2019 IEEE International Conference on Smart Computing (SMARTCOMP)最新文献

筛选
英文 中文
Homomorphic Encryption for Privacy-Preserving Genome Sequences Search 保护隐私的基因组序列搜索的同态加密
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00021
Yuki Yamada, K. Rohloff, M. Oguchi
{"title":"Homomorphic Encryption for Privacy-Preserving Genome Sequences Search","authors":"Yuki Yamada, K. Rohloff, M. Oguchi","doi":"10.1109/SMARTCOMP.2019.00021","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00021","url":null,"abstract":"Genome sequence search is useful, for example, in clinical applications where a care provider needs to select a treatment option for a patient based on the exact kind of cancer the patient might have. Homomorphic encryption is a desirable technology to be used for this application because it is non-interactive. However, privacy-preserving genome sequence search using homomorphic encryption has been a practical challenge because of scalability issues driven by the depth of computations that need to be supported for privacy-preserving genome sequence search. In this paper, we build off of earlier privacy-preserving genome sequence search results to design, implement and compare two approaches to a client-server style system for privacy-preserving genome sequence search. There is a myriad of options and design trade-offs associated with the application of homomorphic encryption in this domain driven, for example, by choices in data encoding, scheme selection, and even encryption software library. We particularly focus on the use of the BGV and BFV homomorphic encryption schemes provided by the HElib and PALISADE open-source homomorphic encryption software libraries. Our results show that using the BFV-based approach in PALISADE provides optimal results for this application over our sample data.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114647478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Online Distributed Analytics at the Edge with Multiple Service Grades 具有多个服务等级的边缘在线分布式分析
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00028
Víctor Valls, Geeth de Mel, H. Kwon, L. Tassiulas
{"title":"Online Distributed Analytics at the Edge with Multiple Service Grades","authors":"Víctor Valls, Geeth de Mel, H. Kwon, L. Tassiulas","doi":"10.1109/SMARTCOMP.2019.00028","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00028","url":null,"abstract":"In this paper, we study the problem of how to allocate bandwidth and computation resources to deliver data analytics services at the edge. The types of services we envision consist of a chain of tasks that must be carried out sequentially, and where the number of tasks executed in the chain determines the grade in which a service is delivered. An example of such type of service is video analytics where different deep-learning algorithms are combined to provide a more accurate description of a scene. The contributions of the paper are to formulate the static resource allocation problem as a linear program, to discuss the challenges of static formulations in dynamic settings, and to propose a control-type formulation that uses approximate system dynamics and time-varying cost functions. The work also highlights the need for policies that can operate the network and learn its characteristics simultaneously.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126409387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems 智能系统受限物联网设备基于属性加密的可行性研究
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00057
Benedetto Girgenti, Pericle Perazzo, C. Vallati, F. Righetti, G. Dini, G. Anastasi
{"title":"On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems","authors":"Benedetto Girgenti, Pericle Perazzo, C. Vallati, F. Righetti, G. Dini, G. Anastasi","doi":"10.1109/SMARTCOMP.2019.00057","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00057","url":null,"abstract":"The Internet of Things (IoT) is enabling a new generation of innovative services based on the seamless integration of smart objects into information systems. Such IoT devices generate an uninterrupted flow of information that can be transmitted through an untrusted network and stored on an untrusted infrastructure. The latter raises new security and privacy challenges that require novel cryptographic methods. Attribute-Based Encryption (ABE) is a new type of public-key encryption that enforces a fine-grained access control on encrypted data based on flexible access policies. The feasibility of ABE adoption in fully-fledged computing systems, i.e. smartphones or embedded systems, has been demonstrated in recent works. In this paper we assess the feasibility of the adoption of ABE in typical IoT constrained devices, characterized by limited capabilities in terms of computing, storage and power. Specifically, an implementation of three ABE schemes for ESP32, a low-cost popular platform to deploy IoT devices, is developed and evaluated in terms of encryption/decryption time and energy consumption. The performance evaluation shows that the adoption of ABE on constrained devices is feasible, although it has a cost that increases with the number of attributes. The analysis in particular highlights how ABE has a significant impact in the lifetime of battery-powered devices, which is impaired significantly when a high number of attributes is adopted.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Novel Smart System for Contaminants Detection and Recognition in Water 一种新型的水中污染物检测与识别智能系统
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00051
M. Ferdinandi, M. Molinara, G. Cerro, L. Ferrigno, C. Marrocco, A. Bria, P. Meo, C. Bourelly, R. Simmarano
