Fei XIONG Hai WANG Aijing LI Dongping YU Guodong WU
The security of Unmanned Aerial Vehicle (UAV) swarms is threatened by the deployment of anti-UAV systems under complicated environments such as battlefield. Specifically, the faults caused by anti-UAV systems exhibit sparse and compressible characteristics. In this paper, in order to improve the survivability of UAV swarms under complicated environments, we propose a novel multi-abnormality self-detecting and faults location method, which is based on compressed sensing (CS) and takes account of the communication characteristics of UAV swarms. The method can locate the faults when UAV swarms are suffering physical damages or signal attacks. Simulations confirm that the proposed method performs well in terms of abnormalities detecting and faults location when the faults quantity is less than 17% of the quantity of UAVs.
Yang WU Weiwei YANG Di ZHANG Xiaoli SUN
Unmanned aerial vehicle (UAV) communication has drawn rising interest recently with the distinctive gains brought by its inherent mobility. In this paper, we investigate the throughput maximization problem in UAV-enabled uplink communication, where multiple ground nodes communicate with a UAV while a group of ground jammers send jamming signals to jam the communications between UAV and the ground nodes. In contrast to the previous works that only considering UAV's transmit power allocation and two-dimension (2D) trajectory design, the ground nodes' transmit power allocation and scheduling along with the UAV's three-dimensional (3D) trajectory design are jointly optimized. The formulated throughput maximization problem is a mixed-integer non-convex programme that hard to be solved in general. Thus, we propose an iterative algorithm to make the problem trackable by applying the block coordinate descent and successive convex optimization techniques. Simulation results show that our proposed algorithm outperforms the benchmark methods that improving the throughput of the system significantly.
Yuta NAKAGAWA Naobumi MICHISHITA Hisashi MORISHITA
In order to achieve an antenna with robustness to metal for closed space wireless communications, two types of the folded monopole antenna with different input impedance have been studied. In this study, we propose the folded monopole antenna, which can switch the input impedance by a simple method. Both simulated and measured results show that the proposed antenna can improve robustness to the proximity of the metal.
Rui SUN Huihui WANG Jun ZHANG Xudong ZHANG
As a research hotspot and difficulty in the field of computer vision, pedestrian detection has been widely used in intelligent driving and traffic monitoring. The popular detection method at present uses region proposal network (RPN) to generate candidate regions, and then classifies the regions. But the RPN produces many erroneous candidate areas, causing region proposals for false positives to increase. This letter uses improved residual attention network to capture the visual attention map of images, then normalized to get the attention score map. The attention score map is used to guide the RPN network to generate more precise candidate regions containing potential target objects. The region proposals, confidence scores, and features generated by the RPN are used to train a cascaded boosted forest classifier to obtain the final results. The experimental results show that our proposed approach achieves highly competitive results on the Caltech and ETH datasets.
Lu LU Guangxia LI Tianwei LIU Siming LI Shiwei TIAN
Positioning information plays a significant role in multi-unmanned aerial vehicles (UAVs) applications. Traditionally, the positioning information is widely provided by Global Navigation Satellite System (GNSS) due to its good performance and global coverage. However, owing to complicated flight environment or signal blockage, jamming and unintentional interference, the UAVs may fail to locate themselves by using GNSS alone. As a new method to resolve these problems, cooperative positioning, by incorporating peer-to-peer range measurements and assisted information, has attracted more and more attentions due to its ability to enhance the accuracy and availability of positioning. However, achieving good performance of cooperative positioning of multi-UAVs is challenging as their mobility, arbitrary nonlinear state-evolution, measurement models and limited computation and communication resources. In this paper, we present a factor graph (FG) representation and message passing methodology to solve cooperative positioning problem among UAVs in 3-dimensional environment where GNSS cannot provide services. Moreover, to deal with the nonlinear state-evolution and measurement models while decreasing the computation complexity and communication cost, we develop a distributed algorithm for dynamic and hybrid UAVs by means of Spherical-Radial Cubature Rules (CR) method with belief propagation (BP) and variational message passing (VMP) methods (CRBP-VMP) on the FG. The proposed CRBP deals with the highly non-linear state-evolution models and non-Gaussian distributions, the VMP method is employed for ranging message, gets the simpler message representation and can reduce communication cost in the joint estimation problem. Simulation results demonstrate that the higher positioning accuracy, the better convergence as well as low computational complexity and communication cost of the proposed CRBP-VMP algorithm, which can be achieved compared with sum-product algorithm over a wireless network (SPAWN) and traditional Cubature Kalman Filters (CKF) method.
