ACM Transactions on Internet Technology最新文献

筛选
英文 中文
PPRP: Preserving-Privacy Route Planning Scheme in VANETs PPRP: vanet中保持隐私的路由规划方案
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2022-02-03 DOI: 10.1145/3430507
Yan-hua Liang, Yining Liu, B. Gupta
{"title":"PPRP: Preserving-Privacy Route Planning Scheme in VANETs","authors":"Yan-hua Liang, Yining Liu, B. Gupta","doi":"10.1145/3430507","DOIUrl":"https://doi.org/10.1145/3430507","url":null,"abstract":"Route planning helps a vehicle to share a message with the roadside units (RSUs) on its path in advance, which greatly speeds the authentication between the vehicle and the RSUs when the vehicle enters the RSUs’ coverage. In addition, since only a small amount of necessary information needs to be shared between the vehicle and the RSUs, route planning can reduce the storage overhead of the vehicle’s on-board unit (OBU) and the RSUs. However, the message sharing requires the assistance of the certification authority (CA), which will lead CA easily to obtain the vehicle’s planning route. Although CA knows the vehicle’s registration information and helps the vehicle to communicate with RSUs, it is unacceptable that the path of their vehicle is obtained by CA for most drivers. In fact, vehicle’s sensitive information such as planning route, starting time, stop place, should be privacy for others including CA. Inspired with the method of oblivious transfer, a preserving-privacy route planning scheme in VANETs is proposed in this article, in which, a vehicle deduces the information of RSUs on its path with the help of CA, while CA knows nothing about which RSUs’ information has been deduced by the vehicle. Later, fast authentication or other service is easily achieved between the vehicle and the RSUs (V2R) with the pre-shared information. After V2R authentication, vehicles could easily communicate with adjacent vehicles with the help of RSUs (V2V). Finally, compared with related schemes, performance evaluation illustrates the proposed scheme is better in terms of time consumption.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 18"},"PeriodicalIF":5.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48405721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Governance of Autonomous Agents on the Web: Challenges and Opportunities Web上自治代理的治理:挑战与机遇
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2022-02-03 DOI: 10.1145/3507910
Timotheus Kampik, Adnane Mansour, O. Boissier, S. Kirrane, J. Padget, T. Payne, Munindar P. Singh, V. Tamma, Antoine Zimmermann
{"title":"Governance of Autonomous Agents on the Web: Challenges and Opportunities","authors":"Timotheus Kampik, Adnane Mansour, O. Boissier, S. Kirrane, J. Padget, T. Payne, Munindar P. Singh, V. Tamma, Antoine Zimmermann","doi":"10.1145/3507910","DOIUrl":"https://doi.org/10.1145/3507910","url":null,"abstract":"The study of autonomous agents has a long history in the Multiagent System and the Semantic Web communities, with applications ranging from automating business processes to personal assistants. More recently, the Web of Things (WoT), which is an extension of the Internet of Things (IoT) with metadata expressed in Web standards, and its community provide further motivation for pushing the autonomous agents research agenda forward. Although representing and reasoning about norms, policies, and preferences is crucial to ensuring that autonomous agents act in a manner that satisfies stakeholder requirements, normative concepts, policies, and preferences have yet to be considered as first-class abstractions in Web-based multiagent systems. Towards this end, this article motivates the need for alignment and joint research across the Multiagent Systems, Semantic Web, and WoT communities, introduces a conceptual framework for governance of autonomous agents on the Web, and identifies several research challenges and opportunities.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 31"},"PeriodicalIF":5.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48718211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities 边缘计算AI物联网智能城市综合节能智能交通系统
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2022-02-03 DOI: 10.1145/3507906
Suresh Chavhan, Deepak Gupta, Sarada Prasad Gochhayat, C. N, Ashish Khanna, K. Shankar, Joel J. P. C. Rodrigues
{"title":"Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities","authors":"Suresh Chavhan, Deepak Gupta, Sarada Prasad Gochhayat, C. N, Ashish Khanna, K. Shankar, Joel J. P. C. Rodrigues","doi":"10.1145/3507906","DOIUrl":"https://doi.org/10.1145/3507906","url":null,"abstract":"With the advancement of information and communication technologies (ICTs), there has been high-scale utilization of IoT and adoption of AI in the transportation system to improve the utilization of energy, reduce greenhouse gas (GHG) emissions, increase quality of services, and provide many extensive benefits to the commuters and transportation authorities. In this article, we propose a novel edge-based AI-IoT integrated energy-efficient intelligent transport system for smart cities by using a distributed multi-agent system. An urban area is divided into multiple regions, and each region is sub-divided into a finite number of zones. At each zone an optimal number of RSUs are installed along with the edge computing devices. The MAS deployed at each RSU collects a huge volume of data from the various sensors, devices, and infrastructures. The edge computing device uses the collected raw data from the MAS to process, analyze, and predict. The predicted information will be shared with the neighborhood RSUs, vehicles, and cloud by using MAS with the help of IoT. The predicted information can be used by freight vehicles to maintain smooth and steady movement, which results in reduction in GHG emissions and energy consumption, and finally improves the freight vehicles’ mileage by reducing traffic congestion in the urban areas. We have exhaustively carried out the simulation results and demonstrated the effectiveness of the proposed system.