and APTs to develop hypergame-based defender strategies that are robust to deception and do not rely on attack detection. These strategies provide provable bounds—and provably optimal bounds—on the attacker payoff. Strategies based on Bayesian priors do not provide such bounds. We then numerically demonstrate our approach on a building control subsystem and discuss next steps in extending this approach toward an operational capability.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 25"},"PeriodicalIF":2.3,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3439430","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44719075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Offline and Online Learning of Signal Temporal Logic Formulae Using Decision Trees 基于决策树的信号时序逻辑公式的离线和在线学习
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.1145/3433994
Giuseppe Bombara, C. Belta
In this article, we focus on inferring high-level descriptions of a system from its execution traces. Specifically, we consider a classification problem where system behaviors are described using formulae of Signal Temporal Logic (STL). Given a finite set of pairs of system traces and labels, where each label indicates whether the corresponding trace exhibits some system property, we devised a decision-tree-based framework that outputs an STL formula that can distinguish the traces. We also extend this approach to the online learning scenario. In this setting, it is assumed that new signals may arrive over time and the previously inferred formula should be updated to accommodate the new data. The proposed approach presents some advantages over traditional machine learning classifiers. In particular, the produced formulae are interpretable and can be used in other phases of the system’s operation, such as monitoring and control. We present two case studies to illustrate the effectiveness of the proposed algorithms: (1) a fault detection problem in an automotive system and (2) an anomaly detection problem in a maritime environment.
在本文中,我们主要关注从系统的执行轨迹推断系统的高级描述。具体来说,我们考虑了一个使用信号时序逻辑(STL)公式描述系统行为的分类问题。给定一组有限的系统跟踪和标签对,其中每个标签表示相应的跟踪是否显示某些系统属性,我们设计了一个基于决策树的框架,该框架输出一个可以区分跟踪的STL公式。我们还将这种方法扩展到在线学习场景。在这种情况下,假设随着时间的推移可能会有新的信号到达,并且应该更新先前推断的公式以适应新的数据。与传统的机器学习分类器相比,该方法具有一些优势。特别是,所产生的公式是可解释的,可用于系统操作的其他阶段,例如监测和控制。我们提出了两个案例研究来说明所提出算法的有效性:(1)汽车系统中的故障检测问题;(2)海上环境中的异常检测问题。
{"title":"Offline and Online Learning of Signal Temporal Logic Formulae Using Decision Trees","authors":"Giuseppe Bombara, C. Belta","doi":"10.1145/3433994","DOIUrl":"https://doi.org/10.1145/3433994","url":null,"abstract":"In this article, we focus on inferring high-level descriptions of a system from its execution traces. Specifically, we consider a classification problem where system behaviors are described using formulae of Signal Temporal Logic (STL). Given a finite set of pairs of system traces and labels, where each label indicates whether the corresponding trace exhibits some system property, we devised a decision-tree-based framework that outputs an STL formula that can distinguish the traces. We also extend this approach to the online learning scenario. In this setting, it is assumed that new signals may arrive over time and the previously inferred formula should be updated to accommodate the new data. The proposed approach presents some advantages over traditional machine learning classifiers. In particular, the produced formulae are interpretable and can be used in other phases of the system’s operation, such as monitoring and control. We present two case studies to illustrate the effectiveness of the proposed algorithms: (1) a fault detection problem in an automotive system and (2) an anomaly detection problem in a maritime environment.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 23"},"PeriodicalIF":2.3,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3433994","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43707011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Introduction to the Special Issue on Time for CPS (TCPS) CPS(TCPS)时间特刊简介
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-20 DOI: 10.1145/3433948
Aviral Shrivastava, P. Derler