Yiheng JIAN Xiao YU Zhou XU Ziyi MA
Fault prediction aims to identify whether a software module is defect-prone or not according to metrics that are mined from software projects. These metric values, also known as features, may involve irrelevance and redundancy, which hurt the performance of fault prediction models. In order to filter out irrelevant and redundant features, a Hybrid Feature Selection (abbreviated as HFS) method for software fault prediction is proposed. The proposed HFS method consists of two major stages. First, HFS groups features with hierarchical agglomerative clustering; second, HFS selects the most valuable features from each cluster to remove irrelevant and redundant ones based on two wrapper based strategies. The empirical evaluation was conducted on 11 widely-studied NASA projects, using three different classifiers with four performance metrics (precision, recall, F-measure, and AUC). Comparison with six filter-based feature selection methods demonstrates that HFS achieves higher average F-measure and AUC values. Compared with two classic wrapper feature selection methods, HFS can obtain a competitive prediction performance in terms of average AUC while significantly reducing the computation cost of the wrapper process.
We propose two secret sharing schemes realizing general access structures, which are based on unauthorized subsets. In the proposed schemes, shares are generated by Tassa's (k,n)-hierarchical threshold scheme instead of Shamir's (k,n)-threshold scheme. Consequently, the proposed schemes can reduce the number of shares distributed to each participant.
Yuichi ASAHIRO Guohui LIN Zhilong LIU Eiji MIYANO
In this paper, we investigate the maximum induced matching problem (MaxIM) on C5-free d-regular graphs. The previously known best approximation ratio for MaxIM on C5-free d-regular graphs is $left(rac{3d}{4}-rac{1}{8}+rac{3}{16d-8} ight)$. In this paper, we design a $left(rac{2d}{3}+rac{1}{3} ight)$-approximation algorithm, whose approximation ratio is strictly smaller/better than the previous one when d≥6.
Kotaro MATSUDA Atsushi TAKAYASU Tsuyoshi TAKAGI
The Shortest Vector Problem (SVP) is one of the most important lattice problems in computer science and cryptography. The LLL lattice basis reduction algorithm runs in polynomial time and can compute an LLL-reduced basis that provably contains an approximate solution to the SVP. On the other hand, the LLL algorithm in practice tends to solve low-dimensional exact SVPs with high probability, i.e., >99.9%. Filling this theoretical-practical gap would lead to an understanding of the computational hardness of the SVP. In this paper, we try to fill the gap in 3,4 and 5 dimensions and obtain two results. First, we prove that given a 3,4 or 5-dimensional LLL-reduced basis, the shortest vector is one of the basis vectors or it is a limited integer linear combination of the basis vectors. In particular, we construct explicit representations of the shortest vector by using the LLL-reduced basis. Our analysis yields a necessary and sufficient condition for checking whether the output of the LLL algorithm contains the shortest vector or not. Second, we estimate the failure probability that a 3-dimensional random LLL-reduced basis does not contain the shortest vector. The upper bound seems rather tight by comparison with a Monte Carlo simulation.
Boolean functions used in the filter model of stream ciphers should have balancedness, large nonlinearity, optimal algebraic immunity and high algebraic degree. Besides, one more criterion called strict avalanche criterion (SAC) can be also considered. During the last fifteen years, much work has been done to construct balanced Boolean functions with optimal algebraic immunity. However, none of them has the SAC property. In this paper, we first present a construction of balanced Boolean functions with SAC property by a slight modification of a known method for constructing Boolean functions with SAC property and consider the cryptographic properties of the constructed functions. Then we propose an infinite class of balanced functions with optimal algebraic immunity and SAC property in odd number of variables. This is the first time that such kind of functions have been constructed. The algebraic degree and nonlinearity of the functions in this class are also determined.
