2020 30th International Telecommunication Networks and Applications Conference (ITNAC)最新文献

筛选
英文 中文
A Study of Reference Node Placement based on 4- quadrant Node Selection in Ultra Wideband Indoor Positioning System 超宽带室内定位系统中基于四象限节点选择的参考节点放置研究
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315162
Kriangkrai Maneerat, Krisada Chinda, Charuwalee Suwatthikul, L. Klinkusoom, L. Kovavisaruch, K. Kaemarungsi
{"title":"A Study of Reference Node Placement based on 4- quadrant Node Selection in Ultra Wideband Indoor Positioning System","authors":"Kriangkrai Maneerat, Krisada Chinda, Charuwalee Suwatthikul, L. Klinkusoom, L. Kovavisaruch, K. Kaemarungsi","doi":"10.1109/ITNAC50341.2020.9315162","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315162","url":null,"abstract":"This paper investigated the impact of the reference node (RN) placement on the localization performance of Ultra wideband (UWB) indoor positioning system. Different RN- placement patterns based on 4-quadrant node selection strategy were experimented. The accuracy performance of UWB indoor positioning systems was evaluated with 3D trilateration algorithm. Experimental results showed that the RN placement with a crossing pattern (Pattern A) provided the highest location accuracy performance in which an average error distance was less than 0.24 m. Moreover, we found that the RN placement with a sloping pattern (Pattern B) could cause the accuracy performance degradation up to 66%. In particular, the positioning error of y- and z-coordinate of the tag placed in the middle for Pattern B was almost 1 m.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Features of Human-Centred Algorithm Design 以人为本算法设计的特点
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315169
M. Cherrington, David Airehrour, Joan Lu, Qiang Xu, David Cameron-Brown, Ihaka Dunn
{"title":"Features of Human-Centred Algorithm Design","authors":"M. Cherrington, David Airehrour, Joan Lu, Qiang Xu, David Cameron-Brown, Ihaka Dunn","doi":"10.1109/ITNAC50341.2020.9315169","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315169","url":null,"abstract":"Algorithms are pervasive, unseen influencers of decisions. Algorithmic features can fluctuate widely, depending on use, user or criteria applied. This paper considers the nascent field of human-centred algorithm design (HCAD), intersecting human-centred design and algorithmic systems. Human-centred, more-than-metric feature selection approaches, create fairer and deeper meaning. More value is created. The unique impact of this paper is to integrate feature selection within a technology HCAD strategy, for a novel, innovative HCAD approach to machine learning. This flexible and evaluative approach can support data advances with human-social nuance, designed for purpose with knowledge for data-driven decisions. The design of machine learning algorithms to the uses in which they will be employed is user-centric. This is important within environments utilising automated, semi-automated or high-performance analytics.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of microstrip antenna and RF circuit for robust wireless communication of IoT devices under partial shield installation 部分屏蔽下物联网设备鲁棒无线通信微带天线和射频电路设计
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315107
Bo Hu, Benjamin Fisher, Alirio Guerra, J. Mo
{"title":"Design of microstrip antenna and RF circuit for robust wireless communication of IoT devices under partial shield installation","authors":"Bo Hu, Benjamin Fisher, Alirio Guerra, J. Mo","doi":"10.1109/ITNAC50341.2020.9315107","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315107","url":null,"abstract":"In recent years, smart devices are popular in residents and commercial offices, which are often integrated into Internet of Things (IoT). To achieve it, those IoT devices often utilize microstrip antennas due to their low cost, low profile, and ease of forming antenna arrays. However, they may be installed inside the steel truss walls for the beauty of the environment. The partial metal shield is observed to reduce the signal strength significantly and blocks the wireless data transmission among those IoT devices over a long distance. This paper’s objective is to design and fabricate an inverted-U shape microstrip antenna and 433MHz radio frequency circuit, which has a good performance even under partial shield installation. The method is to optimize the impedance matching circuit with side and rear metal shields. The experiments confirm that this new design has robust wireless communication among multiple IoT devices over 40-meter indoor and 100-meter outdoor environment.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133983394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors 针对机器学习移动恶意软件检测器的基于特征的对抗性攻击
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315144
M. Shahpasand, Len Hamey, M. Kâafar, Dinusha Vatsalan
{"title":"Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors","authors":"M. Shahpasand, Len Hamey, M. Kâafar, Dinusha Vatsalan","doi":"10.1109/ITNAC50341.2020.9315144","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315144","url":null,"abstract":"The success of Machine Learning (ML) techniques in security applications, such as malware detection, is highly criticized for their vulnerability to Adversarial Examples (AE): perturbed input samples (e.g. malware) can mislead ML to produce an adversary’s desired output (e.g. benign class label). AEs against ML models are broadly studied in the computer vision domain where the adversary perturbs the pixel values of an image such that the change is not perceptible, but the resulting image is misclassified by the model. We investigate the effectiveness of attack techniques proposed in the image domain to attack ML classifiers in the context of mobile malware detection. Since the feature vector representation of samples is often used in ML, a simplified evaluation of ML classifiers’ robustness to AEs is to study feature-based attack models, where the adversary perturbs the input features. We compare the methods, trade-offs, and gaps for such attack models and show that generative models (e.g. GANs) outperform a selection of existing attacks in terms of attack success rate but apply large distortion to the original sample. We also describe how we use the generated samples for increasing a classifier’s robustness through adversarial training.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier 基于LightGBM的网络异常检测:梯度增强分类器