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 18"},"PeriodicalIF":5.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43975058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Semantic Management of On-Device Applications in Industrial IoT 面向工业物联网设备上应用的语义管理
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2022-02-03 DOI: 10.1145/3510820
Haoyu Ren, Darko Anicic, T. Runkler
{"title":"Towards Semantic Management of On-Device Applications in Industrial IoT","authors":"Haoyu Ren, Darko Anicic, T. Runkler","doi":"10.1145/3510820","DOIUrl":"https://doi.org/10.1145/3510820","url":null,"abstract":"The Internet of Things (IoT) is revolutionizing the industry. Powered by pervasive embedded devices, the Industrial IoT (IIoT) provides a unique solution for retrieving and analyzing data near the source in real-time. Many emerging techniques, such as Tiny Machine Learning (TinyML) and Complex Event Processing (CEP), are actively being developed to support decision making at the edge, shifting the paradigm from centralized processing to distributed computing. However, distributed computing presents management challenges, as IoT devices are diverse and constrained, and their number is growing exponentially. The situation is even more challenging when various on-device applications (so-called artifacts) are deployed across decentralized IoT networks. Questions to be addressed include how to discover an appropriate function, whether that function can be executed on a certain device, and how to orchestrate a cross-platform service. To tackle these challenges, we propose an approach for the scalable management of on-device applications among distributed IoT devices. By leveraging the W3C Web of Things (WoT), the capabilities of each IoT device, or more precisely, its interaction patterns, can be semantically expressed in a Thing Description (TD). In addition, we introduce semantic modeling of on-device applications to supplement an TD with additional information regarding applications on the device. Specifically, we demonstrate two examples of semantic modeling: neural networks (NN) and CEP rules. The ontologies are evaluated by answering a set of competency questions. By hosting the enriched semantic knowledge of the entire IoT system in a Knowledge Graph (KG), we can discover and interoperate edge devices and artifacts across the decentralized network. This can reduce fragmentation and increase the reusability of IoT components. We demonstrate the feasibility of our concept on an industrial workstation consisting of a conveyor belt and several IoT devices. Finally, the requirements for constructing an IoT semantic management system are discussed.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 30"},"PeriodicalIF":5.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43432976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles 车联网安全信息验证的高效加密硬件
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2022-02-03 DOI: 10.1145/3431499
Mohamad Ali Mehrabi, A. Jolfaei
{"title":"Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles","authors":"Mohamad Ali Mehrabi, A. Jolfaei","doi":"10.1145/3431499","DOIUrl":"https://doi.org/10.1145/3431499","url":null,"abstract":"An important security requirement in automotive networks is to authenticate, sign, and verify thousands of short messages per second by each vehicle. This requirement mandates the use of a high speed Elliptic Curve Cryptography (ECC) hardware. The Residue Number Systems (RNS) provide a natural parallelism and carry-free operations that could speed-up long integer arithmetics of cryptographic algorithms. In this article, we propose a high-speed RNS Montgomery modular reduction units with parallel computing to reduce the latency of the field modular operations. We propose a fully RNS-based ECC scalar multiplication co-processor for NIST-P256r1 and Brainpool256r1 standard curves and improved the scalar multiplication speed using NAF and DBC numbering systems. Compared to the literature, our scheme provides faster computation without compromising the security level. The performance of our fully RNS-ECC point multiplication meets the requirements of the automotive industry.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 16"},"PeriodicalIF":5.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47900542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles 基于深度学习的车联网安全骨干网流量预测
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2022-02-03 DOI: 10.1145/3433548
Xiaojie Wang, Laisen Nie, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, N. Kumar
