{"title":"Deep learning approach for Tunisian hate Speech detection on Facebook","authors":"Mariem Abbes, Zied Kechaou, A. Alimi","doi":"10.1109/ISCC58397.2023.10217909","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217909","url":null,"abstract":"We have witnessed a sharp increase in violence in Tunisia over the past few years. Violence affecting households, minorities, political parties, and public figures has increased more widely on social media. As a result, it has become easier for extremist, racist, misogynistic, and offensive articles, posts, and comments to be shared. Today, various international and governmental groups vowed to fight internet hate speech. This paper proposes a deep-learning solution to find hateful and offensive speech on Arabic social media sites like Facebook. We introduce two models: a Bi-LSTM based on an attention mechanism with integrating the BERT for Facebook comment classification toward hate speech detection. For this task, we collected 2k Tunisian dialect comments from Facebook. The proposed approach has been evaluated on three datasets, and the obtained results demonstrate that the proposed models can improve Arabic hate detection with an accuracy of 98.89%.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125930056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liang Jiao, Yujia Zhu, Xingyu Fu, Yi Zhou, Fenglin Qin, Qingyun Liu
{"title":"CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6","authors":"Liang Jiao, Yujia Zhu, Xingyu Fu, Yi Zhou, Fenglin Qin, Qingyun Liu","doi":"10.1109/ISCC58397.2023.10218057","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218057","url":null,"abstract":"In this paper, we first show DNS-over-HTTPS (DoH) tunneling detection methods verified to be effective over IPv4 can be applied to IPv6, and then propose a new model called CCSv6, using attention-based convolution neural network to build classifiers with flow-based features to detect DoH tunneling over IPv6, achieve 99.99% accuracy on the IPv6 dataset. In addition, we discuss the influence of various factors such as locations or DoH resolvers on the detection results in detail over IPv6. All the more important, our model shows better transfer learning ability, which can achieve the F1-score of 96% when trained on the IPv6 dataset and tested on the IPv4 dataset.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125996846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient Wireless Mesh Networks with IEEE 802.11ba: A New Architecture","authors":"R. Vital, Carles Gomez, E. G. Villegas","doi":"10.1109/ISCC58397.2023.10218013","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218013","url":null,"abstract":"In traditional IoT applications, energy saving is crucial, whereas the demand for high bandwidth is not frequent. Nonetheless, a new generation of IoT applications show a wider and varying range of requirements, where bandwidth or delay become key performance indicators to consider, which can be satisfied by technologies like Wi-Fi. However, Wi-Fi does not provide a long link range, and it exhibits a high energy consumption. To solve these issues, we propose a Wi-Fi mesh architecture where devices are equipped with a secondary, Wake-up Radio (WuR) interface, based on the new IEEE 802.11ba amendment. A WuR allows the main radio to remain in a power-saving state for long periods. Simulation results demonstrate that this architecture drastically reduces energy consumption, while keeping delay figures similar to those of traditional, single-interface approaches. To our best knowledge, this work pioneers the exploration of WuR's practicality in optimizing energy consumption in Wi-Fi-based mesh networks.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128220915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Reinforcement Learning-Based SFC Deployment Scheme for 6G IoT Scenario","authors":"Shuting Long, Bei Liu, Hui Gao, Xin Su, Xibin Xu","doi":"10.1109/ISCC58397.2023.10218207","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218207","url":null,"abstract":"To meet the extremely low latency requirements of 6G Internet of Things (IoT) services, 6G network should be able to intelligently allocate the network resources. Based on Mobile edge computing (MEC) and network function virtualization (NFV), the 6G NFV/MEC-enabled IoT architecture will be a viable architecture to enable flexible and efficient resource allocation. The architecture will enable the deployment of service function chains (SFCs) in NFV-enabled network edge nodes. However, due to the heterogeneous and dynamic nature of 6G IoT, it is a challenge to deploy SFCs rationally. Therefore, this paper proposes a knowledge-assisted deep reinforcement learning (KADRL) based SFC deployment scheme. The scheme achieves flexible and efficient resource allocation by deploying SFCs at appropriate edge nodes for the requirements of 6G IoT services. Simulation results demonstrate that KADRL can achieve better convergence performance and can meet the requirements of delay-sensitive IoT services.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laura Rodrigues Soares, J. Nobre, Gabriel Kerschner
{"title":"Design of a Blockchain-Based Secure Storage Architecture for Resource-Constrained Healthcare","authors":"Laura Rodrigues Soares, J. Nobre, Gabriel Kerschner","doi":"10.1109/ISCC58397.2023.10218178","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218178","url":null,"abstract":"The Internet of Things (IoT) paradigm can improve a broad range of applications, such as medical sensors, smart cities, industrial monitoring, and so on. In healthcare specifically, these devices can aid in management tasks and improve the quality of life of patients in intensive care. However, securing medical IoT devices and its data is a crucial task. Not only do they handle Electronic Medical Records (EMR) and physiological information, but in some cases, disruption can affect a patient's treatment. Blockchain technologies applied in the healthcare context can provide privacy, immutability, decentralization, and easier access and sharing of medical data. Despite the emergence of applications aiming to solve security issues in the Healthcare IoT (HIoT) scenario using blockchain, there is still much to be addressed, mainly regarding throughput, storage of data, and efficient use of resources. This work proposes a blockchain-based storage architecture for HIoT, using a private network and distributed data storage to achieve integrity, accountability, and availability of medical data.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130717978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Long Dai, Jiarong Mao, Liao Xu, Xuefeng Fan, Xiaoyi Zhou
