17,003 research outputs found
Security and Privacy Problems in Voice Assistant Applications: A Survey
Voice assistant applications have become omniscient nowadays. Two models that
provide the two most important functions for real-life applications (i.e.,
Google Home, Amazon Alexa, Siri, etc.) are Automatic Speech Recognition (ASR)
models and Speaker Identification (SI) models. According to recent studies,
security and privacy threats have also emerged with the rapid development of
the Internet of Things (IoT). The security issues researched include attack
techniques toward machine learning models and other hardware components widely
used in voice assistant applications. The privacy issues include technical-wise
information stealing and policy-wise privacy breaches. The voice assistant
application takes a steadily growing market share every year, but their privacy
and security issues never stopped causing huge economic losses and endangering
users' personal sensitive information. Thus, it is important to have a
comprehensive survey to outline the categorization of the current research
regarding the security and privacy problems of voice assistant applications.
This paper concludes and assesses five kinds of security attacks and three
types of privacy threats in the papers published in the top-tier conferences of
cyber security and voice domain.Comment: 5 figure
Multi-Objective Trust-Region Filter Method for Nonlinear Constraints using Inexact Gradients
In this article, we build on previous work to present an optimization
algorithm for nonlinearly constrained multi-objective optimization problems.
The algorithm combines a surrogate-assisted derivative-free trust-region
approach with the filter method known from single-objective optimization.
Instead of the true objective and constraint functions, so-called fully linear
models are employed, and we show how to deal with the gradient inexactness in
the composite step setting, adapted from single-objective optimization as well.
Under standard assumptions, we prove convergence of a subset of iterates to a
quasi-stationary point and if constraint qualifications hold, then the limit
point is also a KKT-point of the multi-objective problem
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
Testing the nomological network for the Personal Engagement Model
The study of employee engagement has been a key focus of management for over three decades. The academic literature on engagement has generated multiple definitions but there are two primary models of engagement: the Personal Engagement Model of Kahn (1990), and the Work Engagement Model (WEM) of Schaufeli et al., (2002). While the former is cited by most authors as the seminal work on engagement, research has tended to focus on elements of the model and most theoretical work on engagement has predominantly used the WEM to consider the topic.
The purpose of this study was to test all the elements of the nomological network of the PEM to determine whether the complete model of personal engagement is viable. This was done using data from a large, complex public sector workforce. Survey questions were designed to test each element of the PEM and administered to a sample of the workforce (n = 3,103). The scales were tested and refined using confirmatory factor analysis and then the model was tested determine the structure of the nomological network. This was validated and the generalisability of the final model was tested across different work and organisational types.
The results showed that the PEM is viable but there were differences from what was originally proposed by Kahn (1990). Specifically, of the three psychological conditions deemed necessary for engagement to occur, meaningfulness, safety, and availability, only meaningfulness was found to contribute to employee engagement. The model demonstrated that employees experience meaningfulness through both the nature of the work that they do and the organisation within which they do their work. Finally, the findings were replicated across employees in different work types and different organisational types.
This thesis makes five contributions to the engagement paradigm. It advances engagement theory by testing the PEM and showing that it is an adequate representation of engagement. A model for testing the causal mechanism for engagement has been articulated, demonstrating that meaningfulness in work is a primary mechanism for engagement. The research has shown the key aspects of the workplace in which employees experience meaningfulness, the nature of the work that they do and the organisation within which they do it. It has demonstrated that this is consistent across organisations and the type of work. Finally, it has developed a reliable measure of the different elements of the PEM which will support future research in this area
Évaluation de l'impact du changement climatique sur la défoliation de l'épinette noire par la tordeuse des bourgeons de l'épinette