For many Cyber-Physical Systems (CPS), timing is crucial for safety, security, and responsiveness of the system behavior. Time is key to enabling coordinated actions among the many, often heavily distributed, components of a CPS. For example, in power systems, the time of all phasor measurement units (PMUs) is synchronized via GPS signals, because otherwise aligning data from various distributed PMUs will become impossible, rendering state estimates wrong and unusable. With the increasing connectivity in modern CPS, requirements on timing accuracy and synchronization are evolving, ranging from tight, picosecond synchronization accuracy in power systems to high precision and accuracy requirements for wireless and low-power networks. Smart cities and connected vehicles pose new technological challenges and timing properties play an important role for coordination and security. Despite the importance of time in CPS, there are significant gaps in specifying, reasoning about, verifying, and testing the timing behavior of systems. In practice, timing in CPS is often an afterthought in the development process. While experienced domain experts might understand the desired timing behavior of the CPS, they often do not have a standardized, formal way of describing the timing requirements, let alone incorporating timing properties as part of the design. Even if a design is accompanied with well-defined timing requirements, it is difficult to verify whether a given design satisfies those requirements. The article in this special issue address challenges ranging from specifying, modeling, and verifying time in CPS in various application domains, including automotive control, communication, and manufacturing. • In their work on “Composable Finite State Machine–based Modeling for Quality-ofInformation-Aware Cyber-physical Systems,” Rafael Rosales and Michael Paulitsch present a model-based design methodology and introduce composable design patterns to address the following Quality-of-Information properties: timeliness, correctness, completeness, consistency, and accuracy. By specifying and composing behaviors using extended finite state machines, reuse and robustness are increased and dynamic validation and optimization of functional and nonfunctional properties is enabled. • The article “System-level Logical Execution Time: Augmenting the Logical Execution Time Paradigm for Distributed Real-time Automotive Software,” by Kai-Björn Gemlau, Leonie Köhler, Rolf Ernst, and Sophie Quinton, apply the well-known logical execution time paradigm, which abstracts away notoriously hard-to-characterize and often non-deterministic physical execution times, not just to a single component but also in a systemwide context. By explicitly acknowledging the fact that communication times are not negligible and cannot be abstracted way, the work addresses challenges in the design and verification of complex automotive systems, such as predictability, synchronization, composability,
对于许多网络物理系统(CPS)来说,时间对于系统行为的安全性、安全性和响应性至关重要。要在CPS的许多(通常是大量分布的)组成部分之间实现协调行动,时间是关键。例如,在电力系统中,所有相量测量单元(pmu)的时间都是通过GPS信号同步的,否则将不可能对齐来自各个分布式pmu的数据,从而导致状态估计错误和不可用。随着现代CPS中连通性的增加,对定时精度和同步的要求也在不断发展,从电力系统中严格的皮秒同步精度到无线和低功耗网络的高精度和精度要求。智慧城市和网联汽车提出了新的技术挑战,而时序特性在协调和安全方面发挥着重要作用。尽管时间在CPS中很重要,但在指定、推理、验证和测试系统的定时行为方面存在重大差距。在实践中,在开发过程中,CPS中的时间通常是事后才想到的。虽然经验丰富的领域专家可能了解CPS的期望计时行为,但他们通常没有标准化的、正式的方式来描述计时需求,更不用说将计时属性作为设计的一部分了。即使设计伴随着定义良好的时序需求,也很难验证给定的设计是否满足这些需求。本期特刊中的文章讨论了在各种应用领域(包括汽车控制、通信和制造)中指定、建模和验证CPS时间的挑战。•Rafael Rosales和Michael Paulitsch在“面向信息质量感知的网络物理系统的可组合有限状态机建模”一文中提出了一种基于模型的设计方法,并引入了可组合的设计模式来解决以下信息质量属性:及时性、正确性、完整性、一致性和准确性。通过使用扩展有限状态机指定和组合行为,增加了重用性和健壮性,并启用了功能和非功能属性的动态验证和优化。•Kai-Björn Gemlau、Leonie Köhler、Rolf Ernst和Sophie Quinton撰写的文章“系统级逻辑执行时间:增强分布式实时汽车软件的逻辑执行时间范式”,应用了众所周知的逻辑执行时间范式,该范式抽象了众所周知的难以表征且通常不确定的物理执行时间,不仅适用于单个组件,而且适用于系统范围的上下文中。通过明确承认通信时间不可忽略且不能抽象的事实,该工作解决了复杂汽车系统设计和验证中的挑战,例如可预测性、同步性、可组合性和可扩展性。
{"title":"Introduction to the Special Issue on Time for CPS (TCPS)","authors":"Aviral Shrivastava, P. Derler","doi":"10.1145/3433948","DOIUrl":"https://doi.org/10.1145/3433948","url":null,"abstract":"For many Cyber-Physical Systems (CPS), timing is crucial for safety, security, and responsiveness of the system behavior. Time is key to enabling coordinated actions among the many, often heavily distributed, components of a CPS. For example, in power systems, the time of all phasor measurement units (PMUs) is synchronized via GPS signals, because otherwise aligning data from various distributed PMUs will become impossible, rendering state estimates wrong and unusable. With the increasing connectivity in modern CPS, requirements on timing accuracy and synchronization are