Article
Computer Science, Information Systems
Ben Stephens, Arash Shaghaghi, Robin Doss, Salil S. Kanhere
Summary: Research into Internet of Things (IoT) botnet malware has significantly increased since the Mirai botnet attacks in 2016. This paper compiles and synthesizes relevant literature from the past five years to provide an overview of recent advances in IoT botnets, their detection and prevention, and future research directions needed to address this growing threat.
Article
Computer Science, Information Systems
Xiaohan Liu, Yue Zhan, Hao Jin, Yuan Wang, Yi Zhang
Summary: To ensure the healthy development of social networks and the harmony and stability of society, a classification method is proposed based on early identification of social bots. This method includes topic expansion, SBERT model for relevance judgments, opinion sentence recognition using TextCNN, and transfer learning for improved classification. Experimental results show that topic expansion enhances the classification performance of the SBERT model. The inclusion of opinion sentence recognition rules and transfer learning improves the classification effect of social bots.
Article
Psychology, Social
Annabelle M. Mournet, Evan M. Kleiman
Summary: This study used a multistage recruitment process through Reddit to increase data integrity in the face of internet bots. By modifying language advertisements and removing compensation information, the study successfully reduced the presence of bots and collected more reliable data. The findings provide valuable insights on how to combat internet bot infiltration in online survey studies.
CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING
(2023)
Article
Computer Science, Hardware & Architecture
Zhibo Zhang, Huiqiang Wang, Hongwu Lv, Jiayu Sun, Guodong Li, Xin Han
Summary: With the emergence of latency-sensitive applications in the 5G networking era, accurate and rapid end-to-end latency measurement is crucial for network fault diagnosis and optimization. To address the inaccuracies caused by frequent hash collisions and fixed measurement intervals, we propose CHAT, an end-to-end network latency measurement framework. CHAT utilizes an improved cuckoo filter to reduce hash collisions and dynamically adjusts the measurement interval based on a gain indicator, maximizing the number of valid packets used for latency estimation. Additionally, CHAT minimizes packet transfers over links to avoid interference with end-to-end latency measurement in real networks. Extensive experiments demonstrate the effectiveness and applicability of CHAT.
IEEE-ACM TRANSACTIONS ON NETWORKING
(2023)
Article
Engineering, Electrical & Electronic
Daili Yang, Bin Gao, Wai Lok Woo, Houlai Wen, Yihong Zhao, Zhao Gao
Summary: This article explores emotional assessment under the Internet of Things architecture through a wearable emotion-sensing system. By collecting multimodal data and using a graph structure and neural network model, emotions are evaluated and interpreted intelligently. The research findings indicate that the male participants' attractiveness perception in dating is more closely related to language communication.
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT
(2023)
Article
Computer Science, Cybernetics
Tuja Khaund, Baris Kirdemir, Nitin Agarwal, Huan Liu, Fred Morstatter
Summary: Online social networks (OSNs) have become a crucial aspect of societal digitalization, altering communication, decision-making, and beliefs, with impacts on social groups, financial systems, and political communication. Social media platforms are home to social bots, which mimic human social behaviors and automate sociotechnical actions.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS
(2022)
Article
Telecommunications
Mohammed Ibrahim, Mohd Taufik Abdullah, Azizol Abdullah, Thinagaran Perumal
Summary: The study proposed an IoT-Susceptible-Infectious-Abandon (IoT-SIA) model to analyze the impact of memory-efficient bots on the size of the botnet infection. Based on numerical simulation results, memory-efficient bots have shown a direct impact on the size of the botnet infection and the propagation time of the attack.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Robotics
Lukas Supik, Katerina Stranska, Miroslav Kulich, Libor Preucil, Michael Somr, Karel Kosnar
Summary: The widespread demand for mobile robots has led to the development of new robot driving mechanisms, and in this study, magnetic field-driven bristle-bots with wireless control and power supply were developed. Experimental validation was conducted, showing that these downscaled and steerable bristle-bots have promising potential for future development.
IEEE ROBOTICS AND AUTOMATION LETTERS
(2023)
Article
Computer Science, Hardware & Architecture
Ola Salman, Imad H. Elhajj, Ali Chehab, Ayman Kayssi
Summary: Traffic classification is essential for managing network Quality of Service (QoS) and security. This paper proposes an approach for early traffic classification based on empirical assessment and information theory. The study suggests a confidence measure to determine the optimal number of packets to inspect, balancing between response time and classification accuracy. Additionally, an ensemble Deep Learning (DL)-based classifier model is introduced to enhance the accuracy by training successive DL models. The experimental results demonstrate improved early classification accuracy with the proposed measures and ensemble method.
Article
History & Philosophy Of Science
Mina Young Pedersen, Marija Slavkovik, Sonja Smets
Summary: Social bots are computer programs that mimic human users on social media platforms, and their detection is mainly done using machine learning approaches. This paper proposes a complementary method of bot detection using model checking, introducing Temporal Network Logic (TNL) to specify social networks and formalize different types of bot behaviors. The paper also explores an extension of the logic using hybrid logic elements. Model checking algorithms for both TNL and its hybrid extension are provided, with the former having complexity in p and the latter in PSPACE.
