Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

Discipline
Keyword
Publication Year
File Type

Articles 1381 - 1410 of 6891

Full-Text Articles in Physical Sciences and Mathematics

Improving The Performance Of Transportation Networks: A Semi-Centralized Pricing Approach, Zhiguang Cao, Hongliang Guo, Wen Song, Kaizhou Gao, Liujiang Kang, Xuexi Zhang, Qilun Wu Oct 2021

Improving The Performance Of Transportation Networks: A Semi-Centralized Pricing Approach, Zhiguang Cao, Hongliang Guo, Wen Song, Kaizhou Gao, Liujiang Kang, Xuexi Zhang, Qilun Wu

Research Collection School Of Computing and Information Systems

Improving the performance of transportation network is a crucial task in traffic management. In this paper, we start with a cooperative routing problem, which aims to minimize the chance of road network breakdown. To address this problem, we propose a subgradient method, which can be naturally implemented as a semi-centralized pricing approach. Particularly, each road link adopts the pricing scheme to calculate and adjust the local toll regularly, while the vehicles update their routes to minimize the toll costs by exploiting the global toll information. To prevent the potential oscillation brought by the subgradient method, we introduce a heavy-ball method …


Revocable Policy-Based Chameleon Hash, Shengmin Xu, Jianting Ning, Jinhua Ma, Guowen Xu, Jiaming Yuan, Robert H. Deng Oct 2021

Revocable Policy-Based Chameleon Hash, Shengmin Xu, Jianting Ning, Jinhua Ma, Guowen Xu, Jiaming Yuan, Robert H. Deng

Research Collection School Of Computing and Information Systems

Policy-based chameleon hash (PCH) is a cryptographic building block which finds increasing practical applications. Given a message and an access policy, for any chameleon hash generated by a PCH scheme, a chameleon trapdoor holder whose rewriting privileges satisfy the access policy can amend the underlying message without affecting the hash value. In practice, it is necessary to revoke the rewriting privileges of a trapdoor holder due to various reasons, such as change of positions, compromise of credentials, or malicious behaviours. In this paper, we introduce the notion of revocable PCH (RPCH) and formally define its security. We instantiate a concrete …


Visionary Caption: Improving The Accessibility Of Presentation Slides Through Highlighting Visualization, Carmen Ji Yan Yip, Jie Mi Chong, Sin Yee Kwek, Yong Wang, Kotaro Hara Oct 2021

Visionary Caption: Improving The Accessibility Of Presentation Slides Through Highlighting Visualization, Carmen Ji Yan Yip, Jie Mi Chong, Sin Yee Kwek, Yong Wang, Kotaro Hara

Research Collection School Of Computing and Information Systems

Presentation slides are widely used in occasions such as academic talks and business meetings. Captions placed on slides support deaf and hard of hearing (DHH) people to understand spoken contents, but simultaneously comprehending and associating visual contents on slides and caption text could be challenging. In this paper, we design and develop a visualization technique to highlight and associate chart on a slide and numerical data in caption. We first conduct a small formative study with people with and without hearing impairments to assess the value of the visualization technique using a lo-fidelity video prototype. We then develop Visionary Caption, …


Conquer: Contextual Query-Aware Ranking For Video Corpus Moment Retrieval, Zhijian Hou, Chong-Wah Ngo, W. K. Chan Oct 2021

Conquer: Contextual Query-Aware Ranking For Video Corpus Moment Retrieval, Zhijian Hou, Chong-Wah Ngo, W. K. Chan

Research Collection School Of Computing and Information Systems

This paper tackles a recently proposed Video Corpus Moment Retrieval task. This task is essential because advanced video retrieval applications should enable users to retrieve a precise moment from a large video corpus. We propose a novel CONtextual QUery-awarE Ranking (CONQUER) model for effective moment localization and ranking. CONQUER explores query context for multi-modal fusion and representation learning in two different steps. The first step derives fusion weights for the adaptive combination of multi-modal video content. The second step performs bi-directional attention to tightly couple video and query as a single joint representation for moment localization. As query context is …


Interactive Probing Of Multivariate Time Series Prediction Models: A Case Of Freight Rate Analysis, Haonan Xu, Haotian Li, Yong Wang Oct 2021

Interactive Probing Of Multivariate Time Series Prediction Models: A Case Of Freight Rate Analysis, Haonan Xu, Haotian Li, Yong Wang

