Xiyue Sun, Fabian R. Pieroth, Kyrill Schmid, M. Wirsing, Lenz Belzner
{"title":"On Learning Stable Cooperation in the Iterated Prisoner's Dilemma with Paid Incentives","authors":"Xiyue Sun, Fabian R. Pieroth, Kyrill Schmid, M. Wirsing, Lenz Belzner","doi":"10.1109/ICDCSW56584.2022.00031","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00031","url":null,"abstract":"An essential step towards collective intelligence in systems comprised of multiple independent and autonomous agents is that individual decision-makers are capable of acting cooperatively. Cooperation is especially challenging in environ-ments where collective and individual rationality diverge, like in the Prisoner's Dilemma (PD), which is often used to test whether algorithms are capable of circumventing the single non-optimal Nash equilibrium. In this paper, we extend the approach “Learning to Incentivize other Learning Agents” in two ways: 1. We analyze the impact of the payoff matrices on incentive updates, as different payoff matrices could accelerate or decelerate the growth of incentives. 2. We adapt the concept of the market from “Action Markets in Deep Multi-Agent Reinforcement Learning” to iterated PD games as to trade incentives, i.e., the final revenue of the agent is the game revenue minus the incentive it provided, and propose (sufficient) conditions for reaching stable two-way cooperation under specific assumptions.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132750096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nandish Chattopadhyay, Arpita Singh, A. Chattopadhyay
{"title":"ROFL: RObust privacy preserving Federated Learning","authors":"Nandish Chattopadhyay, Arpita Singh, A. Chattopadhyay","doi":"10.1109/ICDCSW56584.2022.00033","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00033","url":null,"abstract":"In the modern world of connectivity, most data is generated in a de centralised way, across a multitude of platforms like mobile devices and other loT applications. This crowd sourced data, if well analyzed, can prove to be rich in insights, for different tasks. However, the issue in utilizing it lies with the consolidation of the data, which is unacceptable to most involved parties. While every participant stands to benefit from the collective use of the massive data repositories, the lack of trust between them prevents that endeavour. In this paper, we propose ROFL, which is an end-to-end robust mechanism of learning, that has been developed keeping all the trust issues in mind and addressing the necessity of privacy. We make note of the threat models that might make the participants apprehensive and design a bi-directional two-dimensional privacy preserving framework, that builds upon the state-of-the-art in differentially private federated learning. Specifically, we propose a weighted federated averaging technique for aggregation of the differentially private models generated by the participants. We are able to provide privacy guarantees without compromising on the accuracy of the machine learning task. ROFL has been tested for multiple neural architectures (VGG-16 [1] and ResNet [2]) on multiple datasets (MNIST [3], CIFAR-I0 and CIFAR-I00 [4]). On the machine learning tasks, it is able to achieve accuracies within the range of 1 % -2 % of what a model trained on the collected data would have generated, in the average case scenario. We have verified the robustness of ROFL against attacks involving sabotaging or malicious client providing erroneous models. The study on model convergence reveals how to improve the efficiency of ROFL. We also provide evidence on how ROFL is easily scalable in nature.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114418342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ji Hyung Kim, Tigran Bantikyan, Nam Wook Kim, Lewis Tseng
{"title":"A Human-centered Approach to make Networked Entertainment Green: A Case Study of CDN","authors":"Ji Hyung Kim, Tigran Bantikyan, Nam Wook Kim, Lewis Tseng","doi":"10.1109/ICDCSW56584.2022.00050","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00050","url":null,"abstract":"In our day to day lives, we are becoming more re-liant on clouds, which results in an excessive energy consumption by cloud infrastructures. In 2016, the US Department of Energy found that datacenters in the US made up roughly 2 % of all electricity consumption nationwide. Designing a cloud computing system that runs on sustainable energy and simultaneously satisfies increasing user demands with high availability is still an unsolved challenge. We focus on networked entertainment systems in this short paper. The first goal of this paper is to provide a broad research agenda on using a human-in-the-loop design to tackle this challenge, discussing more problems than solutions. Second, we present our design of an interactive Content Delivery Network (CDN) that is the backbone for much networked entertainment, e.g., Netflix and YouTube. Our CDN solution (i) considers user preferences and their tolerance (to unavailability) when tuning system configuration and design, and (ii) uses system metrics and availability predictions to encourage users to adopt more energy- efficient behavior. Finally, we advocate designs that integrate expertise from multiple disciplines, including Human-Computer Interaction, Machine Learning, and Cloud/Pervasive computing, and argue why cloud platforms can benefit from adopting such a holistic approach.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT","authors":"M. Alani, E. Damiani, Uttam Ghosh","doi":"10.1109/ICDCSW56584.2022.00040","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00040","url":null,"abstract":"IoT adoption is becoming widespread in different areas of applications in our daily lives. The increased reliance on IoT devices has made them a worthy target for attackers. With malicious actors targeting water treatment facilities, power grids, and power nuclear reactors, industrial IoT poses a much higher risk in comparison to other IoT application contexts. In this pa-per, we present a deep-learning based intrusion detection system for industrial IoT. The proposed system was trained and tested using the WUSTL-IIOT-2021 dataset. Testing results showed accuracy exceeding 99% with minimally low false-positive, and false-negative rates. The proposed model was explained using SHAP values.