COMPUTER COMMUNICATIONS

A game theory-based COVID-19 close contact detecting method with edge computing collaboration
Shen Y, Liu B, Xia X, Qi L, Xu X and Dou W
People all throughout the world have suffered from the COVID-19 pandemic. People can be infected after brief contact, so how to assess the risk of infection for everyone effectively is a tricky challenge. In view of this challenge, the combination of wireless networks with edge computing provides new possibilities for solving the COVID-19 prevention problem. With this observation, this paper proposed a game theory-based COVID-19 close contact detecting method with edge computing collaboration, named GCDM. The GCDM method is an efficient method for detecting COVID-19 close contact infection with users' location information. With the help of edge computing's feature, the GCDM can deal with the detecting requirements of computing and storage and relieve the user privacy problem. Technically, as the game reaches equilibrium, the GCDM method can maximize close contact detection completion rate while minimizing the latency and cost of the evaluation process in a decentralized manner. The GCDM is described in detail and the performance of GCDM is analyzed theoretically. Extensive experiments were conducted and experimental results demonstrate the superior performance of GCDM over other three representative methods through comprehensive analysis.
NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory
Deng H, Hu J, Sharma R, Mo M and Ren Y
The continued spread of COVID-19 seriously endangers the physical and mental health of people in all countries. It is an important method to establish inter agency COVID-19 detection and prevention system based on game theory through wireless communication and artificial intelligence. Federated learning (FL) as a privacy preserving machine learning framework has received extensive attention. From the perspective of game theory, FL can be regarded as a process in which multiple participants play games against each other to maximize their own interests. This requires that the user's data is not leaked during the training process. However, existing studies have proved that the privacy protection capability of FL is insufficient. In addition, the existing way of realizing privacy protection through multiple rounds of communication between participants increases the burden of wireless communication. To this end, this paper considers the security model of FL based on game theory, and proposes our scheme, NVAS, a non-interactive verifiable privacy-preserving FL aggregation scheme in wireless communication environments. The NVAS can protect user privacy during FL training without unnecessary interaction between participants, which can better motivate more participants to join and provide high-quality training data. Furthermore, we designed a concise and efficient verification algorithm to ensure the correctness of model aggregation. Finally, the security and feasibility of the scheme are analyzed.
Online learning resource recommendation method based on multi-similarity metric optimization under the COVID-19 epidemic
Wang J, Jiang S and Ding J
With the continuous COVID-19 pneumonia epidemic, online learning has become a normal choice for many learners. However, the problems of information overload and knowledge maze have been aggravated in the process of online learning. A learning resource recommendation method based on multi similarity measure optimization is proposed in this paper. We optimize the user score similarity by introducing information entropy, and use particle swarm optimization algorithm to determine the comprehensive similarity weight, and determine the nearest neighbor user with both score similarity and interest similarity through secondary screening in this method. The ultimate goal is to improve the accuracy of recommendation results, and help learners learn more effectively. We conduct experiments on public data sets. The experimental results show that the algorithm in this paper can significantly improve the recommendation accuracy on the basis of maintaining a stable recommendation coverage.
A Semi-supervised Sensing Rate Learning based CMAB scheme to combat COVID-19 by trustful data collection in the crowd
Tang J, Fan K, Xie W, Zeng L, Han F, Huang G, Wang T, Liu A and Zhang S
The recruitment of trustworthy and high-quality workers is an important research issue for MCS. Previous studies either assume that the qualities of workers are known in advance, or assume that the platform knows the qualities of workers once it receives their collected data. In reality, to reduce costs and thus maximize revenue, many strategic workers do not perform their sensing tasks honestly and report fake data to the platform, which is called False data attacks. And it is very hard for the platform to evaluate the authenticity of the received data In this paper, an incentive mechanism named Semi-supervision based Combinatorial Multi-Armed Bandit reverse Auction (SCMABA) is proposed to solve the recruitment problem of multiple unknown and strategic workers in MCS. First, we model the worker recruitment as a multi-armed bandit reverse auction problem and design an UCB-based algorithm to separate the exploration and exploitation, regarding the Sensing Rates (SRs) of recruited workers as the gain of the bandit Next, a Semi-supervised Sensing Rate Learning (SSRL) approach is proposed to quickly and accurately obtain the workers' SRs, which consists of two phases, supervision and self-supervision. Last, SCMABA is designed organically combining the SRs acquisition mechanism with multi-armed bandit reverse auction, where supervised SR learning is used in the exploration, and the self-supervised one is used in the exploitation. We theoretically prove that our SCMABA achieves truthfulness and individual rationality and exhibits outstanding performances of the SCMABA mechanism through in-depth simulations of real-world data traces.