Research Collection School Of Computing and Information Systems

We present an interactive probing tool to create, modify and analyze what-if scenarios for multivariate time series models. The solution is applied to freight trading, where analysts can carry out sensitivity analysis on freight rates by changing demand and supply-related econometric variables and observing their resultant effects on freight indexes. We utilize various visualization techniques to enable intuitive scenario creation, alteration, and comprehension of time series inputs and model predictions. Our tool proved to be useful to the industry practitioners, demonstrated by a case study where freight traders are given hypothetical market scenarios and successfully generated quantitative freight index projection …


Visilence: An Interactive Visualization Tool For Error Resilience Analysis, Shaolun Ruan, Yong Wang, Qiang Guan Oct 2021

Visilence: An Interactive Visualization Tool For Error Resilience Analysis, Shaolun Ruan, Yong Wang, Qiang Guan

Research Collection School Of Computing and Information Systems

Soft errors have become one of the major concerns for HPC applications, as those errors can result in seriously corrupted outcomes, such as silent data corruptions (SDCs). Prior studies on error resilience have studied the robustness of HPC applications. However, it is still difficult for program developers to identify potential vulnerability to soft errors. In this paper, we present Visilence, a novel visualization tool to visually analyze error vulnerability based on the control-flow graph generated from HPC applications. Visilence efficiently visualizes the affected program states under injected errors and presents the visual analysis of the most vulnerable parts of an …


Cloudnplay: Resource Optimization For A Cloud-Native Gaming System, Angelus Wibowo, Nguyen Binh Duong Ta Oct 2021

Cloudnplay: Resource Optimization For A Cloud-Native Gaming System, Angelus Wibowo, Nguyen Binh Duong Ta

Research Collection School Of Computing and Information Systems

Cloud gaming enables people playing graphically intensive games from their less powerful, or even outdated computing devices. It is challenging to realize cloud gaming as it requires minimal latency in server-side processing, rendering and streaming, which are expensive in terms of resource requirements, e.g., powerful GPU servers. Commercial gaming providers, e.g., Google Stadia, Amazon Luna, etc., hardly disclose any information on how they optimize gaming performance and cloud cost. In this work, we aim to investigate resource cost optimization for such cloud gaming systems. In contrast to previous work which have been focusing more on theoretical approaches, we deliver a …


A First Look At Accessibility Issues In Popular Github Projects, Tingting Bi, Xin Xia, David Lo, Aldeida Aleti Oct 2021

A First Look At Accessibility Issues In Popular Github Projects, Tingting Bi, Xin Xia, David Lo, Aldeida Aleti

Research Collection School Of Computing and Information Systems

Accessibility design elements allow people to access software products and services independent of their different abilities. However, accessibility is challenging to handle and whether accessibility is widely considered in software projects is unclear. In this work, we aim to understand if accessibility is a prevalent consideration in practice, what accessibility issues are discussed in GitHub projects, what potential reasons cause accessibility issues, and what solutions (e.g., tools and standards) are applied for addressing accessibility issues. In this work, we collect 11,820 accessibility issues and their threads discussed by developers in popular GitHub projects. We manually analyzed and grouped the collected …


Online Learning: A Comprehensive Survey, Steven C. H. Hoi, Doyen Sahoo, Jing Lu, Peilin Zhao Oct 2021

Online Learning: A Comprehensive Survey, Steven C. H. Hoi, Doyen Sahoo, Jing Lu, Peilin Zhao

Research Collection School Of Computing and Information Systems

Online learning represents a family of machine learning methods, where a learner attempts to tackle some predictive (or any type of decision-making) task by learning from a sequence of data instances one by one at each time. The goal of online learning is to maximize the accuracy/correctness for the sequence of predictions/decisions made by the online learner given the knowledge of correct answers to previous prediction/learning tasks and possibly additional information. This is in contrast to traditional batch or offline machine learning methods that are often designed to learn a model from the entire training data set at once. Online …


Solarslam: Battery-Free Loop Closure For Indoor Localisation, Bo Wei, Weitao Xu, Chengwen Luo, Guillaume Zoppi, Dong Ma, Sen Wang Oct 2021

Solarslam: Battery-Free Loop Closure For Indoor Localisation, Bo Wei, Weitao Xu, Chengwen Luo, Guillaume Zoppi, Dong Ma, Sen Wang

