danielphan2003 / arxiv-daily-summaries

An issue a day keeps the paper overload away.
1 stars 0 forks source link

New submissions for Wed, 21 Jun 23 #68

Open github-actions[bot] opened 1 year ago

github-actions[bot] commented 1 year ago

This is an autogenerated issue. It uses the facebook/bart-large-cnn model to generate summaries for each papers appeared below.


Keyword: IoT (13 papers)

CStream: Parallel Data Stream Compression on Multicore Edge Devices

:brain: Authors: Xianzhi Zeng, Shuhao Zhang
:paw_prints: Details: arXiv:2306.10228
:ramen: tl;dr: In the burgeoning realm of Internet of Things (IoT) applications on edge devices, data stream compression has become increasingly pertinent. The integration of added compression overhead and limited hardware resources on these devices calls for a nuanced software-hardware co-design. This paper introduces CStream, a pioneering framework crafted for parallelizing stream compression on multicore edge devices....
:seedling: Read more →

Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

:brain: Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo
:paw_prints: Details: arXiv:2306.10309
:ramen: tl;dr: Edge learning is a new and powerful approach to training models across distributed clients. This approach is expected to be embedded within future network infrastructures, including 6G. This survey article provides a holistic review of the most recent research focused on edge learning vulnerabilities and defenses for 6G-enabled IoT....
:seedling: Read more →

Fast Fourier Inception Networks for Occluded Video Prediction

:brain: Authors: Ping Li, Chenhan Zhang, Xianghua Xu
:paw_prints: Details: arXiv:2306.10346
:ramen: tl;dr: Video prediction is a pixel-level task that generates future frames by employing the historical frames. There often exist continuous complex motions, such as object overlapping and scene occlusion in video, which poses great challenges to this task. Previous works either fail to well capture the long-term temporal dynamics or do not handle the occlusions masks....
:seedling: Read more →

An Architectural Design Decision Model for Resilient IoT Application

:brain: Authors: Cristovao Freitas Iglesias Jr, Claudio Miceli, Miodrag Bolic
:paw_prints: Details: arXiv:2306.10429
:ramen: tl;dr: The Internet of Things is a paradigm that refers to the ubiquitous presence around us of physical objects equipped with sensing, networking, and processing capabilities. Any threat affecting the availability of IoT applications can be crucial financially and for the safety of the physical integrity of users. This feature calls for IoT applications that remain operational and efficiently handle possible threats....
:seedling: Read more →

Towards Stability of Autoregressive Neural Operators

:brain: Authors: Michael McCabe, Peter Harrington, Shashank Subramanian, Jed Brown
:paw_prints: Details: arXiv:2306.10619
:ramen: tl;dr: Neural operators have proven to be a promising approach for modeling spatiotemporal systems in the physical sciences. Training these models for large systems can be quite challenging as they incur significant computational and memory expense. We present results on several scientific systems that include Navier-Stokes fluid flow, rotating shallow water, and a high-resolution global weather forecasting system....
:seedling: Read more →

Deep learning based black spot identification on Greek road networks

:brain: Authors: Ioannis Karamanlis, Alexandros Kokkalis, Vassilios Profillidis, George Botzoris, Chairi Kiourt, Vasileios Sevetlidis, George Pavlidis
:paw_prints: Details: arXiv:2306.10734
:ramen: tl;dr: Black spot identification involves analyzing the geographical location and time-based occurrence of road accidents. This study focused on traffic accidents in Greek road networks to recognize black spots. The study produced a publicly available dataset called Black Spots of North Greece (BSNG) and a highly accurate identification method....
:seedling: Read more →

Leveraging The Edge-to-Cloud Continuum for Scalable Machine Learning on Decentralized Data

:brain: Authors: Ahmed M. Abdelmoniem
:paw_prints: Details: arXiv:2306.10848
:ramen: tl;dr: The traditional methods for training AI/ML models are becoming obsolete, especially with the growing concerns over privacy and security. The new design is envisioned to be model-centric in which the trained models are treated as a commodity. It is expected that this design will provide a decentralized framework for efficient collaborative learning at scale....
:seedling: Read more →

Efficient Generalized Temporal Pattern Mining in Big Time Series Using Mutual Information