evolving, ranging from tight, picosecond synchronization accuracy in power systems to high precision and accuracy requirements for wireless and low-power networks. Smart cities and connected vehicles pose new technological challenges and timing properties play an important role for coordination and security. Despite the importance of time in CPS, there are significant gaps in specifying, reasoning about, verifying, and testing the timing behavior of systems. In practice, timing in CPS is often an afterthought in the development process. While experienced domain experts might understand the desired timing behavior of the CPS, they often do not have a standardized, formal way of describing the timing requirements, let alone incorporating timing properties as part of the design. Even if a design is accompanied with well-defined timing requirements, it is difficult to verify whether a given design satisfies those requirements. The article in this special issue address challenges ranging from specifying, modeling, and verifying time in CPS in various application domains, including automotive control, communication, and manufacturing. • In their work on “Composable Finite State Machine–based Modeling for Quality-ofInformation-Aware Cyber-physical Systems,” Rafael Rosales and Michael Paulitsch present a model-based design methodology and introduce composable design patterns to address the following Quality-of-Information properties: timeliness, correctness, completeness, consistency, and accuracy. By specifying and composing behaviors using extended finite state machines, reuse and robustness are increased and dynamic validation and optimization of functional and nonfunctional properties is enabled. • The article “System-level Logical Execution Time: Augmenting the Logical Execution Time Paradigm for Distributed Real-time Automotive Software,” by Kai-Björn Gemlau, Leonie Köhler, Rolf Ernst, and Sophie Quinton, apply the well-known logical execution time paradigm, which abstracts away notoriously hard-to-characterize and often non-deterministic physical execution times, not just to a single component but also in a systemwide context. By explicitly acknowledging the fact that communication times are not negligible and cannot be abstracted way, the work addresses challenges in the design and verification of complex automotive systems, such as predictability, synchronization, composability,","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":" ","pages":"1 - 2"},"PeriodicalIF":2.3,"publicationDate":"2021-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3433948","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47093143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Planning for Automated Vehicles with Human Trust 具有人类信任的自动驾驶汽车规划
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-09 DOI: 10.1145/3561059
Shili Sheng, Erfan Pakdamanian, Kyungtae Han, Ziran Wang, John K. Lenneman, David Parker, Lu Feng
Recent work has considered personalized route planning based on user profiles, but none of it accounts for human trust. We argue that human trust is an important factor to consider when planning routes for automated vehicles. This article presents a trust-based route-planning approach for automated vehicles. We formalize the human-vehicle interaction as a partially observable Markov decision process (POMDP) and model trust as a partially observable state variable of the POMDP, representing the human’s hidden mental state. We build data-driven models of human trust dynamics and takeover decisions, which are incorporated in the POMDP framework, using data collected from an online user study with 100 participants on the Amazon Mechanical Turk platform. We compute optimal routes for automated vehicles by solving optimal policies in the POMDP planning and evaluate the resulting routes via human subject experiments with 22 participants on a driving simulator. The experimental results show that participants taking the trust-based route generally reported more positive responses in the after-driving survey than those taking the baseline (trust-free) route. In addition, we analyze the trade-offs between multiple planning objectives (e.g., trust, distance, energy consumption) via multi-objective optimization of the POMDP. We also identify a set of open issues and implications for real-world deployment of the proposed approach in automated vehicles.
