Crowdsourcing based radio map anomalous event detection system for calibration-on-demand

Author(s):  
Dezhi Zhang ◽  
Guoping Qiu ◽  
Yupeng Gao ◽  
Xiong Fang ◽  
Rui Cheng ◽  
...  
2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Yasmeen George ◽  
Shanika Karunasekera ◽  
Aaron Harwood ◽  
Kwan Hui Lim

AbstractA key challenge in mining social media data streams is to identify events which are actively discussed by a group of people in a specific local or global area. Such events are useful for early warning for accident, protest, election or breaking news. However, neither the list of events nor the resolution of both event time and space is fixed or known beforehand. In this work, we propose an online spatio-temporal event detection system using social media that is able to detect events at different time and space resolutions. First, to address the challenge related to the unknown spatial resolution of events, a quad-tree method is exploited in order to split the geographical space into multiscale regions based on the density of social media data. Then, a statistical unsupervised approach is performed that involves Poisson distribution and a smoothing method for highlighting regions with unexpected density of social posts. Further, event duration is precisely estimated by merging events happening in the same region at consecutive time intervals. A post processing stage is introduced to filter out events that are spam, fake or wrong. Finally, we incorporate simple semantics by using social media entities to assess the integrity, and accuracy of detected events. The proposed method is evaluated using different social media datasets: Twitter and Flickr for different cities: Melbourne, London, Paris and New York. To verify the effectiveness of the proposed method, we compare our results with two baseline algorithms based on fixed split of geographical space and clustering method. For performance evaluation, we manually compute recall and precision. We also propose a new quality measure named strength index, which automatically measures how accurate the reported event is.


Author(s):  
Vafa Soltangharaei ◽  
Rafal Anay ◽  
Deepak Begrajka ◽  
Matthijs Bijman ◽  
Mohamed Khaled ElBatanouny ◽  
...  

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1411 ◽  
Author(s):  
Fuad A. Ghaleb ◽  
Faisal Saeed ◽  
Mohammad Al-Sarem ◽  
Bander Ali Saleh Al-rimy ◽  
Wadii Boulila ◽  
...  

Vehicular ad hoc networks (VANETs) play an important role as enabling technology for future cooperative intelligent transportation systems (CITSs). Vehicles in VANETs share real-time information about their movement state, traffic situation, and road conditions. However, VANETs are susceptible to the cyberattacks that create life threatening situations and/or cause road congestion. Intrusion detection systems (IDSs) that rely on the cooperation between vehicles to detect intruders, were the most suggested security solutions for VANET. Unfortunately, existing cooperative IDSs (CIDSs) are vulnerable to the legitimate yet compromised collaborators that share misleading and manipulated information and disrupt the IDSs’ normal operation. As such, this paper proposes a misbehavior-aware on-demand collaborative intrusion detection system (MA-CIDS) based on the concept of distributed ensemble learning. That is, vehicles individually use the random forest algorithm to train local IDS classifiers and share their locally trained classifiers on-demand with the vehicles in their vicinity, which reduces the communication overhead. Once received, the performance of the classifiers is evaluated using the local testing dataset in the receiving vehicle. The evaluation values are used as a trustworthiness factor and used to rank the received classifiers. The classifiers that deviate much from the box-and-whisker plot lower boundary are excluded from the set of the collaborators. Then, each vehicle constructs an ensemble of weighted random forest-based classifiers that encompasses the locally and remotely trained classifiers. The outputs of the classifiers are aggregated using a robust weighted voting scheme. Extensive simulations were conducted utilizing the network security laboratory-knowledge discovery data mining (NSL-KDD) dataset to evaluate the performance of the proposed MA-CIDS model. The obtained results show that MA-CIDS performs better than the other existing models in terms of effectiveness and efficiency for VANET.


2016 ◽  
Vol 106 (5) ◽  
pp. 2037-2044 ◽  
Author(s):  
Stephen Arrowsmith ◽  
Christopher Young ◽  
Sanford Ballard ◽  
Megan Slinkard ◽  
Kristine Pankow

Author(s):  
Sergey A. Romanov ◽  
Nikolai A. Kharkovchuk ◽  
Maxim R. Sinelnikov ◽  
Mikhail R. Abrash ◽  
Vladislav Filinkov

Sign in / Sign up

Export Citation Format

Share Document