Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,...Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,and real account purchases,immoral actors demonize rivals and advertise their goods.Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years.The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones.This paper adopts a semi-supervised machine learning method to detect fake reviews on any website,among other things.Online reviews are classified using a semi-supervised approach(PU-learning)since there is a shortage of labeled data,and they are dynamic.Then,classification is performed using the machine learning techniques Support Vector Machine(SVM)and Nave Bayes.The performance of the suggested system has been compared with standard works,and experimental findings are assessed using several assessment metrics.展开更多
Recently,automotive intrusion detection systems(IDSs)have emerged as promising defense approaches to counter attacks on in-vehicle networks(IVNs).However,the effectiveness of IDSs relies heavily on the quality of the ...Recently,automotive intrusion detection systems(IDSs)have emerged as promising defense approaches to counter attacks on in-vehicle networks(IVNs).However,the effectiveness of IDSs relies heavily on the quality of the datasets used for training and evaluation.Despite the availability of several datasets for automotive IDSs,there has been a lack of comprehensive analysis focusing on assessing these datasets.This paper aims to address the need for dataset assessment in the context of automotive IDSs.It proposes qualitative and quantitative metrics that are independent of specific automotive IDSs,to evaluate the quality of datasets.These metrics take into consideration various aspects such as dataset description,collection environment,and attack complexity.This paper evaluates eight commonly used datasets for automotive IDSs using the proposed metrics.The evaluation reveals biases in the datasets,particularly in terms of limited contexts and lack of diversity.Additionally,it highlights that the attacks in the datasets were mostly injected without considering normal behaviors,which poses challenges for training and evaluating machine learning-based IDSs.This paper emphasizes the importance of addressing the identified limitations in existing datasets to improve the performance and adaptability of automotive IDSs.The proposed metrics can serve as valuable guidelines for researchers and practitioners in selecting and constructing high-quality datasets for automotive security applications.Finally,this paper presents the requirements for high-quality datasets,including the need for representativeness,diversity,and balance.展开更多
Cybersecurity increasingly relies on machine learning(ML)models to respond to and detect attacks.However,the rapidly changing data environment makes model life-cycle management after deployment essential.Real-time det...Cybersecurity increasingly relies on machine learning(ML)models to respond to and detect attacks.However,the rapidly changing data environment makes model life-cycle management after deployment essential.Real-time detection of drift signals from various threats is fundamental for effectively managing deployed models.However,detecting drift in unsupervised environments can be challenging.This study introduces a novel approach leveraging Shapley additive explanations(SHAP),a widely recognized explainability technique in ML,to address drift detection in unsupervised settings.The proposed method incorporates a range of plots and statistical techniques to enhance drift detection reliability and introduces a drift suspicion metric that considers the explanatory aspects absent in the current approaches.To validate the effectiveness of the proposed approach in a real-world scenario,we applied it to an environment designed to detect domain generation algorithms(DGAs).The dataset was obtained from various types of DGAs provided by NetLab.Based on this dataset composition,we sought to validate the proposed SHAP-based approach through drift scenarios that occur when a previously deployed model detects new data types in an environment that detects real-world DGAs.The results revealed that more than 90%of the drift data exceeded the threshold,demonstrating the high reliability of the approach to detect drift in an unsupervised environment.The proposed method distinguishes itself fromexisting approaches by employing explainable artificial intelligence(XAI)-based detection,which is not limited by model or system environment constraints.In conclusion,this paper proposes a novel approach to detect drift in unsupervised ML settings for cybersecurity.The proposed method employs SHAP-based XAI and a drift suspicion metric to improve drift detection reliability.It is versatile and suitable for various realtime data analysis contexts beyond DGA detection environments.This study significantly contributes to theMLcommunity by addressing the critical issue of managing ML models in real-world cybersecurity settings.Our approach is distinguishable from existing techniques by employing XAI-based detection,which is not limited by model or system environment constraints.As a result,our method can be applied in critical domains that require adaptation to continuous changes,such as cybersecurity.Through extensive validation across diverse settings beyond DGA detection environments,the proposed method will emerge as a versatile drift detection technique suitable for a wide range of real-time data analysis contexts.It is also anticipated to emerge as a new approach to protect essential systems and infrastructures from attacks.展开更多
Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation res...Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation results are presented. It is shown that the proposed ML algorithm is at least 0.7 dB better than the conventional Matched-Filter (MF) algorithm for uncoded systems, in both non-fading and fading channels. For the consideration of practical application, it is further simplified in complexity. Compared with the original ML algorithm, the simplified ML algorithm can provide significant reduction in complexity with small degradation in performance.展开更多
MC CDMA is a thriving topic in recent years. Multiuser interference is also very severe as in DS CDMA. ML method is the best multiuser detection, but it has a computational complexity exponentially increased with th...MC CDMA is a thriving topic in recent years. Multiuser interference is also very severe as in DS CDMA. ML method is the best multiuser detection, but it has a computational complexity exponentially increased with the number of users. Mean field annealing and chaotic neural network are two promising optimum techniques. This paper applies them into the ML detection, comparison of the two methods is made.展开更多
Aiming at the optimum path excluding characteristics and the full constellation searching characteristics of the K-best detection algorithm, an improved-performance K-best detection algorithm and several reduced-compl...Aiming at the optimum path excluding characteristics and the full constellation searching characteristics of the K-best detection algorithm, an improved-performance K-best detection algorithm and several reduced-complexity K-best detection algorithms are proposed. The improved-performance K-best detection algorithm deploys minimum mean square error (MMSE) filtering of a channel matrix before QR decomposition. This algorithm can decrease the probability of excluding the optimum path and achieve better performance. The reducedcomplexity K-best detection algorithms utilize a sphere decoding method to reduce searching constellation points. Simulation results show that the improved performance K-best detection algorithm obtains a 1 dB performance gain compared to the K- best detection algorithm based on sorted QR decomposition (SQRD). Performance loss occurs when K = 4 in reduced complexity K-best detection algorithms. When K = 8, the reduced complexity K-best detection algorithms require less computational effort compared with traditional K-best detection algorithms and achieve the same performance.展开更多
This paper introduces a simple combining technique for cooperative relay scheme which is based on a Detect-and-Forward (DEF) relay protocol. Cooperative relay schemes have been introduced in earlier works but most of ...This paper introduces a simple combining technique for cooperative relay scheme which is based on a Detect-and-Forward (DEF) relay protocol. Cooperative relay schemes have been introduced in earlier works but most of them ignore the quality of the source-relay (S-R) channel in the detection at the destination, although this channel can contribute heavily to the performance of cooperation schemes. For optimal detection, the destination has to account all possible error events at the relay as well. Here we present a Maximum Likelihood criterion (ML) at the destination which considers closed-form expressions for each symbol error rate (SER) to facilitate the detection. Computer simulations show that significant diversity gain and Packet Error Rate (PER) performance can be achieved by the proposed scheme with good tolerance to propagation errors from noisy relays. In fact, diversity gain is increased with additional relay nodes. We compare this scheme against the baseline Cooperative-Maximum Ratio Combining (C-MRC).展开更多
In this paper,we propose an efficient fall detection system in enclosed environments based on single Gaussian model using the maximum likelihood method.Online video clips are used to extract the features from two came...In this paper,we propose an efficient fall detection system in enclosed environments based on single Gaussian model using the maximum likelihood method.Online video clips are used to extract the features from two cameras.After the model is constructed,a threshold is set,and the probability for an incoming sample under the single Gaussian model is compared with that threshold to make a decision.Experimental results show that if a proper threshold is set,a good recognition rate for fall activities can be achieved.展开更多
This paper proposes an efficient approximate Maximum Likelihood (ML) detection method for Multiple-Input Multiple-Output (MIMO) systems,which searches local area instead of exhaustive search and selects valid search p...This paper proposes an efficient approximate Maximum Likelihood (ML) detection method for Multiple-Input Multiple-Output (MIMO) systems,which searches local area instead of exhaustive search and selects valid search points in each transmit antenna signal constellation instead of all hy-perplane. Both of the selection and search complexity can be reduced significantly. The method per-forms the tradeoff between computational complexity and system performance by adjusting the neighborhood size to select the valid search points. Simulation results show that the performance is comparable to that of the ML detection while the complexity is only as the small fraction of ML.展开更多
