On the Performance Metric and Design of Non-Uniformly Shaped Constellation

Asymmetric information is shown to be more accurate in characterizing the performance of quadrant folding shaped (QFS) M-QAM. The performance difference of QFS M-QAM schemes strongly depends on the FEC coding rate, and the optimum FEC coding rate is found to be around ?0.8, which is independent of QFS M-QAM and the designed rates.

First Field Trial of Sensing Vehicle Speed, Density, and Road Conditions by Using Fiber Carrying High Speed Data

For the first time, we demonstrate detection of vehicle speed, density, and road conditions using deployed fiber carrying high-speed data transmission, and prove carriers’ large-scale fiber infrastructures can also be used as ubiquitous sensing networks.

NODOZE: Combatting Threat Alert Fatigue with Automated Provenance Triage

Large enterprises are increasingly relying on threat detection softwares (e.g., Intrusion Detection Systems) to allow them to spot suspicious activities. These softwares generate alerts which must be investigated by cyber analysts to figure out if they are true attacks. Unfortunately, in practice, there are more alerts than cyber analysts can properly investigate. This leads to a “threat alert fatigue” or information overload problem where cyber analysts miss true attack alerts in the noise of false alarms.In this paper, we present NoDoze to combat this challenge using contextual and historical information of generated threat alert in an enterprise. NoDoze first generates a causal dependency graph of an alert event. Then, it assigns an anomaly score to each event in the dependency graph based on the frequency with which related events have happened before in the enterprise. NoDoze then propagates those scores along the edges of the graph using a novel network diffusion algorithm and generates a subgraph with an aggregate anomaly score which is used to triage alerts. Evaluation on our dataset of 364 threat alerts shows that NoDoze decreases the volume of false alarms by 86%, saving more than 90 hours of analysts’ time, which was required to investigate those false alarms. Furthermore, NoDoze generated dependency graphs of true alerts are 2 orders of magnitude smaller than those generated by traditional tools without sacrificing the vital information needed for the investigation. Our system has a low average runtime overhead and can be deployed with any threat detection software.

Countering Malicious Processes with Process-DNS Association

Modern malware and cyber attacks depend heavily on DNS services to make their campaigns reliable and difficult to track. Monitoring network DNS activities and blocking suspicious domains have been proven an effective technique in countering such attacks. However, recent successful campaigns reveal that at- tackers adapt by using seemingly benign domains and public web storage services to hide malicious activity. Also, the recent support for encrypted DNS queries provides attacker easier means to hide malicious traffic from network-based DNS monitoring.We propose PDNS, an end-point DNS monitoring system based on DNS sensor deployed at each host in a network, along with a centralized backend analysis server. To detect such attacks, PDNS expands the monitored DNS activity context and examines process context which triggered that activity. Specifically, each deployed PDNS sensor matches domain name and the IP address related to the DNS query with process ID, binary signature, loaded DLLs, and code signing information of the program that initiated it. We evaluate PDNS on a DNS activity dataset collected from 126 enterprise hosts and with data from multiple malware sources. Using ML Classifiers including DNN, our results outperform most previous works with high detection accuracy: a true positive rate at 98.55% and a low false positive rate at 0.03%.

TrackIO: Tracking First Responders Inside-Out

First responders, a critical lifeline of any society, often find themselves in precarious situations. The ability to track them in real-time in unknown indoor environments would significantly contribute to the success of their mission as well as their safety. In this work, we present the design, implementation and evaluation of TrackIO–a system capable of accurately localizing and tracking mobile responders real-time in large indoor environments. TrackIO leverages the mobile virtual infrastructure offered by unmanned aerial vehicles (UAVs), coupled with the balanced penetration-accuracy tradeoff offered by ultra-wideband (UWB), to accomplish this objective directly from outside, without relying on access to any indoor infrastructure. Towards a practical system, TrackIO incorporates four novel mechanisms in its design that address key challenges to enable tracking responders (i) who are mobile with potentially non-uniform velocities (e.g. during turns), (ii) deep indoors with challenged reachability, (iii) in real-time even for a large network, and (iv) with high accuracy even when impacted by UAV’s position error. TrackIO’s real-world performance reveals that it can track static nodes with a median accuracy of about 1–1.5m and mobile (even running) nodes with a median accuracy of 2–2.5m in large buildings in real-time.

Transactive Energy Management with Blockchain Smart Contracts for P2P Multi-Settlement Markets

Integration of renewables and energy storage, leading to rise of prosumers, has created localized bidirectional flows. As the result, the utility demand has decreased and traditional centralized controller can no longer realize the optimal performance of ever growing distribution systems. To achieve scalable control, exploiting the potential of smart loads and Distributed Energy Resource (DER) controllability, a framework for decentralized Peer-To-Peer (P2P) energy management has been developed to manage localized micro-energy markets. Such decentralized management approach could, in theory, sustain diverse prosumer and utility business models. We have been developing an autonomous decentralized management solution that maximizes the benefit of prosumers while protecting utility assets. This P2P energy trading market leverages Blockchain technology and its Smart Contract framework. This paper presents 1) transactive energy market for P2P multi-settlement markets, 2) architecture of blockchain-based energy management system, 3) smart contract design that solves an economic dispatch problem of DERs to maximize the profit of pro/consumers.

Multi-parameter distributed fiber sensing with higherorder optical and acoustic modes

We propose a novel multi-parameter sensing technique based on a Brillouin optical time domain reflectometry in the elliptical-core few-mode fiber, using higher-order optical and acoustic modes. Multiple Brillouin peaks are observed for the backscattering of both the LP01 mode and LP11 mode. We characterize the temperature and strain coefficients for various optical–acoustic mode pairs. By selecting the proper combination of modes pairs, the performance of multi-parameter sensing can be optimized. Distributed sensing of temperature and strain is demonstrated over a 0.5-km elliptical-core few-mode fiber, with the discriminative uncertainty of 0.28°C and 5.81 ?? for temperature and strain, respectively.

Visual Entailment: A Novel Task for Fine-Grained Image Understanding

Existing visual reasoning datasets, such as Visual Question Answering (VQA), often suffer from biases conditioned on the question, image or answer distributions. The recently proposed CLEVR dataset addresses these limitations and requires fine-grained reasoning, but the dataset is synthetic and consists of similar objects and sentence structures across the dataset. In this paper, we introduce a new inference task, Visual Entailment (VE) – consisting of image-sentence pairs whereby a premise is defined by an image, rather than a natural language sentence as in traditional Textual Entailment tasks. The goal of a trained VE model is to predict whether the image semantically entails the text. To realize this task, we build a dataset SNLI-VE based on the Stanford Natural Language Inference corpus and Flickr30k dataset. We evaluate various existing VQA baselines and build a model called Explainable Visual Entailment (EVE) system to address the VE task. EVE achieves up to 71% accuracy and outperforms several other state-of-the-art VQA based models. Finally, we demonstrate the explainability of EVE through cross-modal attention visualizations.

A Deep Neural Network for Unsupervised Anomaly Detection and Diagnosis in Multivariate Time Series Data

Nowadays, multivariate time series data are increasingly collected in various real-world systems, e.g., power plants, wearable devices, etc. Anomaly detection and diagnosis in multivariate time series refer to identifying abnormal status in certain time steps and pinpointing the root causes. Building such a system, however, is challenging since it not only requires to capture the temporal dependency in each time series, but also need encode the inter-correlations between different pairs of time series. In addition, the system should be robust to noise and provide operators with different levels of anomaly scores based upon the severity of different incidents. Despite the fact that a number of unsupervised anomaly detection algorithms have been developed, few of them can jointly address these challenges. In this paper, we propose a Multi-Scale Convolutional Recurrent Encoder-Decoder (MSCRED), to perform anomaly detection and diagnosis in multivariate time series data. Specifically, MSCRED first constructs multi-scale (resolution) signature matrices to characterize multiple levels of the system statuses in different time steps. Subsequently, given the signature matrices, a convolutional encoder is employed to encode the inter-sensor (time series) correlations and an attention based Convolutional Long-Short Term Memory (ConvLSTM) network is developed to capture the temporal patterns. Finally, based upon the feature maps which encode the inter-sensor correlations and temporal information, a convolutional decoder is used to reconstruct the input signature matrices and the residual signature matrices are further utilized to detect and diagnose anomalies. Extensive empirical studies based on a synthetic dataset and a real power plant dataset demonstrate that MSCRED can outperform state-of-the-art baseline methods.

Coherent optical wireless communication link employing orbital angular momentum multiplexing in a ballistic and diffusive scattering medium

We experimentally investigate the scattering effect on an 80 Gbit/s orbital angular momentum (OAM) multiplexed optical wireless communication link. The power loss, mode purity, cross talk, and bit error rate performance are measured and analyzed for different OAM modes under scattering levels from ballistic to diffusive regions. Results show that (i) power loss is the main impairment in the ballistic scattering, while the mode purities of different OAM modes are not significantly affected; (ii) in the diffusive scattering, however, the performance of an OAM-multiplexed link further suffers from the increased cross talk between the different OAM modes.