Md Shahriar Nazim, Yeong Min Jang, ByungDeok Chung
{"title":"Machine Learning Based Battery Anomaly Detection Using Empirical Data","authors":"Md Shahriar Nazim, Yeong Min Jang, ByungDeok Chung","doi":"10.1109/ICAIIC60209.2024.10463489","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463489","url":null,"abstract":"In the context of energy storage systems (ESS), this work investigates the use of machine learning approaches for anomaly identification utilizing empirical site data. Making advantage of the empirical data gathered from the operational environment, the study concentrates on using precise anomaly detection techniques-mainly the Isolation Forest method. The Isolation forest approach is utilized to detect abnormalities in the empirical data obtained by ESS operations. It is well-known for its effectiveness in locating outliers in datasets. In order to improve the operational dependability and safety of Energy Storage Systems (ESS), this study explores the application of the Isolation Forest technique as a powerful tool for identifying anomalies in the site data. The results of the study show that, Isolation forest can detect anomalies with the accuracy of 99.43 %.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"62 ","pages":"847-850"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alessandro Buratto, Elia Guerra, M. Miozzo, Paolo Dini, L. Badia
{"title":"Energy Minimization for Participatory Federated Learning in IoT Analyzed via Game Theory","authors":"Alessandro Buratto, Elia Guerra, M. Miozzo, Paolo Dini, L. Badia","doi":"10.1109/ICAIIC60209.2024.10463513","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463513","url":null,"abstract":"The Internet of Things requires intelligent decision making in many scenarios. To this end, resources available at the individual nodes for sensing or computing, or both, can be leveraged. This results in approaches known as participatory sensing and federated learning, respectively. We investigate the simultaneous implementation of both, through a distributed approach based on empowering local nodes with game theoretic decision making. A global objective of energy minimization is combined with the individual node's optimization of local expenditure for sensing and transmitting data over multiple learning rounds. We present extensive evaluations of this technique, based on both a theoretical framework and experiments in a simulated network scenario with real data. Such a distributed approach can reach a desired level of accuracy for federated learning without a centralized supervision of the data collector. However, depending on the weight attributed to the local costs of the single node, it may also result in a significantly high Price of Anarchy (from 1.28 onwards). Thus, we argue for the need of incentive mechanisms, possibly based on Age of Information of the single nodes.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"35 12","pages":"249-254"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uyen Do, Laura Lahesoo, R. Carnier, Kensuke Fukuda
{"title":"Evaluation of XAI Algorithms in IoT Traffic Anomaly Detection","authors":"Uyen Do, Laura Lahesoo, R. Carnier, Kensuke Fukuda","doi":"10.1109/ICAIIC60209.2024.10463357","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463357","url":null,"abstract":"Anomaly detection in network traffic, both in general computer networks and specifically in Internet of Things (IoT) networks, plays a crucial role in ensuring computer network security. Over the years, numerous machine learning and deep learning-based anomaly detection tools have been proposed, exhibiting high accuracy in identifying anomalous behavior. However, a significant challenge arises with most machine learning and deep learning algorithms, as they are often considered black-box models that lack interpretability. Consequently, explaining the reasons behind certain network behaviors being labeled as anomalous becomes a difficult task. To overcome this issue, we evaluate the combination of anomaly detectors and eXplainable Artificial Intelligence (XAI) algorithms in IoT traffic anomaly detection. Our research results demonstrate that XAI algorithms can consistently identify the most impactful network features of security anomalies. More specifically, (1) SHAP algorithm is the most robust and reliable in the four tested XAI algorithms for four types of supervised/unsupervised anomaly detection models, independent of two datasets including different anomalies. (2) Image-based XAI algorithms are not suitable for explainability of network anomaly detection.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"72 ","pages":"669-674"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Greenhouse Automated Carbon Cycling System for Carbon Savings","authors":"Kwang Ho Yang, H. Yoe, Mi Suk Kim, Meong-hun Lee","doi":"10.1109/ICAIIC60209.2024.10463490","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463490","url":null,"abstract":"Given the realities of global warming and climate change, the agricultural sector must produce food in more efficient and sustainable ways. In this context, we studied ways to utilize carbon dioxide for crop growth by improving greenhouse heating systems that use fossil fuels. This study studies the design and feasibility of a system that collects carbon dioxide generated by burning fossil fuels in winter greenhouses and supplies it to the crop area. The study results suggest the following important conclusions: First, this system can promote crop growth and improve agricultural productivity, and optimize crop growth conditions. Second, it has the ability to minimize energy consumption and reduce greenhouse gas emissions by considering energy efficiency. As a result, this system is expected to help achieve carbon neutrality in agriculture by minimizing the environmental impact of fossil fuel use.