Research Collection School Of Computing and Information Systems

In this paper, we propose SolarSLAM, a batteryfree loop closure method for indoor localisation. Inertial Measurement Unit (IMU) based indoor localisation method has been widely used due to its ubiquity in mobile devices, such as mobile phones, smartwatches and wearable bands. However, it suffers from the unavoidable long term drift. To mitigate the localisation error, many loop closure solutions have been proposed using sophisticated sensors, such as cameras, laser, etc. Despite achieving high-precision localisation performance, these sensors consume a huge amount of energy. Different from those solutions, the proposed SolarSLAM takes advantage of an energy harvesting solar cell as a …


Burst-Induced Multi-Armed Bandit For Learning Recommendation, Rodrigo Alves, Antoine Ledent, Marius Kloft Oct 2021

Burst-Induced Multi-Armed Bandit For Learning Recommendation, Rodrigo Alves, Antoine Ledent, Marius Kloft

Research Collection School Of Computing and Information Systems

In this paper, we introduce a non-stationary and context-free Multi-Armed Bandit (MAB) problem and a novel algorithm (which we refer to as BMAB) to solve it. The problem is context-free in the sense that no side information about users or items is needed. We work in a continuous-time setting where each timestamp corresponds to a visit by a user and a corresponding decision regarding recommendation. The main novelty is that we model the reward distribution as a consequence of variations in the intensity of the activity, and thereby we assist the exploration/exploitation dilemma by exploring the temporal dynamics of the …


Bv-Person: A Large-Scale Dataset For Bird-View Person Re-Identification, Cheng Yan, Guansong Pang, Lei Wang, Jile Jiao, Xuetao Feng, Chunhua Shen, Jingjing Li Oct 2021

Bv-Person: A Large-Scale Dataset For Bird-View Person Re-Identification, Cheng Yan, Guansong Pang, Lei Wang, Jile Jiao, Xuetao Feng, Chunhua Shen, Jingjing Li

Research Collection School Of Computing and Information Systems

Person Re-IDentification (ReID) aims at re-identifying persons from non-overlapping cameras. Existing person ReID studies focus on horizontal-view ReID tasks, in which the person images are captured by the cameras from a (nearly) horizontal view. In this work we introduce a new ReID task, bird-view person ReID, which aims at searching for a person in a gallery of horizontal-view images with the query images taken from a bird's-eye view, i.e., an elevated view of an object from above. The task is important because there are a large number of video surveillance cameras capturing persons from such an elevated view at public …


Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith Oct 2021

Using Role Play To Develop An Empathetic Mindset In Executive Education, Siu Loon Hoe, Tamsin Greulich-Smith

Research Collection School Of Computing and Information Systems

The purpose of this article is to discuss the importance of a role play activity as part of an experiential instructional strategy to develop an empathetic mindset among professionals, managers, and executives (PMEs) attending an executive education program in change management. This article provides an approach and process for management educators and facilitators of executive education programs to introduce and teach role play for the busy executives to learn about empathy. Role play is a useful teaching method that helps adult learners understand the importance of seeing things from another person’s point of view especially within a short period of …


Direct Differentiable Augmentation Search, Aoming Liu, Zehao Huang, Zhiwu Huang, Huang, Naiyan Wang Oct 2021

Direct Differentiable Augmentation Search, Aoming Liu, Zehao Huang, Zhiwu Huang, Huang, Naiyan Wang

Research Collection School Of Computing and Information Systems

Data augmentation has been an indispensable tool to improve the performance of deep neural networks, however the augmentation can hardly transfer among different tasks and datasets. Consequently, a recent trend is to adopt AutoML technique to learn proper augmentation policy without extensive hand-crafted tuning. In this paper, we propose an efficient differentiable search algorithm called Direct Differentiable Augmentation Search (DDAS). It exploits meta-learning with one-step gradient update and continuous relaxation to the expected training loss for efficient search. Our DDAS can achieve efficient augmentation search without relying on approximations such as Gumbel-Softmax or second order gradient approximation. To further reduce …


Design Of A Two-Echelon Freight Distribution System In Last-Mile Logistics Considering Covering Locations And Occasional Drivers, Vincent F. Yu, Panca Jodiawan, Ming-Lu Hou, Aldy Gunawan Oct 2021

Design Of A Two-Echelon Freight Distribution System In Last-Mile Logistics Considering Covering Locations And Occasional Drivers, Vincent F. Yu, Panca Jodiawan, Ming-Lu Hou, Aldy Gunawan

