x UAS application areas increase by the day. x UAS relatively easy to be built. x News outlets UAS applications: + Expected use on a massive scale. + Equipped with high-res cameras and storage. + Record visual and aud...
详细信息
ISBN:
(纸本)9781479989522
x UAS application areas increase by the day. x UAS relatively easy to be built. x News outlets UAS applications: + Expected use on a massive scale. + Equipped with high-res cameras and storage. + Record visual and audio information. + Also can record people's faces or license plates. x Need privacy protection measures.
Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for r...
详细信息
ISBN:
(纸本)9781450333764
Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for resource-bounded systems, such as cyber-physical systems. For example, many control systems are built on legacy components which are computationally limited but have strict timing constraints. If integrity protection is a binary decision, it may simply be infeasible to introduce into such systems;without it, however, an adversary can forge malicious messages, which can cause significant physical or financial harm. We propose a formal game-theoretic framework for optimal stochastic message authentication, providing provable integrity guarantees for resource-bounded systems based on an existing MAC scheme. We use our framework to investigate attacker deterrence, as well as optimal design of stochastic message authentication schemes when deterrence is impossible. Finally, we provide experimental results on the computational performance of our framework in practice. Copyright is held by the owner/author(s).
The infrastructures on which our society depends are interconnected and interdependent on multiple levels. The failure of one infrastructure can result in the disruption of other infrastructures, which can lead to sev...
详细信息
Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity pres...
详细信息
Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity preserving mechanism, which hides the identities of communicating parties, plays an important role as a defense against cyber and physical attacks. While anonymous routing protocols for DTNs have been proposed in the past, to the best of our knowledge, there is no work that emphasizes the theoretical aspects. In this paper, we first design an abstract of anonymous routing protocols for DTNs and augment the existing solution with multi-copy message forwarding. Then, we construct simplified mathematical models, which can be used to understand the fundamental performance and security guarantees of onion-based anonymous routing in DTNs. The numerical and simulation results using randomly generated contact graphs and the real traces demonstrate that our models provide very close approximations to the performance of the anonymous DTN routing protocol.
This editorial introduces the first selection of papers in IEEE-RITA from the LACCEI annual conference held in 2014. It publishes a view of the LACCEI coverage of issues and topics inside their engineering coverage of...
详细信息
This editorial introduces the first selection of papers in IEEE-RITA from the LACCEI annual conference held in 2014. It publishes a view of the LACCEI coverage of issues and topics inside their engineering coverage of Latin American and Caribbean countries, and of the solutions and vision they provide worldwide and for the Region.
Web 2.0 resources such as online forum messages are of growing value in supporting education and research, and new information systems are aimed at synthesizing these resources into environments facilitating collabora...
详细信息
ISBN:
(纸本)9781509012268
Web 2.0 resources such as online forum messages are of growing value in supporting education and research, and new information systems are aimed at synthesizing these resources into environments facilitating collaboration, learning and other goals. To support the automatic identification of valuable Web 2.0 resources, this paper presents an approach for estimating the information value of messages posted to an online forum. The system integrates key insights that include (1) how to reliably obtain large quantities of both positive and negative examples of such resources for use in training a machine learning algorithm, (2) the importance of considering authorship when analyzing the value of an online message, (3) the benefit of considering the subsequent message when analyzing a given message for its importance, and (4) how to develop and leverage a custom sentiment analysis model for use in automatically identifying high-value messages. In an evaluation using almost 90000 messages from an online forum, a baseline model for identifying valuable messages made over 50% more errors than the proposed model.
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged ...
详细信息
For many supervised learning applications, addi- tional information, besides the labels, is often available dur- ing training, but not available during testing. Such additional information, referred to the privileged information, can be exploited during training to construct a better classifier. In this paper, we propose a Bayesian network (BN) approach for learning with privileged information. We propose to in- corporate the privileged information through a three-node BN. We further mathematically evaluate different topologies of the three-node BN and identify those structures, through which the privileged information can benefit the classifica- tion. Experimental results on handwritten digit recognition, spontaneous versus posed expression recognition, and gender recognition demonstrate the effectiveness of our approach.
In this paper, we propose an approximate policy iteration method for cooperative control of multiagent systems under the limited sensing/communication topology. By considering a class of nonlinear multiagent systems, ...
详细信息
ISBN:
(纸本)9780889869752
In this paper, we propose an approximate policy iteration method for cooperative control of multiagent systems under the limited sensing/communication topology. By considering a class of nonlinear multiagent systems, the cooperative control problem is formulated as making all systems achieve consensus while minimizing the individual sensing/communication topology dependent cost functions. To solve the induced multiagent Hamilton-Jacobi-Bellman (HJB) equations, a multiagent policy iteration algorithm is proposed with convergence proof. Neural network parameterization is further employed to approximate value function to deal with unknown system dynamics. Through seeking the least-squares solution based on the measured online sensing/communication data, the approximate multiagent policy iteration algorithm is obtained to solve the posed optimal cooperative control problem for multi agents. Simulation results illustrate the effectiveness of the proposed optimal cooperative control.
Scaffolding students in open-ended learning environments (OELEs) is a difficult challenge. The open-ended nature of OELEs allows students to simultaneously pursue, modify, and abandon any of a large number of both sho...
详细信息
Scaffolding students in open-ended learning environments (OELEs) is a difficult challenge. The open-ended nature of OELEs allows students to simultaneously pursue, modify, and abandon any of a large number of both short-term and long-term approaches to completing their tasks. To overcome these challenges, we have recently developed coherence analysis, which focuses on students' ability to interpret and apply the information available in the OELE. This approach has yielded valuable dividends: by characterizing students according to the coherence of their behavior, teachers and researchers have access to easily-calculated, intuitive, and actionable measures of the quality of students' problem-solving processes. The next step in this line of research is to develop a framework for using coherence analysis to adaptively scaffold students in OELEs. In this paper, we present our initial ideas for this work and propose guidelines for the construction of a scaffolding framework.
This paper presents a formulation of a nonlinear model predictive controller for steering of a nuclear reaction in a pressurized water reactor via control rod displacement. The predictive model, based on point kinetic...
详细信息
暂无评论