Reliable and efficient emergency rescue networks: A blockchain and fireworks algorithm-based approach
Chen B, Zhang W, Shi Y, Lv D and Yang Z
In recent years, coronavirus disease 2019 (COVID-19) has been a severe issue the world faces. Emergency rescue networks concerning the distribution of relief materials have gained extensive attention to tackle COVID-19 and related emergency issues. However, it is challenging to establish reliable and efficient emergency rescue networks due to information asymmetry and lack of trust among different rescue stations. In this work, we propose blockchain-based emergency rescue networks to track every transaction of the relief materials reliably and make decisions to deliver relief materials efficiently. More specifically, we propose a hybrid blockchain architecture that employs on-chain data verification to authenticate data records and off-chain data storage to reduce storage overhead. Furthermore, we propose a fireworks algorithm to efficiently calculate the optimal allocation strategies for relief materials. The algorithm provides chaotic random screening and node request guarantee techniques with good convergence. The simulation results show that integrating blockchain technology and the fireworks algorithm can significantly improve relief materials' operation efficiency and distribution quality.
A new federated learning-based wireless communication and client scheduling solution for combating COVID-19
Chen S, Jie Z, Wang G, Li KC, Yang J and Liu X
Federated learning is a machine learning method that can break the data island. Its inherent privacy-preserving property has an important role in training medical image models. However, federated learning requires frequent communication, which incur high communication costs. Moreover, the data is heterogeneous due to different users' preferences, which may degrade the performance of models. To address the problem of statistical heterogeneity, we propose FedUC, an algorithm to control the uploaded updates for federated learning, where a client scheduling method is made on the basis of weight divergence, update increment, and loss. We also balance the local data of the clients by image augmentation to mitigate the impact of the non-independently identically distribution. The server assigns compression thresholds to the clients based on the weight divergence and update increment of the models for gradient compression to reduce the wireless communication costs. Finally, based on the weight divergence, update increment and accuracy, the server dynamically assigns weights to the model parameters for the aggregation. Simulation and analysis utilizing a publicly available chest disease dataset containing COVID-19 are compared with existing federated learning methods. Experimental results show that our proposed strategy has better training performance in improving model accuracy and reducing wireless communication costs.
Attribute-based multi-user collaborative searchable encryption in COVID-19
Zhao F, Peng C, Xu D, Liu Y, Niu K and Tang H
With the outbreak of COVID-19, the government has been forced to collect a large amount of detailed information about patients in order to effectively curb the epidemic of the disease, including private data of patients. Searchable encryption is an essential technology for ciphertext retrieval in cloud computing environments, and many searchable encryption schemes are based on attributes to control user's search permissions to protect their data privacy. The existing attribute-based searchable encryption (ABSE) scheme can only implement the situation where the search permission of one person meets the search policy and does not support users to obtain the search permission through collaboration. In this paper, we proposed a new attribute-based collaborative searchable encryption scheme in multi-user setting (ABCSE-MU), which takes the access tree as the access policy and introduces the translation nodes to implement collaborative search. The cooperation can only be reached on the translation node and the flexibility of search permission is achieved on the premise of data security. ABCSE-MU scheme solves the problem that a single user has insufficient search permissions but still needs to search, making the user's access policy more flexible. We use random blinding to ensure the confidentiality and security of the secret key, further prove that our scheme is secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. Security analysis further shows that the scheme can ensure the confidentiality of data under chosen-keyword attacks and resist collusion attacks.
Federal learning edge network based sentiment analysis combating global COVID-19
Liang W, Chen X, Huang S, Xiong G, Yan K and Zhou X
As one of the important research topics in the field of natural language processing, sentiment analysis aims to analyze web data related to COVID-19, e.g., supporting China government agencies combating COVID-19. There are popular sentiment analysis models based on deep learning techniques, but their performance is limited by the size and distribution of the dataset. In this study, we propose a model based on a federal learning framework with Bert and multi-scale convolutional neural network (Fed_BERT_MSCNN), which contains a Bidirectional Encoder Representations from Transformer modules and a multi-scale convolution layer. The federal learning framework contains a central server and local deep learning machines that train local datasets. Parameter communications were processed through edge networks. The weighted average of each participant's model parameters was communicated in the edge network for final utilization. The proposed federal network not only solves the problem of insufficient data, but also ensures the data privacy of the social platform during the training process and improve the communication efficiency. In the experiment, we used datasets of six social platforms, and used accuracy and F1-score as evaluation criteria to conduct comparative studies. The performance of the proposed Fed_BERT_MSCNN model was generally superior than the existing models in the literature.
