{"title":"Cross-social-network Interconnection Model Based on Bridge Community","authors":"Min Hu, Mengyuan Dong","doi":"10.4108/eai.29-6-2019.2282012","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282012","url":null,"abstract":"As users participate in many online social networks (OSNs), connecting different social networks has become the latest task that researchers are focusing on. The analysis of user behavior needs to mine user information from multiple social networks, obtain more accurate information through association matching to analyze and predict, and improve the attributes of users' multiple social networks. Through the mining and analysis of user information, the interconnection of information dissemination of multiple social networks is realized. This paper firstly sorts the importance of user nodes in multi-social networks, and finds important nodes and secondarily important nodes to form the initial bridge community; then we build bridge user links through similarity matching of the users in the bridge community; finally, we propose cross-social-network interconnection model based on bridge community to enhance the structural interconnection between multiple social networks.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128154693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supervised Machine Learning based Routing Detection for Smart Meter Network","authors":"Raqibul Hasan, Yanxiao Zhao, Guodong Wang, Yu Luo, Lina Pu, Rui Wang","doi":"10.4108/eai.29-6-2019.2283068","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2283068","url":null,"abstract":"It is known that the Ad hoc On-Demand Distance Vector (AODV) routing protocol for smart meter network is vulnerable to denial of service attacks (e.g., black hole attack and selective forwarding attack). In this paper, we introduce supervised machine learning to detect unknown routing attacks under AODV. There are two problems in the existing intrusion detection algorithms. The first problem is that the existing intrusion detection algorithms are mainly applied to a specific and known type of routing attack, which no longer work for unknown attacks. The second one is that constant thresholds are commonly used for detection. To overcome these two problems, we introduce a supervised machine learning based detection approach. To implement supervised machine learning, three steps are involved. First, features and target estimations are selected from malicious AODV behaviors in smart meter network to generate training data sets. Second, we assign a suitable classifier including support vector machine, k-nearest neighbors and decision trees to fit the training and predicted data. Third, we update our training data to maintain a dynamic threshold. Simulations are conducted using Python3.6 to evaluate the accuracy and the time overhead of our proposed supervised machine learning model. The simulation results show that the decision trees algorithm assures 100% accuracy with minimum time overhead to detect routing attacks in AODV.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134131578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Time-aware Method for Occupancy Detection in a Building","authors":"Ling Song, Xiaofei Niu, Qiang Lyu, Shunming Lyu, Tian Tian","doi":"10.4108/eai.29-6-2019.2282388","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282388","url":null,"abstract":"The target of buildings’ energy efficient is to facilitate a comfortable environment for occupants while maintaining minimal energy consumption. Occupant behaviors pay a large impact in influencing the energy consumption. Time-aware occupancy detection could give information support for intelligent building energy management. In this paper several building occupancy detection methods, which are based on the temporal analysis of historical data, are proposed for providing different size of prediction window occupancy detection. Each proposed approaches are evaluated against accurate real-life data collected from a building. Experiments have been conducted using actual occupancy data under six different time horizons can be used to perform time-aware occupancy states prediction. The experimental results show that Stochastic Gradient Descent (SGD) and Gaussian mixture models-Hidden Markov Model (GMM-HMM) outperforms the other methods for the evaluation. With proposed more accurate time-aware occupancy prediction algorithms, we hope to develop more energy-efficient HVAC(Heating, Ventilation, and Air Conditioning) scheduling systems in order to save energy consumption.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongcheng Huang, Licheng Lai, Min Hu, Mengyuan Dong, Tingting Wang
{"title":"A Social Network Information Dissemination Model Based on Evolutionary Game Considering Node’s Attitude","authors":"Hongcheng Huang, Licheng Lai, Min Hu, Mengyuan Dong, Tingting Wang","doi":"10.4108/eai.29-6-2019.2282003","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282003","url":null,"abstract":"As a kind of social attribute of bounded rational users, attitude continuously selects and updates in the process of interaction between nodes, which makes the behavioral game between communication subjects and affects the dissemination of information. To analyze the impact of attitude changes on information, this paper proposes an information propagation model based on evolutionary game. Firstly, from the individual point of view, the update rules of the node's attitude are defined according to non-Bayesian social learning rules. Secondly, the game matrix between nodes based on attitude value is established, and the information dissemination model based on node attitude is established according to the evolutionary analysis paradigm. By replicating the equilibrium solution of dynamic equations with both positive and negative attitudes, and analyzing the stability of the corresponding equilibrium points, the evolution mechanism of dynamic interaction between attitude nodes is obtained. Finally, the impact of different attitudes on information dissemination was analyzed by combining SIS model. The validity of the proposed model is verified by numerical analysis and simulation experiments, and the simulation results show that the change of different attitude of nodes plays an important role in information dissemination.