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315049
Md. Khairul Islam, Prithula Hridi, Md. Shohrab Hossain, Husnu S. Narman
{"title":"Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier","authors":"Md. Khairul Islam, Prithula Hridi, Md. Shohrab Hossain, Husnu S. Narman","doi":"10.1109/ITNAC50341.2020.9315049","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315049","url":null,"abstract":"Anomaly detection systems are significant in recognizing intruders or suspicious activities by detecting unseen and unknown attacks. In this paper, we have worked on a benchmark network anomaly detection dataset UNSW-NB15, that reflects modern-day network traffic. Previous works on this dataset either lacked a proper validation approach or followed only one evaluation setup which made it difficult to compare their contributions with others using the same dataset but with different validation steps. In this paper, we have used a machine learning classifier LightGBM to perform binary classification on this dataset. We have presented a thorough study of the dataset with feature engineering, preprocessing, feature selection. We have evaluated the performance of our model using different experimental setups (used in several previous works) to clearly evaluate and compare with others. Using ten-fold cross-validation on the train, test, and combined (training and test) dataset, our model has achieved 97.21%, 98.33%, and 96.21% f1_scores, respectively. Also, the model fitted only on train data, achieved 92.96% f1_score on the separate test data. So our model also provides significant performance on unseen data. We have presented complete comparisons with the prior arts using all performance metrics available on them. And we have also shown that our model outperformed them in most metrics and thus can detect network anomalies better.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128284501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor Field 一种无线传感器领域相关信号空间跟踪的高效机器学习算法
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315016
H. Alasti
{"title":"An Efficient Machine Learning Algorithm For Spatial Tracking Of Correlated Signals In Wireless Sensor Field","authors":"H. Alasti","doi":"10.1109/ITNAC50341.2020.9315016","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315016","url":null,"abstract":"An efficient machine learning algorithm based on stochastic gradient is proposed and discussed for spatial tracking of correlated spatial signals from the sensor observations in wireless sensor field. The proposed algorithm can be used for environmental monitoring applications such as efficient temporal monitoring of temperature in hot island, or efficient monitoring of the distribution of pollutant gasses in wide areas for example terrain of large cities, etc. The proposed algorithm is computationally efficient and is low cost. In this paper the number of reporting sensors in tracking of signal is defined as cost. The spatial signal is compressed into a number of its isocontours at specific levels and the sensors whose sensor readings are in given margin of these contour levels, report their sensor readings to the fusion center (FC). The algorithm is done in two phases of spatial modeling and spatial tracking, where it uses the correlation between the spatial signal before and after variation of the spatial signal and updates the new set of contour levels for spatial tracking. The proposed machine learning algorithm finds the modeling parameters during the spatial modeling phase, and then updates them in spatial tracking phase. The performance analysis of the proposed algorithm shows that it successfully tracks the spatial variations of the signal at low cost with similar modeling performance to the spatial modeling.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An End-to-End Medical Emergency Response System to Support Elderly People 支援长者的端到端医疗紧急应变系统
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315129
Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri, M. D. Ahmed, G. Singh, Rose Arts
{"title":"An End-to-End Medical Emergency Response System to Support Elderly People","authors":"Md. Akbar Hossain, S. K. Ray, Seyed Reza Shahamiri, M. D. Ahmed, G. Singh, Rose Arts","doi":"10.1109/ITNAC50341.2020.9315129","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315129","url":null,"abstract":"This paper proposes the concept and preliminary design of an end-to-end medical emergency response system (EEMERS) to support and help elderly people in the community who live alone. The system integrates the informal caregivers, like the neighbors, friends, and family, with the traditional formal caregivers, such as the paramedics, ambulance and medical professionals. The informal caregivers act as the first responders to attend a patient in case of a medical emergency situation before the arrival of an ambulance or other medical services. An overview of the different modules of the EEMERS, the technological details and the end-to-end process flow of the system are discussed in this work. Moreover, the selection of the most appropriate informal caregiver to attend a medical emergency situation depends on a list of pre-defined contexts and is an important part of EEMERS. This work also discusses the preliminary validation results of the informal caregiver selection based on three machine learning algorithms, namely, Logistic Regression, Support Vector Machine, Nave Bayes. Finally, the paper provides a brief overview of the basic proof-of-concept implementation of the system.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle Networks MLIDS:利用长短期记忆网络处理原始高维CAN总线数据,用于车载网络入侵检测