Research Collection School Of Computing and Information Systems

This research addresses a new variant of the vehicle routing problem, called the two-echelon vehicle routing problem with time windows, covering options, and occasional drivers (2E-VRPTW-CO-OD). In this problem, two types of fleets are available to serve customers, city freighters and occasional drivers (ODs), while two delivery options are available to customers, home delivery and alternative delivery. For customers choosing the alternative delivery, their demands are delivered to one of the available covering locations for them to pick up. The objective of 2E-VRPTW-CO-OD is to minimize the total cost consisting of routing costs, connection costs, and compensations paid to ODs …


Towards Source-Aligned Variational Models For Cross-Domain Recommendation, Aghiles Salah, Thanh-Binh Tran, Hady W. Lauw Oct 2021

Towards Source-Aligned Variational Models For Cross-Domain Recommendation, Aghiles Salah, Thanh-Binh Tran, Hady W. Lauw

Research Collection School Of Computing and Information Systems

Data sparsity is a long-standing challenge in recommender systems. Among existing approaches to alleviate this problem, cross-domain recommendation consists in leveraging knowledge from a source domain or category (e.g., Movies) to improve item recommendation in a target domain (e.g., Books). In this work, we advocate a probabilistic approach to cross-domain recommendation and rely on variational autoencoders (VAEs) as our latent variable models. More precisely, we assume that we have access to a VAE trained on the source domain that we seek to leverage to improve preference modeling in the target domain. To this end, we propose a model which learns …


Countering Attacker Data Manipulation In Security Games, Andrew R. Butler, Thanh H. Nguyen, Arunesh Sinha Oct 2021

Countering Attacker Data Manipulation In Security Games, Andrew R. Butler, Thanh H. Nguyen, Arunesh Sinha

Research Collection School Of Computing and Information Systems

. Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior during learning, leading to an inaccurate model and ineffective defender strategies. In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary. Second, we extend this technique …


Links Do Matter: Understanding The Drivers Of Developer Interactions In Software Ecosystems, Subhajit Datta, Amrita Bhattacharjee, Subhashis Majumder Oct 2021

Links Do Matter: Understanding The Drivers Of Developer Interactions In Software Ecosystems, Subhajit Datta, Amrita Bhattacharjee, Subhashis Majumder

Research Collection School Of Computing and Information Systems

Studies of collaborating individuals engaged in collective enterprises usually focus on the individuals, rather than the links supporting their interaction. Accordingly, large scale software development ecosystems have also been examined primarily in terms of developer engagement. We posit that communication links between developers play a central role in the sustenance and effectiveness of such ecosystems. In this paper, we investigate whether and how developer attributes relate to the importance of the communication channels between them. We present a technique using 2nd order Markov models to extract features of interest of the links and apply the technique on data from a …


Aixfood'21: 3rd Workshop On Aixfood, Ricardo Guerrero, Michael Spranger, Shuqiang Jiang, Chong-Wah Ngo Oct 2021

Aixfood'21: 3rd Workshop On Aixfood, Ricardo Guerrero, Michael Spranger, Shuqiang Jiang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Food and cooking analysis present exciting research and application challenges for modern AI systems, particularly in the context of multimodal data such as images or video. A meal that appears in a food image is a product of a complex progression of cooking stages, often described in the accompanying textual recipe form. In the cooking process, individual ingredients change their physical properties, become combined with other food components, all to produce a final, yet highly variable, appearance of the meal. Recognizing food items or meals on a plate from images or videos, their physical properties such as the amount, nutritional …


Mining Informal & Short Student Self-Reflections For Detecting Challenging Topics: A Learning Outcomes Insight Dashboard, De Lin Ong, Gottipati Swapna, Siaw Ling Lo, Venky Shankararaman Oct 2021

Mining Informal & Short Student Self-Reflections For Detecting Challenging Topics: A Learning Outcomes Insight Dashboard, De Lin Ong, Gottipati Swapna, Siaw Ling Lo, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Having students write short self-reflections at the end of each weekly session enables them to reflect on what they have learnt in the session and topics they find challenging. Analysing these self-reflections provides instructors with insights on how to address the missing conceptions and misconceptions of the students and appropriately plan and deliver the next session. Currently, manual methods adopted to analyse these student reflections are time consuming and tedious. This paper proposes a solution model that uses content mining and NLP techniques to automate the analysis of short self-reflections. We evaluate the solution model by studying its implementation in …


From Continuity To Editability: Inverting Gans With Consecutive Images, Yangyang Xu, Yong Du, Wenpeng Xiao, Xuemiao Xu, Shengfeng He Oct 2021

From Continuity To Editability: Inverting Gans With Consecutive Images, Yangyang Xu, Yong Du, Wenpeng Xiao, Xuemiao Xu, Shengfeng He

