2020 54th Annual Conference on Information Sciences and Systems (CISS)最新文献

筛选
英文 中文
Statistical Delay/Error-Rate Bounded QoS Provisioning Across Clustered MmWave-Channels Over Cell-Free Massive MIMO Based 5G Mobile Wireless Networks in the Finite Blocklength Regime 有限块长度下基于无蜂窝大规模MIMO的5G移动无线网络上集群毫米波信道的统计延迟/错误率有界QoS提供
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570617109
Xi Zhang, Jingqing Wang, H. V. Poor
{"title":"Statistical Delay/Error-Rate Bounded QoS Provisioning Across Clustered MmWave-Channels Over Cell-Free Massive MIMO Based 5G Mobile Wireless Networks in the Finite Blocklength Regime","authors":"Xi Zhang, Jingqing Wang, H. V. Poor","doi":"10.1109/CISS48834.2020.1570617109","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570617109","url":null,"abstract":"To support ultra-reliable low-latency communications (URLLC) for time-sensitive multimedia 5G wireless services, several advanced techniques, including statistical delay-bounded quality-of-service (QoS) provisioning and finite blocklength coding (FBC), have been developed to upper-bound both delay and error- rate. On the other hand, millimeter wave (mmWave) cell-free (CF) massive multi-input multi-output (m-MIMO) techniques, where a large number of distributed access points (APs) jointly serve all users at millimeter wave frequencies using the same time- frequency resources, has emerged as one of the key promising candidate techniques to significantly improve QoS performance in 5G networks. Leveraging the sparse scattering characteristics of mmWave wireless channels, the arrival traffic can be partitioned into parallel substreams using scattering-clusters based mmWave wireless channel model to reduce queuing delay. However, due to the complexity of analyzing queueing dynamics across clustered mmWave wireless channels for CF m-MIMO schemes, it is challenging to statistically guarantee QoS performance in terms of upper-bounding delay and error-rate. To overcome the above- mentioned problems, in this paper we propose a novel analytical model to quantitatively characterize stochastic QoS performance of delay and error-rate across clustered mmWave channels for CF m-MIMO schemes. In particular, we develop CF m-MIMO system models across clustered mmWave wireless channels. We also apply the Mellin transform to derive an upper bound on the delay violation probability using the spatial multiplexing queue model. Our simulation results validate and evaluate our proposed FBC based mmWave CF m-MIMO schemes under statistical delay/error-rate bounded QoS constraints.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine Sensors 拜占庭传感器存在下的降秩最小二乘参数估计
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570610804
G. NaganandaK., Rick S. Blum, Alec Koppel
{"title":"Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine Sensors","authors":"G. NaganandaK., Rick S. Blum, Alec Koppel","doi":"10.1109/CISS48834.2020.1570610804","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570610804","url":null,"abstract":"In this paper, we study the impact of the presence of byzantine sensors on the reduced-rank linear least squares (LS) estimator. A sensor network with N sensors makes observations of the physical phenomenon and transmits them to a fusion center which computes the LS estimate of the parameter of interest. It is well-known that rank reduction exploits the bias-variance tradeoff in the full-rank estimator by putting higher priority on highly informative content of the data. The low-rank LS estimator is constructed using this highly informative content, while the remaining data can be discarded without affecting the overall performance of the estimator. We consider the scenario where a fraction 0 < α < 1 of the N sensors are subject to data falsification attack from byzantine sensors, wherein an intruder injects a higher noise power (compared to the unattacked sensors) to the measurements of the attacked sensors.Our main contribution is an analytical characterization of the impact of data falsification attack of the above type on the performance of reduced-rank LS estimator. In particular, we show how optimally prioritizing the highly informative content of the data gets affected in the presence of attacks. A surprising result is that, under sensor attacks, when the elements of the data matrix are all positive the error performance of the low- rank estimator experiences a phenomenon wherein the estimate of the mean-squared error comprises negative components. A complex nonlinear programming-based recipe is known to exist that resolves this undesirable effect; however, the phenomenon is oftentimes considered very objectionable in the statistical literature. On the other hand, to our advantage this effect can serve to detect cyber attacks on sensor systems. Numerical results are presented to complement the theoretical findings of the paper.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123861928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity of Inference in Vehicular Ad-hoc Networks : Invited Presentation 车辆自组织网络中的推理网络安全:特邀报告
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570627364
Zisheng Wang, Rick S. Blum
