danielphan2003 / arxiv-daily-summaries

An issue a day keeps the paper overload away.
1 stars 0 forks source link

New submissions for Tue, 18 Apr 23 #24

Open github-actions[bot] opened 1 year ago

github-actions[bot] commented 1 year ago

This is an autogenerated issue. It uses the facebook/bart-large-cnn model to generate summaries for each papers appeared below.


Keyword: iot (14 papers)

Few-shot Weakly-supervised Cybersecurity Anomaly Detection

:brain: Authors: Rahul Kale, Vrizlynn L. L. Thing
:paw_prints: Details: arXiv:2304.07470
:ramen: tl;dr: Cyberattacks compromising users' sensitive data are becoming more prevalent. Traditional defense mechanisms may not be sufficiently equipped to handle the complex and ever-changing new threats. We propose an enhancement to an existing few-shot weakly-supervised deep learning anomaly detection framework. This framework incorporates data augmentation, representation learning and ordinal regression....
:sunflower: Comments: Computer and Security (Elsevier)
:seedling: Read more →

Herder Ants: Ant Colony Optimization with Aphids for Discrete Event-Triggered Dynamic Optimization Problems

:brain: Authors: Jonas Skackauskas, Tatiana Kalganova
:paw_prints: Details: arXiv:2304.07646
:ramen: tl;dr: Ant Colony Optimization (ACO) with Aphids is modelled after a real-world symbiotic relationship between ants and aphids. The proposed strategy aims to improve the inter-state convergence rate throughout the entire dynamic optimization. It does so by minimizing the fitness penalty and maximizing the convergence speed that occurs after the dynamic change....
:seedling: Read more →

FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare through Federated Learning and Blockchain

:brain: Authors: Nazar Waheed, Ateeq Ur Rehman, Anushka Nehra, Mahnoor Farooq, Nargis Tariq, Mian Ahmad Jan, Fazlullah Khan, Abeer Z. Alalmaie, Priyadarsi Nanda
:paw_prints: Details: arXiv:2304.07668
:ramen: tl;dr: The rapid adoption of Internet of Things (IoT) devices in healthcare has introduced new challenges in preserving data privacy, security and patient safety. Traditional approaches need to ensure security and privacy while maintaining computational efficiency. This paper proposes a novel hybrid approach combining federated learning and blockchain technology to provide a secure and privacy-preserved solution....
:sunflower: Comments: Submitted to: Globecom 2023
:seedling: Read more →

Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data

:brain: Authors: Nazar Waheed, Fazlullah Kha, Mian Ahmad Jan, Abeer Z. Alalmaie, Priyadarsi Nanda
:paw_prints: Details: arXiv:2304.07676
:ramen: tl;dr: The rapid expansion of Internet of Things (IoT) devices in smart homes has significantly improved the quality of life. This proliferation of connected devices raises critical concerns regarding security and privacy of the user data. In this paper, we propose a differential privacy-based system to ensure comprehensive security for data generated by smart homes....
:sunflower: Comments: Submitted to IEEE COINS
:seedling: Read more →

Sensor Data Validation for Garbage Collection Using Machine Learning

:brain: Authors: Kabeer Gulati, Zuhaib Ahmad, Abhishek Raj
:paw_prints: Details: arXiv:2304.07708
:ramen: tl;dr: Sensor data validation is crucial. Erroneous data can be corrected with this method. If the sensor outputs faulty value for a prolonged period of time, the system will be reported and a report will be generated. This fuzzy system is then used on the readings from an ultrasonic sensor....
:sunflower: Comments: 11 pages, 13 figures
:seedling: Read more →

MS-LSTM: Exploring Spatiotemporal Multiscale Representations in Video Prediction Domain

:brain: Authors: Zhifeng Ma, Hao Zhang, Jie Liu
:paw_prints: Details: arXiv:2304.07724
:ramen: tl;dr: The drastic variation of motion in spatial and temporal dimensions makes the video prediction task extremely challenging. Existing RNN models obtain higher performance by deepening or widening the model. They obtain the multi-scale features of the video only by stacking layers, which is inefficient and brings unbearable training costs (such as memory, FLOPs, and training time)...
:sunflower: Comments: arXiv admin note: substantial text overlap with arXiv:2206.03010
:seedling: Read more →

Smart Watch Supported System for Health Care Monitoring

:brain: Authors: Anshuman Mishra, Richards Joe Stanislaus
:paw_prints: Details: arXiv:2304.07789
:ramen: tl;dr: Wearable smartwatch is equipped with sensors to measure health parameters, namely, heartbeat, blood pressure, body temperature, and step count. An esp8266 Wi-Fi module uploads the health parameters into the thingspeak cloud platform with a time stamp. This smartwatch also has a joystick for cruise and navigation control of the motor driver-enabled wheelchair....
:sunflower: Comments: 5 pages and 9 figures
:seedling: Read more →

Characterizing the load profile in power grids by Koopman mode decomposition of interconnected dynamics

:brain: Authors: Ali Tavasoli, Behnaz Moradijamei, Heman Shakeri
:paw_prints: Details: arXiv:2304.07832
:ramen: tl;dr: Electricity load forecasting is crucial for effectively managing and optimizing power grids. Over the past few decades, various statistical and deep learning approaches have been used to develop load forecasting models. This paper presents an interpretable machine learning approach that identifies load dynamics using data-driven methods. The Koopman-based approach outperforms a deep learning architecture in terms of accuracy and computational efficiency....
:sunflower: Comments: 34 pages, 17 figures
:seedling: Read more →

