-
Quality-Aware Task Offloading for Cooperative Perception in Vehicular Edge Computing
Authors:
Amr M. Zaki,
Sara A. Elsayed,
Khalid Elgazzar,
Hossam S. Hassanein
Abstract:
Task offloading in Vehicular Edge Computing (VEC) can advance cooperative perception (CP) to improve traffic awareness in Autonomous Vehicles. In this paper, we propose the Quality-aware Cooperative Perception Task Offloading (QCPTO) scheme. Q-CPTO is the first task offloading scheme that enhances traffic awareness by prioritizing the quality rather than the quantity of cooperative perception. Q-C…
▽ More
Task offloading in Vehicular Edge Computing (VEC) can advance cooperative perception (CP) to improve traffic awareness in Autonomous Vehicles. In this paper, we propose the Quality-aware Cooperative Perception Task Offloading (QCPTO) scheme. Q-CPTO is the first task offloading scheme that enhances traffic awareness by prioritizing the quality rather than the quantity of cooperative perception. Q-CPTO improves the quality of CP by curtailing perception redundancy and increasing the Value of Information (VOI) procured by each user. We use Kalman filters (KFs) for VOI assessment, predicting the next movement of each vehicle to estimate its region of interest. The estimated VOI is then integrated into the task offloading problem. We formulate the task offloading problem as an Integer Linear Program (ILP) that maximizes the VOI of users and reduces perception redundancy by leveraging the spatially diverse fields of view (FOVs) of vehicles, while adhering to strict latency requirements. We also propose the Q-CPTO-Heuristic (Q-CPTOH) scheme to solve the task offloading problem in a time-efficient manner. Extensive evaluations show that Q-CPTO significantly outperforms prominent task offloading schemes by up to 14% and 20% in terms of response delay and traffic awareness, respectively. Furthermore, Q-CPTO-H closely approaches the optimal solution, with marginal gaps of up to 1.4% and 2.1% in terms of traffic awareness and the number of collaborating users, respectively, while reducing the runtime by up to 84%.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
HMAR: Hierarchical Masked Attention for Multi-Behaviour Recommendation
Authors:
Shereen Elsayed,
Ahmed Rashed,
Lars Schmidt-Thieme
Abstract:
In the context of recommendation systems, addressing multi-behavioral user interactions has become vital for understanding the evolving user behavior. Recent models utilize techniques like graph neural networks and attention mechanisms for modeling diverse behaviors, but capturing sequential patterns in historical interactions remains challenging. To tackle this, we introduce Hierarchical Masked A…
▽ More
In the context of recommendation systems, addressing multi-behavioral user interactions has become vital for understanding the evolving user behavior. Recent models utilize techniques like graph neural networks and attention mechanisms for modeling diverse behaviors, but capturing sequential patterns in historical interactions remains challenging. To tackle this, we introduce Hierarchical Masked Attention for multi-behavior recommendation (HMAR). Specifically, our approach applies masked self-attention to items of the same behavior, followed by self-attention across all behaviors. Additionally, we propose historical behavior indicators to encode the historical frequency of each items behavior in the input sequence. Furthermore, the HMAR model operates in a multi-task setting, allowing it to learn item behaviors and their associated ranking scores concurrently. Extensive experimental results on four real-world datasets demonstrate that our proposed model outperforms state-of-the-art methods. Our code and datasets are available here (https://github.com/Shereen-Elsayed/HMAR).
△ Less
Submitted 29 April, 2024;
originally announced May 2024.
