The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] AME(1195hit)

21-40hit(1195hit)

  • Bayesian Learning-Assisted Joint Frequency Tracking and Channel Estimation for OFDM Systems

    Hong-Yu LIU  

     
    PAPER-Communication Theory and Signals

      Pubricized:
    2023/03/30
      Vol:
    E106-A No:10
      Page(s):
    1336-1342

    Orthogonal frequency division multiplexing (OFDM) is very sensitive to the carrier frequency offset (CFO). The CFO estimation precision heavily makes impacts on the OFDM performance. In this paper, a new Bayesian learning-assisted joint CFO tracking and channel impulse response estimation is proposed. The proposed algorithm is modified from a Bayesian learning-assisted estimation (BLAE) algorithm in the literature. The BLAE is expectation-maximization (EM)-based and displays the estimator mean square error (MSE) lower than the Cramer-Rao bound (CRB) when the CFO value is near zero. However, its MSE value may increase quickly as the CFO value goes away from zero. Hence, the CFO estimator of the BLAE is replaced to solve the problem. Originally, the design criterion of the single-time-sample (STS) CFO estimator in the literature is maximum likelihood (ML)-based. Its MSE performance can reach the CRB. Also, its CFO estimation range can reach the widest range required for a CFO tracking estimator. For a CFO normalized by the sub-carrier spacing, the widest tracking range required is from -0.5 to +0.5. Here, we apply the STS CFO estimator design method to the EM-based Bayesian learning framework. The resultant Bayesian learning-assisted STS algorithm displays the MSE performance lower than the CRB, and its CFO estimation range is between ±0.5. With such a Bayesian learning design criterion, the additional channel noise power and power delay profile must be estimated, as compared with the ML-based design criterion. With the additional channel statistical information, the derived algorithm presents the MSE performance better than the CRB. Two frequency-selective channels are adopted for computer simulations. One has fixed tap weights, and the other is Rayleigh fading. Comparisons with the most related algorithms are also been provided.

  • Multi-Objective Design of EMI Filter with Uncertain Parameters by Preference Set-Based Design Method and Polynomial Chaos Method

    Duc Chinh BUI  Yoshiki KAYANO  Fengchao XIAO  Yoshio KAMI  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2023/06/30
      Vol:
    E106-B No:10
      Page(s):
    959-968

    Today's electronic devices must meet many requirements, such as those related to performance, limits to the radiated electromagnetic field, size, etc. For such a design, the requirement is to have a solution that simultaneously meets multiple objectives that sometimes include conflicting requirements. In addition, it is also necessary to consider uncertain parameters. This paper proposes a new combination of statistical analysis using the Polynomial Chaos (PC) method for dealing with the random and multi-objective satisfactory design using the Preference Set-based Design (PSD) method. The application in this paper is an Electromagnetic Interference (EMI) filter for a practical case, which includes plural element parameters and uncertain parameters, which are resistors at the source and load, and the performances of the attenuation characteristics. The PC method generates simulation data with high enough accuracy and good computational efficiency, and these data are used as initial data for the meta-modeling of the PSD method. The design parameters of the EMI filter, which satisfy required performances, are obtained in a range by the PSD method. The authors demonstrate the validity of the proposed method. The results show that applying a multi-objective design method using PSD with a statistical method using PC to handle the uncertain problem can be applied to electromagnetic designs to reduce the time and cost of product development.

  • Regressive Gaussian Process Latent Variable Model for Few-Frame Human Motion Prediction

    Xin JIN  Jia GUO  

     
    PAPER

      Pubricized:
    2023/05/23
      Vol:
    E106-D No:10
      Page(s):
    1621-1626

    Human motion prediction has always been an interesting research topic in computer vision and robotics. It means forecasting human movements in the future conditioning on historical 3-dimensional human skeleton sequences. Existing predicting algorithms usually rely on extensive annotated or non-annotated motion capture data and are non-adaptive. This paper addresses the problem of few-frame human motion prediction, in the spirit of the recent progress on manifold learning. More precisely, our approach is based on the insight that achieving an accurate prediction relies on a sufficiently linear expression in the latent space from a few training data in observation space. To accomplish this, we propose Regressive Gaussian Process Latent Variable Model (RGPLVM) that introduces a novel regressive kernel function for the model training. By doing so, our model produces a linear mapping from the training data space to the latent space, while effectively transforming the prediction of human motion in physical space to the linear regression analysis in the latent space equivalent. The comparison with two learning motion prediction approaches (the state-of-the-art meta learning and the classical LSTM-3LR) demonstrate that our GPLVM significantly improves the prediction performance on various of actions in the small-sample size regime.