:brain: Authors: Van Long Ho, Nguyen Ho, Torben Bach Pedersen, Panagiotis Papapetrou
:paw_prints: Details: arXiv:2306.10994
:ramen: tl;dr: Big time series are increasingly available from an ever wider range of IoT-enabled sensors deployed in various environments. Significant insights can be gained by mining temporal patterns from these time series. Temporal pattern mining (TPM) extends traditional pattern mining by adding event time intervals into extracted patterns....
:sunflower: Comments: arXiv admin note: text overlap with arXiv:2010.03653
:seedling: Read more →

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy

:brain: Authors: Erol Gelenbe, Mohammed Nasereddin
:paw_prints: Details: arXiv:2306.11007
:ramen: tl;dr: IoT Servers that receive and process packets from IoT devices should meet the QoS needs of incoming packets, and support Attack Detection software. This paper proposes and evaluates a simple architecture to protect a Server that is connected to a Local Area Network, using a Quasi Deterministic Transmission Policy Forwarder (SQF)...
:sunflower: Comments: 8 pages, 13 figures
:seedling: Read more →

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware

:brain: Authors: Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah
:paw_prints: Details: arXiv:2306.11206
:ramen: tl;dr: IoT devices integrate a wealth of third-party components (TPCs) in firmware. Violating the usage specifications of TPCs can cause serious consequences. UVScan is an automated and scalable system to detect TPC usage violations in IoT firmware. The results show that UVScan achieves more than 70% precision and recall, and has a significant performance improvement....
:sunflower: Comments: Accepted as a full paper at USENIX Security '23
:seedling: Read more →

Spatiotemporal Pyramidal CNN with Depth-Wise Separable Convolution for Eye Blinking Detection in the Wild

:brain: Authors: Lan Anh Thi Nguy, Bach Nguyen Gia, Thanh Tu Thi Nguyen, Kamioka Eiji, Tan Xuan Phan
:paw_prints: Details: arXiv:2306.11287
:ramen: tl;dr: Eye blinking detection in the wild plays an essential role in deception detection, driving fatigue detection, etc. Despite the fact that numerous attempts have already been made, the majority of them have encountered difficulties. We propose to utilize upsampling and downsampling the input eye images to the same resolution as one potential solution....
:seedling: Read more →

UUKG: Unified Urban Knowledge Graph Dataset for Urban Spatiotemporal Prediction

:brain: Authors: Yansong Ning, Hao Liu, Hao Wang, Zhenyu Zeng, Hui Xiong
:paw_prints: Details: arXiv:2306.11443
:ramen: tl;dr: Urban SpatioTemporal Prediction (USTP) is of great importance to the development and operation of the smart city. As an emerging building block, multi-sourced urban data are usually integrated as urban knowledge graphs (UrbanKGs) This paper presents UUKG, the unified urban knowledge graph dataset for knowledge-enhanced urban spatiotemporal predictions....
:seedling: Read more →

Energy-efficient superparamagnetic Ising machine and its application to traveling salesman problems

:brain: Authors: Jia Si, Shuhan Yang, Yunuo Cen, Jiaer Chen, Zhaoyang Yao, Dong-Jun Kim, Kaiming Cai, Jerald Yoo, Xuanyao Fong, Hyunsoo Yang
:paw_prints: Details: arXiv:2306.11572
:ramen: tl;dr: The growth of artificial intelligence and IoT has created a significant computational load for solving non-deterministic polynomial-time (NP)-hard problems. Here, we present an experimental Ising annealing computer based on superparamagnetic tunnel junctions (SMTJs) with all-to-all connections, which successfully solves a 70-city travelling salesman problem (4761-node Ising problem)...
:sunflower: Comments: 5 figures
:seedling: Read more →

Keyword: edge computing (1 papers)

Multi-Task Offloading via Graph Neural Networks in Heterogeneous Multi-access Edge Computing

:brain: Authors: Mulei Ma
:paw_prints: Details: arXiv:2306.10232
:ramen: tl;dr: Task offloading plays a pivotal role in optimizing system throughput and resource utilization. Existing task offloading methods often fall short of adequately modeling the dependency topology relationships between offloaded tasks. Our proposed algorithm improves 18.6\%-53.8\% over greedy and approximate algorithms....
:seedling: Read more →

Keyword: Blockchain (12 papers)