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315024
Araya Kibrom Desta, Shuji Ohira, Ismail Arai, K. Fujikawa
{"title":"MLIDS: Handling Raw High-Dimensional CAN Bus Data Using Long Short-Term Memory Networks for Intrusion Detection in In-Vehicle Networks","authors":"Araya Kibrom Desta, Shuji Ohira, Ismail Arai, K. Fujikawa","doi":"10.1109/ITNAC50341.2020.9315024","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315024","url":null,"abstract":"CAN uses no authentication and encryption mechanisms for secure communication. To solve the security issues of the CAN bus, a deep learning-based intrusion detection systems have been proposed. But due to the high dimensional property of the CAN bus data, it was not possible to create an effective Intrusion Detection System (IDS) in the CAN bus that can take the property of the CAN data into consideration. In this paper, we are proposing a Long Short-Term Memory Networks (LSTM) based IDS that can handle the high dimensional property of the CAN bus data . Unlike the conventional methods which required a single network architecture for each unique arbitration ID, our method gives a single overall anomaly signal over a certain detection window without the need for reverese-engineering the CAN bus data. Using this anomaly signal we have managed to achieve 100% detection precision for insertion, fuzzy and targeted attacks in our data and in a public data that is prepared for this specific purpose.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Software-Defined Vehicular Networks: A Cooperative Approach for Computational Offloading 软件定义的车辆网络:一种计算卸载的协作方法
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315146
S. Shah, M. Gregory, Shuo Li
{"title":"Software-Defined Vehicular Networks: A Cooperative Approach for Computational Offloading","authors":"S. Shah, M. Gregory, Shuo Li","doi":"10.1109/ITNAC50341.2020.9315146","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315146","url":null,"abstract":"Conventional vehicular systems are gradually evolving into intelligent transportation systems. Multi-access Edge Computing (MEC) has become an important component of the software-defined vehicular networks that benefit from the introduction of reliable and low latency 5G networks and Wi-Fi. MEC offers a variety of smart services closer to the access networks leveraged by vehicles. The intelligent and connected vehicles demand access to compute-intensive applications that require compute and storage resources in addition to what is available in vehicles today. The computational burden on the connected vehicles can be significantly reduced by offloading to the MEC nodes and to the cloud. However, existing computational offloading schemes are challenged by the fast-moving vehicles, frequent handovers and subtle differences to the scenarios designed to support mobile phone handovers. The paper presents a software-defined vehicular edge computing architecture that copes with the mobility challenges by utilising the Software Defined Networking paradigm to perform traffic flow management for information collection and intelligent management of connected vehicles and networks.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient Systems for Smart Sensor Communications 智能传感器通信的节能系统
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Pub Date : 2020-11-25 DOI: 10.1109/ITNAC50341.2020.9315030
Z. M. Hussain
{"title":"Energy-Efficient Systems for Smart Sensor Communications","authors":"Z. M. Hussain","doi":"10.1109/ITNAC50341.2020.9315030","DOIUrl":"https://doi.org/10.1109/ITNAC50341.2020.9315030","url":null,"abstract":"A wireless sensor network (WSN) is a communication network with ad hoc configuration consisting of a number of tiny, low-power, low-cost sensors which are normally distributed in a decentralized fashion and have limited processing capability. WSNs have found a wide range of applications such as industrial process control, healthcare monitoring, surveillance, forest fire detection, natural disaster detection, target tracking, among many other applications. It is known that WSNs are resource-constrained, hence, energy efficiency is crucial for all applications of WSNs to extend the life span of the sensors' batteries. The most energy consuming operation in WSN is data communication, hence, it is important to reduce amount of data transmission through WSNs without significantly affecting the transferred information. In this paper we will focus on two directions of data-efficient signal representations that are expected to provide WSNs with sufficient energy control. The first direction is the use of intelligent short word-length (SWL) systems via embedded sigma-delta modulation, and the second direction is to use compressive sensing (CS) with chaotic sequences. If security is a factor, then CS via chaos can support secure communication in addition to its main function as a technique for data compression.","PeriodicalId":131639,"journal":{"name":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120979502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信