  • Visual Inspection Method for Subway Tunnel Cracks Based on Multi-Kernel Convolution Cascade Enhancement Learning

    Baoxian WANG  Zhihao DONG  Yuzhao WANG  Shoupeng QIN  Zhao TAN  Weigang ZHAO  Wei-Xin REN  Junfang WANG  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2023/06/27
      Vol:
    E106-D No:10
      Page(s):
    1715-1722

    As a typical surface defect of tunnel lining structures, cracking disease affects the durability of tunnel structures and poses hidden dangers to tunnel driving safety. Factors such as interference from the complex service environment of the tunnel and the low signal-to-noise ratio of the crack targets themselves, have led to existing crack recognition methods based on semantic segmentation being unable to meet actual engineering needs. Based on this, this paper uses the Unet network as the basic framework for crack identification and proposes to construct a multi-kernel convolution cascade enhancement (MKCE) model to achieve accurate detection and identification of crack diseases. First of all, to ensure the performance of crack feature extraction, the model modified the main feature extraction network in the basic framework to ResNet-50 residual network. Compared with the VGG-16 network, this modification can extract richer crack detail features while reducing model parameters. Secondly, considering that the Unet network cannot effectively perceive multi-scale crack features in the skip connection stage, a multi-kernel convolution cascade enhancement module is proposed by combining a cascaded connection of multi-kernel convolution groups and multi-expansion rate dilated convolution groups. This module achieves a comprehensive perception of local details and the global content of tunnel lining cracks. In addition, to better weaken the effect of tunnel background clutter interference, a convolutional block attention calculation module is further introduced after the multi-kernel convolution cascade enhancement module, which effectively reduces the false alarm rate of crack recognition. The algorithm is tested on a large number of subway tunnel crack image datasets. The experimental results show that, compared with other crack recognition algorithms based on deep learning, the method in this paper has achieved the best results in terms of accuracy and intersection over union (IoU) indicators, which verifies the method in this paper has better applicability.

  • Malicious Domain Detection Based on Decision Tree

    Thin Tharaphe THEIN  Yoshiaki SHIRAISHI  Masakatu MORII  

     
    LETTER

      Pubricized:
    2023/06/22
      Vol:
    E106-D No:9
      Page(s):
    1490-1494

    Different types of malicious attacks have been increasing simultaneously and have become a serious issue for cybersecurity. Most attacks leverage domain URLs as an attack communications medium and compromise users into a victim of phishing or spam. We take advantage of machine learning methods to detect the maliciousness of a domain automatically using three features: DNS-based, lexical, and semantic features. The proposed approach exhibits high performance even with a small training dataset. The experimental results demonstrate that the proposed scheme achieves an approximate accuracy of 0.927 when using a random forest classifier.

  • Siamese Transformer for Saliency Prediction Based on Multi-Prior Enhancement and Cross-Modal Attention Collaboration

    Fazhan YANG  Xingge GUO  Song LIANG  Peipei ZHAO  Shanhua LI  

     
    PAPER-Image Recognition, Computer Vision

      Pubricized:
    2023/06/20
      Vol:
    E106-D No:9
      Page(s):
    1572-1583

    Visual saliency prediction has improved dramatically since the advent of convolutional neural networks (CNN). Although CNN achieves excellent performance, it still cannot learn global and long-range contextual information well and lacks interpretability due to the locality of convolution operations. We proposed a saliency prediction model based on multi-prior enhancement and cross-modal attention collaboration (ME-CAS). Concretely, we designed a transformer-based Siamese network architecture as the backbone for feature extraction. One of the transformer branches captures the context information of the image under the self-attention mechanism to obtain a global saliency map. At the same time, we build a prior learning module to learn the human visual center bias prior, contrast prior, and frequency prior. The multi-prior input to another Siamese branch to learn the detailed features of the underlying visual features and obtain the saliency map of local information. Finally, we use an attention calibration module to guide the cross-modal collaborative learning of global and local information and generate the final saliency map. Extensive experimental results demonstrate that our proposed ME-CAS achieves superior results on public benchmarks and competitors of saliency prediction models. Moreover, the multi-prior learning modules enhance images express salient details, and model interpretability.