-
Utility-driven Optimization of TTL Cache Hierarchies under Network Delays
Authors:
Karim S. Elsayed,
Fabien Geyer,
Amr Rizk
Abstract:
We optimize hierarchies of Time-to-Live (TTL) caches under random network delays. A TTL cache assigns individual eviction timers to cached objects that are usually refreshed upon a hit where upon a miss the object requires a random time to be fetched from a parent cache. Due to their object decoupling property, TTL caches are of particular interest since the optimization of a per-object utility en…
▽ More
We optimize hierarchies of Time-to-Live (TTL) caches under random network delays. A TTL cache assigns individual eviction timers to cached objects that are usually refreshed upon a hit where upon a miss the object requires a random time to be fetched from a parent cache. Due to their object decoupling property, TTL caches are of particular interest since the optimization of a per-object utility enables service differentiation. However, state-of-the-art exact TTL cache optimization does not extend beyond single TTL caches, especially under network delays. In this paper, we leverage the object decoupling effect to formulate the non-linear utility maximization problem for TTL cache hierarchies in terms of the exact object hit probability under random network delays. We iteratively solve the utility maximization problem to find the optimal per-object TTLs. Further, we show that the exact model suffers from tractability issues for large hierarchies and propose a machine learning approach to estimate the optimal TTL values for large systems. Finally, we provide numerical and data center trace-based evaluations for both methods showing the significant offloading improvement due to TTL optimization considering the network delays.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Context-Aware Sequential Model for Multi-Behaviour Recommendation
Authors:
Shereen Elsayed,
Ahmed Rashed,
Lars Schmidt-Thieme
Abstract:
Sequential recommendation models are crucial for next-item recommendations in online platforms, capturing complex patterns in user interactions. However, many focus on a single behavior, overlooking valuable implicit interactions like clicks and favorites. Existing multi-behavioral models often fail to simultaneously capture sequential patterns. We propose CASM, a Context-Aware Sequential Model, l…
▽ More
Sequential recommendation models are crucial for next-item recommendations in online platforms, capturing complex patterns in user interactions. However, many focus on a single behavior, overlooking valuable implicit interactions like clicks and favorites. Existing multi-behavioral models often fail to simultaneously capture sequential patterns. We propose CASM, a Context-Aware Sequential Model, leveraging sequential models to seamlessly handle multiple behaviors. CASM employs context-aware multi-head self-attention for heterogeneous historical interactions and a weighted binary cross-entropy loss for precise control over behavior contributions. Experimental results on four datasets demonstrate CASM's superiority over state-of-the-art approaches.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
Towards Mitigating ChatGPT's Negative Impact on Education: Optimizing Question Design through Bloom's Taxonomy
Authors:
Saber Elsayed
Abstract:
The popularity of generative text AI tools in answering questions has led to concerns regarding their potential negative impact on students' academic performance and the challenges that educators face in evaluating student learning. To address these concerns, this paper introduces an evolutionary approach that aims to identify the best set of Bloom's taxonomy keywords to generate questions that th…
▽ More
The popularity of generative text AI tools in answering questions has led to concerns regarding their potential negative impact on students' academic performance and the challenges that educators face in evaluating student learning. To address these concerns, this paper introduces an evolutionary approach that aims to identify the best set of Bloom's taxonomy keywords to generate questions that these tools have low confidence in answering. The effectiveness of this approach is evaluated through a case study that uses questions from a Data Structures and Representation course being taught at the University of New South Wales in Canberra, Australia. The results demonstrate that the optimization algorithm is able to find keywords from different cognitive levels to create questions that ChatGPT has low confidence in answering. This study is a step forward to offer valuable insights for educators seeking to create more effective questions that promote critical thinking among students.
△ Less
Submitted 30 March, 2023;
originally announced April 2023.
-
Machine Learning Aided Multiscale Magnetostatics
Authors:
Fadi Aldakheel,
Celal Soyarslan,
Hari Subramani Palanisamy,
Elsayed Saber Elsayed
Abstract:
Computational material modeling using advanced numerical techniques speeds up the design process and reduces the costs of developing new engineering products. In the field of multiscale modeling, huge computation efforts are expected for modeling heterogeneous materials while trying to reach high accuracy levels. In this work, a machine learning approach, namely the convolutional neural network (C…
▽ More
Computational material modeling using advanced numerical techniques speeds up the design process and reduces the costs of developing new engineering products. In the field of multiscale modeling, huge computation efforts are expected for modeling heterogeneous materials while trying to reach high accuracy levels. In this work, a machine learning approach, namely the convolutional neural network (CNN), is developed as a solution providing a high level of accuracy, while being computationally efficient. The input for the CNN model consists of two-/three-dimensional images of artificial periodic and biphasic microstructures in the form of nonoverlapping and overlapping, mono- and polydisperse circular/spherical disk systems, which are generated by a random sequential inhibition process. These correspond to Statistical Volume Elements (SVE). Considering linear magnetostatics at the microscale, the output is the apparent permeability of the SVE. Training and testing data for the apparent properties is produced with finite element method-based two-scale asymptotic homogenization. The model efficiency is revealed by employing some representative examples in two- and three-dimensional settings. In this regard, the performance of the CNN model is assessed with the applied computational homogenization method relating to the accuracy and computational efficiency. The results with the CNN model show high accuracy in predicting the homogenized permeability and a significant decrease in computation time.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
