{"title":"A Hybridized Approach for Testing Neural Network Based Intrusion Detection Systems","authors":"Faqeer ur Rehman, C. Izurieta","doi":"10.1109/SmartNets50376.2021.9555416","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9555416","url":null,"abstract":"Enhancing the trust of machine learning-based classifiers with large input spaces is a desirable goal; however, due to high labeling costs and limited resources, this is a challenging task. One solution is to use test input prioritization techniques that aim to identify and label only the most effective test instances. These prioritized test inputs can then be used with some popular testing techniques e.g., Metamorphic testing (MT) to test and uncover implementation bugs in computationally complex machine learning classifiers that suffer from the oracle problem. However, there are certain limitations involved with this approach, (i) using a small number of prioritized test inputs may not be enough to check the program correctness over a large variety of input scenarios, and (ii) traditional MT approaches become infeasible when the programs under test exhibit a non-deterministic behavior during training e.g., Neural Network-based classifiers. Therefore, instead of using MT for testing purposes, we propose a metamorphic relation to solve a data generation/labeling problem; that is, enhancing the test inputs effectiveness by extending the prioritized test set with new tests without incurring additional labeling costs. Further, we leverage the prioritized test inputs (both source and follow-up data sets) and propose a statistical hypothesis testing (for detection) and machine learning-based approach (for prediction) of faulty behavior in two other machine learning classifiers (Neural Network-based Intrusion Detection Systems). In our case, the problem is interesting in the sense that injected bugs represent the high accuracy producing mutated program versions that may be difficult to detect by a software developer. The results indicate that (i) the proposed statistical hypothesis testing is able to identify the induced buggy behavior, and (ii) Random Forest outperforms and achieves the best performance over SVM and k-NN algorithms.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Di Wang, Ahmad Al-Rubaie, Yaqoub Alsarkal, Sandra Stincic, John Davies
{"title":"Cost effective and Accurate Vehicle Make/Model Recognition method Using YoloV5","authors":"Di Wang, Ahmad Al-Rubaie, Yaqoub Alsarkal, Sandra Stincic, John Davies","doi":"10.1109/SmartNets50376.2021.9555409","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9555409","url":null,"abstract":"Automatic meta-data extraction from images from highway cameras is a necessary component for intelligent transportation and smart city. Meta-data can include detailed information on vehicles, such as car make/model, car registration plate and drivers’ behaviour, etc.. This paper focuses on real-time car make/model information extraction from highway cameras. As we have very limited access to the real world data due to data privacy and protection, we use open-source data (e.g. car selling websites) and transfer learning on open-source pre-trained models to build a model which is generic enough to be applied directly to similar data sets from other sources, (e.g. real-world highway cameras) without losing much accuracy. To achieve this, we propose applying the object detection method ‘You Only Look Once’ (Yolo) for classification problem of car make/model. The proposed method and trained model achieve an accuracy of 95.6% when applied directly to real-world highway cameras without using their data for training.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121694562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SmartNets 2021 Authors Index","authors":"","doi":"10.1109/smartnets50376.2021.9555413","DOIUrl":"https://doi.org/10.1109/smartnets50376.2021.9555413","url":null,"abstract":"","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[SmartNets 2021 Front cover]","authors":"","doi":"10.1109/smartnets50376.2021.9555427","DOIUrl":"https://doi.org/10.1109/smartnets50376.2021.9555427","url":null,"abstract":"","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Deep Learning for COVID-19 Control: Implementing a Convolutional Neural Network in a Facemask Detection Application","authors":"Caolan Deery, Kevin Meehan","doi":"10.1109/SmartNets50376.2021.9555431","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9555431","url":null,"abstract":"The ongoing COVID-19 pandemic has changed people’s lives in ways that many would not have predicted. In the days, weeks and months since mandatory lockdowns and restrictions came into effect worldwide, people have had to adjust their daily lives in an effort to slow and restrict the spread of the virus -- like regularly sanitising their hands, maintaining social distancing in crowded places, and wearing facemasks. The latter is contentious for some but has been a necessary deterrent in slowing the spread of this virus. There is potential for utilising technology as a supplementary deterrent and monitoring tool to help detect non-compliance of mask wearing. This research investigates the efficacy of AI for such purposes, exploring the applicability of a Convolutional Neural Network (CNN), for predicting if a person in a real time video feed is wearing a facemask. A dataset of over 10,000 images was created to effectively evaluate this research. The CNN developed was tested against the validation dataset to evaluate its performance, the model demonstrated 98.47% accuracy on a varied and balanced dataset.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121604871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Finger Stretching and Bending Dynamics as a Biometric Modality","authors":"Sraddhanjali Acharya, Abdul Serwadda","doi":"10.1109/SmartNets50376.2021.9555429","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9555429","url":null,"abstract":"Studies on the characterization of the dexterity of fingers and hands improve the understanding of how humans interact with computing devices. In this study, finger bending patterns captured by flex sensors worn on the fingers are characterized to build a biometric authentication system. The modality uses an array of resistive sensors fitted in a smart glove worn by users while typing. The study encompasses 55 users, 23 of them entered a 9-digit PIN on a laptop’s number pad, and 32 of them typed a 10-length alphanumeric password on the full-sized keyboard. The results demonstrate that the users are authenticated using features built from the flex sensors relating to their PIN and password with a mean EER score of 7.49% and 9.76%, respectively. We further assessed the potential of using individual fingers to authenticate users in both the biometric systems and found that even the fingers not used for typing exhibited discriminative patterns due to movement dynamics during the typing process. This assessment highlights the potential for designing lightweight biometric modalities utilizing dexterity and patterns based on fewer fingers.