  • Unified 6G Waveform Design Based on DFT-s-OFDM Enhancements

    Juan LIU  Xiaolin HOU  Wenjia LIU  Lan CHEN  Yoshihisa KISHIYAMA  Takahiro ASAI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2022/12/05
      Vol:
    E106-B No:6
      Page(s):
    528-537

    To achieve the extreme high data rate and extreme coverage extension requirements of 6G wireless communication, new spectrum in sub-THz (100-300GHz) and non-terrestrial network (NTN) are two of the macro trends of 6G candidate technologies, respectively. However, non-linearity of power amplifiers (PA) is a critical challenge for both sub-THz and NTN. Therefore, high power efficiency (PE) or low peak to average power ratio (PAPR) waveform design becomes one of the most significant 6G research topics. Meanwhile, high spectral efficiency (SE) and low out-of-band emission (OOBE) are still important key performance indicators (KPIs) for 6G waveform design. Single-carrier waveform discrete Fourier transform spreading orthogonal frequency division multiplexing (DFT-s-OFDM) has achieved many research interests due to its high PE, and it has been supported in 5G New Radio (NR) when uplink coverage is limited. So DFT-s-OFDM can be regarded as a candidate waveform for 6G. Many enhancement schemes based on DFT-s-OFDM have been proposed, including null cyclic prefix (NCP)/unique word (UW), frequency-domain spectral shaping (FDSS), and time-domain compression and expansion (TD-CE), etc. However, there is no unified framework to be compatible with all the enhancement schemes. This paper firstly provides a general description of the 6G candidate waveforms based on DFT-s-OFDM enhancement. Secondly, the more flexible TD-CE supporting methods for unified non-orthogonal waveform (uNOW) are proposed and discussed. Thirdly, a unified waveform framework based on DFT-s-OFDM structure is proposed. By designing the pre-processing and post-processing modules before and after DFT in the unified waveform framework, the three technical methods (NCP/UW, FDSS, and TD-CE) can be integrated to improve three KPIs of DFT-s-OFDM simultaneously with high flexibility. Then the implementation complexity of the 6G candidate waveforms are analyzed and compared. Performance of different DFT-s-OFDM enhancement schemes is investigated by link level simulation, which reveals that uNOW can achieve the best PAPR performance among all the 6G candidate waveforms. When considering PA back-off, uNOW can achieve 124% throughput gain compared to traditional DFT-s-OFDM.

  • Space Division Multiplexing Using High-Luminance Cell-Size Reduction Arrangement for Low-Luminance Smartphone Screen to Camera Uplink Communication

    Alisa KAWADE  Wataru CHUJO  Kentaro KOBAYASHI  

     
    PAPER

      Pubricized:
    2022/11/01
      Vol:
    E106-A No:5
      Page(s):
    793-802

    To simultaneously enhance data rate and physical layer security (PLS) for low-luminance smartphone screen to camera uplink communication, space division multiplexing using high-luminance cell-size reduction arrangement is numerically analyzed and experimentally verified. The uplink consists of a low-luminance smartphone screen and an indoor telephoto camera at a long distance of 3.5 meters. The high-luminance cell-size reduction arrangement avoids the influence of spatial inter-symbol interference (ISI) and ambient light to obtain a stable low-luminance screen. To reduce the screen luminance without decreasing the screen pixel value, the arrangement reduces only the high-luminance cell area while keeping the cell spacing. In this study, two technical issues related to high-luminance cell-size reduction arrangement are solved. First, a numerical analysis and experimental results show that the high-luminance cell-size reduction arrangement is more effective in reducing the spatial ISI at low luminance than the conventional low-luminance cell arrangement. Second, in view point of PLS enhancement at wide angles, symbol error rate should be low in front of the screen and high at wide angles. A numerical analysis and experimental results show that the high-luminance cell-size reduction arrangement is more suitable for enhancing PLS at wide angles than the conventional low-luminance cell arrangement.