最近的工作考虑了基于用户档案的个性化路线规划,但没有一项考虑到人类的信任。我们认为,在规划自动化车辆路线时,人类的信任是一个需要考虑的重要因素。本文提出了一种基于信任的自动化车辆路线规划方法。我们将人-车交互形式化为部分可观察的马尔可夫决策过程(POMDP),并将信任建模为POMDP的部分可观察状态变量,表示人类隐藏的心理状态。我们使用从亚马逊机械土耳其平台上的100名参与者的在线用户研究中收集的数据,建立了人类信任动态和收购决策的数据驱动模型,这些模型被纳入POMDP框架。我们通过求解POMDP规划中的最优策略来计算自动化车辆的最优路线,并通过在驾驶模拟器上对22名参与者进行的人体实验来评估由此产生的路线。实验结果表明,与基线(无信任)路线的参与者相比,采用基于信任路线的参与者在驾驶后调查中通常报告了更多的积极反应。此外,我们还通过POMDP的多目标优化分析了多个规划目标(如信任、距离、能耗)之间的权衡。我们还确定了一系列悬而未决的问题,以及在自动化车辆中部署所提出方法的现实意义。
{"title":"Planning for Automated Vehicles with Human Trust","authors":"Shili Sheng, Erfan Pakdamanian, Kyungtae Han, Ziran Wang, John K. Lenneman, David Parker, Lu Feng","doi":"10.1145/3561059","DOIUrl":"https://doi.org/10.1145/3561059","url":null,"abstract":"Recent work has considered personalized route planning based on user profiles, but none of it accounts for human trust. We argue that human trust is an important factor to consider when planning routes for automated vehicles. This article presents a trust-based route-planning approach for automated vehicles. We formalize the human-vehicle interaction as a partially observable Markov decision process (POMDP) and model trust as a partially observable state variable of the POMDP, representing the human’s hidden mental state. We build data-driven models of human trust dynamics and takeover decisions, which are incorporated in the POMDP framework, using data collected from an online user study with 100 participants on the Amazon Mechanical Turk platform. We compute optimal routes for automated vehicles by solving optimal policies in the POMDP planning and evaluate the resulting routes via human subject experiments with 22 participants on a driving simulator. The experimental results show that participants taking the trust-based route generally reported more positive responses in the after-driving survey than those taking the baseline (trust-free) route. In addition, we analyze the trade-offs between multiple planning objectives (e.g., trust, distance, energy consumption) via multi-objective optimization of the POMDP. We also identify a set of open issues and implications for real-world deployment of the proposed approach in automated vehicles.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"6 1","pages":"1 - 21"},"PeriodicalIF":2.3,"publicationDate":"2021-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49015243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data-driven Distributionally Robust Optimization For Vehicle Balancing of Mobility-on-Demand Systems 数据驱动的按需移动系统车辆平衡分布鲁棒优化
IF 2.3 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-04 DOI: 10.1145/3418287
Fei Miao, Sihong He, Lynn Pepin, Shuo Han, Abdeltawab M. Hendawi, Mohamed E. Khalefa, J. Stankovic, G. Pappas
With the transformation to smarter cities and the development of technologies, a large amount of data is collected from sensors in real time. Services provided by ride-sharing systems such as taxis, mobility-on-demand autonomous vehicles, and bike sharing systems are popular. This paradigm provides opportunities for improving transportation systems’ performance by allocating ride-sharing vehicles toward predicted demand proactively. However, how to deal with uncertainties in the predicted demand probability distribution for improving the average system performance is still a challenging and unsolved task. Considering this problem, in this work, we develop a data-driven distributionally robust vehicle balancing method to minimize the worst-case expected cost. We design efficient algorithms for constructing uncertainty sets of demand probability distributions for different prediction methods and leverage a quad-tree dynamic region partition method for better capturing the dynamic spatial-temporal properties of the uncertain demand. We then derive an equivalent computationally tractable form for numerically solving the distributionally robust problem. We evaluate the performance of the data-driven vehicle balancing algorithm under different demand prediction and region partition methods based on four years of taxi trip data for New York City (NYC). We show that the average total idle driving distance is reduced by 30% with the distributionally robust vehicle balancing method using quad-tree dynamic region partitions, compared with vehicle balancing methods based on static region partitions without considering demand uncertainties. This is about a 60-million-mile or a 8-million-dollar cost reduction annually in NYC.