Research Collection School Of Computing and Information Systems

Existing GAN inversion methods are stuck in a paradox that the inverted codes can either achieve high-fidelity reconstruction, or retain the editing capability. Having only one of them clearly cannot realize real image editing. In this paper, we resolve this paradox by introducing consecutive images (e.g., video frames or the same person with different poses) into the inversion process. The rationale behind our solution is that the continuity of consecutive images leads to inherent editable directions. This inborn property is used for two unique purposes: 1) regularizing the joint inversion process, such that each of the inverted codes is semantically …


Differentiated Learning For Multi-Modal Domain Adaptation, Jianming Lv, Kaijie Liu, Shengfeng He Oct 2021

Differentiated Learning For Multi-Modal Domain Adaptation, Jianming Lv, Kaijie Liu, Shengfeng He

Research Collection School Of Computing and Information Systems

Directly deploying a trained multi-modal classifier to a new environment usually leads to poor performance due to the well-known domain shift problem. Existing multi-modal domain adaptation methods treated each modality equally and optimize the sub-models of different modalities synchronously. However, as observed in this paper, the degrees of domain shift in different modalities are usually diverse. We propose a novel Differentiated Learning framework to make use of the diversity between multiple modalities for more effective domain adaptation. Specifically, we model the classifiers of different modalities as a group of teacher/student sub-models, and a novel Prototype based Reliability Measurement is presented …


From Contexts To Locality: Ultra-High Resolution Image Segmentation Via Locality-Aware Contextual Correlation, Qi Li, Weixiang Yang, Wenxi Liu, Yuanlong Yu, Shengfeng He Oct 2021

From Contexts To Locality: Ultra-High Resolution Image Segmentation Via Locality-Aware Contextual Correlation, Qi Li, Weixiang Yang, Wenxi Liu, Yuanlong Yu, Shengfeng He

Research Collection School Of Computing and Information Systems

Ultra-high resolution image segmentation has raised increasing interests in recent years due to its realistic applications. In this paper, we innovate the widely used high-resolution image segmentation pipeline, in which an ultrahigh resolution image is partitioned into regular patches for local segmentation and then the local results are merged into a high-resolution semantic mask. In particular, we introduce a novel locality-aware contextual correlation based segmentation model to process local patches, where the relevance between local patch and its various contexts are jointly and complementarily utilized to handle the semantic regions with large variations. Additionally, we present a contextual semantics refinement …


Analyzing Devops Teaching Strategies: An Initial Study, Samuel Ferino, Marcelo Fernandes, Anny K. Fernandes, Uirá Kulesza, Eduardo Aranha, Christoph Treude Oct 2021

Analyzing Devops Teaching Strategies: An Initial Study, Samuel Ferino, Marcelo Fernandes, Anny K. Fernandes, Uirá Kulesza, Eduardo Aranha, Christoph Treude

Research Collection School Of Computing and Information Systems

DevOps refers to a set of practices that integrate software development and operations with the primary aim to enable the continuous delivery of high-quality software. DevOps has also promoted several challenges to software engineering teaching. In this paper, we present a preliminary study that analyzes existing teaching strategies reported in the literature. Our findings indicate a set of approaches highlighting the use of environments to support teaching. Our work also investigates how these environments can contribute to address existing challenges and recommendations of DevOps teaching.


Contrasting Third-Party Package Management User Experience, Syful Islam, Raula Kula, Christoph Treude, Takashi Ishio, Kenichi Matsumoto Oct 2021

Contrasting Third-Party Package Management User Experience, Syful Islam, Raula Kula, Christoph Treude, Takashi Ishio, Kenichi Matsumoto

Research Collection School Of Computing and Information Systems

The management of third-party package dependencies is crucial to most technology stacks, with package managers acting as brokers to ensure that a verified package is correctly installed, configured, or removed from an application. Diversity in technology stacks has led to dozens of package ecosystems with their own management features. While recent studies have shown that developers struggle to migrate their dependencies, the common assumption is that package ecosystems are used without any issue. In this study, we explore 13 package ecosystems to understand whether their features correlate with the experience of their users. By studying experience through the questions that …


Eargate: Gait-Based User Identification With In-Ear Microphones, Andrea Ferlini, Dong Ma, Cecilia Mascolo Oct 2021

Eargate: Gait-Based User Identification With In-Ear Microphones, Andrea Ferlini, Dong Ma, Cecilia Mascolo