{"title":"Balancing Robustness and Covertness in NLP Model Watermarking: A Multi-Task Learning Approach","authors":"Long Dai, Jiarong Mao, Liao Xu, Xuefeng Fan, Xiaoyi Zhou","doi":"10.1109/ISCC58397.2023.10218209","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218209","url":null,"abstract":"The popularity of ChatGPT demonstrates the immense commercial value of natural language processing (NLP) technology. However, NLP models are vulnerable to piracy and redistribution, which harms the economic interests of model owners. Existing NLP model watermarking schemes struggle to balance robustness and covertness. Robust watermarking require embedding more information, which compromises their covertness; conversely, covert watermarking are challenging to embed more information, which affects their robustness. This paper proposes an NLP model watermarking framework that uses multi-task learning to address the conflict between robustness and covertness in existing schemes. Specifically, a covert trigger set is established to implement remote verification of the watermark model, and a covert auxiliary network is designed to enhance the watermark model's robustness. The proposed watermarking framework is evaluated on two benchmark datasets and three mainstream NLP models. The experiments validate the frame-work's excellent covertness, robustness, and low false positive rate.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123169608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Gain and Compact Microstrip Patch Antenna Array Design for 26 GHz Broadband Wireless Systems","authors":"Sirine Ghenjeti, R. Barrak, S. Hamouda","doi":"10.1109/ISCC58397.2023.10218290","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218290","url":null,"abstract":"Millimeter waves pave the way to new mobile network domains due to their expected very high speed. Several applications such as Vehicle-to-anything (V2X) will benefit from using millimeter bands to offer very high transmission rates with low latency. However, given the high attenuation of millimeter waves in free space, special attention should be paid to antenna design to allow high gain and wide bandwidth with a compact and integrable antenna structure. This paper presents a new $4times 8$ microstrip patch array antenna operating in 26 GHz band. The proposed antenna is designed on a Rogers Duroid RT5880 substrate with a dielectric constant of 2.2 and a height of 0.508mm. The simulations are conducted with HFSS CAD tool. The antenna simulation results show good performances with a bandwidth of 1.1 GHz, a gain of 21.26 dBi and a compact size of $110times 80$ mm2, which are very promising for 5G V2X communications.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126586846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinyu Yuan, Yan Qiao, Pei Zhao, Rongyao Hu, Benchu Zhang
{"title":"Traffic Matrix Estimation based on Denoising Diffusion Probabilistic Model","authors":"Xinyu Yuan, Yan Qiao, Pei Zhao, Rongyao Hu, Benchu Zhang","doi":"10.1109/ISCC58397.2023.10218016","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218016","url":null,"abstract":"The traffic matrix estimation (TME) problem has been widely researched for decades of years. Recent progresses in deep generative models offer new opportunities to tackle TME problems in a more advanced way. In this paper, we leverage the powerful ability of denoising diffusion probabilistic models (DDPMs) on distribution learning, and for the first time adopt DDPM to address the TME problem. To ensure a good performance of DDPM on learning the distributions of TMs, we design a preprocessing module to reduce the dimensions of TMs while keeping the data variety of each OD flow. To improve the estimation accuracy, we parameterize the noise factors in DDPM and transform the TME problem into a gradient-descent optimization problem. Finally, we compared our method with the state-of-the-art TME methods using two real-world TM datasets, the experimental results strongly demonstrate the superiority of our method on both TM synthesis and TM estimation.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Borsatti, W. Cerroni, L. Foschini, G. Grabarnik, Filippo Poltronieri, Domenico Scotece, L. Shwartz, C. Stefanelli, M. Tortonesi, Mattia Zaccarini
{"title":"Modeling Digital Twins of Kubernetes-Based Applications","authors":"D. Borsatti, W. Cerroni, L. Foschini, G. Grabarnik, Filippo Poltronieri, Domenico Scotece, L. Shwartz, C. Stefanelli, M. Tortonesi, Mattia Zaccarini","doi":"10.1109/ISCC58397.2023.10217853","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217853","url":null,"abstract":"Kubernetes provides several functions that can help service providers to deal with the management of complex container-based applications. However, most of these functions need a time-consuming and costly customization process to address service-specific requirements. The adoption of Digital Twin (DT) solutions can ease the configuration process by enabling the evaluation of multiple configurations and custom policies by means of simulation-based what-if scenario analysis. To facilitate this process, this paper proposes KubeTwin, a framework to enable the definition and evaluation of DTs of Kubernetes applications. Specifically, this work presents an innovative simulation-based inference approach to define accurate DT models for a Kubernetes environment. We experimentally validate the proposed solution by implementing a DT model of an image recognition application that we tested under different conditions to verify the accuracy of the DT model. The soundness of these results demonstrates the validity of the KubeTwin approach and calls for further investigation.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent Deep Reinforcement Learning Based Computation Offloading Approach for LEO Satellite Broadband Networks","authors":"Junyu Lai, Huashuo Liu, Yusong Sun, Junhong Zhu, Wanyi Ma, Lianqiang Gan","doi":"10.1109/ISCC58397.2023.10218146","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218146","url":null,"abstract":"Conventional computation offloading approaches are originally designed for ground networks, and are not effective for low earth orbit (LEO) satellite networks. This paper proposes a multi-agent deep reinforcement learning (MADRL) algorithm for making multi-level offloading decisions in LEO satellite networks. Offloading is formulated as a partially observable Markov decision process based multi-agent decision problem. Each satellite as an agent either conducts a received task, forwards it to neighbors, or sends it to ground clouds based on its own policy. These agents are independent and their deep neural networks to make offloading decisions share identical parameter values and are trained by using the same replay buffer. A centralized training and distributed executing mechanism is adopted to ensure that agents can make globally optimized offloading decisions. Comparative experiments demonstrate that the proposed MADRL algorithm outperforms the five baselines in terms of task processing delay and bandwidth consumption with acceptable computational complexity.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"59 1","pages":"1435-1440"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139361278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}