NFTs to MARS: Multi-Attention Recommender System for NFTs

:brain: Authors: Seonmi Kim, Youngbin Lee, Yejin Kim, Joohwan Hong, Yongjae Lee
:paw_prints: Details: arXiv:2306.10053
:ramen: tl;dr: The Non-Fungible Token (NFT) market remains underexplored. The unique characteristics of the NFT market highlight the importance of developing tailored recommender systems to cater to its specific needs and unlock its full potential. In specific, we develop a Multi-Attention Recommender System for NFTs....
:seedling: Read more →

The Ontology for Agents, Systems and Integration of Services: OASIS version 2

:brain: Authors: Giampaolo Bella, Domenico Cantone, Carmelo Fabio Longo, Marianna Nicolosi-Asmundo, Daniele Francesco Santamaria
:paw_prints: Details: arXiv:2306.10061
:ramen: tl;dr: The OASIS ontology -- An Ontology for Agent, Systems, and Integration of Services, presented in 2019 -- pursues the behaviouristic approach to deliver a semantic representation system and a communication protocol for agents and their commitments. This paper reports on the main modeling choices concerning the representation of agents in OASis 2, the latest major upgrade of the system....
:sunflower: Comments: Already published on Intelligenza Artificiale, Vol. 17, no 1, pp. 51-62, 2023. DOI 10.3233/IA-230002
:seedling: Read more →

Managing health insurance using blockchain technology

:brain: Authors: Tajkia Nuri Ananna, Munshi Saifuzzaman, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous
:paw_prints: Details: arXiv:2306.10329
:ramen: tl;dr: Fraudulent actions, false claims, a lack of transparency and data privacy, reliance on human effort and dishonesty from consumers, healthcare professionals, or even the insurer party itself, are the most common and important hurdles towards success. This chapter briefly covers the most immediate concerns in the health insurance industry and provides insight into how blockchain technology integration can contribute....
:sunflower: Comments: 37 pages, 2 figures, 12 tables
:seedling: Read more →

Understanding and Characterizing Cryptocurrency Free Giveaway and Arbitrage Bot Scams In the Wild

:brain: Authors: Kai Li, Darren Lee, Shixuan Guan
:paw_prints: Details: arXiv:2306.10634
:ramen: tl;dr: This paper presents a large-scale analysis of two prevalent cryptocurrency scams disseminated through Twitter and YouTube. The first scam involves free giveaway schemes where scammers publish fake giveaway websites to deceive victims and steal funds. The second scam revolves around arbitrage bots and publishes videos to entice victims into executing malicious smart contracts....
:sunflower: Comments: 17 pages, 8 figures
:seedling: Read more →

COLE: A Column-based Learned Storage for Blockchain Systems

:brain: Authors: Ce Zhang, Cheng Xu, Haibo Hu, Jianliang Xu
:paw_prints: Details: arXiv:2306.10739
:ramen: tl;dr: Blockchain systems suffer from high storage costs as every node needs to store and maintain the entire blockchain data. To reduce the index storage overhead, an initial idea is to leverage the emerging learned index technique. Compared with MPT, COLE reduces the storage size by up to 94% while improving the system throughput by 1.4X-5.4x....
:seedling: Read more →

Confidential Computing in Edge-Cloud Hierarchy

:brain: Authors: Yeghisabet Alaverdyan, Suren Poghosyan, Vahagn Poghosyan
:paw_prints: Details: arXiv:2306.10834
:ramen: tl;dr: Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit. The paper introduces confidential computing approaches focused on protecting hierarchical data within edge- cloud network....
:seedling: Read more →

Blockchain-Enabled Federated Learning: A Reference Architecture Incorporating a DID Access System

:brain: Authors: Eunsu Goh, Daeyeol Kim, Do-Yup Kim, Kwangkee Lee
:paw_prints: Details: arXiv:2306.10841
:ramen: tl;dr: Federated Learning (FL) allows multiple participants to jointly train machine learning models in a decentralized manner while maintaining data privacy and security. This paper proposes a reference architecture for blockchain-enabled federated learning. A critical component of this architecture is the implementation of a decentralized identifier (DID)-based access system....
:sunflower: Comments: 16 pages, 15 figures, 3 tables
:seedling: Read more →

Performance and Reliability Analysis for Practical Byzantine Fault Tolerance with Repairable Voting Nodes