Planning-Assisted Context-Sensitive Autonomous Shepherding of Dispersed Robotic Swarms in Obstacle-Cluttered Environments
Authors:
Jing Liu,
Hemant Singh,
Saber Elsayed,
Robert Hunjet,
Hussein Abbass
Abstract:
Robotic shepherding is a bio-inspired approach to autonomously guiding a swarm of agents towards a desired location. The research area has earned increasing research interest recently due to the efficacy of controlling a large number of agents in a swarm (sheep) using a smaller number of actuators (sheepdogs). However, shepherding a highly dispersed swarm in an obstacle-cluttered environment remai…
▽ More
Robotic shepherding is a bio-inspired approach to autonomously guiding a swarm of agents towards a desired location. The research area has earned increasing research interest recently due to the efficacy of controlling a large number of agents in a swarm (sheep) using a smaller number of actuators (sheepdogs). However, shepherding a highly dispersed swarm in an obstacle-cluttered environment remains challenging for existing methods. To improve the efficacy of shepherding in complex environments with obstacles and dispersed sheep, this paper proposes a planning-assisted context-sensitive autonomous shepherding framework with collision avoidance abilities. The proposed approach models the swarm shepherding problem as a single Travelling Salesperson Problem (TSP), with two sheepdogs\textquoteright\ modes: no-interaction and interaction. An adaptive switching approach is integrated into the framework to guide real-time path planning for avoiding collisions with static and dynamic obstacles; the latter representing moving sheep swarms. We then propose an overarching hierarchical mission planning system, which is made of three sub-systems: a clustering approach to group and distinguish sheep sub-swarms, an Ant Colony Optimisation algorithm as a TSP solver for determining the optimal herding sequence of the sub-swarms, and an online path planner for calculating optimal paths for both sheepdogs and sheep. The experiments on various environments, both with and without obstacles, objectively demonstrate the effectiveness of the proposed shepherding framework and planning approaches.
△ Less
Submitted 27 February, 2023; v1 submitted 24 January, 2023;
originally announced January 2023.
-
Deep Multi-Representation Model for Click-Through Rate Prediction
Authors:
Shereen Elsayed,
Lars Schmidt-Thieme
Abstract:
Click-Through Rate prediction (CTR) is a crucial task in recommender systems, and it gained considerable attention in the past few years. The primary purpose of recent research emphasizes obtaining meaningful and powerful representations through mining low and high feature interactions using various components such as Deep Neural Networks (DNN), CrossNets, or transformer blocks. In this work, we p…
▽ More
Click-Through Rate prediction (CTR) is a crucial task in recommender systems, and it gained considerable attention in the past few years. The primary purpose of recent research emphasizes obtaining meaningful and powerful representations through mining low and high feature interactions using various components such as Deep Neural Networks (DNN), CrossNets, or transformer blocks. In this work, we propose the Deep Multi-Representation model (DeepMR) that jointly trains a mixture of two powerful feature representation learning components, namely DNNs and multi-head self-attentions. Furthermore, DeepMR integrates the novel residual with zero initialization (ReZero) connections to the DNN and the multi-head self-attention components for learning superior input representations. Experiments on three real-world datasets show that the proposed model significantly outperforms all state-of-the-art models in the task of click-through rate prediction.
△ Less
Submitted 25 October, 2022; v1 submitted 18 October, 2022;
originally announced October 2022.
-
End-to-End Image-Based Fashion Recommendation
Authors:
Shereen Elsayed,
Lukas Brinkmeyer,
Lars Schmidt-Thieme
Abstract:
In fashion-based recommendation settings, incorporating the item image features is considered a crucial factor, and it has shown significant improvements to many traditional models, including but not limited to matrix factorization, auto-encoders, and nearest neighbor models. While there are numerous image-based recommender approaches that utilize dedicated deep neural networks, comparisons to att…
▽ More
In fashion-based recommendation settings, incorporating the item image features is considered a crucial factor, and it has shown significant improvements to many traditional models, including but not limited to matrix factorization, auto-encoders, and nearest neighbor models. While there are numerous image-based recommender approaches that utilize dedicated deep neural networks, comparisons to attribute-aware models are often disregarded despite their ability to be easily extended to leverage items' image features. In this paper, we propose a simple yet effective attribute-aware model that incorporates image features for better item representation learning in item recommendation tasks. The proposed model utilizes items' image features extracted by a calibrated ResNet50 component. We present an ablation study to compare incorporating the image features using three different techniques into the recommender system component that can seamlessly leverage any available items' attributes. Experiments on two image-based real-world recommender systems datasets show that the proposed model significantly outperforms all state-of-the-art image-based models.