A decoding method complemented by Maximum Likelihood (ML) detection for V-BLAST (Verti- cal Bell Labs Layered Space-Time) system is presented. The ranked layers are divided into several groups. ML decoding is performe...A decoding method complemented by Maximum Likelihood (ML) detection for V-BLAST (Verti- cal Bell Labs Layered Space-Time) system is presented. The ranked layers are divided into several groups. ML decoding is performed jointly for the layers within the same group while the Decision Feedback Equalization (DFE) is performed for groups. Based on the assumption of QPSK modulation and the quasi-static flat fading channel, simulations are made to testify the performance of the proposed algorithm. The results show that the algorithm outperforms the original V-BLAST detection dramatically in Symbol Error Probability (SEP) per- formance. Specifically, Signal-to-Noise Ratio (SNR) improvement of 3.4dB is obtained for SEP of 10?2 (4×4 case), with a reasonable complexity maintained.展开更多
The e-commerce industry’s rapid growth,accelerated by the COVID-19 pandemic,has led to an alarming increase in digital fraud and associated losses.To establish a healthy e-commerce ecosystem,robust cyber security and...The e-commerce industry’s rapid growth,accelerated by the COVID-19 pandemic,has led to an alarming increase in digital fraud and associated losses.To establish a healthy e-commerce ecosystem,robust cyber security and anti-fraud measures are crucial.However,research on fraud detection systems has struggled to keep pace due to limited real-world datasets.Advances in artificial intelligence,Machine Learning(ML),and cloud computing have revitalized research and applications in this domain.While ML and data mining techniques are popular in fraud detection,specific reviews focusing on their application in e-commerce platforms like eBay and Facebook are lacking depth.Existing reviews provide broad overviews but fail to grasp the intricacies of ML algorithms in the e-commerce context.To bridge this gap,our study conducts a systematic literature review using the Preferred Reporting Items for Systematic reviews and Meta-Analysis(PRISMA)methodology.We aim to explore the effectiveness of these techniques in fraud detection within digital marketplaces and the broader e-commerce landscape.Understanding the current state of the literature and emerging trends is crucial given the rising fraud incidents and associated costs.Through our investigation,we identify research opportunities and provide insights to industry stakeholders on key ML and data mining techniques for combating e-commerce fraud.Our paper examines the research on these techniques as published in the past decade.Employing the PRISMA approach,we conducted a content analysis of 101 publications,identifying research gaps,recent techniques,and highlighting the increasing utilization of artificial neural networks in fraud detection within the industry.展开更多
文摘Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,and real account purchases,immoral actors demonize rivals and advertise their goods.Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years.The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones.This paper adopts a semi-supervised machine learning method to detect fake reviews on any website,among other things.Online reviews are classified using a semi-supervised approach(PU-learning)since there is a shortage of labeled data,and they are dynamic.Then,classification is performed using the machine learning techniques Support Vector Machine(SVM)and Nave Bayes.The performance of the suggested system has been compared with standard works,and experimental findings are assessed using several assessment metrics.
基金supported in part by the 2021 Autonomous Driving Development Innovation Project of the Ministry of Science and ICT,‘Development of Technology for Security and Ultra-High-Speed Integrity of the Next-Generation Internal Net-Work of Autonomous Vehicles’(No.2021-0-01348)and in part by the National Research Foundation of Korea(NRF)grant funded by the Korean Government Ministry of Science and ICT(MSIT)under Grant NRF-2021R1A2C2014428.
文摘Recently,automotive intrusion detection systems(IDSs)have emerged as promising defense approaches to counter attacks on in-vehicle networks(IVNs).However,the effectiveness of IDSs relies heavily on the quality of the datasets used for training and evaluation.Despite the availability of several datasets for automotive IDSs,there has been a lack of comprehensive analysis focusing on assessing these datasets.This paper aims to address the need for dataset assessment in the context of automotive IDSs.It proposes qualitative and quantitative metrics that are independent of specific automotive IDSs,to evaluate the quality of datasets.These metrics take into consideration various aspects such as dataset description,collection environment,and attack complexity.This paper evaluates eight commonly used datasets for automotive IDSs using the proposed metrics.The evaluation reveals biases in the datasets,particularly in terms of limited contexts and lack of diversity.Additionally,it highlights that the attacks in the datasets were mostly injected without considering normal behaviors,which poses challenges for training and evaluating machine learning-based IDSs.This paper emphasizes the importance of addressing the identified limitations in existing datasets to improve the performance and adaptability of automotive IDSs.The proposed metrics can serve as valuable guidelines for researchers and practitioners in selecting and constructing high-quality datasets for automotive security applications.Finally,this paper presents the requirements for high-quality datasets,including the need for representativeness,diversity,and balance.