:brain: Authors: Yan-Xia Chang, Qing Wang, Quan-Lin Li, Yaqian Ma
:paw_prints: Details: arXiv:2306.10960
:ramen: tl;dr: The PBFT consensus protocol forms a basis for some other important BFT consensus protocols, such as Tendermint, Streamlet, HotStuff, and LibraBFT. In general, the voting nodes may always fail so that they can leave the PBFT-based system in a random time interval....
:sunflower: Comments: 55 pages, 17 figures
:seedling: Read more →

Decentralized Quantum Federated Learning for Metaverse: Analysis, Design and Implementation

:brain: Authors: Dev Gurung, Shiva Raj Pokhrel, Gang Li
:paw_prints: Details: arXiv:2306.11297
:ramen: tl;dr: The proposed QFL leverages the power of blockchain to create a secure and transparent system that is robust against cyberattacks and fraud. The decentralized QFL system addresses the risks associated with a centralized server-based approach. Our theoretical analysis and discussions develop a genuinely decentralized financial system essential for the Metaverse....
:seedling: Read more →

Data Availability Sampling in Ethereum: Analysis of P2P Networking Requirements

:brain: Authors: Michał Król, Onur Ascigil, Sergi Rene, Etienne Rivière, Matthieu Pigaglio, Kaleem Peeroo, Vladimir Stankovic, Ramin Sadre, Felix Lange
:paw_prints: Details: arXiv:2306.11456
:ramen: tl;dr: Data Availability Sampling (DAS) has the potential to improve its transaction per second rate by more than two orders of magnitude. DAS should also significantly reduce per-transaction validation costs. At the same time, DAS introduces new communication patterns in the Ethereum Peer-to-Peer (P2P) network....
:seedling: Read more →

The Pricing And Hedging Of Constant Function Market Makers

:brain: Authors: Richard Dewey, Craig Newbold
:paw_prints: Details: arXiv:2306.11580
:ramen: tl;dr: We investigate the most common type of blockchain-based decentralized exchange, which are known as constant function market makers (CFMMs) We present a model for valuing the liquidity provider (LP) mechanism and estimating the value of the associated derivatives. We also develop ideas around the equilibrium distribution of fair price conditional on the arrival of traders....
:seedling: Read more →

Allowing Blockchain Loans with Low Collateral

:brain: Authors: Tom Azoulay, Uri Carl, Ori Rottenstreich
:paw_prints: Details: arXiv:2306.11620
:ramen: tl;dr: Collateral is an item of value serving as security for the repayment of a loan. In blockchain-based loans, cryptocurrencies serve as the collateral. High volatility of cryptocurrencies implies a serious barrier of entry with a common practice that collateral values equal multiple times the value of the loan. As assets serving as collateral are locked, this requirement prevents many candidates from obtaining loans....
:sunflower: Comments: Presented at ICBC 2023
:seedling: Read more →

Keyword: Federated Learning (9 papers)

Federated Few-shot Learning

:brain: Authors: Song Wang, Xingbo Fu, Kaize Ding, Chen Chen, Huiyuan Chen, Jundong Li
:paw_prints: Details: arXiv:2306.10234
:ramen: tl;dr: Federated Learning (FL) enables multiple clients to collaboratively learn a machine learning model without exchanging their own local data. However, certain clients may only contain a limited number of samples (i.e., few-shot samples) In this scenario, existing FL efforts typically encounter a significant performance drop on these clients....
:sunflower: Comments: SIGKDD 2023
:seedling: Read more →

Bkd-FedGNN: A Benchmark for Classification Backdoor Attacks on Federated Graph Neural Network

:brain: Authors: Fan Liu, Siqi Lai, Yansong Ning, Hao Liu
:paw_prints: Details: arXiv:2306.10351
:ramen: tl;dr: Federated Graph Neural Network (FedGNN) has recently emerged as a rapidly growing research topic. Despite its advantages, the distributed nature of FedGNN introduces additional vulnerabilities. Backdoor attacks stemming from malicious participants have been explored. Bkd-FedGnn decomposes the graph backdoor attack into trigger generation and injection steps, and extends the attack to the node-level federated setting....
:seedling: Read more →

Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids

:brain: Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin
:paw_prints: Details: arXiv:2306.10420
:ramen: tl;dr: False data injection attack (FDIA) is one of the classes of those attacks that target the smart measurement devices by injecting malicious data. The employment of machine learning techniques in the detection and localization of FDIA is proven to provide effective results. Training of such models requires centralized processing of sensitive user data that may not be plausible in a practical scenario....
:sunflower: Comments: 9 pages, 6 figures
:seedling: Read more →

Data-Heterogeneous Hierarchical Federated Learning with Mobility

:brain: Authors: Tan Chen, Jintao Yan, Yuxuan Sun, Sheng Zhou, Deniz Gunduz, Zhisheng Niu
:paw_prints: Details: arXiv:2306.10692
:ramen: tl;dr: Federated learning enables distributed training of machine learning (ML) models across multiple devices in a privacy-preserving manner. Hierarchical federated learning (HFL) is further proposed to meet the requirements of both latency and coverage. This paper shows that mobility can indeed improve the model accuracy by up to 15.1\% when training a convolutional neural network on the CIFAR-10 dataset....
:seedling: Read more →

Practical and General Backdoor Attacks against Vertical Federated Learning

:brain: Authors: Yuexin Xuan, Xiaojun Chen, Zhendong Zhao, Bisheng Tang, Ye Dong
:paw_prints: Details: arXiv:2306.10746
:ramen: tl;dr: backdoor attacks on vertical federated learning (VFL) are rarely studied. Main challenge of this attack is to allow an attacker without access to the data labels, to perform an effective attack. BadVFL is a novel and practical approach to inject backdoor triggers into victim models without label information....
:sunflower: Comments: 17 pages, 7 figures, To appear in ECML PKDD 2023
:seedling: Read more →

Differentially Private Over-the-Air Federated Learning Over MIMO Fading Channels

:brain: Authors: Hang Liu, Jia Yan, Ying-Jun Angela Zhang
:paw_prints: Details: arXiv:2306.10982
:ramen: tl;dr: Federated learning (FL) enables edge devices to collaboratively train machine learning models. While over-the-air model aggregation improves communication efficiency, uploading models to an edge server over wireless networks can pose privacy risks. We show that FL model communication with a multiple-antenna server amplifies privacy leakage. We analyze the learning convergence and privacy loss of the studied FL system....
:sunflower: Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
:seedling: Read more →

FSAR: Federated Skeleton-based Action Recognition with Adaptive Topology Structure and Knowledge Distillation

:brain: Authors: Jingwen Guo, Hong Liu, Shitong Sun, Tianyu Guo, Min Zhang, Chenyang Si
:paw_prints: Details: arXiv:2306.11046
:ramen: tl;dr: Federated Learning (FL) has attracted much attention due to its outstanding advantages in privacy-preserving. However, directly applying FL approaches to skeleton videos suffers from unstable training. Existing skeleton-based action recognition methods typically follow a centralized learning paradigm. To address this limitation, we pioneer a novel Federated Skeleton-based Action Recognition (FSAR) paradigm....
:seedling: Read more →

Adaptive Federated Learning with Auto-Tuned Clients

:brain: Authors: Junhyung Lyle Kim, Mohammad Taha Toghani, César A. Uribe, Anastasios Kyrillidis
:paw_prints: Details: arXiv:2306.11201
:ramen: tl;dr: Federated learning (FL) is a distributed machine learning framework where the global model of a central server is trained via multiple collaborative steps by participating clients without sharing their data. We propose a simple step size rule for SGD that enables each client to use its own step size by adapting to the local smoothness of the function each client is optimizing. We provide theoretical and empirical results where the benefit of the client adaptivity is shown in various FL scenarios....
:seedling: Read more →

FedNoisy: Federated Noisy Label Learning Benchmark

:brain: Authors: Siqi Liang, Jintao Huang, Dun Zeng, Junyuan Hong, Jiayu Zhou, Zenglin Xu
:paw_prints: Details: arXiv:2306.11650
:ramen: tl;dr: Federated learning has gained popularity for distributed learning without aggregating sensitive data from clients. But meanwhile, the distributed and isolated nature of data isolation may be complicated by data quality, making it more vulnerable to noisy labels. Many efforts exist to defend against the negative impacts of noisy labels in centralized or federated settings....
:seedling: Read more →