scholarly journals SPy: Car Steering Reveals Your Trip Route!

2020 ◽  
Vol 2020 (2) ◽  
pp. 155-174
Author(s):  
Mert D. Pesé ◽  
Xiaoying Pu ◽  
Kang G. Shin

AbstractVehicular data-collection platforms as part of Original Equipment Manufacturers’ (OEMs’) connected telematics services are on the rise in order to provide diverse connected services to the users. They also allow the collected data to be shared with third-parties upon users’ permission. Under the current suggested permission model, we find these platforms leaking users’ location information without explicitly obtaining users’ permission. We analyze the accuracy of inferring a vehicle’s location from seemingly benign steering wheel angle (SWA) traces, and show its impact on the driver’s location privacy. By collecting and processing real-life SWA traces, we can infer the users’ exact traveled routes with up to 71% accuracy, which is much higher than the state-of-the-art.

2021 ◽  
Vol 11 (17) ◽  
pp. 8074
Author(s):  
Tierui Zou ◽  
Nader Aljohani ◽  
Keerthiraj Nagaraj ◽  
Sheng Zou ◽  
Cody Ruben ◽  
...  

Concerning power systems, real-time monitoring of cyber–physical security, false data injection attacks on wide-area measurements are of major concern. However, the database of the network parameters is just as crucial to the state estimation process. Maintaining the accuracy of the system model is the other part of the equation, since almost all applications in power systems heavily depend on the state estimator outputs. While much effort has been given to measurements of false data injection attacks, seldom reported work is found on the broad theme of false data injection on the database of network parameters. State-of-the-art physics-based model solutions correct false data injection on network parameter database considering only available wide-area measurements. In addition, deterministic models are used for correction. In this paper, an overdetermined physics-based parameter false data injection correction model is presented. The overdetermined model uses a parameter database correction Jacobian matrix and a Taylor series expansion approximation. The method further applies the concept of synthetic measurements, which refers to measurements that do not exist in the real-life system. A machine learning linear regression-based model for measurement prediction is integrated in the framework through deriving weights for synthetic measurements creation. Validation of the presented model is performed on the IEEE 118-bus system. Numerical results show that the approximation error is lower than the state-of-the-art, while providing robustness to the correction process. Easy-to-implement model on the classical weighted-least-squares solution, highlights real-life implementation potential aspects.


2020 ◽  
pp. 1199-1212
Author(s):  
Syeda Erfana Zohora ◽  
A. M. Khan ◽  
Arvind K. Srivastava ◽  
Nhu Gia Nguyen ◽  
Nilanjan Dey

In the last few decades there has been a tremendous amount of research on synthetic emotional intelligence related to affective computing that has significantly advanced from the technological point of view that refers to academic studies, systematic learning and developing knowledge and affective technology to a extensive area of real life time systems coupled with their applications. The objective of this paper is to present a general idea on the area of emotional intelligence in affective computing. The overview of the state of the art in emotional intelligence comprises of basic definitions and terminology, a study of current technological scenario. The paper also proposes research activities with a detailed study of ethical issues, challenges with importance on affective computing. Lastly, we present a broad area of applications such as interactive learning emotional systems, modeling emotional agents with an intention of employing these agents in human computer interactions as well as in education.


Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 203
Author(s):  
Antonio López Vivar ◽  
Alberto Turégano Castedo ◽  
Ana Lucila Sandoval Orozco ◽  
Luis Javier García Villalba

Smart contracts have gained a lot of popularity in recent times as they are a very powerful tool for the development of decentralised and automatic applications in many fields without the need for intermediaries or trusted third parties. However, due to the decentralised nature of the blockchain on which they are based, a series of challenges have emerged related to vulnerabilities in their programming that, given their particularities, could have (and have already had) a very high economic impact. This article provides a holistic view of security challenges associated with smart contracts, as well as the state of the art of available public domain tools.


2020 ◽  
Author(s):  
Fatima Zahra Errounda ◽  
Yan Liu

Abstract Location and trajectory data are routinely collected to generate valuable knowledge about users' pattern behavior. However, releasing location data may jeopardize the privacy of the involved individuals. Differential privacy is a powerful technique that prevents an adversary from inferring the presence or absence of an individual in the original data solely based on the observed data. The first challenge in applying differential privacy in location is that a it usually involves a single user. This shifts the adversary's target to the user's locations instead of presence or absence in the original data. The second challenge is that the inherent correlation between location data, due to people's movement regularity and predictability, gives the adversary an advantage in inferring information about individuals. In this paper, we review the differentially private approaches to tackle these challenges. Our goal is to help newcomers to the field to better understand the state-of-the art by providing a research map that highlights the different challenges in designing differentially private frameworks that tackle the characteristics of location data. We find that in protecting an individual's location privacy, the attention of differential privacy mechanisms shifts to preventing the adversary from inferring the original location based on the observed one. Moreover, we find that the privacy-preserving mechanisms make use of the predictability and regularity of users' movements to design and protect the users' privacy in trajectory data. Finally, we explore how well the presented frameworks succeed in protecting users' locations and trajectories against well-known privacy attacks.