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"49 4","pages":"864-867"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Solving the Data Imbalance Problem for Detecting Heunginjimun Roof Tilt Using Transfer Learning Algorithms","authors":"Sang-Yun Lee, Seok-Ju Kang","doi":"10.1109/ICAIIC60209.2024.10463414","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463414","url":null,"abstract":"Cultural heritage with high historical value requires continuous management and protection. However, recognizing subtle changes with the naked eye has limitations and requires much time and personnel deployment. To solve this problem, we will automatically detect the tilt of Heunginjimun's roof using Transfer Learning algorithms. In a previous study, among single environments classified into nine types according to season and weather, the ratio of normal and abnormal images in the winter/night and winter/daytime datasets was unbalanced at 9:1 and 8:2. As a result, problems with poor prediction accuracy occurred in some experiments. In this paper, to solve this problem, we adjusted the composition ratio of the dataset and measured the prediction accuracy. When comparing the measurement results with previous studies, the dataset size was reduced by half, but the accuracy was higher. This showed that higher accuracy and performance can be expected by achieving the balance between classes rather than increasing the dataset size.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"37 5","pages":"221-225"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ebuka Chinaechetam Nkoro, C. I. Nwakanma, Jae-Min Lee, Dong‐Seong Kim
{"title":"Bit-by-Bit: A Quantization-Aware Training Framework with XAI for Robust Metaverse Cybersecurity","authors":"Ebuka Chinaechetam Nkoro, C. I. Nwakanma, Jae-Min Lee, Dong‐Seong Kim","doi":"10.1109/ICAIIC60209.2024.10463374","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463374","url":null,"abstract":"In this work, a novel framework for detecting mali-cious networks in the IoT-enabled Metaverse networks to ensure that malicious network traffic is identified and integrated to suit optimal Metaverse cybersecurity is presented. First, the study raises a core security issue related to the cyberthreats in Metaverse networks and its privacy breaching risks. Second, to address the shortcomings of efficient and effective network intrusion detection (NIDS) of dark web traffic, this study employs a quantization-aware trained (QAT) 1D CNN followed by fully con-nected networks (ID CNNs-GRU-FCN) model, which addresses the issues of and memory contingencies in Metaverse NIDS models. The QAT model is made interpretable using eXplainable artificial intelligence (XAI) methods namely, SHapley additive exPlanations (SHAP) and local interpretable model-agnostic ex-planations (LIME), to provide trustworthy model transparency and interpretability. Overall, the proposed method contributes to storage benefits four times higher than the original model without quantization while attaining a high accuracy of 99.82 %.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"35 31","pages":"832-837"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Urslla Uchechi Izuazu, Vivian Ukamaka Ihekoronye, Dong‐Seong Kim, Jae Min Lee
{"title":"Securing Critical Infrastructure: A Denoising Data-Driven Approach for Intrusion Detection in ICS Network","authors":"Urslla Uchechi Izuazu, Vivian Ukamaka Ihekoronye, Dong‐Seong Kim, Jae Min Lee","doi":"10.1109/ICAIIC60209.2024.10463488","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463488","url":null,"abstract":"The centralized and vulnerable nature of the industrial control system (ICS) communication network makes it an attractive target for malicious actors aiming to infiltrate and exploit vulnerabilities. These threat actors seek to cause disruptions, compromise sensitive data, and potentially sabotage critical industrial processes. Existing methods for threat detection assume an ideal scenario where there exists no noise/disturbance to threat detection and classification, neglecting to account for the inherent noise and complexity present in real-world industrial processing environments. In reality, the deployment of these models may introduce performance degradation leading to sub-optimal model performance. In response to the identified issue, this study presents a security framework that proactively addresses the challenges posed by noise and provides a robust mechanism for detecting malicious activities from routine industrial network operations. The proposed framework can be deployed at the supervision network segment of ICS to analyze incoming network traffic signals, to effectively distinguish an attack from normal operation amdist noise. Our proposed approach undergoes experimental simulations to validate its effectiveness, and is compared with state-of-the-art based on key performance metrics. Simulation results show that our approach is robust in reconstructing noisy traffic signals with a minimal mean square error of 0.12 and an overall accuracy of 99.6%, outperforming existing methods.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"41 11","pages":"841-846"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense Method Challenges Against Backdoor Attacks in Neural Networks","authors":"Samaneh Shamshiri, Insoo Sohn","doi":"10.1109/ICAIIC60209.2024.10463411","DOIUrl":"https://doi.org/10.1109/ICAIIC60209.2024.10463411","url":null,"abstract":"Open-source machine-learning models demon-strated promising performance in a wide range of applications. However, they have been proved to be fragile against backdoor attacks. Backdoor attack, as a cyber-threat, results in targeted or not-targeted mis-classification of the neural networks without effecting the accuracy of the benign data samples. This happens through inserting imperceptible malicious triggers to the small part of datasets to change the prediction of the model based on attacker desired results. Therefore, a big part of researches focused on improving the robustness of the neural networks using different kind of detection and mitigation algorithms. In this paper, we discussed the challenges of the defense methods against backdoor attacks in machine learning models. Furthermore, we explored three state-of-the art defense algorithms against BDs including DB-COVIDNet, fine-pruning, LPSF and delve into the evolving landscape of backdoor attacks and the inherent difficulties in developing robust defense mechanisms.","PeriodicalId":518256,"journal":{"name":"2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":"20 6","pages":"396-400"},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140527896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}