2023 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
Performance Analysis of Physical Layer Security in Power Line Communication Networks 电力线通信网络物理层安全性能分析
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217916
Javier Hernandez Fernandez, A. Omri, Roberto Di Pietro
{"title":"Performance Analysis of Physical Layer Security in Power Line Communication Networks","authors":"Javier Hernandez Fernandez, A. Omri, Roberto Di Pietro","doi":"10.1109/ISCC58397.2023.10217916","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217916","url":null,"abstract":"Due to the broadcast nature of power line communication (PLC) channels, confidential information exchanged on the power grid is prone to malicious exploitation by any PLC device connected to the same power grid. To combat the ever-growing security threats, physical layer security (PLS) has been proposed as a viable safeguard or complement to existing security mechanisms. In this paper, the security analysis of a typical PLC adversary system model is investigated. In particular, we derive the expressions of the corresponding average secrecy capacity (ASC) and the secrecy outage probability (SOP) of the considered PLC system. In addition, numerical results are presented to validate the obtained analytical expressions and to assess the relevant PLS performances. The results show significant impacts of the transmission distances and the used carrier frequency on the overall transmission security.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Face Detection Improvement using Subclass Learning and Low Variance Directions 基于子类学习和低方差方向的人脸检测改进
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217858
Soumaya Nheri
{"title":"Human Face Detection Improvement using Subclass Learning and Low Variance Directions","authors":"Soumaya Nheri","doi":"10.1109/ISCC58397.2023.10217858","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217858","url":null,"abstract":"In order to increase the face detection rate in complicated images, a novel approach is presented in this work. The suggested method seeks to improve accuracy by utilizing low-variance directions for data projection and one-class subclass learning. Previous studies have demonstrated that taking into account the data carried by low-variance directions enhances the performance of models in one-class classification. For dispersion data, subclass learning is extremely successful. To evaluate the effectiveness of our subclass method, we conducted a comparison between our proposed approach and other one-class classifiers on multiple face detection datasets. Results reveal that the suggested method performs better than other methods, demonstrating its potential to develop face identification technologies.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things (IoT) for Elderly's Healthcare and Wellbeing: Applications, Prospects and Challenges 物联网(IoT)用于老年人的医疗保健和福祉:应用、前景和挑战
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218131
Achraf Othman, Ahmed Elsheikh, Amnah Mohammed Al-Mutawaa
{"title":"Internet of Things (IoT) for Elderly's Healthcare and Wellbeing: Applications, Prospects and Challenges","authors":"Achraf Othman, Ahmed Elsheikh, Amnah Mohammed Al-Mutawaa","doi":"10.1109/ISCC58397.2023.10218131","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218131","url":null,"abstract":"The Internet of Things (IoT) is an ever-evolving ecosystem that enables interactions between humans and interconnected objects, including healthcare domains. IoT addresses the lack of access to medical resources, the growing elderly population with chronic conditions, and the rising medical costs. This research analyzes 20 review articles on IoT applications for the well-being and healthcare of the elderly population. IoT can significantly improve well-being and healthcare through remote monitoring, communication, automating tasks, and access to various services and information. However, several limitations and challenges must be considered when employing IoT for the elderly's well-being and healthcare.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End Deep Learning assisted by Reconfigurable Intelligent Surface for uplink MU massive MIMO under PA Non-Linearities 基于可重构智能曲面的端到端深度学习在PA非线性下的上行MU大规模MIMO研究
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217870
A. Arfaoui, Maha Cherif, R. Bouallègue