Les modèles écologiques actuels prévoient de profonds effets des changements climatiques sur les régimes de perturbations naturelles des forêts. La tordeuse des bourgeons de l'épinette (Choristoneura fumiferana) (TBE) est le principal insecte défoliateur dans l'est de l'Amérique du Nord. Les épidémies de TBE ont un impact majeur sur la structure et la fonction de la forêt boréale canadienne puisque la défoliation entraîne une diminution de la croissance des arbres, une augmentation de la mortalité et une baisse de la productivité forestière. Les épidémies de TBE sont devenues plus sévères au cours du dernier siècle à cause des changements climatiques; cependant, nous savons peu de choses sur la manière dont l'effet intégré du climat et du TBE modifie la croissance des espèces hôtes. Nous évaluons ici comment l’interaction entre le climat et la gravité de l'épidémie affecte la croissance de l'épinette noire (Picea mariana) pendant l'épidémie de TBE qui a eu lieu entre 1968-1988 et 2006-2017. Nous avons compilé des séries dendrochronologiques (2271 arbres), des données de sévérité de l'épidémie (estimée par la défoliation aérienne observée) et des données climatiques pour 164 sites au Québec, Canada. Nous avons utilisé un modèle linéaire à effets mixtes pour déterminer l'impact des paramètres climatiques, de la défoliation cumulative (des cinq années précédentes) et de leur effet couplé sur la croissance en surface terrière. À la gravité maximale de l'épidémie, la croissance en surface terrière de l'épinette noire a été réduite de 14 à 18 % sur les cinq années en raison de l'effet TBE. Cette croissance a été affectée par le climat : des températures minimales estivales précédentes plus élevées et un indice d'humidité climatique estival plus élevé ont réduit la croissance de 11 % et 4 % respectivement. En revanche, l'effet négatif de la défoliation a été atténué de 9% pour une température minimale plus élevée au printemps précédent et de 7% pour une température maximale plus élevée l'été précédent. Cette étude améliore notre compréhension des effets combinés de la TBE et du climat et aide à prévoir les dommages futurs causés par cet insecte dans les peuplements forestiers afin de soutenir la gestion durable des forêts. Nous recommandons également que les projections des écosystèmes dans la forêt boréale incluent plusieurs classes de défoliation de la TBE et plusieurs scénarios climatiques
A Design Science Research Approach to Smart and Collaborative Urban Supply Networks
Urban supply networks are facing increasing demands and challenges and thus constitute a relevant field for research and practical development. Supply chain management holds enormous potential and relevance for society and everyday life as the flow of goods and information are important economic functions. Being a heterogeneous field, the literature base of supply chain management research is difficult to manage and navigate. Disruptive digital technologies and the implementation of cross-network information analysis and sharing drive the need for new organisational and technological approaches. Practical issues are manifold and include mega trends such as digital transformation, urbanisation, and environmental awareness.
A promising approach to solving these problems is the realisation of smart and collaborative supply networks. The growth of artificial intelligence applications in recent years has led to a wide range of applications in a variety of domains. However, the potential of artificial intelligence utilisation in supply chain management has not yet been fully exploited. Similarly, value creation increasingly takes place in networked value creation cycles that have become continuously more collaborative, complex, and dynamic as interactions in business processes involving information technologies have become more intense.
Following a design science research approach this cumulative thesis comprises the development and discussion of four artefacts for the analysis and advancement of smart and collaborative urban supply networks. This thesis aims to highlight the potential of artificial intelligence-based supply networks, to advance data-driven inter-organisational collaboration, and to improve last mile supply network sustainability. Based on thorough machine learning and systematic literature reviews, reference and system dynamics modelling, simulation, and qualitative empirical research, the artefacts provide a valuable contribution to research and practice
Pollution-induced community tolerance in freshwater biofilms – from molecular mechanisms to loss of community functions
Exposure to herbicides poses a threat to aquatic biofilms by affecting their community structure, physiology and function. These changes render biofilms to become more tolerant, but on the downside community tolerance has ecologic costs. A concept that addresses induced community tolerance to a pollutant (PICT) was introduced by Blanck and Wängberg (1988). The basic principle of the concept is that microbial communities undergo pollution-induced succession when exposed to a pollutant over a long period of time, which changes communities structurally and functionally and enhancing tolerance to the pollutant exposure. However, the mechanisms of tolerance and the ecologic consequences were hardly studied up to date. This thesis addresses the structural and functional changes in biofilm communities and applies modern molecular methods to unravel molecular tolerance mechanisms.
Two different freshwater biofilm communities were cultivated for a period of five weeks, with one of the communities being contaminated with 4 μg L-1 diuron. Subsequently, the communities were characterized for structural and functional differences, especially focusing on their crucial role of photosynthesis. The community structure of the autotrophs was assessed using HPLC-based pigment analysis and their functional alterations were investigated using Imaging-PAM fluorometry to study photosynthesis and community oxygen profiling to determine net primary production. Then, the molecular fingerprints of the communities were measured with meta-transcriptomics (RNA-Seq) and GC-based community metabolomics approaches and analyzed with respect to changes in their molecular functions. The communities were acute exposed to diuron for one hour in a dose-response design, to reveal a potential PICT and uncover related adaptation to diuron exposure. The combination of apical and molecular methods in a dose-response design enabled the linkage of functional effects of diuron exposure and underlying molecular mechanisms based on a sensitivity analysis.