{"title":"Cybersecurity of Inference in Vehicular Ad-hoc Networks : Invited Presentation","authors":"Zisheng Wang, Rick S. Blum","doi":"10.1109/CISS48834.2020.1570627364","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570627364","url":null,"abstract":"In recent years, there has been a surge in research and development efforts on vehicular ad-hoc networks (VANETs) with the objective to make driving safer. VANETS that share sensor data can provide tremendous improvements in this respect. Unfortunately, such VANETs are known for numerous security concerns and are vulnerable to cyber-attacks. In this paper we focus on studying cyber physical attacks on VANETs which share sensor data among vehicles to track important objects, an important emerging topic that has received little attention. We develop an appropriate VANET system model along with attack detection methods that can find any attack that impacts tracking of important objects like other vehicles or pedestrians regardless of how the attack is launched. This includes attacks modifying hardware, software, sensor data, communications or anything else. We have not seen any similar work. We illustrate these ideas with numerical results for a specific efficient distributed tracking algorithm. We describe a attack detection algorithm and numerically investigate the performance.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Belief Propagation Pattern-Coupled Sparse Bayesian Learning for Non-Stationary Uplink Channel Estimation Over Massive-MIMO Based 5G Mobile Wireless Networks 基于大规模mimo的5G移动无线网络非平稳上行信道估计的信念传播模式耦合稀疏贝叶斯学习
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570617107
Jianqiao Chen, Xi Zhang
{"title":"Belief Propagation Pattern-Coupled Sparse Bayesian Learning for Non-Stationary Uplink Channel Estimation Over Massive-MIMO Based 5G Mobile Wireless Networks","authors":"Jianqiao Chen, Xi Zhang","doi":"10.1109/CISS48834.2020.1570617107","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570617107","url":null,"abstract":"In this paper, we develop a novel sparse Bayesian learning (SBL) scheme for recovery of block-sparse uplink channels in time-division duplex (TDD) massive multi-input multi-output (MIMO) based 5G mobile wireless networks. We first introduce a pattern-coupled hierarchical Gaussian prior to characterize the sparse channel dependency among neighboring antennas, where the dependency coefficient is modeled by birth- death process. Then, to derive hyperparameters, which are employed to control the sparsity of channel coefficients, we exploit an expectation-maximization (EM) formulation to iteratively maximize a lower bound on the posterior probability. In the M-step, the particle swarm optimization (PSO) algorithm is employed to maximize the lower bound efficiently. Finally, we develop a belief propagation (BP)-based pattern-coupled sparse Bayesian learning (PC-SBL) algorithm, referred to as the BP-PC-SBL, to recover block-sparse uplink channels. Based on the factor graph of blocksparse uplink channels, we show that messages in BP satisfy complex Gaussian probability distribution. Therefore, we only need to update their means and variances when updating the messages. BP-PC-SBL algorithm provides precise approximations of matrix inversion as computed by the conventional SBL algorithm, which results in significantly improved computational efficiency. Our numerical analyses validate and evaluate the effectiveness of our proposed schemes and algorithms.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"34 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113933825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Mismatched Detection and Safe, Trustworthy Machine Learning 关于不匹配检测和安全、可信的机器学习
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570627767
Kush R. Varshney
{"title":"On Mismatched Detection and Safe, Trustworthy Machine Learning","authors":"Kush R. Varshney","doi":"10.1109/CISS48834.2020.1570627767","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570627767","url":null,"abstract":"Instilling trust in high-stakes applications of machine learning is becoming essential. Trust may be decomposed into four dimensions: basic accuracy, reliability, human interaction, and aligned purpose. The first two of these also constitute the properties of safe machine learning systems. The second dimension, reliability, is mainly concerned with being robust to epistemic uncertainty and model mismatch. It arises in the machine learning paradigms of distribution shift, data poisoning attacks, and algorithmic fairness. All of these problems can be abstractly modeled using the theory of mismatched hypothesis testing from statistical signal processing. By doing so, we can take advantage of performance characterizations in that literature to better understand the various machine learning issues.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132348748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Learning Parallel Markov Chains over Unreliable Wireless Channels 在不可靠无线信道上学习平行马尔可夫链
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570614323
Weichang Wang, Lei Ying
{"title":"Learning Parallel Markov Chains over Unreliable Wireless Channels","authors":"Weichang Wang, Lei Ying","doi":"10.1109/CISS48834.2020.1570614323","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570614323","url":null,"abstract":"This paper studies the problem of communications between aircraft and a control tower for aviation risk monitoring over wireless channels. The control tower needs to monitor the state of each aircraft in real time by receiving reports from the aircraft. Due to limited bandwidth, only a subset of aircraft can communicate with the control tower at the same time. This paper focuses on the problem of optimal scheduling of data transmissions to minimize the risk. We formulate the problem as learning states of parallel Markov chains where each Markov chain represents an aircraft, and the objective is to minimize the information entropy of all the aircraft. We propose an algorithm based on Whittle’s index and study the indexability of the problem for both single-state wireless channels and multi-state wireless channels. Our numerical evaluations show that our algorithm improves the accuracy of the estimations compared with the heuristic scheduling methods such as greedy and Round& Robin.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Learning based Affective Sensing with Remote Photoplethysmography 基于深度学习的情感感知与远程光容积脉搏波