{"title":"End-to-End Deep Learning assisted by Reconfigurable Intelligent Surface for uplink MU massive MIMO under PA Non-Linearities","authors":"A. Arfaoui, Maha Cherif, R. Bouallègue","doi":"10.1109/ISCC58397.2023.10217870","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217870","url":null,"abstract":"This paper investigates a novel high-performance autoencoder based deep learning approach for Multi-User massive MIMO uplink systems assisted by a Reconfigurable Intelligent Surface (RIS) in which the users are equipped by Power Amplifiers (PA) and aim to communicate with the base station. Indeed, the communication process is formulated in the form of a Deep Neuronal Network (DNN). To handle these scenarios, we have designed a DNN network that includes two components. the first is an encoder intended to process the nonlinear distortions of the PA. The second is a decoder consisting of two fundamental steps. 1) A classic Minimum Mean Square Error linear decoder to decode the information transmitted by the users. 2) The neural network decoder to minimize interference. The results of the numerical simulation illustrate that the proposed method offers a significant improvement in error performance in comparison with the different basic schemes.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of Convolutional Neural Network Depth on the Efficacy of Automated Breast Cancer Screening Systems 卷积神经网络深度对自动化乳腺癌筛查系统效果的影响
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217947
Vineela Nalla, Seyedamin Pouriyeh, R. Parizi, Inchan Hwang, Beatrice Brown-Mulry, Linglin Zhang, Minjae Woo
{"title":"Influence of Convolutional Neural Network Depth on the Efficacy of Automated Breast Cancer Screening Systems","authors":"Vineela Nalla, Seyedamin Pouriyeh, R. Parizi, Inchan Hwang, Beatrice Brown-Mulry, Linglin Zhang, Minjae Woo","doi":"10.1109/ISCC58397.2023.10217947","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217947","url":null,"abstract":"Breast cancer is a global health concern for women. The detection of breast cancer in its early stages is crucial, and screening mammography serves as a vital leading-edge tool for achieving this goal. In this study, we explored the effectiveness of Resnet 50v2 and Resnet 152v2 deep learning models for classifying mammograms using EMBED datasets for the first time. We preprocessed the datasets and utilized various techniques to enhance the performance of the models. Our results suggest that the choice of model architecture depends on the dataset used, with ResNet152 outperforming ResNet50 in terms of recall score. These findings have implications for cancer screening, where recall is an important metric. Our research highlights the potential of deep learning to improve breast cancer classification and underscores the importance of selecting the appropriate model architecture.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127331970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers 半ct:证书对身份所有者透明,但对窥探者不透明
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217862
Aozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan, Jingqiang Lin, Wei Wang
{"title":"Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers","authors":"Aozhuo Sun, Bingyu Li, Qiongxiao Wang, Huiqing Wan, Jingqiang Lin, Wei Wang","doi":"10.1109/ISCC58397.2023.10217862","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217862","url":null,"abstract":"Certificate Transparency (CT) enables timely detection of problematic certification authorities (CAs) by publicly recording all CA-issued certificates. This transparency inevitably leaks the privacy of identity owners (IdOs) through the identity information bound in certificates. In response to the privacy leakage, several privacy-preserving schemes have been proposed that transform/hash/encrypt the privacy-carrying part in certificates. However, these certificates conceal identity while also making it opaque to the IdO, which defeats the purpose of CT. To address the contradiction between transparency and privacy, we propose Semi-CT, a semi-transparency mechanism that makes the certificates transparent to IdOs but opaque to snoopers. Inspired by public-key encryption with keyword search (PEKS), Semi-CT based on bilinear pairing enables trapdoor-holding IdOs to retrieve certificates associated with their identity. Semi-CT also addresses protocol deviation detection and trapdoor protection in the malicious model. Finally, through theoretical and experimental analysis, we prove the security and feasibility of Semi-CT for practical applications.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132602934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: Implementation of a Train-Arrival Notification System 演示:列车到站通知系统的实现
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217940
Aida Eduard, Dnislam Urazayev, Yermakhan Magzym, Dimitrios Zorbas
{"title":"Demo: Implementation of a Train-Arrival Notification System","authors":"Aida Eduard, Dnislam Urazayev, Yermakhan Magzym, Dimitrios Zorbas","doi":"10.1109/ISCC58397.2023.10217940","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217940","url":null,"abstract":"A train-arrival notification system's goal is to keep safe the personnel working on remotely located railroad when a train is approaching. This demo paper provides technical insights of the open hardware and software developments of this system which scientific merit is presented in [1]. Its main components, circuitry and design are discussed with a main focus on the radio communication parts.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method 基于解释方法的系统资源竞争下增强硬件性能计数器的恶意软件检测