A coalitional game-based joint monitoring mechanism for combating COVID-19
Huang DW, Liu B, Bi J, Wang J, Wang M and Wang H
In the absence of effective treatment for COVID-19, disease prevention and control have become a top priority across the world. However, the general lack of effective cooperation between communities makes it difficult to suppress the community spread of the global pandemic; hence repeated outbreaks of COVID-19 have become the norm. To address this problem, this paper considers community cooperation in disease monitoring and designs a joint epidemic monitoring mechanism, in which adjacent communities cooperate to enhance their monitoring capability. In this work, we formulate the epidemiological monitoring process as a coalitional game. Then, we propose a Shapley value-based payoffs distribution scheme for the coalitional game. A comprehensive analytical framework is developed to evaluate the advantages and sustainability of the cooperation between communities. Experimental results show that the proposed mechanism performs much better than the conventional non-cooperative monitoring design and can greatly increase each community's payoffs.
COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach
Dhasarathan C, Hasan MK, Islam S, Abdullah S, Mokhtar UA, Javed AR and Goundar S
COVID-19 data analysis and prediction from patient data repository collected from hospitals and health organizations. Users' credentials and personal information are at risk; it could be an unrecoverable issue worldwide. A Homomorphic identification of possible breaches could be more appropriate for minimizing the risk factors in preventing personal data. Individual user privacy preservation is a must-needed research focus in various fields. Health data generated and collected information from multiple scenarios increasing the complexity involved in maintaining secret patient information. A homomorphic-based systematic approach with a deep learning process could reduce depicts and illegal functionality of unknown organizations trying to have relation to the environment and physical and social relations. This article addresses the homomorphic standard system functionality, which refers to all the functional aspects of deep learning system requirements in COVID-19 health management. Moreover, this paper spotlights the metric privacy incorporation for improving the Deep Learning System (DPLS) approaches for solving the healthcare system's complex issues. It is absorbed from the result analysis Homomorphic-based privacy observation metric gradually improves the effectiveness of the deep learning process in COVID-19-health care management.
3D face recognition algorithm based on deep Laplacian pyramid under the normalization of epidemic control
Kong W, You Z and Lv X
Under the normalization of epidemic control in COVID-19, it is essential to realize fast and high-precision face recognition without feeling for epidemic prevention and control. This paper proposes an innovative Laplacian pyramid algorithm for deep 3D face recognition, which can be used in public. Through multi-mode fusion, dense 3D alignment and multi-scale residual fusion are ensured. Firstly, the 2D to 3D structure representation method is used to fully correlate the information of crucial points, and dense alignment modeling is carried out. Then, based on the 3D critical point model, a five-layer Laplacian depth network is constructed. High-precision recognition can be achieved by multi-scale and multi-modal mapping and reconstruction of 3D face depth images. Finally, in the training process, the multi-scale residual weight is embedded into the loss function to improve the network's performance. In addition, to achieve high real-time performance, our network is designed in an end-to-end cascade. While ensuring the accuracy of identification, it guarantees personnel screening under the normalization of epidemic control. This ensures fast and high-precision face recognition and establishes a 3D face database. This method is adaptable and robust in harsh, low light, and noise environments. Moreover, it can complete face reconstruction and recognize various skin colors and postures.
A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues
Deepanshi , Budhiraja I, Garg D, Kumar N and Sharma R
SARS-CoV-2 is an infected disease caused by one of the variants of Coronavirus which emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 outbreak has put the world on a halt and is a major threat to the public health system. It has shattered the world with its effects on different areas as the pandemic hit the world in a number of waves with different variants and mutations. Each variant and mutation have different transmission and infection rates in the human population. More than 609 million people have tested positive and more than 6.5 million people have died due to this disease as per 14th September 2022. Despite of numerous efforts, precautions and vaccination the infection has grown rapidly in the world. In this paper, we aim to give a holistic overview of COVID-19 its variants, game theory perspective, effects on the different social and economic areas, diagnostic advancements, treatment methods. A taxonomy is made for the proper insight of the work demonstrated in the paper. Finally, we discuss the open issues associated with COVID-19 in different fields and futuristic research trends in the area. The main aim of the paper is to provide comprehensive literature that covers all the areas and provide an expert understanding of the COVID-19 techniques and potentially be further utilized to combat the outbreak of COVID-19.