{"title":"A Novel Smart System for Contaminants Detection and Recognition in Water","authors":"M. Ferdinandi, M. Molinara, G. Cerro, L. Ferrigno, C. Marrocco, A. Bria, P. Meo, C. Bourelly, R. Simmarano","doi":"10.1109/SMARTCOMP.2019.00051","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00051","url":null,"abstract":"Nowadays water monitoring represents one of the most challenging global aims for the protection of people and environment health. In this paper we propose the application of an integrated system for the detection and recognition of contaminants in water. It is based on a two layer architecture: a sensing layer based on SENSIPLUS chip, and a data collection and classification layer, hereafter referred as SENSIPLUS Deep Machine (SDM). The SDM includes: a Micro Controller Unit (MCU), an optional host controller (e.g. laptop, smartphone, etc.) and different software components for data communication, analysis, and classification/regression based on machine learning techniques. Although the SDM classification/regression module can be potentially developed with any machine learning solution, in this paper we adopted an Artificial Neural Network with only one hidden layer to have a lightweight solution suitable to run (for inference) on ultra low power MCU. Aiming at further minimizing the network complexity, two alternative training sessions have been pursued: the first one using raw sensors' data and the second one applying a feature space dimensionality reduction through the Principal Component Analysis technique. Comparable and positive results (higher than 82% as average accuracy) have been obtained, confirming the validity and potentiality of the proposed system.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Identifying the Context of Hurricane Posts on Twitter using Wavelet Features 使用小波特征识别推特上飓风帖子的上下文
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00072
A. Anam, A. Gangopadhyay, Nirmalya Roy
{"title":"Identifying the Context of Hurricane Posts on Twitter using Wavelet Features","authors":"A. Anam, A. Gangopadhyay, Nirmalya Roy","doi":"10.1109/SMARTCOMP.2019.00072","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00072","url":null,"abstract":"With the increase of natural disasters all over the world, we are in crucial need of innovative solutions with inexpensive implementations to assist the emergency response systems. Information collected through conventional sources (e.g., incident reports, 911 calls, physical volunteers, etc.) are proving to be insufficient [1]. Responsible organizations are now leaning towards research grounds that explore digital human connectivity and freely available sources of information. U.S. Geological Survey and Federal Emergency Management Agency (FEMA) introduced Critical Lifeline (CLL) s which identifies the most significant areas that require immediate attention in case of natural disasters. These organizations applied crowdsourcing by connecting digital volunteer networks to collect data on the critical lifelines from data sources including social media [3], [4], [5]. In the past couple of years, during some of the deadly hurricanes (e.g., Harvey, IRMA, Maria, Michael, Florence, etc.), people took on different social media platforms like never seen before, in search of help for rescue, shelter, and relief. Their posts reflect crisis updates and their real-time observations on the devastation that they witness. In this paper, we propose a methodology to build and analyze time-frequency features of words on social media to assist the volunteer networks in identifying the context before, during and after a natural disaster and distinguishing contexts connected to the critical lifelines. We employ Continuous Wavelet Transform to help create word features and propose two ways to reduce the dimensions which we use to create word clusters to identify themes of conversations associated with stages of a disaster and these lifelines. We compare two different methodologies of wavelet features and word clusters both qualitatively and quantitatively, to show that wavelet features can identify and separate context without using semantic information as inputs.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Communicating Neural Network Architecture for Smart Environments 面向智能环境的分布式通信神经网络架构
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00058
Prince Abudu, A. Markham
{"title":"Distributed Communicating Neural Network Architecture for Smart Environments","authors":"Prince Abudu, A. Markham","doi":"10.1109/SMARTCOMP.2019.00058","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00058","url":null,"abstract":"The deployment of millions of embedded sensors plagued by resource constraints in sophisticated, complex and dynamic IoT smart environments continues to inspire the need to build novel architectures and models for automated, efficient inference and communication in distributed smart settings. In such settings, practical challenges related to energy efficiency, computational power and reliability, tedious design implementation, effective communication, optimal sampling and accurate event classification, prediction and detection exist. Sensors operating in smart environments must be capable of overcoming such challenges and enable scalable monitoring of dynamic phenomena while conducting real-time operations. The development of Machine Learning (ML) continues to motivate a new wave of innovative solutions that intermarry embedded sensors, IoT, and ML to enable various applications in smart environments. We propose a distributed communicating architecture based on Recurrent Neural Networks (RNNs) that can be instantiated on smart devices observing unique data and performing automated distributed inference via hidden-state communication. Our model uses a data-driven approach to collectively solve various distributed objectives, as evidenced by a series of systematic analyses we present. Although demonstrated on a small setup (2/3) nodes, this work sets out a new direction for automatically learning to communicate to solve tasks in distributed settings.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smartwatch Application for Horse Gaits Activity Recognition 马的步态活动识别智能手表应用