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized Computation Offloading in Mobile Edge Computing Systems","authors":"Rohan Sharma, Kushaal Gummaraju, Pranav Anantharam, Ojaswi Saraf, Vamsi Krishna Tumuluru","doi":"10.1109/SmartNets50376.2021.9553007","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9553007","url":null,"abstract":"Existing works on mobile edge computing (MEC) which operate under multi-user and multi-server scenarios often assume centralized computation offloading. This paper proposes a decentralized computation offloading scheme where a user does not require information about other users and about the MEC network (e.g., number of servers, network topology). Under the proposed computation offloading scheme, a user infers the transmission delay from the link rate assigned by its associated base station (BS). Further, each user privately deploys a moving average model to estimate the network delay after transmission. Using such information and its own information (i.e., local computing resource and energy availability), the user decides whether to offload its task to the MEC network via the BS. In case, a user decides to offload its task then the task deadline is not revealed to the MEC network to maintain fairness. Thereafter, the central controller of the MEC network performs optimal task allocation and notification of the computation results to the users. The impact of various user-parameters such as task generation probability, deadline, task size and processing density on the users and the MEC network are analyzed using extensive simulations.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133625729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-aware Robust Proactive Content Caching using Edge Service Providers","authors":"Rishi Kashyap, Manasa Bhat, Deepa Umashankar, Vamsi Krishna Tumuluru","doi":"10.1109/SmartNets50376.2021.9555417","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9555417","url":null,"abstract":"In this paper, we propose a novel proactive content caching problem in which a set of contending edge service providers (ESPs) in a given region offer their storage and link capacities to the content provider (CP). The privacy of each contending ESP is preserved in the proposed caching problem. Each ESP independently determines the amount of storage and link capacity it can offer to the CP based on the local forecast of the content requests and its local edge resources. Unlike existing works, an ESP’s decision making problem is modeled as a robust mixed integer problem due to the uncertain storage capacity. Based on the offers made by the ESPs and its own prediction of the content requests, the CP determines the optimal content placement decisions while reserving the storage and link capacities under the ESPs in order to serve its clients at different bit rates. The CP also finds the optimal allocation of predicted requests across the ESPs. The decisions of the CP are found using a separate mixed integer problem which minimizes the payments given by the CP to the ESPs for their service. We show the impact of the robust parameter on the content placement decisions. We also perform sensitivity analysis of the CP’s decisions.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134344331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Padmanabh, Ahmad Al-Rubaie, John Davies, Sandra Stincic, A. Aljasmi
{"title":"Fault Prediction in HVAC Chillers by Analysis of Internal System Dynamics","authors":"K. Padmanabh, Ahmad Al-Rubaie, John Davies, Sandra Stincic, A. Aljasmi","doi":"10.1109/SmartNets50376.2021.9555424","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9555424","url":null,"abstract":"The Chiller of a Heating, Ventilation, and Air-Conditioning (HVAC) system is a complex and expensive multicomponent appliance that is not impervious to failure. Predicting, or even identifying, a fault at its inception, can reduce the scale of the damage and mitigate the potential losses to be incurred, both financial and operational. This paper presents a systematic approach for the analysis of multiple streams of data from chillers to identify potential failures as soon as they become detectable from the data. The data streams are received from sensors in the IoT ecosystem of chillers to monitor the multitude of processes and parameters that are vital to their operation. Chillers have built-in mechanisms to generate alarms when key sensor values go beyond designated limits. A certain combination of these alarms is responsible for chiller failure, therefore, our proposed method needs to first predict these alarms using multi-sensor data fusion. Thus, in this IoT ecosystem there are two levels of sensor fusion for our predictive models: at the sensor level and at the derived alarms level. The final objective is to determine “time-time-to-next-alarm” TA). The model for TTA is built using time-shifted sensor values. Since chiller failure is a function of sensor alarms, and both are binary in nature, a special technique of logistic circuits is used to mimic the combination logical circuit to predict the failure of the chiller.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges and Approaches to Time-Series Forecasting for Traffic Prediction at Data Centers","authors":"Shruti Jadon, A. Patankar, Jan Kanty Milczek","doi":"10.1109/SmartNets50376.2021.9555422","DOIUrl":"https://doi.org/10.1109/SmartNets50376.2021.9555422","url":null,"abstract":"Time-series forecasting has been an important research domain with significant applications, such as ECG predictions, sales forecasting, weather conditions, and recently COVID-19 spread predictions. Many researchers have investigated a multitude of modeling approaches to meet the requirements of these wide ranges of applications. In this context, our work focuses on reviewing different forecasting approaches for telemetry data collected in networks and data centers. Forecasting of telemetry data is a critical feature of network and data center management products. However, there are multiple options of forecasting approaches that range from a simple linear statistical model to high-capacity deep learning architectures. In this paper, we summarize and evaluate the performance of many well-known time series forecasting techniques. This research evaluation aims to provide a comprehensive summary for further innovation in forecasting approaches for telemetry data.","PeriodicalId":443191,"journal":{"name":"2021 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132259670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}