{"title":"An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection","authors":"H. Nguyen, Hoang Nguyen Viet, T. Uehara","doi":"10.1145/3440749.3442661","DOIUrl":"https://doi.org/10.1145/3440749.3442661","url":null,"abstract":"Security researchers have used Natural Language Processing (NLP) and Deep Learning techniques for programming code analysis tasks such as automated bug detection and vulnerability prediction or classification. These studies mainly generate the input vectors for the deep learning models based on the NLP embedding methods. Nevertheless, while there are many existing embedding methods, the structures of neural networks are diverse and usually heuristic. This makes it difficult to select effective combinations of neural models and the embedding techniques for training the code vulnerability detectors. To address this challenge, we extended a benchmark system to analyze the compatibility of four popular word embedding techniques with four different neural networks, including the standard Bidirectional Long Short-Term Memory (Bi-LSTM), the Bi-LSTM applied attention mechanism, the Convolutional Neural Network (CNN), and the classic Deep Neural Network (DNN). We trained and tested the models by using two types of vulnerable function datasets written in C code. Our results revealed that the Bi-LSTM model combined with the FastText embedding technique showed the most efficient detection rate on a real-world but not on an artificially constructed dataset. Further comparisons with the other combinations are also discussed in detail in our result.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdel-Nasser Ateeq, Israa Obaid, O. Othman, Ahmed Awad
{"title":"Lifetime Enhancement of WSN Based on Improved LEACH with Cluster Head Alternative Gateway","authors":"Abdel-Nasser Ateeq, Israa Obaid, O. Othman, Ahmed Awad","doi":"10.1145/3440749.3442615","DOIUrl":"https://doi.org/10.1145/3440749.3442615","url":null,"abstract":"Wireless Sensor Network (WSN) is a self-configured network of light-weight nodes, that are used in many applications by sending their data through this network to a Base Station (BS), which in turn, delivers the data to its final destination. In WSN, the sensor node’s energy is usually limited, and thus, the overall power consumption of the network is a real challenge. Numerous methods have been proposed to overcome this challenge by improving the overall power consumption and thus, prolonging the lifetime of the network. Low Energy Adaptive Clustering Hierarchy (LEACH) protocol has been considered as a leading routing protocol in WSN, due to its low power consumption resultant from its cluster-based behavior. However, for dense networks, LEACH suffers from large burden over cluster head (CH), which might result in packet loss due to the induced congestion in the CH. In this paper, an improved algorithm based on LEACH is proposed to maximize the lifetime of WSN, by using another node to relieve CH’s burden. The routing path selection process is refined through selecting a new node that has the highest residual energy in each cluster to be an alternative gateway for the cluster head. Then, the routing path will be decided based on distance. This modified algorithm outperforms the original LEACH by 4.35% increase in the residual energy, which prolongs the network lifetime. However, there is a slight increase in the overhead ratio.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Challenges Posed by Quantum Computing on Emerging Technologies","authors":"A. Abuarqoub","doi":"10.1145/3440749.3442651","DOIUrl":"https://doi.org/10.1145/3440749.3442651","url":null,"abstract":"Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with efficiencies that are not possible with classical computers. Quantum computing technology has a lasting potential impact on society and a broad implications on many aspects of our lives. Communications Industry Researchers (CIR) estimates that the global quantum-computing market is expected to reach $1.9 billion in 2023, increasing to $8 billion by 2027, in spending on associated software and services. Although quantum computing has several advantages, it threatens the current cryptographic techniques, which are necessary for today’s Internet standards like the Transport Layer Security (TLS). This is due to its ability to perform infinite complex computations in parallel. Therefore, it is expected that quantum computers will be able to solve the key distribution problem and break every single cryptography and authentication algorithm based on Asymmetric cryptography, such as: RSA, ECC, and Diffie-Hellman. New emerging technologies such as the Internet of Things (IoT), blockchain, autonomous vehicles, 5G, Artificial Intelligence (AI) and robotics all rely on cryptography for their secure operation. Although quantum computing supports technological evolution and growth, it will pose a threat to the current progress and future development of these technologies. Therefore, cryptography and authentication techniques need improvements as introducing quantum computing would put today’s cybersecurity in serious risk. NSA and NIST proposed solutions to tackle these challenges. However, these solutions are still immature as they need major upgrade of hardware implementation. Instead, the recommendations focus on what is called post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. This talk outlines how the impact of quantum technologies on authentication, data exchange, and data storage, as well as areas where cryptography plays an essential role, such as: blockchain, 5G, IoT, and AI technologies. It investigate the possible impact of quantum technologies on these emerging technologies. Finally, it discusses some of the current quantum security solution that are devoted to protect the devices and systems in the quantum era, and mitigate quantum attacks.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Carta, S. Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, D. R. Recupero