2019 ◽  
Vol 10 (1) ◽  
Author(s):  
Weifeng Yang ◽  
Wei Gong ◽  
Chengyi Hou ◽  
Yun Su ◽  
Yinben Guo ◽  
...  

AbstractDeveloping fabric-based electronics with good wearability is undoubtedly an urgent demand for wearable technologies. Although the state-of-the-art fabric-based wearable devices have shown unique advantages in the field of e-textiles, further efforts should be made before achieving “electronic clothing” due to the hard challenge of optimally unifying both promising electrical performance and comfortability in single device. Here, we report an all-fiber tribo-ferroelectric synergistic e-textile with outstanding thermal-moisture comfortability. Owing to a tribo-ferroelectric synergistic effect introduced by ferroelectric polymer nanofibers, the maximum peak power density of the e-textile reaches 5.2 W m−2 under low frequency motion, which is 7 times that of the state-of-the-art breathable triboelectric textiles. Electronic nanofiber materials form hierarchical networks in the e-textile hence lead to moisture wicking, which contributes to outstanding thermal-moisture comfortability of the e-textile. The all-fiber electronics is reliable in complicated real-life situation. Therefore, it is an idea prototypical example for electronic clothing.


Mathematics ◽  
2021 ◽  
Vol 9 (23) ◽  
pp. 3048
Author(s):  
Boyu Kuang ◽  
Mariusz Wisniewski ◽  
Zeeshan A. Rana ◽  
Yifan Zhao

Visual navigation is an essential part of planetary rover autonomy. Rock segmentation emerged as an important interdisciplinary topic among image processing, robotics, and mathematical modeling. Rock segmentation is a challenging topic for rover autonomy because of the high computational consumption, real-time requirement, and annotation difficulty. This research proposes a rock segmentation framework and a rock segmentation network (NI-U-Net++) to aid with the visual navigation of rovers. The framework consists of two stages: the pre-training process and the transfer-training process. The pre-training process applies the synthetic algorithm to generate the synthetic images; then, it uses the generated images to pre-train NI-U-Net++. The synthetic algorithm increases the size of the image dataset and provides pixel-level masks—both of which are challenges with machine learning tasks. The pre-training process accomplishes the state-of-the-art compared with the related studies, which achieved an accuracy, intersection over union (IoU), Dice score, and root mean squared error (RMSE) of 99.41%, 0.8991, 0.9459, and 0.0775, respectively. The transfer-training process fine-tunes the pre-trained NI-U-Net++ using the real-life images, which achieved an accuracy, IoU, Dice score, and RMSE of 99.58%, 0.7476, 0.8556, and 0.0557, respectively. Finally, the transfer-trained NI-U-Net++ is integrated into a planetary rover navigation vision and achieves a real-time performance of 32.57 frames per second (or the inference time is 0.0307 s per frame). The framework only manually annotates about 8% (183 images) of the 2250 images in the navigation vision, which is a labor-saving solution for rock segmentation tasks. The proposed rock segmentation framework and NI-U-Net++ improve the performance of the state-of-the-art models. The synthetic algorithm improves the process of creating valid data for the challenge of rock segmentation. All source codes, datasets, and trained models of this research are openly available in Cranfield Online Research Data (CORD).


2017 ◽  
Vol 77 (1) ◽  
pp. 917-937 ◽  
Author(s):  
Muhammad Hameed Siddiqi ◽  
Maqbool Ali ◽  
Mohamed Elsayed Abdelrahman Eldib ◽  
Asfandyar Khan ◽  
Oresti Banos ◽  
...  

2015 ◽  
Vol 235 (1) ◽  
pp. 82-89
Author(s):  
Ullrich Heilemann

Summary This is a fine, useful book on the history and structure of macroeconometric models. Its perspective is “applied” and has a “positivistic bias”. It gives a good (or not so good) picture of the state of the art. The problems of the now “Big Science” deserve more attention than the modelling community (and Welfe) so far has been willing to pay. The trend towards ever larger policy-relevant models will continue. However, few of them are accessible to third parties. “Transparency”, a major goal models had once started to increase, continues to get out of sight.


2008 ◽  
Vol 13 (1) ◽  
pp. 64-78 ◽  
Author(s):  
Moshe Zeidner ◽  
Richard D. Roberts ◽  
Gerald Matthews

Almost from its inception, the emotional intelligence (EI) construct has been an elusive one. After nearly 2 decades of research, there still appears to be little consensus over how EI should be conceptualized or assessed and the efficacy of practical applications in real life settings. This paper aims at providing a snapshot of the state-of-the-art in research involving this newly minted construct. Specifically, in separate sections of this article, we set out to distinguish what is known from what is unknown in relation to three paramount concerns of EI research, i.e., conceptualization, assessment, and applications. In each section, we start by discussing assertions that may be made with some degree of confidence, elucidating what are essentially sources of consensus concerning EI. We move then to discuss sources of controversy; those things for which there is less agreement among EI researchers. We hope that this “straight talk” about the current status of EI research will provide a platform for new research in both basic and applied domains.


Sign in / Sign up

Export Citation Format

Share Document