基金supported by the Institute of Information and Communications Technology Planning and Evaluation(IITP)grant funded by the Korean government(MSIT)(No.2022-0-00089,Development of clustering and analysis technology to identify cyber attack groups based on life cycle)the Institute of Civil Military Technology Cooperation funded by the Defense Acquisition Program Administration and Ministry of Trade,Industry and Energy of Korean government under Grant No.21-CM-EC-07.
文摘Cybersecurity increasingly relies on machine learning(ML)models to respond to and detect attacks.However,the rapidly changing data environment makes model life-cycle management after deployment essential.Real-time detection of drift signals from various threats is fundamental for effectively managing deployed models.However,detecting drift in unsupervised environments can be challenging.This study introduces a novel approach leveraging Shapley additive explanations(SHAP),a widely recognized explainability technique in ML,to address drift detection in unsupervised settings.The proposed method incorporates a range of plots and statistical techniques to enhance drift detection reliability and introduces a drift suspicion metric that considers the explanatory aspects absent in the current approaches.To validate the effectiveness of the proposed approach in a real-world scenario,we applied it to an environment designed to detect domain generation algorithms(DGAs).The dataset was obtained from various types of DGAs provided by NetLab.Based on this dataset composition,we sought to validate the proposed SHAP-based approach through drift scenarios that occur when a previously deployed model detects new data types in an environment that detects real-world DGAs.The results revealed that more than 90%of the drift data exceeded the threshold,demonstrating the high reliability of the approach to detect drift in an unsupervised environment.The proposed method distinguishes itself fromexisting approaches by employing explainable artificial intelligence(XAI)-based detection,which is not limited by model or system environment constraints.In conclusion,this paper proposes a novel approach to detect drift in unsupervised ML settings for cybersecurity.The proposed method employs SHAP-based XAI and a drift suspicion metric to improve drift detection reliability.It is versatile and suitable for various realtime data analysis contexts beyond DGA detection environments.This study significantly contributes to theMLcommunity by addressing the critical issue of managing ML models in real-world cybersecurity settings.Our approach is distinguishable from existing techniques by employing XAI-based detection,which is not limited by model or system environment constraints.As a result,our method can be applied in critical domains that require adaptation to continuous changes,such as cybersecurity.Through extensive validation across diverse settings beyond DGA detection environments,the proposed method will emerge as a versatile drift detection technique suitable for a wide range of real-time data analysis contexts.It is also anticipated to emerge as a new approach to protect essential systems and infrastructures from attacks.
文摘Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation results are presented. It is shown that the proposed ML algorithm is at least 0.7 dB better than the conventional Matched-Filter (MF) algorithm for uncoded systems, in both non-fading and fading channels. For the consideration of practical application, it is further simplified in complexity. Compared with the original ML algorithm, the simplified ML algorithm can provide significant reduction in complexity with small degradation in performance.
文摘MC CDMA is a thriving topic in recent years. Multiuser interference is also very severe as in DS CDMA. ML method is the best multiuser detection, but it has a computational complexity exponentially increased with the number of users. Mean field annealing and chaotic neural network are two promising optimum techniques. This paper applies them into the ML detection, comparison of the two methods is made.
基金The National High Technology Research and Develop-ment Program of China (863Program)(No.2006AA01Z264)the National Natural Science Foundation of China (No.60572072)
文摘Aiming at the optimum path excluding characteristics and the full constellation searching characteristics of the K-best detection algorithm, an improved-performance K-best detection algorithm and several reduced-complexity K-best detection algorithms are proposed. The improved-performance K-best detection algorithm deploys minimum mean square error (MMSE) filtering of a channel matrix before QR decomposition. This algorithm can decrease the probability of excluding the optimum path and achieve better performance. The reducedcomplexity K-best detection algorithms utilize a sphere decoding method to reduce searching constellation points. Simulation results show that the improved performance K-best detection algorithm obtains a 1 dB performance gain compared to the K- best detection algorithm based on sorted QR decomposition (SQRD). Performance loss occurs when K = 4 in reduced complexity K-best detection algorithms. When K = 8, the reduced complexity K-best detection algorithms require less computational effort compared with traditional K-best detection algorithms and achieve the same performance.