{"title":"HawkEye: a Visual Framework for Agile Cross-Validation of Deep Learning Approaches in Financial Forecasting","authors":"S. Carta, S. Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, D. R. Recupero","doi":"10.1145/3440749.3442653","DOIUrl":"https://doi.org/10.1145/3440749.3442653","url":null,"abstract":"Financial forecasting represents a challenging task, mainly due to the irregularity of the market, high fluctuations and noise of the involved data, as well as collateral phenomena including investor mood and mass psychology. In recent years, many researchers focused their work on predicting the performance of the market by exploiting novel Machine Learning and Deep Learning tools and techniques. However, many of the approaches proposed in the literature do not take adequately into account some important specific domain issues in the analysis of the results. Among these, it is worth to mention the bias introduced by the choice of model weights initialization and the considered observation periods, as well as the narrow separation between significant results and noise, typical of the financial domain. A thorough analysis of these peculiar issues lead to a substantial increase of the experiments and results to analyze, making the discovery of meaningful hidden patterns very difficult and time consuming to perform. To cope with these concerns and accompanying the current Machine Learning Interpretability trend, in this paper we propose a visual framework for in-depth analysis of results obtained from Deep Learning approaches, tackling classification tasks within the financial domain and aiming at a better interpretation and explanation of the trained Deep Learning models. Our framework offers a modular view, both general and targeted, of results data, providing several financial specific metrics, including Sharpe and Sortino ratios, Equity curves and Maximum Drawdown, as well as custom period analysis and reports, experiment comparison tools, and evaluation features for different algorithms.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Coding for the Interaction of Unmanned Flying Platforms in Data Acquisition Networks","authors":"S. Vladimirov, R. Kirichek, V. Vishnevsky","doi":"10.1145/3440749.3442622","DOIUrl":"https://doi.org/10.1145/3440749.3442622","url":null,"abstract":"The paper determines the application of the network coding method in the system for gathering information from wireless body area networks based on unmanned flying platforms. Application of network coding methods is carried out using the proposed model of a data acquisition network. The limits of applicability of the proposed method are estimated and statistical modeling is carried out using various checksum algorithms, taking into account the features of the problem being solved. The analysis of the simulation results is carried out.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing the Kemeny's Weighted Median for the Rank Aggregation Problem","authors":"S. Dvoenko, D. O. Pshenichny","doi":"10.1145/3440749.3442652","DOIUrl":"https://doi.org/10.1145/3440749.3442652","url":null,"abstract":"A coordinated ranking as the opinion of an expert group usually can be represented by the well-known Kemeny's median. The Kemeny's median is the least different ranking from other rankings and is free of known contradictions of the majority rule problem. As a mathematical principle, the Kemeny's median gives a decision in any case, in particular, for conflicting experts’ decisions in ordinal scales. In practice, competing opinions are usually modified by special approval procedures to achieve the required level of consensus. The known approach consists in assigning weights to experts’ opinions. In this paper, the problem to find the median for a linear combination of experts’ rankings is investigated using the well-known locally optimal Kemeny's algorithm. It is proposed to use the weighted loss matrix in it.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Khan, S. Z. Zukhraf, Asrin Abdollahi, S. Imran, I. Qureshi, M. A. Aziz, Syed Bilal Hussain Shah
{"title":"Reinforce Based Optimization in Wireless Communication Technologies and Routing Techniques Using Internet of Flying Vehicles","authors":"I. Khan, S. Z. Zukhraf, Asrin Abdollahi, S. Imran, I. Qureshi, M. A. Aziz, Syed Bilal Hussain Shah","doi":"10.1145/3440749.3442621","DOIUrl":"https://doi.org/10.1145/3440749.3442621","url":null,"abstract":"Effective communication plays a pivotal role to measure the quality of experience in networks. Recent technological development in the area of wireless communication and many other fields are emerged like flying ad hoc networks, internet of everything. Due to dynamic structure of unmanned aerial vehicles the mobile topological structure is having direct concerns about communication technology performance. Conventional routing techniques are utilized in communication to ensure effective connectivity of two or more workstations. This research study performs comprehensive comparative evaluation wireless communication technology generation for various parameters arrangements. Also qualified learning study is incorporated about different routing protocols in the area of flying ad hoc networks.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Vasiliev, I. Zharikov, V. Fadeenko, I. Fadeenko, V. Davydov