Chronic exposure to diuron impaired freshwater biofilms in their biomass accrual. The contaminated communities particularly lost autotrophic biomass, reflected by the decrease in specific chlorophyll a content. This loss was associated with a change in the molecular fingerprint of the communities, which substantiates structural and physiological changes. The decline in autotrophic biomass could be due to a primary loss of sensitive autotrophic organisms caused by the selection of better adapted species in the course of chronic exposure. Related to this hypothesis, an increase in diuron tolerance has been detected in the contaminated communities and molecular mechanisms facilitating tolerance have been found. It was shown that genes of the photosystem, reductive-pentose phosphate cycle and arginine metabolism were differentially expressed among the communities and that an increased amount of potential antioxidant degradation products was found in the contaminated communities. This led to the hypothesis that contaminated communities may have adapted to oxidative stress, making them less sensitive to diuron exposure. Moreover, the photosynthetic light harvesting complex was altered and the photoprotective xanthophyll cycle was increased in the contaminated communities. Despite these adaptation strategies, the loss of autotrophic biomass has been shown to impair primary production. This impairment persisted even under repeated short-term exposure, so that the tolerance mechanisms cannot safeguard primary production as a key function in aquatic systems.:1. The effect of chemicals on organisms and their functions .............................. 1
1.1 Welcome to the anthropocene .......................................................................... 1
1.2 From cellular stress responses to ecosystem resilience ................................... 3
1.2.1 The individual pursuit for homeostasis ....................................................... 3
1.2.2 Stability from diversity ................................................................................. 5
1.3 Community ecotoxicology - a step forward in monitoring the effects of chemical
pollution? ................................................................................................................. 6
1.4 Functional ecotoxicological assessment of microbial communities ................... 9
1.5 Molecular tools – the key to a mechanistic understanding of stressor effects
from a functional perspective in microbial communities? ...................................... 12
2. Aims and Hypothesis ......................................................................................... 14
2.1 Research question .......................................................................................... 14
2.2 Hypothesis and outline .................................................................................... 15
2.3 Experimental approach & concept .................................................................. 16
2.3.1 Aquatic freshwater biofilms as model community ..................................... 16
2.3.2 Diuron as model herbicide ........................................................................ 17
2.3.3 Experimental design ................................................................................. 18
3. Structural and physiological changes in microbial communities after chronic
exposure - PICT and altered functional capacity ................................................. 21
3.1 Introduction ..................................................................................................... 21
3.2 Methods .......................................................................................................... 23
3.2.1 Biofilm cultivation ...................................................................................... 23
3.2.2 Dry weight and autotrophic index ............................................................. 23
3.2.4 Pigment analysis of periphyton ................................................................. 23
3.2.4.1 In-vivo pigment analysis for community characterization ....................... 24
3.2.4.2 In-vivo pigment analysis based on Imaging-PAM fluorometry ............... 24
3.2.4.3 In-vivo pigment fluorescence for tolerance detection ............................. 26
3.2.4.4 Ex-vivo pigment analysis by high-pressure liquid-chromatography ....... 27
3.2.5 Community oxygen metabolism measurements ....................................... 28
3.3 Results and discussion ................................................................................... 29
3.3.1 Comparison of the structural community parameters ............................... 29
3.3.2 Photosynthetic activity and primary production of the communities after
selection phase ................................................................................................. 33
3.3.3 Acquisition of photosynthetic tolerance .................................................... 34
3.3.4 Primary production at exposure conditions ............................................... 36
3.3.5 Tolerance detection in primary production ................................................ 37
3.4 Summary and Conclusion ........................................................................... 40
4. Community gene expression analysis by meta-transcriptomics ................... 41
4.1 Introduction to meta-transcriptomics ............................................................... 41
4.2. Methods ......................................................................................................... 43
4.2.1 Sampling and RNA extraction................................................................... 43
4.2.2 RNA sequencing analysis ......................................................................... 44
4.2.3 Data assembly and processing................................................................. 45
4.2.4 Prioritization of contigs and annotation ..................................................... 47
4.2.5 Sensitivity analysis of biological processes .............................................. 48
4.3 Results and discussion ................................................................................... 48
4.3.1 Characterization of the meta-transcriptomic fingerprints .......................... 49
4.3.2 Insights into community stress response mechanisms using trend analysis
(DRomic’s) ......................................................................................................... 51
4.3.3 Response pattern in the isoform PS genes .............................................. 63
4.5 Summary and conclusion ................................................................................ 65
5. Community metabolome analysis ..................................................................... 66
5.1 Introduction to community metabolomics ........................................................ 66