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218007
Yanfei Hu, Shuailou Li, Boyang Zhang, Xu Cheng, Yu Wen
{"title":"HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method","authors":"Yanfei Hu, Shuailou Li, Boyang Zhang, Xu Cheng, Yu Wen","doi":"10.1109/ISCC58397.2023.10218007","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218007","url":null,"abstract":"Hardware performance counter (HPC) has been widely used in malware detection because of its low access overhead and the ability of revealing dynamic behavior during program's execution. However, HPC based malware detection (HMD) suffers from performance decline due to HPC's non- determinism caused by resource competition. Current work enables malware detection under resource competition but still leaves misclassifications. In this paper, we propose HUND, a framework for improving the detection ability of HMD models under resource competition. To this end, we first introduce an explanation module to make the program's prediction interpretable and accurate on the whole. We then design a rectification module for troubleshooting HMDMs' errors by generating modified samples and lowering the effects of false classified instances on model decision. We evaluate HUND by performing HMD models two datasets of HPC-level behaviors. The experimental results show HUND explains HMDMs with high fidelity and HUND's effectiveness in troubleshooting the errors of HMDMs.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation Of Optimized Cluster Based PBFT Blockchain Validation Process 基于PBFT的优化聚类区块链验证过程仿真
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10218119
Rabeb Ben Othmen, Wassim Abbessi, Sofiane Ouni, Wafa Badreddine, Gilles Dequen
{"title":"Simulation Of Optimized Cluster Based PBFT Blockchain Validation Process","authors":"Rabeb Ben Othmen, Wassim Abbessi, Sofiane Ouni, Wafa Badreddine, Gilles Dequen","doi":"10.1109/ISCC58397.2023.10218119","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10218119","url":null,"abstract":"Recently, blockchain technology has emerged as a revolutionary innovation with its distributed ledger feature that allows applications to store and transmit data in a secure, transparent, and immutable manner. One of the main ideas of blockchain technology is the consensus mechanism for reaching an agreement on the state of the distributed ledger. In this context, Practical Byzantine Fault Tolerance (PBFT) is one of the most popular algorithms. However, it has a high communication overhead and poor scalability. To overcome these limits, this paper presents the effectiveness of our algorithm Random Cluster PBFT (RC-PBFT) through an evaluation of its performance under various network conditions. Our algorithm runs on randomly selected clusters, and the results are then broadcast on the blockchain network. The effectiveness of RC-PBFT is demonstrated by implementations on the NS-3 network simulator, and the tests performed show that our approach achieves significant improvements compared to the original PBFT algorithm.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk 在烤面包机崛起之前:对新兴DoH解析器部署风险的看法
2023 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2023-07-09 DOI: 10.1109/ISCC58397.2023.10217976
Yuqi Qiu, Baiyang Li, Zhiqian Li, Liang Jiao, Yujia Zhu, Qingyun Liu
{"title":"Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk","authors":"Yuqi Qiu, Baiyang Li, Zhiqian Li, Liang Jiao, Yujia Zhu, Qingyun Liu","doi":"10.1109/ISCC58397.2023.10217976","DOIUrl":"https://doi.org/10.1109/ISCC58397.2023.10217976","url":null,"abstract":"As an encryption protocol for DNS queries, DNS-over-HTTPS (DoH) is becoming increasingly popular, and it mainly addresses the last-mile privacy protection problem. However, the security of DoH is in urgent need of measurement and analysis due to its reliance on certificates and upstream servers. In this paper, we focus on the DoH ecosystem and conduct a one-month measurement to analyze the current deployment of DoH resolvers. Our findings indicate that some of these resolvers use invalid certificates, which can compromise the security and privacy advantages of the protocol. Furthermore, we found that many providers are at risk of certificate outages, which could cause significant disruptions to the DoH ecosystem. Additionally, we observed that the centralization of DoH resolvers and upstream DNS servers is a potential issue that needs addressing to ensure the stability of the ecosystem.","PeriodicalId":265337,"journal":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131979710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信