△ Less
Submitted 5 May, 2022;
originally announced May 2022.
-
CARCA: Context and Attribute-Aware Next-Item Recommendation via Cross-Attention
Authors:
Ahmed Rashed,
Shereen Elsayed,
Lars Schmidt-Thieme
Abstract:
In sparse recommender settings, users' context and item attributes play a crucial role in deciding which items to recommend next. Despite that, recent works in sequential and time-aware recommendations usually either ignore both aspects or only consider one of them, limiting their predictive performance. In this paper, we address these limitations by proposing a context and attribute-aware recomme…
▽ More
In sparse recommender settings, users' context and item attributes play a crucial role in deciding which items to recommend next. Despite that, recent works in sequential and time-aware recommendations usually either ignore both aspects or only consider one of them, limiting their predictive performance. In this paper, we address these limitations by proposing a context and attribute-aware recommender model (CARCA) that can capture the dynamic nature of the user profiles in terms of contextual features and item attributes via dedicated multi-head self-attention blocks that extract profile-level features and predicting item scores. Also, unlike many of the current state-of-the-art sequential item recommendation approaches that use a simple dot-product between the most recent item's latent features and the target items embeddings for scoring, CARCA uses cross-attention between all profile items and the target items to predict their final scores. This cross-attention allows CARCA to harness the correlation between old and recent items in the user profile and their influence on deciding which item to recommend next. Experiments on four real-world recommender system datasets show that the proposed model significantly outperforms all state-of-the-art models in the task of item recommendation and achieving improvements of up to 53% in Normalized Discounted Cumulative Gain (NDCG) and Hit-Ratio. Results also show that CARCA outperformed several state-of-the-art dedicated image-based recommender systems by merely utilizing image attributes extracted from a pre-trained ResNet50 in a black-box fashion.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
A.I. and Data-Driven Mobility at Volkswagen Financial Services AG
Authors:
Shayan Jawed,
Mofassir ul Islam Arif,
Ahmed Rashed,
Kiran Madhusudhanan,
Shereen Elsayed,
Mohsan Jameel,
Alexei Volk,
Andre Hintsches,
Marlies Kornfeld,
Katrin Lange,
Lars Schmidt-Thieme
Abstract:
Machine learning is being widely adapted in industrial applications owing to the capabilities of commercially available hardware and rapidly advancing research. Volkswagen Financial Services (VWFS), as a market leader in vehicle leasing services, aims to leverage existing proprietary data and the latest research to enhance existing and derive new business processes. The collaboration between Infor…
▽ More
Machine learning is being widely adapted in industrial applications owing to the capabilities of commercially available hardware and rapidly advancing research. Volkswagen Financial Services (VWFS), as a market leader in vehicle leasing services, aims to leverage existing proprietary data and the latest research to enhance existing and derive new business processes. The collaboration between Information Systems and Machine Learning Lab (ISMLL) and VWFS serves to realize this goal. In this paper, we propose methods in the fields of recommender systems, object detection, and forecasting that enable data-driven decisions for the vehicle life-cycle at VWFS.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)
Authors:
Victor Adewopo,
Bilal Gonen,
Nelly Elsayed,
Murat Ozer,
Zaghloul Saad Elsayed
Abstract:
In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, information sharing, trade-off, and review systems. Domain knowledge is shared among experts in hacker's forums which contain indicators of compromise that can be explo…
▽ More
In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, information sharing, trade-off, and review systems. Domain knowledge is shared among experts in hacker's forums which contain indicators of compromise that can be explored for cyberthreat intelligence. Developing tools that can be deployed for threat detection is integral in securing digital communication in cyberspace. In this paper, we addressed the use of TOR relay nodes for anonymizing communications in deep web forums. We propose a novel approach for detecting cyberthreats using a deep learning algorithm Long Short-Term Memory (LSTM). The developed model outperformed the experimental results of other researchers in this problem domain with an accuracy of 94\% and precision of 90\%. Our model can be easily deployed by organizations in securing digital communications and detection of vulnerability exposure before cyberattack.