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570617362
Timur Luguev, Dominik Seuss, Jens-Uwe Garbas
{"title":"Deep Learning based Affective Sensing with Remote Photoplethysmography","authors":"Timur Luguev, Dominik Seuss, Jens-Uwe Garbas","doi":"10.1109/CISS48834.2020.1570617362","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570617362","url":null,"abstract":"Recent studies show that heart rate variability (HRV) is an important physiological characteristic that reflects physiological and affective states of a person. Advancements in the field of remote camera-based photoplethysmography has made possible measurement of cardiac signals using just the raw face videos. Most of existing studies of camera-based cardiovascular monitoring focus on just heart rate (HR) estimation, leaving more interesting case of remote HRV estimation out of scope. However, knowing only the average HR is not enough for affective sensing applications, and measurement of HRV is beneficial. We propose a new framework, which uses deep spatiotemporal networks for contactless HRV measurements from raw facial videos. The proposed framework employs data augmentation technique. It was evaluated on two multimodal databases that consists face videos with synchronized physiological signals. Experiments demonstrate the advantage of our deep learning based approach for HRV estimation. We also achieved promising results for inclusion remote HRV estimation in affective sensing applications.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
CISS 2020 TOC
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/ciss48834.2020.9086271
{"title":"CISS 2020 TOC","authors":"","doi":"10.1109/ciss48834.2020.9086271","DOIUrl":"https://doi.org/10.1109/ciss48834.2020.9086271","url":null,"abstract":"","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Multiple Change-Point Detection with Limited Communication 有限通信条件下的确定性多变化点检测
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570627514
Eyal Nitzan, Topi Halme, H. Poor, V. Koivunen
{"title":"Deterministic Multiple Change-Point Detection with Limited Communication","authors":"Eyal Nitzan, Topi Halme, H. Poor, V. Koivunen","doi":"10.1109/CISS48834.2020.1570627514","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570627514","url":null,"abstract":"Large-scale sensor networks are used in modern applications to perform statistical inference. In particular, multiple change-point detection using a sensor network is of interest in applications, such as Internet of Things and environmental monitoring. In this paper, we consider deterministic multiple change-point detection using a sensor network, in which each sensor observes a different data stream and communicates with a fusion center (FC). Due to communication limitations, the fusion center monitors only a subset of the sensors at each time slot. We propose a detection procedure that takes into account these limitations. In this procedure, the FC monitors the sensors with the highest cumulative sum values under the communication limitations. It is shown that the proposed procedure is scalable in the sense that it attains an average detection delay (ADD) that does not increase with the number of sensors, while controlling the false discovery rate. Using the proposed procedure, we identify and analyze the tradeoff between reducing the ADD and reducing the average number of observations drawn until the change-points are declared.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised Learning 基于变分自编码器和监督学习的文本恶意域名检测
2020 54th Annual Conference on Information Sciences and Systems (CISS) Pub Date : 2020-03-01 DOI: 10.1109/CISS48834.2020.1570601577
Yuwei Sun, Ng S. T. Chong, H. Ochiai
{"title":"Text-based Malicious Domain Names Detection Based on Variational Autoencoder And Supervised Learning","authors":"Yuwei Sun, Ng S. T. Chong, H. Ochiai","doi":"10.1109/CISS48834.2020.1570601577","DOIUrl":"https://doi.org/10.1109/CISS48834.2020.1570601577","url":null,"abstract":"With the rapid development of information technology, adaptation of an information system in industries and institutes has become more and more common. However, attacks like using zombie networks to access a host thus causing it to shut down are frequent in recent years. Domain names play a significant role in the connection with a server, considered as a key for detecting these attacks. In this paper, we propose a text-based method to convert domain names into numeric features, based on the term frequency and inverse document frequency (TF-IDF). Then we adopt the variational autoencoder (VAE) consisting of an encoder and a decoder, extracting hidden information from features. Moreover, through collapsing the Gaussian distribution of these features at the hidden layer to its mean, the distribution of domain names is visualized. After that, we adopt a supervised learning called Convolutional Neural Network (CNN) for the classification between the malicious and benign. We train the model using feature vectors from the VAE. At last, the scheme achieves a validation accuracy of 0.868 for the malicious domain names detection.","PeriodicalId":256370,"journal":{"name":"2020 54th Annual Conference on Information Sciences and Systems (CISS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书