5.2 Methods .......................................................................................................... 68
5.2.1 Sampling, metabolite extraction and derivatisation................................... 68
5.2.2 GC-TOF-MS analysis ............................................................................... 69
5.2.3 Data processing and statistical analysis ................................................... 69
5.3 Results and discussion ................................................................................... 70
5.3.1 Characterization of the metabolic fingerprints .......................................... 70
5.3.2 Difference in the metabolic fingerprints .................................................... 71
5.3.3 Differential metabolic responses of the communities to short-term exposure
of diuron ............................................................................................................ 73
5.4 Summary and conclusion ................................................................................ 78
6. Synthesis ............................................................................................................. 79
6.1 Approaches and challenges for linking molecular data to functional
measurements ...................................................................................................... 79
6.2 Methods .......................................................................................................... 83
6.2.1 Summary on the data ............................................................................... 83
6.2.2 Aggregation of molecular data to index values (TELI and MELI) .............. 83
6.2.3 Functional annotation of contigs and metabolites using KEGG ................ 83
6.3 Results and discussion ................................................................................... 85
6.3.1 Results of aggregation techniques ........................................................... 85
6.3.2 Sensitivity analysis of the different molecular approaches and endpoints 86
6.3.3 Mechanistic view of the molecular stress responses based on KEGG
functions ............................................................................................................ 89
6.4 Consolidation of the results – holistic interpretation and discussion ............... 93
6.4.1 Adaptation to chronic diuron exposure - from molecular changes to
community effects.............................................................................................. 93
6.4.2 Assessment of the ecological costs of Pollution-induced community
tolerance based on primary production ............................................................. 94
6.5 Outlook ............................................................................................................ 9
Reinforcement Learning-based User-centric Handover Decision-making in 5G Vehicular Networks
The advancement of 5G technologies and Vehicular Networks open a new paradigm for Intelligent Transportation Systems (ITS) in safety and infotainment services in urban and highway scenarios. Connected vehicles are vital for enabling massive data sharing and supporting such services. Consequently, a stable connection is compulsory to transmit data across the network successfully. The new 5G technology introduces more bandwidth, stability, and reliability, but it faces a low communication range, suffering from more frequent handovers and connection drops. The shift from the base station-centric view to the user-centric view helps to cope with the smaller communication range and ultra-density of 5G networks. In this thesis, we propose a series of strategies to improve connection stability through efficient handover decision-making. First, a modified probabilistic approach, M-FiVH, aimed at reducing 5G handovers and enhancing network stability. Later, an adaptive learning approach employed Connectivity-oriented SARSA Reinforcement Learning (CO-SRL) for user-centric Virtual Cell (VC) management to enable efficient handover (HO) decisions. Following that, a user-centric Factor-distinct SARSA Reinforcement Learning (FD-SRL) approach combines time series data-oriented LSTM and adaptive SRL for VC and HO management by considering both historical and real-time data. The random direction of vehicular movement, high mobility, network load, uncertain road traffic situation, and signal strength from cellular transmission towers vary from time to time and cannot always be predicted. Our proposed approaches maintain stable connections by reducing the number of HOs by selecting the appropriate size of VCs and HO management. A series of improvements demonstrated through realistic simulations showed that M-FiVH, CO-SRL, and FD-SRL were successful in reducing the number of HOs and the average cumulative HO time. We provide an analysis and comparison of several approaches and demonstrate our proposed approaches perform better in terms of network connectivity
Building data management capabilities to address data protection regulations: Learnings from EU-GDPR
The European Union’s General Data Protection Regulation (EU-GDPR) has initiated a paradigm shift in data protection toward greater choice and sovereignty for individuals and more accountability for organizations. Its strict rules have inspired data protection regulations in other parts of the world. However, many organizations are facing difficulty complying with the EU-GDPR: these new types of data protection regulations cannot be addressed by an adaptation of contractual frameworks, but require a fundamental reconceptualization of how companies store and process personal data on an enterprise-wide level. In this paper, we introduce the resource-based view as a theoretical lens to explain the lengthy trajectories towards compliance and argue that these regulations require companies to build dedicated, enterprise-wide data management capabilities. Following a design science research approach, we propose a theoretically and empirically grounded capability model for the EU-GDPR that integrates the interpretation of legal texts, findings from EU-GDPR-related publications, and practical insights from focus groups with experts from 22 companies and four EU-GDPR projects. Our study advances interdisciplinary research at the intersection between IS and law: First, the proposed capability model adds to the regulatory compliance management literature by connecting abstract compliance requirements to three groups of capabilities and the resources required for their implementation, and second, it provides an enterprise-wide perspective that integrates and extends the fragmented body of research on EU-GDPR. Practitioners may use the capability model to assess their current status and set up systematic approaches toward compliance with an increasing number of data protection regulations
- …