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Augmented Regularity for Efficient Video Anomaly Detection: An edge AI application","authors":"Jiafei Liang, Zhou Yue, Feng Yang, Zhiwen Fang","doi":"10.1109/ICDCSW56584.2022.00037","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00037","url":null,"abstract":"Video anomaly detection, as a critical edge AI application, may dramatically minimize transmission burden by transmitting just anomalous data. Traditionally, dense consecutive frames with high resolution are utilized as the input to assure that video anomaly detection performed well. Dense input with high resolution, on the other hand, will result in high computation. To address the demand of high performance with little computation on edge devices, we propose an efficient video anomaly detection based on augmented regularity with mutual learning. Sparse frames collected from every two frames with a low-resolution of 160 × 160 are used as the input to decrease processing. Generally, performance will be hampered as a result of the low-quality inputs. To improve performance, an auxiliary network is created that uses dense inputs to mine plentiful patterns from successive frames and promotes the proposed network throughout the training phase via mutual learning. Additionally, we design augmented regularity to increase scene generalization when edge devices are grouped in distributed applications with various scenes. During the training phase, the augmented regularity, which is irrelevant to the input video, is concatenated in the input as a hidden label message. The label message infers that the inputs are normal. In the inference phase, the abnormal information can be detected from the hidden label message through generated errors. Experimental results on benchmark datasets demonstrate that the proposed method can achieve the state-of-the-art at a super-real-time speed of 80fps.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126685784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jennifer Simonjan, Stefano Ricardo Probst, M. Schranz
{"title":"Inducing Defenders to Mislead an Attacking UAV Swarm","authors":"Jennifer Simonjan, Stefano Ricardo Probst, M. Schranz","doi":"10.1109/ICDCSW56584.2022.00059","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00059","url":null,"abstract":"In recent years, the development of self-organizing and autonomous behaviors for unmanned aerial vehicle (UAV) swarms has increased significantly. Being flexible, scalable and robust, UAV swarms bring many advantages for future applications. However, these properties might also be used for malicious or dangerous applications like autonomous target-oriented attacks. To date, defense includes strategies like fighting the attackers with a defender swarm or exploiting hardware devices like nets and jammers to stop the attackers. These solutions increase the risk on collateral damage even further. To the best of our knowledge, research is lacking intelligent countermeasures against attacking UAV swarms which limit the damage as much as possible. In this paper, we explore how to invert a robust UAV swarm behavior by inducing defender UAVs into an attacking UAV swarm with the goal to mislead the swarm's mission. Via simulations, we model two different swarm behaviors and explore how to invert them with disguised UAVs deflecting the entire swarm.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134460669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Pappas, D. Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, S. Lalis, M. Vavalis
{"title":"Towards Efficient Decentralized Federated Learning","authors":"C. Pappas, D. Papadopoulos, Dimitris Chatzopoulos, Eleni Panagou, S. Lalis, M. Vavalis","doi":"10.1109/ICDCSW56584.2022.00023","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00023","url":null,"abstract":"We focus on the problem of efficiently deploying a federated learning training task in a decentralized setting with multiple aggregators. To that end, we introduce a number of improvements and modifications to the recently proposed IPLS protocol. In particular, we relax its assumption for di-rect communication across participants, using instead indirect communication over a decentralized storage system, effectively turning it into a partially asynchronous protocol. Moreover, we secure it against malicious aggregators (that drop or alter data) by relying on homomorphic cryptographic commitments for efficient verification of aggregation. We implement the modified IPLS protocol and report on its performance and potential bottlenecks. Finally, we identify important next steps for this line of research.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123020104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Distributed and Central Control for Self-Adaptive Systems of Systems","authors":"Christian Kröher, Lea Gerling, Klaus Schmid","doi":"10.1109/ICDCSW56584.2022.00030","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00030","url":null,"abstract":"Distributed and central control are two complementary paradigms to establish self-adaptation in software systems. Both approaches have their individual benefits and drawbacks, which lead to significant trade-offs regarding certain software qualities when designing such systems. The significance of these trade-offs even increases the more complex the target system becomes. In this paper, we present our work-in-progress towards an integrated control approach, which aims at providing the best of both control paradigms. We present the basic concepts of this multi-paradigm approach and outline its inherent support for complex system hierarchies. Further, we illustrate the vision of our approach using application scenarios from the smart energy grid as an example for self-adaptive systems of systems.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128526235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wanying Guo, D. Shin, Isma Farah Siddiqui, Jahwan Koo, Nawab Muhammad Faseeh Qureshi
{"title":"Cost-Effective Optimal Multi-Source Energy Management Technique in Heterogeneous Networks","authors":"Wanying Guo, D. Shin, Isma Farah Siddiqui, Jahwan Koo, Nawab Muhammad Faseeh Qureshi","doi":"10.1109/ICDCSW56584.2022.00042","DOIUrl":"https://doi.org/10.1109/ICDCSW56584.2022.00042","url":null,"abstract":"Heterogeneous networks (HetNets) involve multi-source energy supply for energy consumption through energy conservation and emission reduction. This research paper considers traditional energy's Torono Real-Time (TOU) price and fairness among users. It uses exponential utility functions that build a relationship between energy consumption, energy cost, and user fairness. Furthermore, it divides user selection into two stages such as (i) edge user allocation and (ii) service user determination to obtain an optimally balanced load distribution. We evaluate the proposed technique by combining two algorithms such as PA1 and PA2. The proposed approach significantly reduces the cost and energy consumption of the base station system in heterogeneous networks.","PeriodicalId":357138,"journal":{"name":"2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}