文摘This paper introduces a simple combining technique for cooperative relay scheme which is based on a Detect-and-Forward (DEF) relay protocol. Cooperative relay schemes have been introduced in earlier works but most of them ignore the quality of the source-relay (S-R) channel in the detection at the destination, although this channel can contribute heavily to the performance of cooperation schemes. For optimal detection, the destination has to account all possible error events at the relay as well. Here we present a Maximum Likelihood criterion (ML) at the destination which considers closed-form expressions for each symbol error rate (SER) to facilitate the detection. Computer simulations show that significant diversity gain and Packet Error Rate (PER) performance can be achieved by the proposed scheme with good tolerance to propagation errors from noisy relays. In fact, diversity gain is increased with additional relay nodes. We compare this scheme against the baseline Cooperative-Maximum Ratio Combining (C-MRC).
文摘In this paper,we propose an efficient fall detection system in enclosed environments based on single Gaussian model using the maximum likelihood method.Online video clips are used to extract the features from two cameras.After the model is constructed,a threshold is set,and the probability for an incoming sample under the single Gaussian model is compared with that threshold to make a decision.Experimental results show that if a proper threshold is set,a good recognition rate for fall activities can be achieved.
文摘This paper proposes an efficient approximate Maximum Likelihood (ML) detection method for Multiple-Input Multiple-Output (MIMO) systems,which searches local area instead of exhaustive search and selects valid search points in each transmit antenna signal constellation instead of all hy-perplane. Both of the selection and search complexity can be reduced significantly. The method per-forms the tradeoff between computational complexity and system performance by adjusting the neighborhood size to select the valid search points. Simulation results show that the performance is comparable to that of the ML detection while the complexity is only as the small fraction of ML.
基金Supported by the National Natural Science Foundation of China (No.60172029).
文摘A decoding method complemented by Maximum Likelihood (ML) detection for V-BLAST (Verti- cal Bell Labs Layered Space-Time) system is presented. The ranked layers are divided into several groups. ML decoding is performed jointly for the layers within the same group while the Decision Feedback Equalization (DFE) is performed for groups. Based on the assumption of QPSK modulation and the quasi-static flat fading channel, simulations are made to testify the performance of the proposed algorithm. The results show that the algorithm outperforms the original V-BLAST detection dramatically in Symbol Error Probability (SEP) per- formance. Specifically, Signal-to-Noise Ratio (SNR) improvement of 3.4dB is obtained for SEP of 10?2 (4×4 case), with a reasonable complexity maintained.
文摘The e-commerce industry’s rapid growth,accelerated by the COVID-19 pandemic,has led to an alarming increase in digital fraud and associated losses.To establish a healthy e-commerce ecosystem,robust cyber security and anti-fraud measures are crucial.However,research on fraud detection systems has struggled to keep pace due to limited real-world datasets.Advances in artificial intelligence,Machine Learning(ML),and cloud computing have revitalized research and applications in this domain.While ML and data mining techniques are popular in fraud detection,specific reviews focusing on their application in e-commerce platforms like eBay and Facebook are lacking depth.Existing reviews provide broad overviews but fail to grasp the intricacies of ML algorithms in the e-commerce context.To bridge this gap,our study conducts a systematic literature review using the Preferred Reporting Items for Systematic reviews and Meta-Analysis(PRISMA)methodology.We aim to explore the effectiveness of these techniques in fraud detection within digital marketplaces and the broader e-commerce landscape.Understanding the current state of the literature and emerging trends is crucial given the rising fraud incidents and associated costs.Through our investigation,we identify research opportunities and provide insights to industry stakeholders on key ML and data mining techniques for combating e-commerce fraud.Our paper examines the research on these techniques as published in the past decade.Employing the PRISMA approach,we conducted a content analysis of 101 publications,identifying research gaps,recent techniques,and highlighting the increasing utilization of artificial neural networks in fraud detection within the industry.