△ Less
Submitted 3 February, 2022;
originally announced February 2022.
-
Upgrade of the CMS Resistive Plate Chambers for the High Luminosity LHC
Authors:
A. Samalan,
M. Tytgat,
G. A. Alves,
F. Marujo,
F. Torres Da Silva De Araujo,
E. M. DaCosta,
D. De Jesus Damiao,
H. Nogima,
A. Santoro,
S. Fonseca De Souza,
A. Aleksandrov,
R. Hadjiiska,
P. Iaydjiev,
M. Rodozov,
M. Shopova,
G. Soultanov,
M. Bonchev,
A. Dimitrov,
L. Litov,
B. Pavlov,
P. Petkov,
A. Petrov,
S. J. Qian,
C. Bernal,
A. Cabrera
, et al. (86 additional authors not shown)
Abstract:
During the upcoming High Luminosity phase of the Large Hadron Collider (HL-LHC), the integrated luminosity of the accelerator will increase to 3000 fb$^{-1}$. The expected experimental conditions in that period in terms of background rates, event pileup, and the probable aging of the current detectors present a challenge for all the existing experiments at the LHC, including the Compact Muon Solen…
▽ More
During the upcoming High Luminosity phase of the Large Hadron Collider (HL-LHC), the integrated luminosity of the accelerator will increase to 3000 fb$^{-1}$. The expected experimental conditions in that period in terms of background rates, event pileup, and the probable aging of the current detectors present a challenge for all the existing experiments at the LHC, including the Compact Muon Solenoid (CMS) experiment. To ensure a highly performing muon system for this period, several upgrades of the Resistive Plate Chamber (RPC) system of the CMS are currently being implemented. These include the replacement of the readout system for the present system, and the installation of two new RPC stations with improved chamber and front-end electronics designs. The current overall status of this CMS RPC upgrade project is presented.
△ Less
Submitted 2 November, 2021; v1 submitted 29 September, 2021;
originally announced September 2021.
-
Collaborative Experience between Scientific Software Projects using Agile Scrum Development
Authors:
A. L. Baxter,
S. Y. BenZvi,
W. Bonivento,
A. Brazier,
M. Clark,
A. Coleiro,
D. Collom,
M. Colomer-Molla,
B. Cousins,
A. Delgado Orellana,
D. Dornic,
V. Ekimtcov,
S. ElSayed,
A. Gallo Rosso,
P. Godwin,
S. Griswold,
A. Habig,
S. Horiuchi,
D. A. Howell,
M. W. G. Johnson,
M. Juric,
J. P. Kneller,
A. Kopec,
C. Kopper,
V. Kulikovskiy
, et al. (27 additional authors not shown)
Abstract:
Developing sustainable software for the scientific community requires expertise in software engineering and domain science. This can be challenging due to the unique needs of scientific software, the insufficient resources for software engineering practices in the scientific community, and the complexity of developing for evolving scientific contexts. While open-source software can partially addre…
▽ More
Developing sustainable software for the scientific community requires expertise in software engineering and domain science. This can be challenging due to the unique needs of scientific software, the insufficient resources for software engineering practices in the scientific community, and the complexity of developing for evolving scientific contexts. While open-source software can partially address these concerns, it can introduce complicating dependencies and delay development. These issues can be reduced if scientists and software developers collaborate. We present a case study wherein scientists from the SuperNova Early Warning System collaborated with software developers from the Scalable Cyberinfrastructure for Multi-Messenger Astrophysics project. The collaboration addressed the difficulties of open-source software development, but presented additional risks to each team. For the scientists, there was a concern of relying on external systems and lacking control in the development process. For the developers, there was a risk in supporting a user-group while maintaining core development. These issues were mitigated by creating a second Agile Scrum framework in parallel with the developers' ongoing Agile Scrum process. This Agile collaboration promoted communication, ensured that the scientists had an active role in development, and allowed the developers to evaluate and implement the scientists' software requirements. The collaboration provided benefits for each group: the scientists actuated their development by using an existing platform, and the developers utilized the scientists' use-case to improve their systems. This case study suggests that scientists and software developers can avoid scientific computing issues by collaborating and that Agile Scrum methods can address emergent concerns.