{"title":"Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles","authors":"Xiaojie Wang, Laisen Nie, Zhaolong Ning, Lei Guo, Guoyin Wang, Xinbo Gao, N. Kumar","doi":"10.1145/3433548","DOIUrl":"https://doi.org/10.1145/3433548","url":null,"abstract":"Internet of Vehicles (IoV), as a special application of Internet of Things (IoT), has been widely used for Intelligent Transportation System (ITS), which leads to complex and heterogeneous IoV backbone networks. Network traffic prediction techniques are crucial for efficient and secure network management, such as routing algorithm, network planning, and anomaly and intrusion detection. This article studies the problem of end-to-end network traffic prediction in IoV backbone networks, and proposes a deep learning-based method. The constructed system considers the spatio-temporal feature of network traffic, and can capture the long-range dependence of network traffic. Furthermore, a threshold-based update mechanism is put forward to improve the real-time performance of the designed method by using Q-learning. The effectiveness of the proposed method is evaluated by a real network traffic dataset.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 20"},"PeriodicalIF":5.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64034973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee 保证隐私的域间路由联合路由泄漏检测
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2021-10-15 DOI: 10.1145/3561051
Man Zeng, Dandan Li, Pei Zhang, Kun Xie, Xiaohong Huang
{"title":"Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee","authors":"Man Zeng, Dandan Li, Pei Zhang, Kun Xie, Xiaohong Huang","doi":"10.1145/3561051","DOIUrl":"https://doi.org/10.1145/3561051","url":null,"abstract":"In the inter-domain network, route leaks can disrupt the Internet traffic and cause large outages. The accurate detection of route leaks requires the sharing of AS business relationship information. However, the business relationship information between ASes is confidential. ASes are usually unwilling to reveal this information to the other ASes, especially their competitors. In this paper, we propose a method named FL-RLD to detect route leaks while maintaining the privacy of business relationships between ASes by using a blockchain-based federated learning framework, where ASes can collaboratively train a global detection model without directly disclosing their specific business relationships. To mitigate the lack of ground-truth validation data in route leaks, FL-RLD provides a self-validation scheme by labeling AS triples with local routing policies. We evaluate FL-RLD under a variety of datasets including imbalanced and balanced datasets, and examine different deployment strategies of FL-RLD under different topologies. According to the results, FL-RLD performs better in detecting route leaks than the single AS detection, whether the datasets are balanced or imbalanced. Additionally, the results indicate that selecting ASes with the most peers to first deploy FL-RLD brings more significant benefits in detecting route leaks than selecting ASes with the most providers and customers.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"23 1","pages":"1 - 22"},"PeriodicalIF":5.3,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49546714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy PANOLA:支持用户保护隐私的个人助理
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2021-09-14 DOI: 10.1145/3471187
Onuralp Ulusoy, P. Yolum
{"title":"PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy","authors":"Onuralp Ulusoy, P. Yolum","doi":"10.1145/3471187","DOIUrl":"https://doi.org/10.1145/3471187","url":null,"abstract":"Privacy is the right of individuals to keep personal information to themselves. When individuals use online systems, they should be given the right to decide what information they would like to share and what to keep private. When a piece of information pertains only to a single individual, preserving privacy is possible by providing the right access options to the user. However, when a piece of information pertains to multiple individuals, such as a picture of a group of friends or a collaboratively edited document, deciding how to share this information and with whom is challenging. The problem becomes more difficult when the individuals who are affected by the information have different, possibly conflicting privacy constraints. Resolving this problem requires a mechanism that takes into account the relevant individuals’ concerns to decide on the privacy configuration of information. Because these decisions need to be made frequently (i.e., per each piece of shared content), the mechanism should be automated. This article presents a personal assistant to help end-users with managing the privacy of their content. When some content that belongs to multiple users is about to be shared, the personal assistants of the users employ an auction-based privacy mechanism to regulate the privacy of the content. To do so, each personal assistant learns the preferences of its user over time and produces bids accordingly. Our proposed personal assistant is capable of assisting users with different personas and thus ensures that people benefit from it as they need it. Our evaluations over multiagent simulations with online social network content show that our proposed personal assistant enables privacy-respecting content sharing.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"22 1","pages":"1 - 32"},"PeriodicalIF":5.3,"publicationDate":"2021-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64044949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Big Data Processing on Volunteer Computing 志愿者计算机的大数据处理