Road crash risk prediction during COVID-19 for flash crowd traffic prevention: The case of Los Angeles
Wang J, Yang X, Yu S, Yuan Q, Lian Z and Yang Q
Road crashes are a major problem for traffic safety management, which usually causes flash crowd traffic with a profound influence on traffic management and communication systems. In 2020, the sudden outbreak of the novel coronavirus disease (COVID-19) pandemic led to significant changes in road traffic conditions. In this paper, by analyzing crash data from 2016 to 2020 and new COVID-19 case data in 2020, we find that the average crash severity and crash deaths during this period (a rapid increase of new COVID-19 cases in 2020) are higher than those in previous four years. Hence, it is necessary to exploit a novel road crash risk prediction model for such an emergency. We propose a novel data-adaptive fatigue focal loss (DA-FFL) method by fusing fatigue factors to establish a road crash risk prediction model under the scenario of large-scale emergencies. Finally, the experimental results demonstrate that DA-FFL performs better than the other typical methods in terms of area under curve (AUC) and false alarm rate (FAR) for imbalanced data. Furthermore, DA-FFL has better prediction performance in convolutional neural networks-long short-term memory (CNN-LSTM).
A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions
Guo Y
Zero-day attacks exploit unknown vulnerabilities so as to avoid being detected by cybersecurity detection tools. The studies [1], [2], [3] show that zero-day attacks are wide spread and are one of the major threats to computer security. The traditional signature-based detection method is not effective in detecting zero-day attacks as the signatures of zero-day attacks are typically not available beforehand. Machine Learning (ML)-based detection method is capable of capturing attacks' statistical characteristics and is, hence, promising for zero-day attack detection. In this paper, a comprehensive survey of ML-based zero-day attack detection approaches is conducted, and their ML models, training and testing data sets used, and evaluation results are compared. While significant efforts have been put forth to develop accurate and robust zero-attack detection tools, the existing methods fall short in accuracy, recall, and uniformity against different types of zero-day attacks. Major challenges toward the ML-based methods are identified and future research directions are recommended last.
Cluster head selection method of multiple UAVs under COVID-19 situation
Dai J, Hu Q, Liu X, Zhang Y and Zhu J
As COVID-19 continues to spread, people are unable to move freely when their residence region is temporarily lockdown, supplies cannot normally enter into such zones, leading to the shortage of supplies in these areas. Thus to ensure the delivery of supplies while reducing contact, the unmanned aerial vehicle (UAV) deliveries have become a common way. In order to efficiently use UAV resources and reduce energy loss in data transmission while performing the tasks, clustering is often used for achieving the above objectives, where the selected cluster heads centrally plan tasks so that reduce the communication times. However, problems such as unreasonable clustering, high energy consumption of cluster heads, and high mortality of cluster heads, directly lead the low cooperation efficiency and short life cycle of UAVs. Considering the nodes often died earlier through the k-means algorithm and ant colony algorithm, and highly dependent on the base station, these factors affect the working cycle and coordination efficiency of the UAVs. Facing the issues above, the cluster head selection algorithm of UAV based on game (CHSA) is proposed, where the mixed game model is adopted to select cluster heads for each region after regional division, and selecting the representative node to perform the cluster head selection algorithm, which help to reduce the energy consumption of each round of communication between nodes. Moreover, the key properties of the CHSA algorithm are proved, and the comparison experiment are conducted to prove the CHSA algorithm can effectively reduce energy consumption and prolong the network life cycle.
A survey on vital signs monitoring based on Wi-Fi CSI data
Soto JCH, Galdino I, Caballero E, Ferreira V, Muchaluat-Saade D and Albuquerque C
The COVID-19 pandemic further highlighted the need to use low-cost remote monitoring procedures for medical patients. Since the results reported in the literature have shown that the use of Channel State Information (CSI) from Wi-Fi networks to remotely monitor patients can provide means to obtain a powerful medical information package in a non-invasive way and at low cost, a consistent review and analysis of the state of the art on this applied technique is developed in the present work. Initially, a mathematical overview of the CSI technology and its functional model is done. Subsequently, details about the technical approach necessary to use CSI in medical applications and a summary of the studies reported in the literature with such applications are presented. Based on the analyses and discussions carried out throughout this work, a better understanding of the current state of the art is achieved. Challenges and perspectives for future research are also highlighted.
