作者:
Bin YuanYan JiaLuyi XingDongfang ZhaoXiaoFeng WangDeqing ZouHai JinYuqing ZhangSchool of Cyber Science and Engineering
Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center and Indiana University Bloomington and Shenzhen Huazhong University of Science and Technology Research Institute China School of Cyber Engineering
Xidian University China and National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and Indiana University Bloomington Indiana University BloomingtonSchool of Cyber Science and Engineering
Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center School of Computer Science and Technology
Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center Huazhong Univ. of Sci. & Tech. China National Computer Network Intrusion Protection Center
University of Chinese Academy of Sciences China and School of Cyber Engineering Xidian University China
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by th...
ISBN:
(纸本)9781939133175
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by the device vendor, e.g., Philips bulbs are managed under Philips Hue cloud. Today's mainstream IoT clouds also support device access delegation across different vendors (e.g., Philips Hue, LIFX, etc.) and cloud providers (e.g., Google, IFTTT, etc.): for example, Philips Hue and SmartThings clouds support to delegate device access to another cloud such as Google Home, so a user can manage multiple devices from different vendors all through Google Home. Serving this purpose are the IoT delegation mechanisms developed and utilized by IoT clouds, which we found are heterogeneous and ad-hoc in the wild, in the absence of a standardized delegation protocol suited for IoT environments. In this paper, we report the first systematic study on real-world IoT access delegation, based upon a semi-automatic verification tool we developed. Our study brought to light the pervasiveness of security risks in these delegation mechanisms, allowing the adversary (e.g., Airbnb tenants, former employees) to gain unauthorized access to the victim's devices (e.g., smart locks) or impersonate the devices to trigger other devices. We confirmed the presence of critical security flaws in these mechanisms through end-to-end exploits on them, and further conducted a measurement study. Our research demonstrates the serious consequences of these exploits and the security implications of the practice today for building these mechanisms. We reported our findings to related parties, which acknowledged the problems. We further propose principles for developing more secure cross-cloud IoT delegation services, before a standardized solution can be widely deployed.
Modern bookcrossing leverages the mobile networks to help readers share books via convenient connection, and thus expedites the dissemination of information. However, the lack of traceability has significantly hindere...
详细信息
ISBN:
(数字)9781728152127
ISBN:
(纸本)9781728152134
Modern bookcrossing leverages the mobile networks to help readers share books via convenient connection, and thus expedites the dissemination of information. However, the lack of traceability has significantly hindered the wide adoption of mobile bookcrossing, leading to loss of books. Meanwhile, the managerial inefficiency of current mobile bookcrossing systems becomes another obstacle for advancing the book circulation. To overcome these problems, we propose to leverage the promising blockchain technology with the merits of its immutability and cryptographic smart contract. In this paper, we present BookChain, a traceable and efficient blockchain-based innercampus book sharing system. BookChain stores the complete sharing data of an interested book permanently on blockchain, such that every reader can trace the borrowing history, which reduces the potential for loss of book. BookChain also introduces the use of smart contract to automate the circulation of books with minimal human intervention, resulting in the improvement of efficiency. The experimental results show the effectiveness and low-cost of the proposed system under high concurrent users.
Cloud computing provides utility-based and scalable services to end-users. In the past decade, the demands for resource management in cloud computing have increased substantially which lead to certain challenges such ...
Cloud computing provides utility-based and scalable services to end-users. In the past decade, the demands for resource management in cloud computing have increased substantially which lead to certain challenges such as optimal resource utilization, power consumption, and service level agreement violations. Workload performance prediction serves as an assistance to address these issues. In this paper, we propose a prediction model based on clustered Case-Based Reasoning (CBR). The proposed model determines the performance metrics for workload prior to the co-operation of autonomic computing characteristics. Thus, CBR provides optimal scheduling of resources and workload monitoring for cloud data centers. In order to validate the proposed CBR-based prediction model, we perform a series of experiments and evaluate the effectiveness in terms of precision, recall, f-measure, and mean square error rate. We generate the cases for CBR using traces from the Google cluster data center. Moreover, we also validate our proposed prediction model against Support Vector Machine (SVM) prediction scheme. Experimental results show that the proposed CBR outperforms the SVM-based approach and yields 10% improvement in terms of precision.
Non-uniform memory access (NUMA) architectures feature asymmetrical memory access latencies on different CPU nodes. Hybrid memory systems composed of non-volatile memory (NVM) and DRAM further diversify memory access ...