△ Less
Submitted 2 August, 2022; v1 submitted 19 January, 2021;
originally announced January 2021.
-
Do We Really Need Deep Learning Models for Time Series Forecasting?
Authors:
Shereen Elsayed,
Daniela Thyssens,
Ahmed Rashed,
Hadi Samer Jomaa,
Lars Schmidt-Thieme
Abstract:
Time series forecasting is a crucial task in machine learning, as it has a wide range of applications including but not limited to forecasting electricity consumption, traffic, and air quality. Traditional forecasting models rely on rolling averages, vector auto-regression and auto-regressive integrated moving averages. On the other hand, deep learning and matrix factorization models have been rec…
▽ More
Time series forecasting is a crucial task in machine learning, as it has a wide range of applications including but not limited to forecasting electricity consumption, traffic, and air quality. Traditional forecasting models rely on rolling averages, vector auto-regression and auto-regressive integrated moving averages. On the other hand, deep learning and matrix factorization models have been recently proposed to tackle the same problem with more competitive performance. However, one major drawback of such models is that they tend to be overly complex in comparison to traditional techniques. In this paper, we report the results of prominent deep learning models with respect to a well-known machine learning baseline, a Gradient Boosting Regression Tree (GBRT) model. Similar to the deep neural network (DNN) models, we transform the time series forecasting task into a window-based regression problem. Furthermore, we feature-engineered the input and output structure of the GBRT model, such that, for each training window, the target values are concatenated with external features, and then flattened to form one input instance for a multi-output GBRT model. We conducted a comparative study on nine datasets for eight state-of-the-art deep-learning models that were presented at top-level conferences in the last years. The results demonstrate that the window-based input transformation boosts the performance of a simple GBRT model to levels that outperform all state-of-the-art DNN models evaluated in this paper.
△ Less
Submitted 20 October, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Path Planning for Shepherding a Swarm in a Cluttered Environment using Differential Evolution
Authors:
Saber Elsayed,
Hemant Singh,
Essam Debie,
Anthony Perry,
Benjamin Campbell,
Robert Hunjet,
Hussein Abbass
Abstract:
Shepherding involves herding a swarm of agents (\emph{sheep}) by another a control agent (\emph{sheepdog}) towards a goal. Multiple approaches have been documented in the literature to model this behaviour. In this paper, we present a modification to a well-known shepherding approach, and show, via simulation, that this modification improves shepherding efficacy. We then argue that given complexit…
▽ More
Shepherding involves herding a swarm of agents (\emph{sheep}) by another a control agent (\emph{sheepdog}) towards a goal. Multiple approaches have been documented in the literature to model this behaviour. In this paper, we present a modification to a well-known shepherding approach, and show, via simulation, that this modification improves shepherding efficacy. We then argue that given complexity arising from obstacles laden environments, path planning approaches could further enhance this model. To validate this hypothesis, we present a 2-stage evolutionary-based path planning algorithm for shepherding a swarm of agents in 2D environments. In the first stage, the algorithm attempts to find the best path for the sheepdog to move from its initial location to a strategic driving location behind the sheep. In the second stage, it calculates and optimises a path for the sheep. It does so by using \emph{way points} on that path as the sequential sub-goals for the sheepdog to aim towards. The proposed algorithm is evaluated in obstacle laden environments via simulation with further improvements achieved.
△ Less
Submitted 28 August, 2020;
originally announced August 2020.
-
Detecting Abnormal Traffic in Large-Scale Networks
Authors:
Mahmoud Said Elsayed,
Nhien-An Le-Khac,
Soumyabrata Dev,
Anca Delia Jurcut
Abstract:
With the rapid technological advancements, organizations need to rapidly scale up their information technology (IT) infrastructure viz. hardware, software, and services, at a low cost. However, the dynamic growth in the network services and applications creates security vulnerabilities and new risks that can be exploited by various attacks. For example, User to Root (U2R) and Remote to Local (R2L)…
▽ More
With the rapid technological advancements, organizations need to rapidly scale up their information technology (IT) infrastructure viz. hardware, software, and services, at a low cost. However, the dynamic growth in the network services and applications creates security vulnerabilities and new risks that can be exploited by various attacks. For example, User to Root (U2R) and Remote to Local (R2L) attack categories can cause a significant damage and paralyze the entire network system. Such attacks are not easy to detect due to the high degree of similarity to normal traffic. While network anomaly detection systems are being widely used to classify and detect malicious traffic, there are many challenges to discover and identify the minority attacks in imbalanced datasets. In this paper, we provide a detailed and systematic analysis of the existing Machine Learning (ML) approaches that can tackle most of these attacks. Furthermore, we propose a Deep Learning (DL) based framework using Long Short Term Memory (LSTM) autoencoder that can accurately detect malicious traffics in network traffic. We perform our experiments in a publicly available dataset of Intrusion Detection Systems (IDSs). We obtain a significant improvement in attack detection, as compared to other benchmarking methods. Hence, our method provides great confidence in securing these networks from malicious traffic.