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Information Propagation Model Based on Various Emotions and Heterogeneous Mean Field in Social Networks","authors":"Tingting Wang, Min Hu, Lan Kou","doi":"10.4108/eai.29-6-2019.2282013","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282013","url":null,"abstract":"Information propagation in social networks can be effected by various factors, such as connected relationships, interactions between users, and so on. Previous studies mainly focused on analyzing the impact of physical connections on information propagation, and rarely studied the effects of different emotions on information propagation. Aiming to solve this problem, this paper proposes an emotion-based susceptible-infected-recovered information propagtion model(E-SIR). The model primarily researches the impacts of different emotions and diverse connections on the information propagtion process. We introduced the emotional transmissibility and the information transmissibility to describe the infection abilit ies of different emotions and the possibility of information transmission between different users,respectively. In addition, the dynamic equations are established based on the heterogeneous mean field. The burst threshold and spreading scale are theoretically analyzed and verified by experiments. In general, this paper focuses on the impacts of various emotions and different connections on information propagation.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129808886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harnessing D2D Communications in Collaborative Mobile Clouds for Content Sharing: An Energy Efficient Communication Scheme","authors":"Jun Huang, Chao-Ying Huang, Cong-Cong Xing","doi":"10.4108/eai.29-6-2019.2282757","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282757","url":null,"abstract":"This paper presents an energy efficiency (EE) communication scheme for content sharing with Collaborative Mobile Clouds (CMC) and D2D cluster. A waterfilling-based data segmentation approach for content distribution is proposed. Within the CMC, the cost-effective resource allocation and the power control mechanisms for D2D communications are designed. Through performance comparisons, it is disclosed that the proposed scheme dominates different variations of it in terms of system EE.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116670283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hierarchical Bayesian Model for Matching Unlabeled Point Sets","authors":"Xin Hu, Xiaodong Zhang, Xuequan Zhou, Hua Zhang, Chunshan Li, Deqiong Ding, Dianhui Chu","doi":"10.4108/eai.29-6-2019.2282677","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282677","url":null,"abstract":"","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"87 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126100345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Effective Feature Construction Method for Fall Detection using Smartphone","authors":"Chunshan Li, Tianyu Dai, Dianhui Chu, Xiaodong Zhang","doi":"10.4108/eai.29-6-2019.2282809","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282809","url":null,"abstract":"Recent years, smartphone based fall detection solutions have become research hotspots. These previous algorithms always analyze two types of data (accelerometer and gyroscope) and detect fall event on activities of daily life (ADL) of people which does not consider the case on physical exercise, such as, running etc. In this paper, we propose an effective feature construction method to convert a continuously device motion record to a feature vector which can define the occurrence of a fall event accurately. Base on those feature vectors, a heuristic fusion approach is adopted to extract the fall events on ADL with running. Our method runs on four types of refined and unbiased data (Attitude, RotationRate, Gravity and UserAcceleration) providing by iPhone’s Core Motion framework. And 15 volunteers were employed to simulate fall events. The empirical results have demonstrated that the proposed method is effective and reliable on ADL with physical exercise.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust prediction based on grey exponential smoothing method in VANETs","authors":"Sanshun Zhang, Li Li, Hui Xia, Rui Zhang, Ye Li","doi":"10.4108/eai.29-6-2019.2282065","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282065","url":null,"abstract":"In vehicular ad hoc networks (i.e., VANETs), normal communications between vehicles are vulnerable to attacks from malicious vehicles. Trust-based solution is a feasible method to solve the routing security problem. In this paper, a trust prediction model based on grey exponential smoothing method is proposed by combining the grey model, the exponential smoothing prediction method and the golden section search method. A multicast routing protocol based on the grey exponential smoothing trust prediction model, named ESGM-ODMRP, is presented to verify the validity of this new method. In the experiments, the evaluation of four routing metrics (i.e., packet delivery ratio, overhead, average latency and byte sent per byte delievered) prove that our protocol performs better in identifying malicious vehicles and establishing secure routes.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"28 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120912307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Capsule Network for Gaze Estimation in Wireless Sensor Networks","authors":"Mingyuan Luo, Xi Liu, Wei Wang, Wei Huang","doi":"10.4108/eai.29-6-2019.2282839","DOIUrl":"https://doi.org/10.4108/eai.29-6-2019.2282839","url":null,"abstract":"In this study, aiming at the problem of gaze estimation in the wireless sensor network in the car, we use image-based method to estimate gaze based on the single camera sensor. We use the deep learning model and propose the improved model from three aspects based on the original capsule network. The first is to increase the convolution layer, the second is to increase the capsule layer, and the third is to widen the capsule layer in the network. Through many contrast experiments, it is proved that the appropriate use of the first or second improved method can achieve performance over other comparison models, and the prediction results of gaze estimation are almost no different from the real gaze direction.","PeriodicalId":150308,"journal":{"name":"Proceedings of the 12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128650190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}