{"title":"Hard Disk Failure Prediction Based on Lightgbm with CID","authors":"Hengrui Wang, Yahui Yang, Hongzhang Yang","doi":"10.1109/ISCC53001.2021.9631504","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631504","url":null,"abstract":"In data centers, hard disks are the most prone to failure of IT equipment. Although there is data backup, data reliability still faces challenges due to hard disks failure. In recent years, many hard disk failure prediction approaches based on SMART data have been proposed. In this paper, we proposed a novel disk failure prediction approach based on Lightgbm algorithm with CID (complexity invariant distance). Our failure prediction model has been built and evaluated on SMART data of about 80,000 hard disks from two manufacturers. The experimental result shows that by adding CID features, the TPR is increased from 0.28 to 0.96, and the number of days that the model can predict failures in advance is extended by 1.2 days. Compared with the several existing failure prediction models, our model has better performance on AUC score, f1-score and TPR.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Elderly People During Medical Emergencies: An Informal Caregiver-based Approach","authors":"Yuanyuan Shen, Md. Akbar Hossain, S. K. Ray","doi":"10.1109/ISCC53001.2021.9631389","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631389","url":null,"abstract":"Globally, an increasing number of elderly people live alone at home either by choice or out of compulsion, and many have health issues. During a medical emergency involving an elderly person living alone, getting prompt access to formal medical aids like calling an ambulance or paramedics can be critical. Moreover, an ambulance can also arrive late adding to the patient's suffering. In such situations, informal caregivers can act as first responders to attend to the patients even before an ambulance arrives. The selection of appropriate informal caregivers to attend a medical emergency incident remains a key issue and this paper proposes an informal caregiver selection process based on certain pre-defined characteristics of informal caregivers. Single and ensemble multiclass classification algorithms are considered in this work to rank informal caregivers and preliminary simulation results have shown that ensemble models perform better than single models.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121344948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francisco Jose Dos Santos Reist, M. Veloso, Filipe Mateus Moraes Rodrigues, Vitória de Carvalho Brito, Patrick Ryan Sales dos Santos, José Denes Lima Araújo, R. A. Rabelo, A. O. C. Filho
{"title":"BacillusNet: An automated approach using RetinaNet for segmentation of pulmonary Tuberculosis bacillus","authors":"Francisco Jose Dos Santos Reist, M. Veloso, Filipe Mateus Moraes Rodrigues, Vitória de Carvalho Brito, Patrick Ryan Sales dos Santos, José Denes Lima Araújo, R. A. Rabelo, A. O. C. Filho","doi":"10.1109/ISCC53001.2021.9631390","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631390","url":null,"abstract":"Tuberculosis is an infectious disease transmitted by Mycobacterium tuberculosis, being the leading cause of death from infection. The sputum bacilloscopy method is the technique for detecting the bacillus that is currently most used, not only in the search for infectious cases but also as a thermometer to check the effectiveness of the treatment. In this context, computational techniques have been developed to help the specialist for a better diagnosis. In this work, we promote a methodology for automated detection of the bacillus using RetinaNet. A set of the 928 images was used for evaluating this method. The results were promising, achieving an accuracy of 67.1%, recall of 86. 56%, and an F-score of 75.61%. Finally, we believe that our method is capable of acting in the diagnosis of tuberculosis.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanna Kavalionak, E. Carlini, Patrizio Dazzi, L. Ferrucci, M. Mordacchini, M. Coppola
{"title":"Impact of Network Topology on the Convergence of Decentralized Federated Learning Systems","authors":"Hanna Kavalionak, E. Carlini, Patrizio Dazzi, L. Ferrucci, M. Mordacchini, M. Coppola","doi":"10.1109/ISCC53001.2021.9631460","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631460","url":null,"abstract":"Federated learning is a popular framework that enables harvesting edge resources' computational power to train a machine learning model distributively. However, it is not always feasible or profitable to have a centralized server that controls and synchronizes the training process. In this paper, we consider the problem of training a machine learning model over a network of nodes in a fully decentralized fashion. In particular, we look for empirical evidence on how sensitive is the training process for various network characteristics and communication parameters. We present the outcome of several simulations conducted with different network topologies, datasets, and machine learning models.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A privacy preserving identification protocol for smart contracts","authors":"F. Bruschi, Tommaso Paulon, V. Rana, D. Sciuto","doi":"10.1109/ISCC53001.2021.9631501","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631501","url":null,"abstract":"If on one hand the possibility of using pseudonymous identities is an important feature of blockchains and smart contracts, on the other hand official identity can be required in some applications to comply with regulations such as Know Your Customer and Anti Money Laundering. These regulatory compliance issues are usually dealt with either through “custo-dial” approaches, which however neutralize the decentralization of these systems, or with “whitelisting” mechanisms, that present critical issues with regard to privacy. In this paper we propose a protocol that allows only potentially identifiable users to use a given decentralized applications. The system ensures that users are identifiable only by a competent authority, under certain conditions, and that in any other case they remain pseudonyms. To evaluate performance and costs, we present an Ethereum implementation of the protocol.