△ Less
Submitted 13 August, 2020;
originally announced August 2020.
-
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
Authors:
Mahmoud Said Elsayed,
Nhien-An Le-Khac,
Soumyabrata Dev,
Anca Delia Jurcut
Abstract:
Software-Defined Networking (SDN) is an emerging paradigm, which evolved in recent years to address the weaknesses in traditional networks. The significant feature of the SDN, which is achieved by disassociating the control plane from the data plane, facilitates network management and allows the network to be efficiently programmable. However, the new architecture can be susceptible to several att…
▽ More
Software-Defined Networking (SDN) is an emerging paradigm, which evolved in recent years to address the weaknesses in traditional networks. The significant feature of the SDN, which is achieved by disassociating the control plane from the data plane, facilitates network management and allows the network to be efficiently programmable. However, the new architecture can be susceptible to several attacks that lead to resource exhaustion and prevent the SDN controller from supporting legitimate users. One of these attacks, which nowadays is growing significantly, is the Distributed Denial of Service (DDoS) attack. DDoS attack has a high impact on crashing the network resources, making the target servers unable to support the valid users. The current methods deploy Machine Learning (ML) for intrusion detection against DDoS attacks in the SDN network using the standard datasets. However, these methods suffer several drawbacks, and the used datasets do not contain the most recent attack patterns - hence, lacking in attack diversity.
In this paper, we propose DDoSNet, an intrusion detection system against DDoS attacks in SDN environments. Our method is based on Deep Learning (DL) technique, combining the Recurrent Neural Network (RNN) with autoencoder. We evaluate our model using the newly released dataset CICDDoS2019, which contains a comprehensive variety of DDoS attacks and addresses the gaps of the existing current datasets. We obtain a significant improvement in attack detection, as compared to other benchmarking methods. Hence, our model provides great confidence in securing these networks.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
CMS RPC Background -- Studies and Measurements
Authors:
R. Hadjiiska,
A. Samalan,
M. Tytgat,
N. Zaganidis,
G. A. Alves,
F. Marujo,
F. Torres Da Silva De Araujo,
E. M. Da Costa,
D. De Jesus Damiao,
H. Nogima,
A. Santoro,
S. Fonseca De Souza,
A. Aleksandrov,
P. Iaydjiev,
M. Rodozov,
M. Shopova,
G. Sultanov,
M. Bonchev,
A. Dimitrov,
L. Litov,
B. Pavlov,
P. Petkov,
A. Petrov,
S. J. Qian,
C. Bernal
, et al. (84 additional authors not shown)
Abstract:
The expected radiation background in the CMS RPC system has been studied using the MC prediction with the CMS FLUKA simulation of the detector and the cavern. The MC geometry used in the analysis describes very accurately the present RPC system but still does not include the complete description of the RPC upgrade region with pseudorapidity $1.9 < \lvert η\rvert < 2.4$. Present results will be upd…
▽ More
The expected radiation background in the CMS RPC system has been studied using the MC prediction with the CMS FLUKA simulation of the detector and the cavern. The MC geometry used in the analysis describes very accurately the present RPC system but still does not include the complete description of the RPC upgrade region with pseudorapidity $1.9 < \lvert η\rvert < 2.4$. Present results will be updated with the final geometry description, once it is available. The radiation background has been studied in terms of expected particle rates, absorbed dose and fluence. Two High Luminosity LHC (HL-LHC) scenarios have been investigated - after collecting $3000$ and $4000$ fb$^{-1}$. Estimations with safety factor of 3 have been considered, as well.
△ Less
Submitted 13 December, 2020; v1 submitted 26 May, 2020;
originally announced May 2020.