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00080
Enrico Casella, A. R. Khamesi, S. Silvestri
{"title":"Smartwatch Application for Horse Gaits Activity Recognition","authors":"Enrico Casella, A. R. Khamesi, S. Silvestri","doi":"10.1109/SMARTCOMP.2019.00080","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00080","url":null,"abstract":"Activity recognition has been introduced as a means of detecting an action from a series of observations. Although in the literature, the terms \"activity recognition\" and \"human activity recognition\" are mostly used interchangeably, there exist several interesting applications for non-human subjects. In this work, we study animal activity recognition with special focus on horse gaits recognition. The on-body and unobtrusive system developed in this paper has several potential applications which can raise attention towards financial, emotional and veterinary health issues related to animals. Leveraging the pervasive use of smartwatches for activity tracking, we develop a smartwatch application to collect accelerometer data. The application is based on novel outlier detection and feature extraction techniques, in conjunction with state-of-the-art machine learning approaches. We perform real life experiments with two horses to evaluate the performances of our proposed system. To this aim, we place the monitoring device both on the horse saddle and the rider's wrist. The results show a high accuracy in both scenarios, which allows a seamless and unobtrusive use of our wearable device application by the rider. In addition, we study the effects of sliding window size and sampling frequency, providing useful insights for future research in horse gaits recognition.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"2507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131284371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning 克服标记数据的缺乏:利用迁移学习训练入侵检测模型
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00031
Ankush Singla, E. Bertino, D. Verma
{"title":"Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning","authors":"Ankush Singla, E. Bertino, D. Verma","doi":"10.1109/SMARTCOMP.2019.00031","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00031","url":null,"abstract":"Deep learning (DL) techniques have recently been proposed for enhancing the accuracy of network intrusion detection systems (NIDS). However, keeping the DL based detection models up to date requires large amounts of new labeled training data which is often expensive and time-consuming to collect. In this paper, we investigate the viability of transfer learning (TL), an approach that enables transferring learned features and knowledge from a trained source model to a target model with minimal new training data. We compare the performance of a NIDS model trained using TL with a NIDS model trained from scratch. We show that TL enables detection models to perform much better at identifying new attacks when there is relatively less training data available.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"1341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116338809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Unauthorized Parking Detection using Deep Networks at Real Time 使用深度网络实时检测未经授权的停车
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00088
Weiling Chen, C. Yeo
{"title":"Unauthorized Parking Detection using Deep Networks at Real Time","authors":"Weiling Chen, C. Yeo","doi":"10.1109/SMARTCOMP.2019.00088","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00088","url":null,"abstract":"Although many public areas have installed CCTV to help monitor the traffic conditions, manually inspecting these videos to recognize unauthorized parking behaviors is extremely tedious and inefficient. In this paper, we propose a framework for automatic detection of illegally parked vehicle. The framework comprises two major components, namely object detection and movement tracking. To be more specific, we adopt one of the most prevalent object detection algorithm YOLO (v3) to detect vehicles and template matching methods using normalized cross correlation for movement tracking. Experiments show that the proposed method can achieve a very high accuracy and is robust to different camera angles, weather conditions and illuminations of the video.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122588411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Apis: Architecture for Federated Power Management api:联邦电源管理的体系结构
2019 IEEE International Conference on Smart Computing (SMARTCOMP) Pub Date : 2019-06-12 DOI: 10.1109/SMARTCOMP.2019.00046
Adam Prey, Jiannan Zhai, Chancey Kelley, J. Hallstrom
{"title":"Apis: Architecture for Federated Power Management","authors":"Adam Prey, Jiannan Zhai, Chancey Kelley, J. Hallstrom","doi":"10.1109/SMARTCOMP.2019.00046","DOIUrl":"https://doi.org/10.1109/SMARTCOMP.2019.00046","url":null,"abstract":"Internet of Things (IoT) devices have been limited in application by constraints posed by batteries. Batteries add size, weight, and upkeep costs, and limit the lifetime of devices preferred to be small, lightweight, and long-lasting. We present Apis, a software and hardware toolkit for federated power management in energy harvesting applications. By replacing batteries with rapid charging storage capacitors, circuitry to control federated energy storage, and software support to make this architecture accessible to developers, embedded devices can potentially run indefinitely with limited maintenance. We present the Apis hardware for controlling federated energy storage, supporting software, and experiments performed to validate the Apis model.","PeriodicalId":253364,"journal":{"name":"2019 IEEE International Conference on Smart Computing (SMARTCOMP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121321067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信