13,012 research outputs found
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
Advancing Model Pruning via Bi-level Optimization
The deployment constraints in practical applications necessitate the pruning
of large-scale deep learning models, i.e., promoting their weight sparsity. As
illustrated by the Lottery Ticket Hypothesis (LTH), pruning also has the
potential of improving their generalization ability. At the core of LTH,
iterative magnitude pruning (IMP) is the predominant pruning method to
successfully find 'winning tickets'. Yet, the computation cost of IMP grows
prohibitively as the targeted pruning ratio increases. To reduce the
computation overhead, various efficient 'one-shot' pruning methods have been
developed, but these schemes are usually unable to find winning tickets as good
as IMP. This raises the question of how to close the gap between pruning
accuracy and pruning efficiency? To tackle it, we pursue the algorithmic
advancement of model pruning. Specifically, we formulate the pruning problem
from a fresh and novel viewpoint, bi-level optimization (BLO). We show that the
BLO interpretation provides a technically-grounded optimization base for an
efficient implementation of the pruning-retraining learning paradigm used in
IMP. We also show that the proposed bi-level optimization-oriented pruning
method (termed BiP) is a special class of BLO problems with a bi-linear problem
structure. By leveraging such bi-linearity, we theoretically show that BiP can
be solved as easily as first-order optimization, thus inheriting the
computation efficiency. Through extensive experiments on both structured and
unstructured pruning with 5 model architectures and 4 data sets, we demonstrate
that BiP can find better winning tickets than IMP in most cases, and is
computationally as efficient as the one-shot pruning schemes, demonstrating 2-7
times speedup over IMP for the same level of model accuracy and sparsity.Comment: Thirty-sixth Conference on Neural Information Processing Systems
(NeurIPS 2022
Associated Random Neural Networks for Collective Classification of Nodes in Botnet Attacks
Botnet attacks are a major threat to networked systems because of their
ability to turn the network nodes that they compromise into additional
attackers, leading to the spread of high volume attacks over long periods. The
detection of such Botnets is complicated by the fact that multiple network IP
addresses will be simultaneously compromised, so that Collective Classification
of compromised nodes, in addition to the already available traditional methods
that focus on individual nodes, can be useful. Thus this work introduces a
collective Botnet attack classification technique that operates on traffic from
an n-node IP network with a novel Associated Random Neural Network (ARNN) that
identifies the nodes which are compromised. The ARNN is a recurrent
architecture that incorporates two mutually associated, interconnected and
architecturally identical n-neuron random neural networks, that act
simultneously as mutual critics to reach the decision regarding which of n
nodes have been compromised. A novel gradient learning descent algorithm is
presented for the ARNN, and is shown to operate effectively both with
conventional off-line training from prior data, and with on-line incremental
training without prior off-line learning. Real data from a 107 node packet
network is used with over 700,000 packets to evaluate the ARNN, showing that it
provides accurate predictions. Comparisons with other well-known state of the
art methods using the same learning and testing datasets, show that the ARNN
offers significantly better performance
Accelerated Sparse Recovery via Gradient Descent with Nonlinear Conjugate Gradient Momentum
This paper applies an idea of adaptive momentum for the nonlinear conjugate
gradient to accelerate optimization problems in sparse recovery. Specifically,
we consider two types of minimization problems: a (single) differentiable
function and the sum of a non-smooth function and a differentiable function. In
the first case, we adopt a fixed step size to avoid the traditional line search
and establish the convergence analysis of the proposed algorithm for a
quadratic problem. This acceleration is further incorporated with an operator
splitting technique to deal with the non-smooth function in the second case. We
use the convex and the nonconvex functionals as two
case studies to demonstrate the efficiency of the proposed approaches over
traditional methods
Procedure-Aware Pretraining for Instructional Video Understanding
Our goal is to learn a video representation that is useful for downstream
procedure understanding tasks in instructional videos. Due to the small amount
of available annotations, a key challenge in procedure understanding is to be
able to extract from unlabeled videos the procedural knowledge such as the
identity of the task (e.g., 'make latte'), its steps (e.g., 'pour milk'), or
the potential next steps given partial progress in its execution. Our main
insight is that instructional videos depict sequences of steps that repeat
between instances of the same or different tasks, and that this structure can
be well represented by a Procedural Knowledge Graph (PKG), where nodes are
discrete steps and edges connect steps that occur sequentially in the
instructional activities. This graph can then be used to generate pseudo labels
to train a video representation that encodes the procedural knowledge in a more
accessible form to generalize to multiple procedure understanding tasks. We
build a PKG by combining information from a text-based procedural knowledge
database and an unlabeled instructional video corpus and then use it to
generate training pseudo labels with four novel pre-training objectives. We
call this PKG-based pre-training procedure and the resulting model Paprika,
Procedure-Aware PRe-training for Instructional Knowledge Acquisition. We
evaluate Paprika on COIN and CrossTask for procedure understanding tasks such
as task recognition, step recognition, and step forecasting. Paprika yields a
video representation that improves over the state of the art: up to 11.23%
gains in accuracy in 12 evaluation settings. Implementation is available at
https://github.com/salesforce/paprika.Comment: CVPR 202
Machine Learning Research Trends in Africa: A 30 Years Overview with Bibliometric Analysis Review
In this paper, a critical bibliometric analysis study is conducted, coupled
with an extensive literature survey on recent developments and associated
applications in machine learning research with a perspective on Africa. The
presented bibliometric analysis study consists of 2761 machine learning-related
documents, of which 98% were articles with at least 482 citations published in
903 journals during the past 30 years. Furthermore, the collated documents were
retrieved from the Science Citation Index EXPANDED, comprising research
publications from 54 African countries between 1993 and 2021. The bibliometric
study shows the visualization of the current landscape and future trends in
machine learning research and its application to facilitate future
collaborative research and knowledge exchange among authors from different
research institutions scattered across the African continent
Recommended from our members
The Epidemiology and Genetic Architecture of Vitamin D Deficiency in African Children
Vitamin D deficiency is a common public health problem worldwide. However, little is known about the epidemiology of vitamin D deficiency in Africa. In this thesis, I aimed to determine: 1) the prevalence of and risk factors associated with vitamin D deficiency in studies conducted in Africa; 2) the prevalence and predictors of vitamin D deficiency in African children; 3) the association between vitamin D and iron deficiency in African children; and 4) genetic variants that influence vitamin D status in Africans.