Article
Multidisciplinary Sciences
Wen Chen, Diogo Pacheco, Kai-Cheng Yang, Filippo Menczer
Summary: Despite accusations of political bias, social media platforms show no strong evidence for such bias. However, the content exposure of Twitter users is heavily influenced by the political leaning of their early connections, with conservative accounts more likely to be exposed to low-credibility content.
NATURE COMMUNICATIONS
(2021)
Article
Computer Science, Software Engineering
Mehdi Golzadeh, Alexandre Decan, Damien Legay, Tom Mens
Summary: This research proposes a ground-truth dataset based on Github account comments to detect bots, and successfully builds an automated classification model with high precision and recall.
JOURNAL OF SYSTEMS AND SOFTWARE
(2021)
Article
Computer Science, Artificial Intelligence
Yajing Wang, Gang Chen, Yunjie (Calvin) Xu, Xianghua Lu
Summary: Online chat has become an important channel for firms to provide customer services and generate purchases. However, the unstructured nature of textual data hinders the use of interaction information. This study develops a novel role-wise attention mechanism that effectively measures service interaction quality and outperforms traditional self-attention mechanisms in predicting customer purchases.
DECISION SUPPORT SYSTEMS
(2023)
Article
Chemistry, Multidisciplinary
Hamza Awad Hamza Ibrahim, Omer Radhi A. L. Zuobi, Awad M. Abaker, Musab B. Alzghoul
Summary: This paper discusses the importance of internet traffic classification and the necessity of hybrid classification methods, proposing a hybrid online classifier system HOC based on two common classification methods. The system demonstrates high accuracy in classifying internet application classes.
APPLIED SCIENCES-BASEL
(2021)
Article
Communication
Harry Yaojun Yan, Kai-Cheng Yang, Filippo Menczer, James Shanahan
Summary: The study found that Republican users are more likely to confuse conservative bots with humans, whereas Democratic users are more likely to confuse conservative human users with bots, demonstrating asymmetrical partisan-motivated reasoning.
NEW MEDIA & SOCIETY
(2021)
Article
Multidisciplinary Sciences
Jiang Bian, Kenji Yoshigoe, Amanda Hicks, Jiawei Yuan, Zhe He, Mengjun Xie, Yi Guo, Mattia Prosperi, Ramzi Salloum, Francois Modave
Article
Health Care Sciences & Services
Jiang Bian, Yi Guo, Mengjun Xie, Alice E. Parish, Isaac Wardlaw, Rita Brown, Francois Modave, Dong Zheng, Tamara T. Perry
JMIR MHEALTH AND UHEALTH
(2017)
Article
Computer Science, Hardware & Architecture
Yue Zhao, Kenji Yoshigoe, Mengjun Xie, Jiang Bian, Ke Xiong
JOURNAL OF SUPERCOMPUTING
(2020)
Article
Chemistry, Analytical
Ruipeng Zhang, Chen Xu, Mengjun Xie
Summary: The research proposes an innovative IoT service platform powered by consortium blockchain technology, abstracting M2M and H2M communications into services provided by IoT devices and realizing data exchange through smart contracts and blockchain transactions. Experimental results demonstrate high performance under light to moderate workloads and provide valuable insights into the optimization of blockchain configuration.
Proceedings Paper
Telecommunications
Chen Xu, Ruipeng Zhang, Mengjun Xie, Li Yang
2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP)
(2019)
Proceedings Paper
Telecommunications
Ruipeng Zhang, Chen Xu, Mengjun Xie
2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP)
(2019)
Proceedings Paper
Engineering, Electrical & Electronic
Ruipeng Zhang, Mengjun Xie, Li Yang
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
(2019)
Proceedings Paper
Engineering, Electrical & Electronic
Yanyan Li, Mengjun Xie
IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS)
(2018)
Proceedings Paper
Computer Science, Theory & Methods
Yanyan Li, Mengjun Xie, Jiang Bian
2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)
(2016)
Proceedings Paper
Computer Science, Theory & Methods
Jonathan Ming, Mengjun Xie
2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)
(2016)
Proceedings Paper
Computer Science, Hardware & Architecture
Jingmin Shi, Chao Peng, Qin Zhu, Pengfei Duan, Yu Bao, Mengjun Xie
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE)
(2015)
Proceedings Paper
Computer Science, Hardware & Architecture
Mengjun Xie, Yanyan Li, Kenji Yoshigoe, Remzi Seker, Jiang Bian
2015 IEEE 16TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE)
(2015)
Proceedings Paper
Computer Science, Information Systems
Samiuddin Mohammed, Mengjun Xie
2015 IEEE 12TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS)
(2015)
Proceedings Paper
Computer Science, Information Systems
Junshuang Yang, Yanyan Li, Mengjun Xie
2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS)
(2015)
Proceedings Paper
Engineering, Electrical & Electronic
Yanyan Li, Junshuang Yang, Mengjun Xie, Dylan Carlson, Han Gil Jang, Jiang Bian
2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015)
(2015)