SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(SAMHÄLLSVETENSKAP) ;lar1:(mau);pers:(Persson Jan)"

Sökning: hsv:(SAMHÄLLSVETENSKAP) > Malmö universitet > Persson Jan

  • Resultat 1-3 av 3
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Bakhtyar, Shoaib, et al. (författare)
  • A synergy based method for designing ITS services
  • 2013
  • Ingår i: international Journal of Advanced Logistics. - : Taylor & Francis. - 2287-7592 .- 2287-108X. ; 2:2, s. 45-54
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we propose a method for supporting the process of designing Intelligent Transportation System (ITS) services, which utilizes on primarily functional synergies with already existing services. Using synergies between services will enable sharing of resources, such as, information entities, functions and technical resources, which in turn may lead to reduced costs for implementing services. The method is built around an existing service description framework, which is used to describe both existing services and the service to be designed. In order to illustrate the usage of the suggested method, we have applied it for designing a new ITS service, i.e., the Liability Intelligent Transport System (LITS) service. The purpose of the LITS service is to support the process of identifying when, where and why freight has been damaged, and which actor was responsible when the freight was damaged. The LITS service may lead to better quality control of consignments and may also facilitate the identification of which actor was responsible for the freight damage, which is of particular interest in multi-modal transport. By applying our service design method we were able to identify that three out of four functions of the LITS service already exist in other existing ITS services. Therefore, the LITS service can be designed based on synergies with these services.
  •  
3.
  • Kebande, Victor R., Dr, et al. (författare)
  • Active Machine Learning Adversarial Attack Detection in the User Feedback Process
  • 2021
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 9, s. 36908-36923
  • Tidskriftsartikel (refereegranskat)abstract
    • Modern Information and Communication Technology (ICT)-based applications utilize current technological advancements for purposes of streaming data, as a way of adapting to the ever-changing technological landscape. Such efforts require providing accurate, meaningful, and trustworthy output from the streaming sensors particularly during dynamic virtual sensing. However, to ensure that the sensing ecosystem is devoid of any sensor threats or active attacks, it is paramount to implement secure real-time strategies. Fundamentally, real-time detection of adversarial attacks/instances during the User Feedback Process (UFP) is the key to forecasting potential attacks in active learning. Also, according to existing literature, there lacks a comprehensive study that has a focus on adversarial detection from an active machine learning perspective at the time of writing this paper. Therefore, the authors posit the importance of detecting adversarial attacks in active learning strategy. Attack in the context of this paper through a UFP-Threat driven model has been presented as any action that exerts an alteration to the learning system or data. To achieve this, the study employed ambient data collected from a smart environment human activity recognition from (Continuous Ambient Sensors Dataset, CASA) with fully labeled connections, where we intentionally subject the Dataset to wrong labels as a targeted/manipulative attack (by a malevolent labeler) in the UFP, with an assumption that the user-labels were connected to unique identities. While the dataset's focus is to classify tasks and predict activities, our study gives a focus on active adversarial strategies from an information security point of view. Furthermore, the strategies for modeling threats have been presented using the Meta Attack Language (MAL) compiler for purposes adversarial detection. The findings from the experiments conducted have shown that real-time adversarial identification and profiling during the UFP could significantly increase the accuracy during the learning process with a high degree of certainty and paves the way towards an automated adversarial detection and profiling approaches on the Internet of Cognitive Things (ICoT).
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-3 av 3

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy