danielphan2003 / arxiv-daily-summaries

An issue a day keeps the paper overload away.
1 stars 0 forks source link

New submissions for Tue, 13 Jun 23 #62

Open github-actions[bot] opened 1 year ago

github-actions[bot] commented 1 year ago

This is an autogenerated issue. It uses the facebook/bart-large-cnn model to generate summaries for each papers appeared below.


Keyword: IoT (13 papers)

Integrating Usage Control into Distributed Ledger Technology for Internet of Things Privacy

:brain: Authors: Nathanaël Denis (TSP), Maryline Laurent (TSP), Sophie Chabridon (TSP)
:paw_prints: Details: arXiv:2306.06143
:ramen: tl;dr: The Internet of Things brings new ways to collect privacy-sensitive data from billions of devices. Well-tailored distributed ledger technologies (DLTs) can provide high transaction processing capacities to IoT devices. Privacy aspects are often neglected or unsatisfying, with a focus mainly on performance and security. We introduce decentralized usage control mechanisms to empower IoT devices to control the data they generate....
:seedling: Read more →

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security

:brain: Authors: Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu, Zhuo Lu
:paw_prints: Details: arXiv:2306.06178
:ramen: tl;dr: Artificial intelligence is advocated to enable a data-driven paradigm for wireless network design. New network architectures, such as the Internet of Things (IoT), 5G, and next-generation (NextG) cellular systems, put forward emerging challenges to the design of future wireless networks....
:seedling: Read more →

Design Frameworks for Hyper-Connected Social XRI Immersive Metaverse Environments

:brain: Authors: Jie Guan, Alexis Morris
:paw_prints: Details: arXiv:2306.06230
:ramen: tl;dr: The metaverse refers to the merger of technologies for providing a digital twin of the real world. As this set of technology paradigms gains in scale, maturity, and utility there are rapidly emerging design challenges. In particular is the metaverse disconnect problem, the gap in task switching that inevitably occurs when a user engages with multiple virtual and physical environments simultaneously....
:seedling: Read more →

Zero-Day Threats Detection for Critical Infrastructures

:brain: Authors: Mike Nkongolo, Mahmut Tokmak
:paw_prints: Details: arXiv:2306.06366
:ramen: tl;dr: The research paper focuses on the importance of defending critical infrastructures against intrusions and security threats. It proposes a computational framework that incorporates feature selection through fuzzification. The research identifies Random Forest (RF) and Extreme Gradient Boosting (XGB) as the top performing algorithms to detect zero-day attacks....
:seedling: Read more →

Quantifying the Benefits of Carbon-Aware Temporal and Spatial Workload Shifting in the Cloud

:brain: Authors: Thanathorn Sukprasert, Abel Souza, Noman Bashir, David Irwin, Prashant Shenoy
:paw_prints: Details: arXiv:2306.06502
:ramen: tl;dr: To mitigate climate change, there has been a recent focus on reducing computing's carbon emissions by shifting its time and location to when and where lower-carbon energy is available. Despite the prominence of carbon-aware spatiotemporal workload shifting, prior work has only quantified its benefits in narrow settings, i.e., for specific workloads....
:seedling: Read more →

Analysis of Cascading Failures Due to Dynamic Load-Altering Attacks

:brain: Authors: Maldon Patrice Goodridge, Alessandro Zocca, Subhash Lakshminarayana
:paw_prints: Details: arXiv:2306.06511
:ramen: tl;dr: Large-scale load-altering attacks (LAAs) are known to severely disrupt power grid operations. The inherent security features in power grids such as the $N-1$ design philosophy dictate LAAs that can trigger cascading failures are rare. We overcome the challenge of efficiently sampling critical LAAs scenarios for a wide range of attack parameters....
:seedling: Read more →

Task-Oriented Integrated Sensing, Computation and Communication for Wireless Edge AI

:brain: Authors: Hong Xing, Guangxu Zhu, Dongzhu Liu, Haifeng Wen, Kaibin Huang, Kaishun Wu
:paw_prints: Details: arXiv:2306.06603
:ramen: tl;dr: edge artificial intelligence (AI) has been proposed to provide high-performance computation of a conventional cloud down to the network edge. Most existing design frameworks separate these designs incurring unnecessary signaling overhead and waste of energy. We provide an overview of principles of enabling ISCC technologies followed by two concrete use cases of edge AI tasks demonstrating the advantage of task-oriented ISCC....
:sunflower: Comments: 18 pages, 6 figures, submitted for possible journal publication
:seedling: Read more →

Analysis of a contention-based approach over 5G NR for Federated Learning in an Industrial Internet of Things scenario

:brain: Authors: Giampaolo Cuozzo, Jonas Pettersson, Massimo Condoluci
:paw_prints: Details: arXiv:2306.06647
:ramen: tl;dr: Growing interest in new applications involving co-located heterogeneous requirements, such as the Industrial Internet of Things (IIoT) paradigm. Dedicated scheduling has been the fundamental approach used by mobile radio systems for uplink transmissions. We present a contention-based design introduced for uplinking transmissions in a 5G NR IIoT scenario....
:seedling: Read more →

MLE-based Device Activity Detection under Rician Fading for Massive Grant-free Access with Perfect and Imperfect Synchronization

:brain: Authors: Wang Liu, Ying Cui, Feng Yang, Lianghui Ding, Jun Sun
:paw_prints: Details: arXiv:2306.06734
:ramen: tl;dr: Most existing studies on massive grant-free access, proposed to support massive machine-type communications (mMTC), assume Rayleigh fading and perfect synchronization for simplicity. In practice, line-of-sight (LoS) components generally exist, and time and frequency synchronization are usually imperfect. This paper systematically investigates maximum likelihood estimation (MLE)-based device activity detection under Rician fading....
:seedling: Read more →

IoT-AD: A Framework To Detect Anomalies Among Interconnected IoT Devices

:brain: Authors: Hasniuj Zahan, Md Washik Al Azad, Ihsan Ali, Spyridon Mastorakis
:paw_prints: Details: arXiv:2306.06764
:ramen: tl;dr: In an Internet of Things (IoT) environment, several IoT devices may be available that are interconnected with each other. In such interconnected environments, a faulty or compromised IoT device could impact the operation of other IoT devices. In this paper, we argue that mitigating the propagation of the anomalous behavior exhibited by a device to other devices is equally important to detecting this behavior in the first place....
:sunflower: Comments: Accepted for publication by the IEEE Internet of Things Journal. The copyright is with IEEE
:seedling: Read more →

VBSF-TLD: Validation-Based Approach for Soft Computing-Inspired Transfer Learning in Drone Detection

:brain: Authors: Jaskaran Singh
:paw_prints: Details: arXiv:2306.06797
:ramen: tl;dr: With the increasing utilization of Internet of Things (IoT) enabled drones, concerns regarding privacy and security have become more prominent. Drones have the ability to capture sensitive information, compromise privacy, and pose security risks. As a result, the demand for advanced technology to automate drone detection has become crucial....
:seedling: Read more →

Correlated Time Series Self-Supervised Representation Learning via Spatiotemporal Bootstrapping

:brain: Authors: Luxuan Wang, Lei Bai, Ziyue Li, Rui Zhao, Fugee Tsung
:paw_prints: Details: arXiv:2306.06994
:ramen: tl;dr: Correlated time series analysis plays an important role in many real-world industries. Learning an efficient representation of this large-scale data for further downstream tasks is necessary but challenging. We propose a time-step-level representation learning framework for individual instances via bootstrapped spatiotemporal representation prediction....
:sunflower: Comments: Accepted to IEEE CASE 2023
:seedling: Read more →

Dynamic Causal Graph Convolutional Network for Traffic Prediction

:brain: Authors: Junpeng Lin, Ziyue Li, Zhishuai Li, Lei Bai, Rui Zhao, Chen Zhang
:paw_prints: Details: arXiv:2306.07019
:ramen: tl;dr: Modeling complex spatiotemporal dependencies in correlated traffic series is essential for traffic prediction. While recent works have shown improved prediction performance by using neural networks, their effectiveness depends on the quality of the graph structures used to represent the spatial topology of the traffic network. In this work, we propose a novel approach that embeds time-varying dynamic Bayesian network. We then use graph convolutional networks to generate traffic forecasts....
:sunflower: Comments: Accepted to IEEE CASE 2023
:seedling: Read more →

Keyword: edge computing (1 papers)

Implementation of Multiple-Step Quantized STDP based on Linear Weight Update Memristive Synapses

:brain: Authors: Y. Liu, D. Wang, Z. Dong, H. Xie, W. Zhao
:paw_prints: Details: arXiv:2306.06379
:ramen: tl;dr: Memristors have been widely studied as artificial synapses in neuromorphic circuits. This is the first of its kind demonstrating successful pulse width encoded multiple-step quantized STDP. This proposed circuit could give an inspiration for combining the analog memristive synapse and leaky integrate-and-fire neuron with digital control units....
:sunflower: Comments: 10 pages, 25 figures
:seedling: Read more →

Keyword: Blockchain (5 papers)

Demystifying Fraudulent Transactions and Illicit Nodes in the Bitcoin Network for Financial Forensics

:brain: Authors: Youssef Elmougy, Ling Liu
:paw_prints: Details: arXiv:2306.06108
:ramen: tl;dr: A recent surge has been witnessed by training machine learning models with cryptocurrency transaction data for anomaly detection, such as money laundering and other fraudulent activities. This paper presents a holistic applied data science approach to fraud detection in the Bitcoin network. We show that adding enhanced features from the address-to-address and address-transaction graphs not only assists in effectively detecting both illicit transactions and illicit addresses, but also assists in gaining in-depth understanding of the root cause of money laundering vulnerabilities in cryptocurrency transactions....
:seedling: Read more →