详细信息
Non-uniform memory access (NUMA) architectures feature asymmetrical memory access latencies on different CPU nodes. Hybrid memory systems composed of non-volatile memory (NVM) and DRAM further diversify memory access latencies due to the relatively large performance gap between NVM and DRAM. Traditional NUMA memory management policies fail to manage hybrid memories effectively and may even hurt application performance. In this paper, we present HiNUMA, a new NUMA abstraction for memory allocation and migration in hybrid memory systems. HiNUMA advocates NUMA topologyaware hybrid memory allocation policies for the initial data placement. HiNUMA also proposes a new NUMA balancing mechanism called HANB for memory migration at runtime. HANB considers both data access frequency and memory bandwidth utilization to reduce the cost of memory accesses in hybrid memory systems. We evaluate the performance of HiNUMA with several typical workloads. Experimental results show that HiNUMA can effectively utilize hybrid memories, and deliver much higher application performance than conventional NUMA memory management policies and other state-of-the-art work.
Fingerprinting-based indoor localization via WiFi has achieved a great breakthrough in the past decade. However, it suffers from an inherent problem that the localization accuracy declines sharply over time due to the...
详细信息
ISBN:
(数字)9781728152127
ISBN:
(纸本)9781728152134
Fingerprinting-based indoor localization via WiFi has achieved a great breakthrough in the past decade. However, it suffers from an inherent problem that the localization accuracy declines sharply over time due to the dynamic environment and unstable WiFi devices. Researchers have designed many methods to update the localization model, e.g., crowdsourcing-based model updating, in order to maintain the localization accuracy. Unfortunately, they have not taken the privacy into consideration during the updating process. This will lead to a threat that the eavesdroppers could guess the location providers' private information according to the updating model. For the goal of maintaining the localization accuracy without the risk of privacy breaching, we proposed FLoc, a fingerprinting-based indoor localization system which updates the localization model via a federated learning framework. In FLoc, every provider maintains a local localization model in their own device. They will regularly encrypt the updating parameters and share them to a common model server. At the model server, it aggregates the encrypted information of the local models to maintain a general model, which will be sent back to the local devices for next updating iteration. We evaluate FLoc in an APs unknown laboratory corridor. The experiment results show that FLoc has a comparable localization performance. Moreover, it can successfully protect the providers' privacy, since the information transferred is all encrypted.
Failure occurrence in large-scale systems is inevitable, which makes the resilience a key challenge for modern systems. Checkpoints with rollback recovery is a well-known approach to provide fault tolerance in distrib...
详细信息
Triangle counting is one of the most basic graph applications to solve many real-world problems in a wide variety of domains. Exploring the massive parallelism of the Graphics Processing Unit (GPU) to accelerate the t...
详细信息
Triangle counting is one of the most basic graph applications to solve many real-world problems in a wide variety of domains. Exploring the massive parallelism of the Graphics Processing Unit (GPU) to accelerate the triangle counting is prevail. We identify that the stat-of-the-art GPU-based studies that focus on improving the load balancing still exhibit inherently a large number of random accesses in degrading the performance. In this paper, we design a prefetching scheme that buffers the neighbor list of the processed vertex in advance in the fast shared memory to avoid high latency of random global memory access. Also, we adopt the degree-based graph reordering technique and design a simple heuristic to evenly distribute the workload. Compared to the state-of-the-art HEPC Graph Challenge Champion in the last year, we advance to improve the performance of triangle counting by up to 5.9× speedup with> 109 TEPS on a single GPU for many large real graphs from graph challenge datasets.
The volume of RDF data continues to grow over the past decade and many known RDF datasets have billions of triples. A grant challenge of managing this huge RDF data is how to access this big RDF data efficiently. A po...
详细信息
The exact position of dead tissue in ischemic stroke lesions plays an important role to cure the life-threatening condition. However, this issue stays difficult caused by variation of ischemic strokes such as shape an...
详细信息
ISBN:
(数字)9781538680759
ISBN:
(纸本)9781538680766
The exact position of dead tissue in ischemic stroke lesions plays an important role to cure the life-threatening condition. However, this issue stays difficult caused by variation of ischemic strokes such as shape and location. Fully convolutional neural networks (FCN) have great potential for semantic image segmentation. Recently, UNet based CNN architectures have secured outstanding performance in the application of medical imaging. The primary problem is data imbalanced in the application of such networks which are very common in medical data application such as lesion applications where non-lesion voxels are higher than lesion voxels. Data imbalance generates low recall and high precision on the prediction of trained networks. Biases towards the particular class are not suitable for many medical works where false positives are less than false negatives. A lot of approaches are developed to tackle this issue including balanced sampling, sample re-weighting, and recently focal loss and similarity loss functions. In this paper, we proposed hyper densely connected network along with hybrid loss functions for ischemic stroke lesions segmentation. The densely connected network exploits the contextual information of multi-modalities, and hybrid loss function uses to overcome the data imbalance. We evaluate our performance on ISLES dataset. Our approach performs well as compared to other existing methods.
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability detectors still cannot achieve the vulne...
详细信息
暂无评论