  • Chinese Named Entity Recognition Method Based on Dictionary Semantic Knowledge Enhancement

    Tianbin WANG  Ruiyang HUANG  Nan HU  Huansha WANG  Guanghan CHU  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2023/02/15
      Vol:
    E106-D No:5
      Page(s):
    1010-1017

    Chinese Named Entity Recognition is the fundamental technology in the field of the Chinese Natural Language Process. It is extensively adopted into information extraction, intelligent question answering, and knowledge graph. Nevertheless, due to the diversity and complexity of Chinese, most Chinese NER methods fail to sufficiently capture the character granularity semantics, which affects the performance of the Chinese NER. In this work, we propose DSKE-Chinese NER: Chinese Named Entity Recognition based on Dictionary Semantic Knowledge Enhancement. We novelly integrate the semantic information of character granularity into the vector space of characters and acquire the vector representation containing semantic information by the attention mechanism. In addition, we verify the appropriate number of semantic layers through the comparative experiment. Experiments on public Chinese datasets such as Weibo, Resume and MSRA show that the model outperforms character-based LSTM baselines.

  • Multimodal Named Entity Recognition with Bottleneck Fusion and Contrastive Learning

    Peng WANG  Xiaohang CHEN  Ziyu SHANG  Wenjun KE  

     
    PAPER-Natural Language Processing

      Pubricized:
    2023/01/18
      Vol:
    E106-D No:4
      Page(s):
    545-555

    Multimodal named entity recognition (MNER) is the task of recognizing named entities in multimodal context. Existing methods focus on utilizing co-attention mechanism to discover the relationships between multiple modalities. However, they still have two deficiencies: First, current methods fail to fuse the multimodal representations in a fine-grained way, which may bring noise of visual modalities. Second, current methods ignore bridging the semantic gap between heterogeneous modalities. To solve the above issues, we propose a novel MNER method with bottleneck fusion and contrastive learning (BFCL). Specifically, we first incorporate the transformer-based bottleneck fusion mechanism, subsequently, information between different modalities can only be exchanged through several bottleneck tokens, thus reducing the noise propagation. Then we propose two decoupled image-text contrastive losses to align the unimodal representations, making the representations of semantically similar modalities closer, while the representations of semantically different modalities farther away. Experimental results demonstrate that our method is competitive to the state-of-the-art models, and achieves 74.54% and 85.70% F1-scores on Twitter-2015 and Twitter-2017 datasets, respectively.

  • A State-Space Approach and Its Estimation Bias Analysis for Adaptive Notch Digital Filters with Constrained Poles and Zeros

    Yoichi HINAMOTO  Shotaro NISHIMURA  

     
    PAPER-Digital Signal Processing

      Pubricized:
    2022/09/16
      Vol:
    E106-A No:3
      Page(s):
    582-589

    This paper deals with a state-space approach for adaptive second-order IIR notch digital filters with constrained poles and zeros. A simplified iterative algorithm is derived from the gradient-descent method to minimize the mean-squared output of an adaptive notch digital filter. Then, stability and parameter-estimation bias are analyzed for the simplified iterative algorithm. A numerical example is presented to demonstrate the validity and effectiveness of the proposed adaptive state-space notch digital filter and parameter-estimation bias analysis.

  • Establishment of Transmission Lines Model of Shielded Twisted-Pair Line

    Xiang ZHOU  Xiaoyu LU  Weike WANG  Jinjing REN  Yixing GU  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2022/10/13
      Vol:
    E106-C No:3
      Page(s):
    67-75

    Crosstalk between lines plays an important role in the transmission of signal. Hence it is of great significance to establish the transmission lines model accurately to evaluate factors affecting crosstalk coupling between lines and to improve the anti-interference capability of the system. As twisted-pair line is widely used for its unique twist structure which improves the anti-interference performance of cables, this paper presents a method of constructing transmission lines model of the shielded twisted-pair line (STP) with two twisted pairs based on S-parameters. Firstly, the transmission lines model of STP with one twisted pair is established. The establishment of distributed capacitance matrix of this model depends on the dielectric constant of insulation layer that surrounds a conductor, but the dielectric constant is often unknown. In this respect, a method to obtain the distributed capacitance matrix based on the S-parameters of this model is proposed. Due to twisting, there is a great deal of variability between the distribution parameters along the length of the STP. As the spatial distribution of conductors in the cross-section of twisted-pair line vary along with the cable length, the distribution parameters matrices also change as they move. The cable is divided into several segments, and the transmission lines model of STP is obtained with the cascade of each segment model. For the STP with two twisted pairs, the crosstalk between pairs is analyzed based on the mixed mode S-parameters. Combined with the transmission lines model of STP with one twisted pair, that of STP with two twisted pairs is obtained. The terminal response voltage can be calculated from the transmission lines model and cable terminal conditions. The validity of the transmission lines model is verified by the consistency between the terminal responses calculated by the model and by the simulated. As the theoretical and simulation results are compatible, the modeling method for the STP with two twisted pairs can be used for the STP with more twisted pairs. In practical engineering application, S-parameters and mixed mode S-parameters can be obtained by testing. That means the transmission lines model of STP can be established based on the test results.

