Javier Hernandez Fernandez, A. Omri, Roberto Di Pietro
{"title":"Performance Analysis of Physical Layer Security in Power Line Communication Networks","authors":"Javier Hernandez Fernandez, A. Omri, Roberto Di Pietro","doi":"10.1109/ISCC58397.2023.10217916","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217916","url":null,"abstract":"Due to the broadcast nature of power line communication (PLC) channels, confidential information exchanged on the power grid is prone to malicious exploitation by any PLC device connected to the same power grid. To combat the ever-growing security threats, physical layer security (PLS) has been proposed as a viable safeguard or complement to existing security mechanisms. In this paper, the security analysis of a typical PLC adversary system model is investigated. In particular, we derive the expressions of the corresponding average secrecy capacity (ASC) and the secrecy outage probability (SOP) of the considered PLC system. In addition, numerical results are presented to validate the obtained analytical expressions and to assess the relevant PLS performances. The results show significant impacts of the transmission distances and the used carrier frequency on the overall transmission security.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Face Detection Improvement using Subclass Learning and Low Variance Directions","authors":"Soumaya Nheri","doi":"10.1109/ISCC58397.2023.10217858","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217858","url":null,"abstract":"In order to increase the face detection rate in complicated images, a novel approach is presented in this work. The suggested method seeks to improve accuracy by utilizing low-variance directions for data projection and one-class subclass learning. Previous studies have demonstrated that taking into account the data carried by low-variance directions enhances the performance of models in one-class classification. For dispersion data, subclass learning is extremely successful. To evaluate the effectiveness of our subclass method, we conducted a comparison between our proposed approach and other one-class classifiers on multiple face detection datasets. Results reveal that the suggested method performs better than other methods, demonstrating its potential to develop face identification technologies.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Achraf Othman, Ahmed Elsheikh, Amnah Mohammed Al-Mutawaa
{"title":"Internet of Things (IoT) for Elderly's Healthcare and Wellbeing: Applications, Prospects and Challenges","authors":"Achraf Othman, Ahmed Elsheikh, Amnah Mohammed Al-Mutawaa","doi":"10.1109/ISCC58397.2023.10218131","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218131","url":null,"abstract":"The Internet of Things (IoT) is an ever-evolving ecosystem that enables interactions between humans and interconnected objects, including healthcare domains. IoT addresses the lack of access to medical resources, the growing elderly population with chronic conditions, and the rising medical costs. This research analyzes 20 review articles on IoT applications for the well-being and healthcare of the elderly population. IoT can significantly improve well-being and healthcare through remote monitoring, communication, automating tasks, and access to various services and information. However, several limitations and challenges must be considered when employing IoT for the elderly's well-being and healthcare.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-End Deep Learning assisted by Reconfigurable Intelligent Surface for uplink MU massive MIMO under PA Non-Linearities","authors":"A. Arfaoui, Maha Cherif, R. Bouallègue","doi":"10.1109/ISCC58397.2023.10217870","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217870","url":null,"abstract":"This paper investigates a novel high-performance autoencoder based deep learning approach for Multi-User massive MIMO uplink systems assisted by a Reconfigurable Intelligent Surface (RIS) in which the users are equipped by Power Amplifiers (PA) and aim to communicate with the base station. Indeed, the communication process is formulated in the form of a Deep Neuronal Network (DNN). To handle these scenarios, we have designed a DNN network that includes two components. the first is an encoder intended to process the nonlinear distortions of the PA. The second is a decoder consisting of two fundamental steps. 1) A classic Minimum Mean Square Error linear decoder to decode the information transmitted by the users. 2) The neural network decoder to minimize interference. The results of the numerical simulation illustrate that the proposed method offers a significant improvement in error performance in comparison with the different basic schemes.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of Convolutional Neural Network Depth on the Efficacy of Automated Breast Cancer Screening Systems","authors":"Vineela Nalla, Seyedamin Pouriyeh, R. Parizi, Inchan Hwang, Beatrice Brown-Mulry, Linglin Zhang, Minjae Woo","doi":"10.1109/ISCC58397.2023.10217947","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217947","url":null,"abstract":"Breast cancer is a global health concern for women. The detection of breast cancer in its early stages is crucial, and screening mammography serves as a vital leading-edge tool for achieving this goal. In this study, we explored the effectiveness of Resnet 50v2 and Resnet 152v2 deep learning models for classifying mammograms using EMBED datasets for the first time. We preprocessed the datasets and utilized various techniques to enhance the performance of the models. Our results suggest that the choice of model architecture depends on the dataset used, with ResNet152 outperforming ResNet50 in terms of recall score. These findings have implications for cancer screening, where recall is an important metric. Our research highlights the potential of deep learning to improve breast cancer classification and underscores the importance of selecting the appropriate model architecture.