96 research outputs found

    Computational intelligence-enabled cybersecurity for the Internet of Things

    Get PDF
    The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber-physical-systems (CPS), etc. The current IoT is facing increasingly security issues, such as vulnerabilities of IoT systems, malware detection, data security concerns, personal and public physical safety risk, privacy issues, data storage management following the exponential growth of IoT devices. This work aims at investigating the applicability of computational intelligence techniques in cybersecurity for IoT, including CI-enabled cybersecurity and privacy solutions, cyber defense technologies, intrusion detection techniques, and data security in IoT. This paper also attempts to provide new research directions and trends for the increasingly IoT security issues using computational intelligence technologies

    The implications of fossil fuel supply constraints on climate change projections: a supply-side analysis

    Get PDF
    Climate projections are based on emission scenarios. The emission scenarios used by the IPCC and by mainstream climate scientists are largely derived from the predicted demand for fossil fuels, and in our view take insufficient consideration of the constrained emissions that are likely due to the depletion of these fuels. This paper, by contrast, takes a supply-side view of CO emission, and generates two supply-driven emission scenarios based on a comprehensive investigation of likely long-term pathways of fossil fuel production drawn from peer-reviewed literature published since 2000. The potential rapid increases in the supply of the non-conventional fossil fuels are also investigated. Climate projections calculated in this paper indicate that the future atmospheric CO concentration will not exceed 610ppm in this century; and that the increase in global surface temperature will be lower than 2.6°C compared to pre-industrial level even if there is a significant increase in the production of non-conventional fossil fuels. Our results indicate therefore that the IPCC's climate projections overestimate the upper-bound of climate change. Furthermore, this paper shows that different production pathways of fossil fuels use, and different climate models, are the two main reasons for the significant differences in current literature on the topic

    An LSH-based offloading method for IoMT services in integrated cloud-edge environment

    Get PDF
    © 2021 ACM. Benefiting from the massive available data provided by Internet of multimedia things (IoMT), enormous intelligent services requiring information of various types to make decisions are emerging. Generally, the IoMT devices are equipped with limited computing power, interfering with the process of computation-intensive services. Currently, to satisfy a wide range of service requirements, the novel computing paradigms, i.e., cloud computing and edge computing, can potentially be integrated for service accommodation. Nevertheless, the private information (i.e., location, service type, etc.) in the services is prone to spilling out during service offloading in the cloud-edge computing. To avoid privacy leakage while improving service utility, including the service response time and energy consumption for service executions, a Locality-sensitive-hash (LSH)-based offloading method, named LOM, is devised. Specifically, LSH is leveraged to encrypt the feature information for the services offloaded to the edge servers with the intention of privacy preservation. Eventually, comparative experiments are conducted to verify the effectiveness of LOM with respect to promoting service utility

    Socially Beneficial Metaverse: Framework, Technologies, Applications, and Challenges

    Full text link
    In recent years, the maturation of emerging technologies such as Virtual Reality, Digital twins, and Blockchain has accelerated the realization of the metaverse. As a virtual world independent of the real world, the metaverse will provide users with a variety of virtual activities that bring great convenience to society. In addition, the metaverse can facilitate digital twins, which offers transformative possibilities for the industry. Thus, the metaverse has attracted the attention of the industry, and a huge amount of capital is about to be invested. However, the development of the metaverse is still in its infancy and little research has been undertaken so far. We describe the development of the metaverse. Next, we introduce the architecture of the socially beneficial metaverse (SB-Metaverse) and we focus on the technologies that support the operation of SB-Metaverse. In addition, we also present the applications of SB-Metaverse. Finally, we discuss several challenges faced by SB-Metaverse which must be addressed in the future.Comment: 28 pages, 6 figures, 3 table

    An IoT-oriented data placement method with privacy preservation in cloud environment

    Get PDF
    © 2018 Elsevier Ltd IoT (Internet of Things) devices generate huge amount of data which require rich resources for data storage and processing. Cloud computing is one of the most popular paradigms to accommodate such IoT data. However, the privacy conflicts combined in the IoT data makes the data placement problem more complicated, and the resource manager needs to take into account the resource efficiency, the power consumption of cloud data centers, and the data access time for the IoT applications while allocating the resources for the IoT data. In view of this challenge, an IoT-oriented Data Placement method with privacy preservation, named IDP, is designed in this paper. Technically, the resource utilization, energy consumption and data access time in the cloud data center with the fat-tree topology are analyzed first. Then a corresponding data placement method, based on the Non-dominated Sorting Genetic Algorithm II (NSGA-II), is designed to achieve high resource usage, energy saving and efficient data access, and meanwhile realize privacy preservation of the IoT data. Finally, extensive experimental evaluations validate the efficiency and effectiveness of our proposed method