Kazuma OHARA Keita EMURA Goichiro HANAOKA Ai ISHIDA Kazuo OHTA Yusuke SAKAI
At EUROCRYPT 2012, Libert, Peters and Yung (LPY) proposed the first scalable revocable group signature (R-GS) scheme in the standard model which achieves constant signing/verification costs and other costs regarding signers are at most logarithmic in N, where N is the maximum number of group members. However, although the LPY R-GS scheme is asymptotically quite efficient, this scheme is not sufficiently efficient in practice. For example, the signature size of the LPY scheme is roughly 10 times larger than that of an RSA signature (for 160-bit security). In this paper, we propose a compact R-GS scheme secure in the random oracle model that is efficient not only in the asymptotic sense but also in practical parameter settings. We achieve the same efficiency as the LPY scheme in an asymptotic sense, and the signature size is nearly equal to that of an RSA signature (for 160-bit security). It is particularly worth noting that our R-GS scheme has the smallest signature size compared to those of previous R-GS schemes which enable constant signing/verification costs. Our technique, which we call parallel Boneh-Boyen-Shacham group signature technique, helps to construct an R-GS scheme without following the technique used in LPY, i.e., we directly apply the Naor-Naor-Lotspiech framework without using any identity-based encryption.
Chaima DHAHRI Kazunori MATSUMOTO Keiichiro HOASHI
Upcoming mood prediction plays an important role in different topics such as bipolar depression disorder in psychology and quality-of-life and recommendations on health-related quality of life research. The mood in this study is defined as the general emotional state of a user. In contrast to emotions which is more specific and varying within a day, the mood is described as having either a positive or negative valence[1]. We propose an autonomous system that predicts the upcoming user mood based on their online activities over cyber, social and physical spaces without using extra-devices and sensors. Recently, many researchers have relied on online social networks (OSNs) to detect user mood. However, all the existing works focused on inferring the current mood and only few works have focused on predicting the upcoming mood. For this reason, we define a new goal of predicting the upcoming mood. We, first, collected ground truth data during two months from 383 subjects. Then, we studied the correlation between extracted features and user's mood. Finally, we used these features to train two predictive systems: generalized and personalized. The results suggest a statistically significant correlation between tomorrow's mood and today's activities on OSNs, which can be used to develop a decent predictive system with an average accuracy of 70% and a recall of 75% for the correlated users. This performance was increased to an average accuracy of 79% and a recall of 80% for active users who have more than 30 days of history data. Moreover, we showed that, for non-active users, referring to a generalized system can be a solution to compensate the lack of data at the early stage of the system, but when enough data for each user is available, a personalized system is used to individually predict the upcoming mood.
Ryo ISHIZUKA Naohiko TSUDA Hironori WASHIZAKI Yoshiaki FUKAZAWA Shunsuke SUGIMURA Yuichiro YASUDA
Deterioration of software quality developed by multiple organizations has become a serious problem. To predict software degradation after an organizational change, this paper investigates the influence of quality deterioration on software metrics by analyzing three software projects. To detect factors indicating a low evolvability, we focus on the relationships between the change in software metric values and refactoring tendencies. Refactoring after an organization change impacts the quality.
Daisuke OKU Kotaro TERADA Masato HAYASHI Masanao YAMAOKA Shu TANAKA Nozomu TOGAWA
Combinatorial optimization problems with a large solution space are difficult to solve just using von Neumann computers. Ising machines or annealing machines have been developed to tackle these problems as a promising Non-von Neumann computer. In order to use these annealing machines, every combinatorial optimization problem is mapped onto the physical Ising model, which consists of spins, interactions between them, and their external magnetic fields. Then the annealing machines operate so as to search the ground state of the physical Ising model, which corresponds to the optimal solution of the original combinatorial optimization problem. A combinatorial optimization problem can be firstly described by an ideal fully-connected Ising model but it is very hard to embed it onto the physical Ising model topology of a particular annealing machine, which causes one of the largest issues in annealing machines. In this paper, we propose a fully-connected Ising model embedding method targeting for CMOS annealing machine. The key idea is that the proposed method replicates every logical spin in a fully-connected Ising model and embeds each logical spin onto the physical spins with the same chain length. Experimental results through an actual combinatorial problem show that the proposed method obtains spin embeddings superior to the conventional de facto standard method, in terms of the embedding time and the probability of obtaining a feasible solution.