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127331970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers","authors":"Aozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan, Jingqiang Lin, Wei Wang","doi":"10.1109/ISCC58397.2023.10217862","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217862","url":null,"abstract":"Certificate Transparency (CT) enables timely detection of problematic certification authorities (CAs) by publicly recording all CA-issued certificates. This transparency inevitably leaks the privacy of identity owners (IdOs) through the identity information bound in certificates. In response to the privacy leakage, several privacy-preserving schemes have been proposed that transform/hash/encrypt the privacy-carrying part in certificates. However, these certificates conceal identity while also making it opaque to the IdO, which defeats the purpose of CT. To address the contradiction between transparency and privacy, we propose Semi-CT, a semi-transparency mechanism that makes the certificates transparent to IdOs but opaque to snoopers. Inspired by public-key encryption with keyword search (PEKS), Semi-CT based on bilinear pairing enables trapdoor-holding IdOs to retrieve certificates associated with their identity. Semi-CT also addresses protocol deviation detection and trapdoor protection in the malicious model. Finally, through theoretical and experimental analysis, we prove the security and feasibility of Semi-CT for practical applications.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132602934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demo: Implementation of a Train-Arrival Notification System","authors":"Aida Eduard, Dnislam Urazayev, Yermakhan Magzym, Dimitrios Zorbas","doi":"10.1109/ISCC58397.2023.10217940","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217940","url":null,"abstract":"A train-arrival notification system's goal is to keep safe the personnel working on remotely located railroad when a train is approaching. This demo paper provides technical insights of the open hardware and software developments of this system which scientific merit is presented in [1]. Its main components, circuitry and design are discussed with a main focus on the radio communication parts.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method","authors":"Yanfei Hu, Shuailou Li, Boyang Zhang, Xu Cheng, Yu Wen","doi":"10.1109/ISCC58397.2023.10218007","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218007","url":null,"abstract":"Hardware performance counter (HPC) has been widely used in malware detection because of its low access overhead and the ability of revealing dynamic behavior during program's execution. However, HPC based malware detection (HMD) suffers from performance decline due to HPC's non- determinism caused by resource competition. Current work enables malware detection under resource competition but still leaves misclassifications. In this paper, we propose HUND, a framework for improving the detection ability of HMD models under resource competition. To this end, we first introduce an explanation module to make the program's prediction interpretable and accurate on the whole. We then design a rectification module for troubleshooting HMDMs' errors by generating modified samples and lowering the effects of false classified instances on model decision. We evaluate HUND by performing HMD models two datasets of HPC-level behaviors. The experimental results show HUND explains HMDMs with high fidelity and HUND's effectiveness in troubleshooting the errors of HMDMs.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Of Optimized Cluster Based PBFT Blockchain Validation Process","authors":"Rabeb Ben Othmen, Wassim Abbessi, Sofiane Ouni, Wafa Badreddine, Gilles Dequen","doi":"10.1109/ISCC58397.2023.10218119","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218119","url":null,"abstract":"Recently, blockchain technology has emerged as a revolutionary innovation with its distributed ledger feature that allows applications to store and transmit data in a secure, transparent, and immutable manner. One of the main ideas of blockchain technology is the consensus mechanism for reaching an agreement on the state of the distributed ledger. In this context, Practical Byzantine Fault Tolerance (PBFT) is one of the most popular algorithms. However, it has a high communication overhead and poor scalability. To overcome these limits, this paper presents the effectiveness of our algorithm Random Cluster PBFT (RC-PBFT) through an evaluation of its performance under various network conditions. Our algorithm runs on randomly selected clusters, and the results are then broadcast on the blockchain network. The effectiveness of RC-PBFT is demonstrated by implementations on the NS-3 network simulator, and the tests performed show that our approach achieves significant improvements compared to the original PBFT algorithm.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk","authors":"Yuqi Qiu, Baiyang Li, Zhiqian Li, Liang Jiao, Yujia Zhu, Qingyun Liu","doi":"10.1109/ISCC58397.2023.10217976","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217976","url":null,"abstract":"As an encryption protocol for DNS queries, DNS-over-HTTPS (DoH) is becoming increasingly popular, and it mainly addresses the last-mile privacy protection problem. However, the security of DoH is in urgent need of measurement and analysis due to its reliance on certificates and upstream servers. In this paper, we focus on the DoH ecosystem and conduct a one-month measurement to analyze the current deployment of DoH resolvers. Our findings indicate that some of these resolvers use invalid certificates, which can compromise the security and privacy advantages of the protocol. Furthermore, we found that many providers are at risk of certificate outages, which could cause significant disruptions to the DoH ecosystem. Additionally, we observed that the centralization of DoH resolvers and upstream DNS servers is a potential issue that needs addressing to ensure the stability of the ecosystem.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131979710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}