-
Flexible One-Dimensional Metal-Insulator-Graphene Diode
Authors:
Zhenxing Wang,
Burkay Uzlu,
Mehrdad Shaygan,
Martin Otto,
Mário Ribeiro,
Enrique González Marín,
Giuseppe Iannaccone,
Gianluca Fiori,
Mohamed Saeed Elsayed,
Renato Negra,
Daniel Neumaier
Abstract:
In this work, a novel one-dimensional geometry for metal-insulator-graphene (1D-MIG) diode with low capacitance is demonstrated. The junction of the 1D-MIG diode is formed at the 1D edge of Al2O3-encapsulated graphene with TiO2 that acts as barrier material. The diodes demonstrate ultra-high current density since the transport in the graphene and through the barrier is in plane. The geometry deliv…
▽ More
In this work, a novel one-dimensional geometry for metal-insulator-graphene (1D-MIG) diode with low capacitance is demonstrated. The junction of the 1D-MIG diode is formed at the 1D edge of Al2O3-encapsulated graphene with TiO2 that acts as barrier material. The diodes demonstrate ultra-high current density since the transport in the graphene and through the barrier is in plane. The geometry delivers very low capacitive coupling between the cathode and anode of the diode, which shows frequency response up to 100 GHz and ensures potential high frequency performance up to 2.4 THz. The 1D-MIG diodes are demonstrated to function uniformly and stable under bending conditions down to 6.4 mm bending radius on flexible substrate.
△ Less
Submitted 18 March, 2020;
originally announced March 2020.
-
Machine-Learning Techniques for Detecting Attacks in SDN
Authors:
Mahmoud Said Elsayed,
Nhien-An Le-Khac,
Soumyabrata Dev,
Anca Delia Jurcut
Abstract:
With the advent of Software Defined Networks (SDNs), there has been a rapid advancement in the area of cloud computing. It is now scalable, cheaper, and easier to manage. However, SDNs are more prone to security vulnerabilities as compared to legacy systems. Therefore, machine-learning techniques are now deployed in the SDN infrastructure for the detection of malicious traffic. In this paper, we p…
▽ More
With the advent of Software Defined Networks (SDNs), there has been a rapid advancement in the area of cloud computing. It is now scalable, cheaper, and easier to manage. However, SDNs are more prone to security vulnerabilities as compared to legacy systems. Therefore, machine-learning techniques are now deployed in the SDN infrastructure for the detection of malicious traffic. In this paper, we provide a systematic benchmarking analysis of the existing machine-learning techniques for the detection of malicious traffic in SDNs. We identify the limitations in these classical machine-learning based methods, and lay the foundation for a more robust framework. Our experiments are performed on a publicly available dataset of Intrusion Detection Systems (IDSs).
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
High Performance Metal-Insulator-Graphene Diodes for Radio Frequency Power Detection Application
Authors:
Mehrdad Shaygan,
Zhenxing Wang,
Mohamed Saeed Elsayed,
Martin Otto,
Giuseppe Iannaccone,
Ahmed Hamed Ghareeb,
Gianluca Fiori,
Renato Negra,
Daniel Neumaier
Abstract:
Vertical metal-insulator-graphene (MIG) diodes for radio frequency (RF) power detection are realized using a scalable approach based on graphene grown by chemical vapor deposition and TiO2 as barrier material. The temperature dependent current flow through the diode can be described by thermionic emission theory taking into account a bias induced barrier lowering at the graphene TiO2 interface. Th…
▽ More
Vertical metal-insulator-graphene (MIG) diodes for radio frequency (RF) power detection are realized using a scalable approach based on graphene grown by chemical vapor deposition and TiO2 as barrier material. The temperature dependent current flow through the diode can be described by thermionic emission theory taking into account a bias induced barrier lowering at the graphene TiO2 interface. The diodes show excellent figures of merit for static operation, including high on-current density of up to 28 A/cm^2, high asymmetry of up to 520, strong maximum nonlinearity of up to 15, and large maximum responsivity of up to 26 V^{-1}, outperforming state-of-the-art metal-insulator-metal and MIG diodes. RF power detection based on MIG diodes is demonstrated, showing a responsivity of 2.8 V/W at 2.4 GHz and 1.1 V/W at 49.4 GHz.
△ Less
Submitted 26 April, 2018;
originally announced April 2018.