LEADER 12623nam 22006975 450 001 9910522969703321 005 20230810173332.0 010 $a3-030-79728-7 024 7 $a10.1007/978-3-030-79728-7 035 $a(CKB)5590000000516507 035 $a(MiAaPQ)EBC6668448 035 $a(Au-PeEL)EBL6668448 035 $a(OCoLC)1235823233 035 $a(DE-He213)978-3-030-79728-7 035 $a(PPN)258063491 035 $a(EXLCZ)995590000000516507 100 $a20210623d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Mobile and Internet Services in Ubiquitous Computing $eProceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) /$fedited by Leonard Barolli, Kangbin Yim, Hsing-Chung Chen 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (544 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v279 311 $a3-030-79727-9 327 $aIntro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function. 327 $a3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning. 327 $a2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes. 327 $a2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References. 327 $aFuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References. 327 $aMalicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning. 330 $aThis book includes proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), which took place in Asan, Korea, on July 1-3, 2021. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus, having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges. The aim of the book is to provide the latest research findings, methods, development techniques, challenges, and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile, and Internet services. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v279 606 $aComputational intelligence 606 $aEngineering$xData processing 606 $aWireless communication systems 606 $aMobile communication systems 606 $aComputational Intelligence 606 $aData Engineering 606 $aWireless and Mobile Communication 615 0$aComputational intelligence. 615 0$aEngineering$xData processing. 615 0$aWireless communication systems. 615 0$aMobile communication systems. 615 14$aComputational Intelligence. 615 24$aData Engineering. 615 24$aWireless and Mobile Communication. 676 $a006.3 702 $aBarolli$b Leonard 702 $aYim$b Kangbin 702 $aChen$b Hsing-Chung 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910522969703321 996 $aInnovative Mobile and Internet Services in Ubiquitous Computing$92084558 997 $aUNINA