In a systematic review and meta-analyses of previous vitamin D studies in Africa, the average prevalence of low vitamin D status was 18.5%, 34.2% and 59.5% using cut-offs of 25-hydroxyvitamin D (25(OH)D) levels of <30 nmol/L, <50 nmol/L and <75 nmol/L, respectively. Populations at risk of vitamin D deficiency included newborns, women, and people living in high latitudes or urban areas.
In an epidemiological study of young children living in Africa, the prevalence of low vitamin D status was 0.6%, 7.8% and 44.5% using cut-offs of 25(OH)D levels of GC2 variant of the group-specific component (GC) gene, which encodes vitamin D binding protein.
Vitamin D deficiency was also associated with 80% higher odds of iron deficiency in these children. Adjusted regression models revealed that vitamin D deficiency was associated with higher ferritin and hepcidin levels suggesting lower iron status, and reduced sTfR and transferrin levels and increased TSAT and serum iron levels suggesting improved iron status.
Genome-wide association study (GWAS) in Africans revealed genetic variants that influence vitamin D status in vitamin D metabolism genes: DHCR7/NADSYN1, CYP2R1 and GC. However, the majority of SNPs from previous European GWASs did not replicate in the current GWAS.
Findings from this thesis indicate that vitamin D deficiency is prevalent in many African populations and should be considered in public health strategies in Africa
Constraints on Incremental Assembly of Upper Crustal Igneous Intrusions, Mount Ellen, Henry Mountains, Utah
Magma systems within the shallow crust drive volcanic processes at the surface. Studying active magma systems directly poses significant difficulty but details of ancient magma systems can provide insight to modern systems. The ancient intrusions now exposed in the Henry Mountains of southern Utah provide an excellent opportunity to study the emplacement of igneous intrusions within the shallow crust. The five main intrusive centers of the Henry Mountains are Oligocene in age and preserve different stages in the development of an igneous system within the shallow crust. Recent studies worldwide have demonstrated that most substantial (> 0.5 km3) igneous intrusions in the shallow crust are incrementally assembled from multiple magma pulses. In the Henry Mountains, smaller component intrusions (< 0.5 km3) clearly demonstrate incremental assembly but an evaluation of incremental assembly for an entire intrusive center has yet to be performed.
The Mount Ellen intrusive complex is the largest intrusive center (~ 100 km3, 15 – 20 km diameter) in the Henry Mountains. This thesis research provides constraints on the construction history and emplacement of Mount Ellen using a combination of multiple techniques, including fieldwork, whole-rock major and trace element geochemistry, anisotropy of magnetic susceptibility, and crystal size distribution analysis. Field work and anisotropy of magnetic susceptibility data suggest that Mount Ellen is a laccolith that in cross section is built a network of stacked igneous sheets. In map-view, the laccolith has an elliptical shape built from numerous igneous lobes radiating away from the central portion of the intrusion. Field observations suggest most lobes are texturally homogenous and likely emplaced from a single magma batch.
Samples collected throughout Mount Ellen were divided into five groups based on a qualitative evaluation of texture. Possible distinctions between these textural groups were then tested using several different techniques. Geochemistry, anisotropy of magnetic susceptibility, and phenocryst crystal size distribution data are individually not sufficient to distinguish all five textural groups. However, limited datasets for two textures can be consistently distinguished using these techniques.
These new results can be integrated with existing constraints to create a comprehensive model for the construction history of Mount Ellen. The intrusive center was constructed in approximately 1 million years at a time-averaged magma injection rate of 0.0004 km3 y-1. The laccolith geometry was built from a radiating network of stacked igneous sheets. The sheets are lobate in map-view (longer than they are wide) and were fed radially outward from a central feeder zone. These component intrusions were emplaced by a minimum of 5 texturally distinct magma pulses, with periods of little or no magmatism between sequential pulses
Annals [...].
Pedometrics: innovation in tropics; Legacy data: how turn it useful?; Advances in soil sensing; Pedometric guidelines to systematic soil surveys.Evento online. Coordenado por: Waldir de Carvalho Junior, Helena Saraiva Koenow Pinheiro, Ricardo Simão Diniz Dalmolin
- …