    OptIForest: Optimal Isolation Forest for Anomaly Detection

    Full text link
    Anomaly detection plays an increasingly important role in various fields for critical tasks such as intrusion detection in cybersecurity, financial risk detection, and human health monitoring. A variety of anomaly detection methods have been proposed, and a category based on the isolation forest mechanism stands out due to its simplicity, effectiveness, and efficiency, e.g., iForest is often employed as a state-of-the-art detector for real deployment. While the majority of isolation forests use the binary structure, a framework LSHiForest has demonstrated that the multi-fork isolation tree structure can lead to better detection performance. However, there is no theoretical work answering the fundamentally and practically important question on the optimal tree structure for an isolation forest with respect to the branching factor. In this paper, we establish a theory on isolation efficiency to answer the question and determine the optimal branching factor for an isolation tree. Based on the theoretical underpinning, we design a practical optimal isolation forest OptIForest incorporating clustering based learning to hash which enables more information to be learned from data for better isolation quality. The rationale of our approach relies on a better bias-variance trade-off achieved by bias reduction in OptIForest. Extensive experiments on a series of benchmarking datasets for comparative and ablation studies demonstrate that our approach can efficiently and robustly achieve better detection performance in general than the state-of-the-arts including the deep learning based methods.Comment: This paper has been accepted by International Joint Conference on Artificial Intelligence (IJCAI-23

    Privacy Preservation for Federated Learning with Robust Aggregation in Edge Computing

    Get PDF
    Benefiting from the powerful data analysis and prediction capabilities of artificial intelligence (AI), the data on the edge is often transferred to the cloud center for centralized training to obtain an accurate model. To resist the risk of privacy leakage due to frequent data transmission between the edge and the cloud, federated learning (FL) is engaged in the edge paradigm, uploading the model updated on the edge server (ES) to the central server for aggregation, instead of transferring data directly. However, the adversarial ES can infer the update of other ESs from the aggregated model and the update may still expose some characteristics of data of other ESs. Besides, there is a certain probability that the entire aggregation is disrupted by the adversarial ESs through uploading a malicious update. In this paper, a privacy-preserving FL scheme with robust aggregation in edge computing is proposed, named FL-RAEC. First, the hybrid privacy-preserving mechanism is constructed to preserve the integrity and privacy of the data uploaded by the ESs. For the robust model aggregation, a phased aggregation strategy is proposed. Specifically, anomaly detection based on autoencoder is performed while some ESs are selected for anonymous trust verification at the beginning. In the next stage, via multiple rounds of random verification, the trust score of each ES is assessed to identify the malicious participants. Eventually, FL-RAEC is evaluated in detail, depicting that FL-RAEC has strong robustness and high accuracy under different attacks

    A fully connected deep learning approach to upper limb gesture recognition in a secure FES rehabilitation environment

    Get PDF
    Stroke is one of the leading causes of death and disability in the world. The rehabilitation of Patients' limb functions has great medical value, for example, the therapy of functional electrical stimulation (FES) systems, but suffers from effective rehabilitation evaluation. In this paper, six gestures of upper limb rehabilitation were monitored and collected using microelectromechanical systems sensors, where data stability was guaranteed using data preprocessing methods, that is, deweighting, interpolation, and feature extraction. A fully connected neural network has been proposed investigating the effects of different hidden layers, and determining its activation functions and optimizers. Experiments have depicted that a three‐hidden‐layer model with a softmax function and an adaptive gradient descent optimizer can reach an average gesture recognition rate of 97.19%. A stop mechanism has been used via recognition of dangerous gesture to ensure the safety of the system, and the lightweight cryptography has been used via hash to ensure the security of the system. Comparison to the classification models, for example, k‐nearest neighbor, logistic regression, and other random gradient descent algorithms, was conducted to verify the outperformance in recognition of upper limb gesture data. This study also provides an approach to creating health profiles based on large‐scale rehabilitation data and therefore consequent diagnosis of the effects of FES rehabilitation
    corecore