Research Collection School Of Computing and Information Systems

Human gait is a widely used biometric trait for user identification and recognition. Given the wide-spreading, steady diffusion of earworn wearables (Earables) as the new frontier of wearable devices, we investigate the feasibility of earable-based gait identification. Specifically, we look at gait-based identification from the sounds induced by walking and propagated through the musculoskeletal system in the body. Our system, EarGate, leverages an in-ear facing microphone which exploits the earable’s occlusion effect to reliably detect the user’s gait from inside the ear canal, without impairing the general usage of earphones. With data collected from 31 subjects, we show that EarGate …


An Exploratory Study Of Social Support Systems To Help Older Adults In Managing Mobile Safety, Tamir Mendel, Debin Gao, David Lo, Eran Toch Oct 2021

An Exploratory Study Of Social Support Systems To Help Older Adults In Managing Mobile Safety, Tamir Mendel, Debin Gao, David Lo, Eran Toch

Research Collection School Of Computing and Information Systems

Older adults face increased safety challenges, such as targeted online fraud and phishing, contributing to the growing technological divide between them and younger adults. Social support from family and friends is often the primary way older adults receive help, but it may also lead to reliance on others. We have conducted an exploratory study to investigate older adults' attitudes and experiences related to mobile social support technologies for mobile safety. We interviewed 18 older adults about their existing support and used the think-aloud method to gather data about a prototype for providing social support during mobile safety challenges. Our findings …


Uncovering Patterns In Reviewers' Feedback To Scene Description Authors, Rosiana Natalie, Jolene Kar Inn Loh, Huei Suen Tan, Joshua Shi-Hao Tseng, Hernisa Kacorri, Kotaro Hara Oct 2021

Uncovering Patterns In Reviewers' Feedback To Scene Description Authors, Rosiana Natalie, Jolene Kar Inn Loh, Huei Suen Tan, Joshua Shi-Hao Tseng, Hernisa Kacorri, Kotaro Hara

Research Collection School Of Computing and Information Systems

Audio descriptions (ADs) can increase access to videos for blind people. Researchers have explored different mechanisms for generating ADs, with some of the most recent studies involving paid novices; to improve the quality of their ADs, novices receive feedback from reviewers. However, reviewer feedback is not instantaneous. To explore the potential for real-time feedback through automation, in this paper, we analyze 1,120 comments that 40 sighted novices received from a sighted or a blind reviewer. We find that feedback patterns tend to fall under four themes: (i) Quality; commenting on different AD quality variables, (ii) Speech Act; the utterance or …


Sylpeniot: Symmetric Lightweight Predicate Encryption For Data Privacy Applications In Iot Environments, Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim, Yangwai Chow, Dongxi Liu Oct 2021

Sylpeniot: Symmetric Lightweight Predicate Encryption For Data Privacy Applications In Iot Environments, Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim, Yangwai Chow, Dongxi Liu

Research Collection School Of Computing and Information Systems

Privacy preserving mechanisms are essential for protecting data in IoT environments. This is particularly challenging as IoT environments often contain heterogeneous resource-constrained devices. One method for protecting privacy is to encrypt data with a pattern or metadata. To prevent information leakage, an evaluation using the pattern must be performed before the data can be retrieved. However, the computational costs associated with typical privacy preserving mechanisms can be costly. This makes such methods ill-suited for resource-constrained devices, as the high energy consumption will quickly drain the battery. This work solves this challenging problem by proposing SyLPEnIoT – Symmetric Lightweight Predicate Encryption …


Weakly-Supervised Video Anomaly Detection With Contrastive Learning Of Long And Short-Range Temporal Features, Yu Tian, Guansong Pang, Yuanhong Chen, Rajvinder Singh, Johan W. Verjans, Gustavo Carneiro Oct 2021

Weakly-Supervised Video Anomaly Detection With Contrastive Learning Of Long And Short-Range Temporal Features, Yu Tian, Guansong Pang, Yuanhong Chen, Rajvinder Singh, Johan W. Verjans, Gustavo Carneiro

Research Collection School Of Computing and Information Systems

Anomaly detection with weakly supervised video-level labels is typically formulated as a multiple instance learning (MIL) problem, in which we aim to identify snippets containing abnormal events, with each video represented as a bag of video snippets. Although current methods show effective detection performance, their recognition of the positive instances, i.e., rare abnormal snippets in the abnormal videos, is largely biased by the dominant negative instances, especially when the abnormal events are subtle anomalies that exhibit only small differences compared with normal events. This issue is exacerbated in many methods that ignore important video temporal dependencies. To address this issue, …