随着智慧城市的转型和技术的发展,传感器实时收集大量数据。出租车、按需自动驾驶汽车、共享单车等共享出行系统提供的服务也很受欢迎。这种模式提供了改善交通系统性能的机会,通过主动分配拼车车辆来预测需求。然而,如何处理预测需求概率分布中的不确定性以提高系统的平均性能仍然是一个具有挑战性和未解决的任务。针对这一问题,本文提出了一种数据驱动的分布式鲁棒车辆平衡方法,以最小化最坏情况下的期望成本。我们设计了有效的算法来构建不同预测方法的需求概率分布的不确定性集,并利用四叉树动态区域划分方法来更好地捕获不确定需求的动态时空特性。然后,我们导出了一个等价的计算易于处理的形式,用于数值求解分布鲁棒问题。基于纽约市4年的出租车出行数据,评估了数据驱动的车辆平衡算法在不同需求预测和区域划分方法下的性能。研究表明,与不考虑需求不确定性的基于静态区域划分的车辆平衡方法相比,采用四叉树动态区域划分的分布鲁棒车辆平衡方法平均总空闲行驶距离减少了30%。这相当于纽约市每年减少6000万英里或800万美元的成本。
{"title":"Data-driven Distributionally Robust Optimization For Vehicle Balancing of Mobility-on-Demand Systems","authors":"Fei Miao, Sihong He, Lynn Pepin, Shuo Han, Abdeltawab M. Hendawi, Mohamed E. Khalefa, J. Stankovic, G. Pappas","doi":"10.1145/3418287","DOIUrl":"https://doi.org/10.1145/3418287","url":null,"abstract":"With the transformation to smarter cities and the development of technologies, a large amount of data is collected from sensors in real time. Services provided by ride-sharing systems such as taxis, mobility-on-demand autonomous vehicles, and bike sharing systems are popular. This paradigm provides opportunities for improving transportation systems’ performance by allocating ride-sharing vehicles toward predicted demand proactively. However, how to deal with uncertainties in the predicted demand probability distribution for improving the average system performance is still a challenging and unsolved task. Considering this problem, in this work, we develop a data-driven distributionally robust vehicle balancing method to minimize the worst-case expected cost. We design efficient algorithms for constructing uncertainty sets of demand probability distributions for different prediction methods and leverage a quad-tree dynamic region partition method for better capturing the dynamic spatial-temporal properties of the uncertain demand. We then derive an equivalent computationally tractable form for numerically solving the distributionally robust problem. We evaluate the performance of the data-driven vehicle balancing algorithm under different demand prediction and region partition methods based on four years of taxi trip data for New York City (NYC). We show that the average total idle driving distance is reduced by 30% with the distributionally robust vehicle balancing method using quad-tree dynamic region partitions, compared with vehicle balancing methods based on static region partitions without considering demand uncertainties. This is about a 60-million-mile or a 8-million-dollar cost reduction annually in NYC.","PeriodicalId":7055,"journal":{"name":"ACM Transactions on Cyber-Physical Systems","volume":"5 1","pages":"1 - 27"},"PeriodicalIF":2.3,"publicationDate":"2021-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3418287","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41555488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
ACM Transactions on Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1