UHF RFID and NFC Point-of-Care -- Architecture, Security, and Implementation

:brain: Authors: Giulio Maria Bianco, Emanuele Raso, Luca Fiore, Vincenzo Mazzaracchio, Lorenzo Bracciale, Fabiana Arduini, Pierpaolo Loreti, Gaetano Marrocco, Cecilia Occhiuzzi
:paw_prints: Details: arXiv:2304.08015
:ramen: tl;dr: points-of-care (PoCs) augment healthcare systems by performing care whenever needed. Personalized medicine, chronic illness management, and cost reduction can be achieved thanks to the widespread adoption of PoCs. Significant incentives for PoCs deployment are nowadays given by wearable devices and, in particular, by RFID and NFC....
:seedling: Read more →

On poroelastic strain energy degradation in the variational phase--field models for hydraulic fracture

:brain: Authors: Tao You, Keita Yoshioka
:paw_prints: Details: arXiv:2304.08139
:ramen: tl;dr: A number of formulations have been proposed for phase--field models for hydraulic fracture. We propose a new form of degraded poroelastic strain energy derived from micromechanical analyses. We demonstrate the model's ability to handle complex hydraulic fracture interactions with a pre--existing natural fracture....
:seedling: Read more →

Cardiac Arrhythmia Detection using Artificial Neural Network

:brain: Authors: Prof Sangeetha R G, Kishore Anand K, Sreevatsan B, Vishal Kumar A
:paw_prints: Details: arXiv:2304.08162
:ramen: tl;dr: The prime purpose of this project is to develop a portable cardiac abnormality monitoring device which can drastically improvise the quality of the monitoring and the overall safety of the device. This paper evaluates the feasibility of the Levenberg-Marquardt ANN algorithm for use in any generic low power wearable devices....
:seedling: Read more →

Energy Attacks in the Battery-less Internet of Things

:brain: Authors: Luca Mottola, Arslan Hameed, Thiemo Voigt
:paw_prints: Details: arXiv:2304.08224
:ramen: tl;dr: We study how ambient energy harvesting may be used as an attack vector in the battery-less Internet of Things (IoT) We demonstrate that by exerting a limited control on the ambient supply of energy to the system, one can create situations of livelock, denial of service, and priority inversion. We design a technique that can detect energy attacks with 92%+ accuracy....
:seedling: Read more →

Fog Computing& IoT: Overview, Architecture and Applications

:brain: Authors: Harshit Gupta, Dr. Ajay Kumar Bharti
:paw_prints: Details: arXiv:2304.08302
:ramen: tl;dr: Fog computing is an extended concept of cloud computing. It works in-between the Internet of Things (IoT) and cloud data centers. Fog computing has made possible to have decreased latency and low network congestion. We have also analyzed the security aspects of fog computing & IoT, which is necessary and an important part of any kind of technology....
:sunflower: Comments: 5 pages, 2 figures
:seedling: Read more →

Efficient Video Action Detection with Token Dropout and Context Refinement

:brain: Authors: Lei Chen, Zhan Tong, Yibing Song, Gangshan Wu, Limin Wang
:paw_prints: Details: arXiv:2304.08451
:ramen: tl;dr: In a video clip, we maintain all tokens from its keyframe, preserve tokens relevant to actor motions from other frames, and drop out the remaining tokens in this clip. Second, we refine scene context by leveraging remaining tokens for better recognizing actor identities. Compared to the vanilla ViT backbone, our EVAD reduces the overall GFLOPs by 43% and improves real-time inference speed by 40% with no performance degradation....
:sunflower: Comments: technical report
:seedling: Read more →

Keyword: edge computing (3 papers)

Spectrum-aware Multi-hop Task Routing in Vehicle-assisted Collaborative Edge Computing

:brain: Authors: Yiqin Deng, Haixia Zhang, Xianhao Chen, Yuguang Fang
:paw_prints: Details: arXiv:2304.07422
:ramen: tl;dr: Multi-access edge computing (MEC) is a promising technology to enhance the quality of service, particularly for low-latency services. It enables computing offloading to edge servers (ESs) in close proximity. By allowing ESs away to also share the computing workload, a multi-hop MEC enables more ESs to share their resources....
:seedling: Read more →

Edge Computing Empowered Tactile Internet for Human Digital Twin: Visions and Case Study

:brain: Authors: Hao Xiang, Kun Wu, Jiayuan Chen, Changyan Yi, Jun Cai, Dusit Niyato, Xuemin (Sherman) Shen
:paw_prints: Details: arXiv:2304.07454
:ramen: tl;dr: Tactile Internet (TI) is envisioned as a key enabling technology for an emerging application, called human digital twin (HDT) HDT is expected to revolutionize the human lifestyle and prompts the development of Metaverse. The realization of HDT poses stringent demands on pervasive connectivity, real-time feedback, high-fidelity modeling and ultra-high reliability....
:seedling: Read more →

Semantic communications, semantic edge computing, and semantic caching

:brain: Authors: Wenhan Yu, Jun Zhao
:paw_prints: Details: arXiv:2304.08096
:ramen: tl;dr: Semantic communication, which focuses on the meaning behind transmitted information, represents a departure from traditional communication paradigms. As mobile devices become increasingly prevalent, it is important to explore the potential of edge computing to aid the semantic encoding/decoding process. However, establishing knowledge bases (KBs) for domain-oriented communication can be time-consuming....
:seedling: Read more →