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependable Reinforcement Learning via Timed Differential Dynamic Logic","authors":"Runhao Wang, Yuhong Zhang, Haiying Sun, Jing Liu","doi":"10.1109/ISCC53001.2021.9631442","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631442","url":null,"abstract":"Reinforcement learning algorithms discover policies that are lauded for their high efficiency, but don't necessarily guarantee safety. We introduce a new approach that provides the best of both worlds: learning optimal policies while enforcing the system to comply with certain model to keep the learning dependable. To this end, we propose Timed Differential Dynamic Logic to express the system properties. Our main insight is to convert the properties to runtime monitors, and use them to monitor whether the system is correctly modeled. We choose the optimal polices only if the reality matches the model, or we will abandon efficiency and instead to choose a policy that guides the agent to a modeled portion of the state space. We also propose Dependable Mixed Control (DMC) algorithm to implement a framework for application. Finally, the effectiveness of our approach is validated through a case study on Communication-Based Autonomous Control (CBAC).","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the L4S Architecture in Cellular Networks with a Programmable Switch","authors":"B. Mathieu, Stéphane Tuffin","doi":"10.1109/ISCC53001.2021.9631539","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631539","url":null,"abstract":"Low-Iatency applications, such as cloud gaming or cloud robotics are very demanding in terms of network latency. The IETF defines the L4S (Low Latency Low Loss Scalable throughput) architecture, to enable the delivery of high-bitrate low-latency applications without degrading the quality of other services. To deploy and upgrade L4S in network equipment to follow the transport protocols entering an age of quick evolutions, P4 (Programming Protocol-Independent Packet Processor), a programmable data plane concept, can help since it facilitates the deployment of networking software. In this paper, we propose a P4-based L4S solution and the performed evaluation proves our system behaves as expected. Furthermore, to be largely deployed, L4S should also be efficient under real cellular network conditions, which can vary over time and where the main network bottlenecks are. However, our evaluation shows limitations of L4S in providing high throughput while ensuring low latency delivery with time varying network conditions.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122209771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identify What You are Doing: Smartphone Apps Fingerprinting on Cellular Network Traffic","authors":"Liuqun Zhai, Zhuang Qiao, Zhongfang Wang, Dongxue Wei","doi":"10.1109/ISCC53001.2021.9631415","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631415","url":null,"abstract":"Apps installed on smartphones may reveal users' privacy, which is often under malicious attacks. Most privacy attacks are based on network layer traffic. However, the encryption used in the cellular network makes it difficult for a passive adversary to obtain the traffic. In this paper, we leverage the data link layer metadata, such as PDCP packet size, distribution, and interarrival time, to create Apps fingerprints and then conduct a non-intrusive smartphone Apps privacy attack. We test three different smartphones on a 4G LTE laboratory network. On twenty popular Apps selected from the AppStore and Huawei AppGallary, we achieve an Fl-score ranging from 91.32% to 99.49%. Also, we investigate the effect of classification algorithms, time windows, monitoring duration and smartphone brands on Apps fingerprinting attack. Furthermore, we evaluate the performance of the attack using only downlink traffic, which is consistent with the actual attack scenario. Because the data link layer specifications of 4G LTE and 5G are similar, the method of Apps fingerprinting attack can be extended to the latest 5G networks.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FA-net: Attention-based Fusion Network For Malware HTTPs Traffic Classification","authors":"Siqi Liu, Yanni Han, Yanjie Hu, Q. Tan","doi":"10.1109/ISCC53001.2021.9631419","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631419","url":null,"abstract":"With the wide application of HTTPs, malware HTTPs traffic classification is usually the first step in anomaly detection system. The existing classification methods mainly use the raw bytes (containing the discriminative features) or the statistical features (containing the global information) as the input, which leads to a low Fl-score. Therefore, this paper presents a novel Attention-based Fusion Network (FA-net), which combines two types of features properly to improve the classification performance. FA-net consists of three sub-networks: RF -net and SF -net extract the representative features of raw bytes and statistical features through the Convolutional Neural Network (CNN) and reconstruction mechanism respectively, and C-net combines two types of features through the attention mechanism and a regulating factor. The experiments indicate that FA-net obtains markedly better results (the average Fl-score of 0.941 and 0.997 respectively on two datasets) than the baselines. We also explore the influence of different regulating factor values on classification performance.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128439350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danilo Carastan-Santos, A. Silva, A. Goldman, Angan Mitra, Yanik Ngoko, Clément Mommessin, D. Trystram
{"title":"Short-Term Ambient Temperature Forecasting for Smart Heaters","authors":"Danilo Carastan-Santos, A. Silva, A. Goldman, Angan Mitra, Yanik Ngoko, Clément Mommessin, D. Trystram","doi":"10.1109/ISCC53001.2021.9631550","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631550","url":null,"abstract":"Maintaining Cloud data centers is a worrying challenge in terms of energy efficiency. This challenge leads to solutions such as deploying Edge nodes that operate inside buildings without massive cooling systems. Edge nodes can act as smart heaters by recycling their consumed energy to heat these buildings. We propose a novel technique to perform temperature forecasting for Edge Computing smart heater environments. Our approach uses time series algorithms to exploit historical air temperature data, smart heaters’ power consumption and temperature to create models to predict short-term ambient temperature over one hour horizon. We implemented our approach on top of Facebook's Prophet time series forecasting framework, and we used the real-time logs from Qarnot Computing as a use-case of a smart heater Edge platform. Our best trained model yields ambient temperature forecasts with less than 2.66% Mean Absolute Percentage Error.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}