  • Calculation Solitaire is NP-Complete

    Chuzo IWAMOTO  Tatsuya IDE  

     
    LETTER

      Pubricized:
    2022/10/31
      Vol:
    E106-D No:3
      Page(s):
    328-332

    Calculation is a solitaire card game with a standard 52-card deck. Initially, cards A, 2, 3, and 4 of any suit are laid out as four foundations. The remaining 48 cards are piled up as the stock, and there are four empty tableau piles. The purpose of the game is to move all cards of the stock to foundations. The foundation starting with A is to be built up in sequence from an ace to a king. The other foundations are similarly built up, but by twos, threes, and fours from 2, 3, and 4 until a king is reached. Here, a card of rank i may be used as a card of rank i + 13j for j ∈ {0, 1, 2, 3}. During the game, the player moves (i) the top card of the stock either onto a foundation or to the top of a tableau pile, or (ii) the top card of a tableau pile onto a foundation. We prove that the generalized version of Calculation Solitaire is NP-complete.

  • Choice Disjunctive Queries in Logic Programming

    Keehang KWON  Daeseong KANG  

     
    LETTER

      Pubricized:
    2022/12/19
      Vol:
    E106-D No:3
      Page(s):
    333-336

    One of the long-standing research problems on logic programming is to treat the cut predicate in a logical, high-level way. We argue that this problem can be solved by adopting linear logic and choice-disjunctive goal formulas of the form G0 ⊕ G1 where G0, G1 are goals. These goals have the following intended semantics: choose the true disjunct Gi and execute Gi where i (= 0 or 1), while discarding the unchosen disjunct. Note that only one goal can remain alive during execution. These goals thus allow us to specify mutually exclusive tasks in a high-level way. Note that there is another use of cut which is for breaking out of failure-driven loops and efficient heap management. Unfortunately, it is not possible to replace cut of this kind with use of choice-disjunctive goals.

  • Design and Development of a Card Game for Learning on the Structure of Arithmetic Story by Concatenated Sentence Integration

    Kohei YAMAGUCHI  Yusuke HAYASHI  Tsukasa HIRASHIMA  

     
    LETTER

      Pubricized:
    2022/09/15
      Vol:
    E106-D No:2
      Page(s):
    131-136

    This study focuses on creating arithmetical stories as a sub-task of problem posing and proposes a game named “Tri-prop scrabble” as a learning environment based on a fusion method of learning and game. The problem-posing ability has a positive relationship with mathematics achievement and understanding the mathematical structure of problems. In the proposed game, learners are expected to experience creating and concatenating various arithmetical stories by integrating simple sentences. The result of a preliminary feasibility study shows that the participants were able to pose and concatenate a variety of types of arithmetic stories and accept this game is helpful for learning arithmetic word problems.

  • A Rate-Based Congestion Control Method for NDN Using Sparse Explicit Rate Notification and AIMD-Based Rate Adjustment

    Takahiko KATO  Masaki BANDAI  

     
    PAPER-Network

      Pubricized:
    2022/06/09
      Vol:
    E105-B No:12
      Page(s):
    1519-1529

    In this paper, we propose a new rate-based congestion control method for Named Data Networking (NDN) using additive increase multiplicative decrease (AIMD) and explicit rate notification. In the proposed method, routers notify a corresponding consumer of bottleneck bandwidth by use of Data packets, in a relatively long interval. In addition, routers monitor outgoing faces using the leaky bucket mechanism. When congestion is detected, the routers report this to corresponding consumers using negative-acknowledgment (NACK) packets. A consumer sets its Interest sending rate to the reported rate when a new value is reported. In addition, the consumer adjusts the sending rate to be around the reported rate based on the AIMD mechanism at Data/NACK packet reception. Computer simulations show that the proposed method achieves a high throughput performance and max-min fairness thanks to the effective congestion avoidance.