A blockchain-based infection tracing and notification system by non-fungible tokens
Ferone A and Della Porta A
SARS-CoV2 pandemic is heavily affecting our lives. Many actions have been undertaken to slow down its expansion and, among the others, contact tracing applications are the less invasive to monitor the spread of the virus. The idea behind contact tracing is to track contacts between people by the exchange of identifiers, not linked to individuals, exploiting the use of Bluetooth Low Energy (BLE) technology to estimate the duration and proximity of contacts. The data collected in this way is used for the sole purpose of notifying a potential contact with an infected person without revealing their identity and location. This paper presents a contact tracing protocol based on technology that exploits for reporting contacts at risk of contagion. The novelty of the proposed solution is the use of Non Fungible Tokens (NFT) to guarantee user privacy through a decentralized approach, equipped with a reliable non-proprietary notification mechanism that allows public access to anonymous infections data.
SecDH: Security of COVID-19 images based on data hiding with PCA
Singh OP, Singh AK, Agrawal AK and Zhou H
Nowadays, image security and copyright protection become challenging, especially after the COVID-19 pandemic. In the paper, we develop SecDH as a medical data hiding scheme, which can guarantee the security and copyright protection of the COVID-19 images. Firstly, the cover image is normalized, which offers high resistance against the geometric attacks. Secondly, the normalized principal component as embedding factor is computed, which are calculated based on principal component analysis (PCA) between cover and mark image. Thirdly, the medical image is invisibly marked with secret mark based on normalized component, redundant discrete wavelet transform (RDWT) and randomized singular value decomposition (RSVD) is introduced. Finally, Arnold cat map scheme employed to ensure the security of the watermarking system. Under the experimental evaluation, our SecDH tool is not only imperceptible, but also has a satisfactory advantage in robustness and security compared with the traditional watermarking schemes.
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations
Sood SK and Rawat KS
In the current scenario of the COVID-19 pandemic and worldwide health emergency, one of the major challenges is to identify and predict the panic health of persons. The management of panic health and on-time evacuation prevents COVID-19 infection incidences in educational institutions and public places. Therefore, a system is required to predict the infection and suggests a safe evacuation path to people that control panic scenarios with mortality. In this paper, a fog-assisted cyber physical system is introduced to control panic attacks and COVID-19 infection risk in public places. The proposed model uses the concept of physical and cyber space. The physical space helps in real time data collection and transmission of the alert generation to the stakeholders. Cyberspace consists of two spaces, fog space, and cloud-space. The fog-space facilitates panic health and COVID-19 symptoms determination with alert generation for risk-affected areas. Cloud space monitors and predicts the person's panic health and symptoms using the SARIMA model. Furthermore, it also identifies risk-prone regions in the affected place using Geographical Population Analysis. The performance evaluation acknowledges the efficiency related to panic health determination and prediction based on the SARIMA with risks mapping accuracy. The proposed system provides an efficient on time evacuation with priority from risk-affected places that protect people from attacks due to panic and infection caused by COVID-19.
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio
Fouladi S, Ebadi MJ, Safaei AA, Bajuri MY and Ahmadian A
The novel 2019 coronavirus disease (COVID-19) has infected over 141 million people worldwide since April 20, 2021. More than 200 countries around the world have been affected by the coronavirus pandemic. Screening for COVID-19, we use fast and inexpensive images from computed tomography (CT) scans. In this paper, ResNet-50, VGG-16, convolutional neural network (CNN), convolutional auto-encoder neural network (CAENN), and machine learning (ML) methods are proposed for classifying Chest CT Images of COVID-19. The dataset consists of 1252 CT scans that are positive and 1230 CT scans that are negative for COVID-19 virus. The proposed models have priority over the other models that there is no need of pre-trained networks and data augmentation for them. The classification accuracies of ResNet-50, VGG-16, CNN, and CAENN were obtained 92.24%, 94.07%, 93.84%, and 93.04% respectively. Among ML classifiers, the nearest neighbor (NN) had the highest performance with an accuracy of 94%.
Do we need a contact tracing app?
Maccari L and Cagno V
The goal of this paper is to shed some light on the usefulness of a contact tracing smartphone app for the containment of the COVID-19 pandemic. We review the basics of contact tracing during the spread of a virus, we contextualize the numbers to the case of COVID-19 and we analyze the state of the art for proximity detection using Bluetooth Low Energy. Our contribution is to assess if there is scientific evidence of the benefit of a contact tracing app in slowing down the spread of the virus using present technologies. Our conclusion is that such evidence is lacking, and we should re-think the introduction of such a privacy-invasive measure.