{"title":"Optimization of designs for fiber optic communication line","authors":"D. Vasiliev, I. Zharikov, V. Fadeenko, I. Fadeenko, V. Davydov","doi":"10.1145/3440749.3442664","DOIUrl":"https://doi.org/10.1145/3440749.3442664","url":null,"abstract":"The article describes a modification of fiber optic communication lines for transmitting microwave signals. Development of microwave transmission lines proposed as an improvement in an educational institution, taking into account the technical requirements for a station in operation. Improving the receiving path is to create a multifunctional walker with the ability to transmit microwave signals. The use of a fiber-optic microwave signal transmission line in the receiving path allows it to be installed in objects with increased electromagnetic activity (for example, a sea-based object). A multifunctional radar with advanced waves can be used to detect various moving and stationary targets in air and sea space, as well as on the Earth’s surface. Studies have shown that the dynamic range of the developed FOCL is 80 dBm. This result is not worse than that of a coaxial cable. The dependence of the tangential sensitivity on the frequency of the received microwave signal was investigated. The results showed that when using the modernized fiber optic link, the sensitivity of the receiving path does not increase.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"747 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133227268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SmartGate system: Automating the detection and control of COVID-19","authors":"Mashael M. Khayyat, Raafat M Munshi","doi":"10.1145/3440749.3442602","DOIUrl":"https://doi.org/10.1145/3440749.3442602","url":null,"abstract":"The recent worldwide COVID-19 pandemic created the urgent need for innovative solutions to aid in early detection and control of this disease. This research begins by introducing the coronavirus strand and ends with the proposed SmartGate to detect the potential of the virus in patients without human intervention. This is to reduce the manual use of thermometers to measure temperature and to shift the detection to automation. Triz theory principles have been considered in the process of the innovative proposed design of the SmartGate. Implementing the proposed SmartGate in public places such as shopping malls, gardens, schools, supermarkets, etc. will avoid the need for manual measurement and thus reduce exposure to infected people. Furthermore, it aids in identifying infected people in order to guide them to visit the assigned hospitals and prevent the spread of infection. The relational COVID-19 tracking database (RCTD) of possibly infected people can be shared with assigned (to treat COVID-19 patients) local hospital module for further appropriate actions. In this paper, several available technologies are integrated to build an innovative solution that will help the world to live safer and provide a better future for the coming generations.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Access Architecture: The Next 20+ Years","authors":"H. Yanikomeroglu","doi":"10.1145/3440749.3442647","DOIUrl":"https://doi.org/10.1145/3440749.3442647","url":null,"abstract":"The very fundamental principles of digital and wireless communications reveal that the provision of ubiquitous super-connectivity in the global scale – i.e., beyond indoors, dense downtown or campus-type areas – is infeasible with the legacy terrestrial network architecture as this would require prohibitively expensive gross over-provisioning. The problem will only exacerbate with even more demanding use-cases of 2030s such as UAVs requiring connectivity (ex: delivery drones), thus the 3D super-connectivity. The roots of today’s wireless access architecture (the terrestrial 4G & 5G cellular network) go back to 1940s. The access architecture has evolved substantially over the decades. However, rapid developments in a number of domains outside telecommunications, including those in aerospace and satellite industries as well as in artificial intelligence, will likely result in a disruptive transformation in the wireless access architecture in the next 20+ years. In this talk, an ultra-agile, dynamic, distributed, and partly-autonomous vertical heterogeneous network (VHetNet) architecture with very low earth orbit satellites (VLEOs), high-altitude platform station (HAPS) systems, and UAV-BSs (UxNB in 3GPP terminology) for almost-ubiquitous super-connectivity will be presented. In the envisioned VHetNet architecture, the HAPS systems constitute arguably the most promising tier. For more information on HAPS systems, please refer to the below papers under review: [5],[1],[4],[2],[3].","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}