Front-running Attack in Distributed Sharded Ledgers and Fair Cross-shard Consensus

:brain: Authors: Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate
:paw_prints: Details: arXiv:2306.06299
:ramen: tl;dr: Haechi is a novel cross-shard protocol that is immune to front-running attacks. Haechi introduces an ordering phase between transaction processing and execution, ensuring that the execution order of transactions is the same as the processing order. To accommodate different consensus speeds among shards, Haechesi incorporates a finalization fairness algorithm to achieve a globally fair order....
:seedling: Read more →

BlockTheFall: Wearable Device-based Fall Detection Framework Powered by Machine Learning and Blockchain for Elderly Care

:brain: Authors: Bilash Saha, Md Saiful Islam, Abm Kamrul Riad, Sharaban Tahora, Hossain Shahriar, Sweta Sneha
:paw_prints: Details: arXiv:2306.06452
:ramen: tl;dr: Falls among the elderly are a major health concern, frequently resulting in serious injuries and a reduced quality of life. "BlockTheFall" is a wearable device-based fall detection framework which detects falls in real time by using sensor data from wearable devices. To ensure data integrity and security, the framework stores and verifies fall event data using blockchain technology....
:sunflower: Comments: Accepted to publish in The 1st IEEE International Workshop on Digital and Public Health
:seedling: Read more →

Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions

:brain: Authors: Mohammed Eunus Ali, Muhammad Aamir Cheema, Tanzima Hashem, Anwaar Ulhaq, Muhammad Ali Babar
:paw_prints: Details: arXiv:2306.06600
:ramen: tl;dr: A Spatial Digital Twin (SDT) is a specific type of digital twin that emphasizes the geospatial aspects of the physical entity. The current body of research on SDTs primarily concentrates on analyzing their potential impact and opportunities within various application domains. This paper is the first to systematically analyze different spatial technologies relevant to building an SDT in layered approach....
:sunflower: Comments: 26 pages, 2 figures
:seedling: Read more →

A UML Profile for Bitcoin Blockchain

:brain: Authors: Behrouz Sefid-Dashti, Javad Salimi Sartakhti, Hassan Daghigh
:paw_prints: Details: arXiv:2306.07054
:ramen: tl;dr: Bitcoin is powered by blockchain, and interest in it has surged in the past few years. Modeling is used in many walks of life to share ideas, reduce complexity and achieve close alignment of one person viewpoint with another. The proposed meta-model, including stereotypes, tagged values, enumerations and a set of constraints, was defined as a Unified Modeling Language (UML) profile....
:sunflower: Comments: 21 page, 11 figures
:seedling: Read more →

Keyword: Federated Learning (4 papers)

Personalized Graph Federated Learning with Differential Privacy

:brain: Authors: Francois Gauthier, Vinay Chakravarthi Gogineni, Stefan Werner, Yih-Fang Huang, Anthony Kuh
:paw_prints: Details: arXiv:2306.06399
:ramen: tl;dr: This paper presents a personalized graph federated learning (PGFL) framework in which distributedly connected servers and their respective edge devices collaboratively learn device or cluster-specific models. The proposed approach exploits similarities among different models to provide a more relevant experience for each device, even in situations with diverse data distributions and disproportionate datasets....
:seedling: Read more →

Optimizing the Collaboration Structure in Cross-Silo Federated Learning

:brain: Authors: Wenxuan Bao, Haohan Wang, Jun Wu, Jingrui He
:paw_prints: Details: arXiv:2306.06508
:ramen: tl;dr: In federated learning (FL), multiple clients collaborate to train machine learning models together. Through utilizing more training data, FL suffers from the potential negative transfer problem. In this paper, we propose FedCollab, a novel FL framework that alleviates negative transfer by clustering clients into non-overlapping coalitions....
:sunflower: Comments: Accepted by ICML 2023
:seedling: Read more →

FedDec: Peer-to-peer Aided Federated Learning

:brain: Authors: Marina Costantini, Giovanni Neglia, Thrasyvoulos Spyropoulos
:paw_prints: Details: arXiv:2306.06715
:ramen: tl;dr: Federated learning (FL) has enabled training machine learning models exploiting the data of multiple agents without compromising privacy. FL is known to be vulnerable to data heterogeneity, partial device participation, and infrequent communication with the server. In this work, we present FedDec, an algorithm that interleaves peer-to-peer communication and parameter averaging....
:sunflower: Comments: 14 pages, 6 figures in png or pdf format
:seedling: Read more →

AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning

:brain: Authors: Ghada Almashaqbeh, Zahra Ghodsi
:paw_prints: Details: arXiv:2306.06825
:ramen: tl;dr: AnoFel is the first framework to support private and anonymous dynamic participation in federated learning. AnoFel leverages several cryptographic primitives, the concept of anonymity sets, differential privacy, and a public bulletin board to support anonymous user registration. For an MNIST classification task with 512 clients, the client setup takes less than 3 sec....
:seedling: Read more →