Noboru SONEHARA Takahisa SUZUKI Akihisa KODATE Toshihiko WAKAHARA Yoshinori SAKAI Yu ICHIFUJI Hideo FUJII Hideki YOSHII
The Cyber-Physical Integrated Society (CPIS) is being formed with the fusion of cyber-space and the real-world. In this paper, we will discuss Data-Driven Decision-Making (DDDM) support systems to solve social problems in the CPIS. First, we introduce a Web of Resources (WoR) that uses Web booking log data for destination data management. Next, we introduce an Internet of Persons (IoP) system to visualize individual and group flows of people by analyzing collected Wi-Fi usage log data. Specifically, we present examples of how WoR and IoP visualize flows of groups of people that can be shared across different industries, including telecommunications carriers and railway operators, and policy decision support for local, short-term events. Finally, the importance of data-driven training of human resources to support DDDM in the future CPIS is discussed.
Network function virtualization (NFV) achieves the flexibility of network service provisioning by using virtualization technology. However, NFV is exposed to a serious security threat known as cross-VM cache timing attacks. In this letter, we look into real security impacts on network virtualization. Specifically, we present two kinds of practical cache timing attacks on virtualized firewalls and routers. We also propose some countermeasures to mitigate such attacks on virtualized network functions.
Kazuki OTOMO Satoru KOBAYASHI Kensuke FUKUDA Hiroshi ESAKI
System logs are useful to understand the status of and detect faults in large scale networks. However, due to their diversity and volume of these logs, log analysis requires much time and effort. In this paper, we propose a log event anomaly detection method for large-scale networks without pre-processing and feature extraction. The key idea is to embed a large amount of diverse data into hidden states by using latent variables. We evaluate our method with 12 months of system logs obtained from a nation-wide academic network in Japan. Through comparisons with Kleinberg's univariate burst detection and a traditional multivariate analysis (i.e., PCA), we demonstrate that our proposed method achieves 14.5% higher recall and 3% higher precision than PCA. A case study shows detected anomalies are effective information for troubleshooting of network system faults.
Recently, Network Function Virtualization (NFV) has drawn attentions of many network researchers with great deal of flexibilities, and various network service chains can be used in an SDN/NFV environment. With the flexibility of virtual middlebox placement, how to place virtual middleboxes in order to optimize the performance of service chains becomes essential. Some past studies focused on placement problem of consolidated middleboxes which combine multiple functions into a virtual middlebox. However, when a virtual middlebox providing only a single function is considered, the placement problem becomes much more complex. In this paper, we propose a new heuristic method, the gradual switch clustering based virtual middlebox placement method, in order to improve the performance of service chains, with the constraints of end-to-end delay, bandwidth, and operation cost of deploying a virtual middlebox on a switch. The proposed method gradually finds candidate places for each type of virtual middlebox along with the sequential order of service chains, by clustering candidate switches which satisfy the constraints. Finally, among candidate places for each type of virtual middlebox, the best places are selected in order to minimize the end-to-end delays of service chains. The evaluation results, which are obtained through Mininet based extensive emulations, show that the proposed method outperforms than other methods, and specifically it achieves around 25% less end-to-end delay than other methods.
Yuta SAKAGAWA Kosuke NAKAJIMA Gosuke OHASHI
We propose a method that detects vehicles from in-vehicle monocular camera images captured during nighttime driving. Detecting vehicles from their shape is difficult at night; however, many vehicle detection methods focusing on light have been proposed. We detect bright spots by appropriate binarization based on the characteristics of vehicle lights such as brightness and color. Also, as the detected bright spots include lights other than vehicles, we need to distinguish the vehicle lights from other bright spots. Therefore, the bright spots were distinguished using Random Forest, a multiclass classification machine-learning algorithm. The features of bright spots not associated with vehicles were effectively utilized in the vehicle detection in our proposed method. More precisely vehicle detection is performed by giving weights to the results of the Random Forest based on the features of vehicle bright spots and the features of bright spots not related to the vehicle. Our proposed method was applied to nighttime images and confirmed effectiveness.
Zhuo ZHANG Yan LEI Jianjun XU Xiaoguang MAO Xi CHANG
Existing fault localization based on neural networks utilize the information of whether a statement is executed or not executed to identify suspicious statements potentially responsible for a failure. However, the information just shows the binary execution states of a statement, and cannot show how important a statement is in executions. Consequently, it may degrade fault localization effectiveness. To address this issue, this paper proposes TFIDF-FL by using term frequency-inverse document frequency to identify a high or low degree of the influence of a statement in an execution. Our empirical results on 8 real-world programs show that TFIDF-FL significantly improves fault localization effectiveness.