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2021-07-22 DOI: 10.1145/3409801
Zhihan Lv, Dongliang Chen, A. Singh
{"title":"Big Data Processing on Volunteer Computing","authors":"Zhihan Lv, Dongliang Chen, A. Singh","doi":"10.1145/3409801","DOIUrl":"https://doi.org/10.1145/3409801","url":null,"abstract":"In order to calculate the node big data contained in complex networks and realize the efficient calculation of complex networks, based on voluntary computing, taking ICE middleware as the communication medium, the loose coupling distributed framework DCBV based on voluntary computing is proposed. Then, the Master, Worker, and MiddleWare layers in the framework, and the development structure of a DCBV framework are designed. The task allocation and recovery strategy, message passing and communication mode, and fault tolerance processing are discussed. Finally, to calculate and verify parameters such as the average shortest path of the framework and shorten calculation time, an improved accurate shortest path algorithm, the N-SPFA algorithm, is proposed. Under different datasets, the node calculation and performance of the N-SPFA algorithm are explored. The algorithm is compared with four approximate shortest-path algorithms: Combined Link and Attribute (CLA), Lexicographic Breadth First Search (LBFS), Approximate algorithm of shortest path length based on center distance of area division (CDZ), and Hub Vertex of area and Core Expressway (HEA-CE). The results show that when the number of CPU threads is 4, the computation time of the DCBV framework is the shortest (514.63 ms). As the number of CPU cores increases, the overall computation time of the framework decreases gradually. For every 2 additional CPU cores, the number of tasks increases by 1. When the number of Worker nodes is 8 and the number of nodes is 1, the computation time of the framework is the shortest (210,979 ms), and the IO statistics data increase with the increase of Worker nodes. When the datasets are Undirected01 and Undirected02, the computation time of the N-SPFA algorithm is the shortest, which is 4520 ms and 7324 ms, respectively. However, the calculation time in the ca-condmat_undirected dataset is 175,292 ms, and the performance is slightly worse. Overall, however, the performance of the N-SPFA and SPFA algorithms is good. Therefore, the two algorithms are combined. For networks with less complexity, the computational scale coefficient of the SPFA algorithm can be set to 0.06, and for general networks, 0.2. When compared with other algorithms in different datasets, the pretreatment time, average query time, and overall query time of N-SPFA algorithm are the shortest, being 49.67 ms, 5.12 ms, and 94,720 ms, respectively. The accuracy (1.0087) and error rate (0.024) are also the best. In conclusion, voluntary computing can be applied to the processing of big data, which has a good reference significance for the distributed analysis of large-scale complex networks.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":" ","pages":"1 - 20"},"PeriodicalIF":5.3,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3409801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42280241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Screw Slot Quality Inspection System Based on Tactile Network 基于触觉网络的螺杆槽质量检测系统
IF 5.3 3区 计算机科学
ACM Transactions on Internet Technology Pub Date : 2021-07-22 DOI: 10.1145/3423556
Yan-Chun Chen, Ren-Hung Hwang, Mu-Yen Chen, Chih-Chin Wen, Chih-Ping Hsu
{"title":"Screw Slot Quality Inspection System Based on Tactile Network","authors":"Yan-Chun Chen, Ren-Hung Hwang, Mu-Yen Chen, Chih-Chin Wen, Chih-Ping Hsu","doi":"10.1145/3423556","DOIUrl":"https://doi.org/10.1145/3423556","url":null,"abstract":"The popularity of 5G networks has made smart manufacturing not limited to high-tech industries such as semiconductors due to its high speed, ultra-high reliability, and low latency. With the advance of system on chip (SoC) design and manufacturing, 5G is also suitable for data transmission in harsh manufacturing environments such as high temperatures, dust, and extreme vibration. The defect of the screw head is caused by the wear and deformation of the die forming the head after mass production. Therefore, the screw quality inspection system based on the tactile network in this article monitors the production quality of the screw; the system will send a warning signal through the router to remind the technician to solve the production problem when the machine produces a defective product. Sensors are embedded into the traditional screw heading machine, and sensing data are transmitted through a gateway to the voluntary computing node for screw slot quality inspection. The anomaly detection data set collected by the screw heading machine has a ratio of anomaly to normal data of 0.006; thus, we propose a time-series deep AutoEncoder architecture for anomaly detection of screw slots. Our experimental results show that the proposed solution outperforms existing works in terms of efficiency and that the specificity and accuracy can reach 97% through the framework proposed in this article.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":"21 1","pages":"1 - 17"},"PeriodicalIF":5.3,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3423556","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47452800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信