  • A Scalable Bitwise Multicast Technology in Named Data Networking

    Yuli ZHA  Pengshuai CUI  Yuxiang HU  Julong LAN  Yu WANG  

     
    PAPER-Information Network

      Pubricized:
    2022/09/20
      Vol:
    E105-D No:12
      Page(s):
    2104-2111

    Named Data Networking (NDN) uses name to indicate content mechanism to divide content, and uses content names for routing and addressing. However, the traditional network devices that support the TCP/IP protocol stack and location-centric communication mechanisms cannot support functions such as in-network storage and multicast distribution of NDN effectively. The performance of NDN routers designed for specific functional platforms is limited, and it is difficult to deploy on a large scale, so the NDN network can only be implemented by software. With the development of data plane languages such as Programmable Protocol-Independent Packet Processors (P4), the practical deployment of NDN becomes achievable. To ensure efficient data distribution in the network, this paper proposes a protocol-independent multicast method according to each binary bit. The P4 language is used to define a bit vector in the data packet intrinsic metadata field, which is used to mark the requested port. When the requested content is returned, the routing node will check which port has requested the content according to the bit vector recorded in the register, and multicast the Data packet. The experimental results show that bitwise multicast technology can eliminate the number of flow tables distributed compared with the dynamic multicast group technology, and reduce the content response delay by 57% compared to unicast transmission technology.

  • Bounded Approximate Payoff Division for MC-nets Games

    Katsutoshi HIRAYAMA  Tenda OKIMOTO  

     
    PAPER-Information Network

      Pubricized:
    2022/09/13
      Vol:
    E105-D No:12
      Page(s):
    2085-2091

    To the best of our knowledge, there have been very few work on computational algorithms for the core or its variants in MC-nets games. One exception is the work by [Hirayama, et.al., 2014], where a constraint generation algorithm has been proposed to compute a payoff vector belonging to the least core. In this paper, we generalize this algorithm into the one for finding a payoff vector belonging to ϵ-core with pre-specified bound guarantee. The underlying idea behind this algorithm is basically the same as the previous one, but one key contribution is to give a clearer view on the pricing problem leading to the development of our new general algorithm. We showed that this new algorithm was correct and never be trapped in an infinite loop. Furthermore, we empirically demonstrated that this algorithm really presented a trade-off between solution quality and computational costs on some benchmark instances.

  • Budget Allocation for Incentivizing Mobile Users for Crowdsensing Platform

    Cheng ZHANG  Noriaki KAMIYAMA  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1342-1352

    With the popularity of smart devices, mobile crowdsensing, in which the crowdsensing platform gathers useful data from users of smart devices, e.g., smartphones, has become a prevalent paradigm. Various incentive mechanisms have been extensively adopted for the crowdsensing platform to incentivize users of smart devices to offer sensing data. Existing works have concentrated on rewarding smart-device users for their short term effort to provide data without considering the long-term factors of smart-device users and the quality of data. Our previous work has considered the quality of data of smart-device users by incorporating the long-term reputation of smart-device users. However, our previous work only considered a quality maximization problem with budget constraints on one location. In this paper, multiple locations are considered. Stackelberg game is utilized to solve a two-stage optimization problem. In the first stage, the crowdsensing platform allocates the budget to different locations and sets price as incentives for users to maximize the total data quality. In the second stage, the users make efforts to provide data to maximize its utility. Extensive numerical simulations are conducted to evaluate proposed algorithm.

  • Spy in Your Eye: Spycam Attack via Open-Sided Mobile VR Device

    Jiyeon LEE  Kilho LEE  

     
    LETTER-Human-computer Interaction

      Pubricized:
    2022/07/22
      Vol:
    E105-D No:10
      Page(s):
    1817-1820

    Privacy violations via spy cameras are becoming increasingly serious. With the recent advent of various smart home IoT devices, such as smart TVs and robot vacuum cleaners, spycam attacks that steal users' information are being carried out in more unpredictable ways. In this paper, we introduce a new spycam attack on a mobile WebVR environment. It is performed by a web attacker who maliciously accesses the back-facing cameras of victims' mobile devices while they are browsing the attacker's WebVR site. This has the power to allow the attacker to capture victims' surroundings even at the desired field of view through sophisticated content placement in VR scenes, resulting in serious privacy breaches for mobile VR users. In this letter, we introduce a new threat facing mobile VR and show that it practically works with major browsers in a stealthy manner.

21-40hit(1195hit)