View: session overviewtalk overview
10:30 | Large-Scale Pre-Training for Dual-Accelerometer Human Activity Recognition PRESENTER: Aleksej Logacjov ABSTRACT. The annotation of physical activity data collected with accelerometers for human activity recognition (HAR) remains challenging despite the growing interest in large public health studies. Existing free-living accelerometer-based datasets are limited, hindering the training of effective deep learning models. To address this limitation, some studies have explored self-supervised learning (SSL), i.e., training models on both labeled and unlabeled data. Here, we extend previous work by evaluating whether large-scale pre-training improves downstream HAR performance. We introduce the SelfPAB method, which includes pre-training a transformer encoder network on increasing amounts of accelerometer data (10-100K hours) using a reconstruction objective to predict missing data segments in the spectrogram representations. Experiments demonstrate improved downstream HAR performance using SelfPAB compared to purely supervised baseline methods on two publicly available datasets (HARTH and HAR70+). Furthermore, an increase in the amount of pre-training data yields higher overall downstream performance. SelfPAB achieves an F1-score of 81.3% (HARTH), and 78.5% (HAR70+) compared to the baselines' F1-scores of 74.2% (HARTH) and 63.7% (HAR70+). Additionally, SelfPAB leads to a performance increase for activities with little training data. |
11:00 | Geo-locating Road Objects using Inverse Haversine Formula with NVIDIA Driveworks PRESENTER: Mamoona Birkhez Shami ABSTRACT. Geolocation is integral to the seamless functioning of autonomous vehicles and advanced traffic monitoring infrastructures. This paper introduces a methodology to geolocate road objects using a monocular camera, leveraging the NVIDIA DriveWorks platform. We use the Centimeter Positioning Service (CPOS) and the inverse Haversine formula to geo-locate road objects accurately. The real-time algorithm processing capability of the NVIDIA DriveWorks platform enables instantaneous object recognition and spatial localization for Advanced Driver Assistance Systems (ADAS) and autonomous driving platforms. We present a measurement pipeline suitable for autonomous driving (AD) platforms and provide detailed guidelines for calibrating cameras using NVIDIA DriveWorks. Experiments were carried out to validate the accuracy of the proposed method for geolocating targets in both controlled and dynamic settings. We show that our approach can locate targets with less than 1m error when the AD platform is stationary and less than 4m error at higher speeds (i.e. up to 60km/h) within a 15m radius. |
11:30 | Simulated RGB and LiDAR Image based Training of Object Detection Models in the Context of Autonomous Driving ABSTRACT. The topic of object detection, which involves giving cars the ability to perceive their environment has drawn greater attention. For better performance, object detection algorithms often need huge datasets, which are frequently manually labeled. This procedure is expensive and time-consuming. Instead, a simulated environment due to which one has complete control over all parameters and allows for automated image annotation. Carla, an open-source project created exclusively for the study of autonomous driving, is one such simulator. This study examines if object detection models that can recognize actual traffic items can be trained using automatically annotated simulator data from Carla. The findings of the experiments demonstrate that optimizing a trained model using Carla’s data, along with some real data, is encouraging. The Yolov5 model, trained using pre-trained Carla weights, exhibited improvements across all performance metrics compared to one trained exclusively on 2000 Kitti images. While it didn’t reach the performance level of the 6000-image Kitti model, the enhancements were indeed substantial. The mAP0.5:0.95 score saw an approximate 10% boost, with the most significant improvement occurring in the Pedestrian class. Furthermore, it is demonstrated that a substantial performance boost can be achieved by training a base model with Carla data and fine-tuning it with a smaller portion of the Kitti dataset. Moreover, the potential utility of Carla LiDAR images in reducing the volume of real images required while maintaining respectable model performance becomes evident. Our code is available at: https://tinyurl.com/3fdjd9xb. |
10:30 | Expanding Horizons: The Evolving Landscape of Development Opportunities in Cybersecurity Training Platforms PRESENTER: Rebeka Toth ABSTRACT. In today's cybersecurity landscape, offensive security plays a vital role in fortifying systems by identifying vulnerabilities and potential attack vectors. Equally significant is the training of offensive security professionals. This study conducts a comprehensive comparative analysis of renowned offensive security training platforms: Hack The Box, TryHackMe, HackerOne, PicoCTF, and PortSwigger Academy. The goal is to evaluate these platforms across eight criteria, shedding light on their strengths and limitations, while also proposing potential enhancements to address existing gaps. The criteria encompass hints, ranking systems, flags, writeups, user feedback, knowledge domains, difficulty levels, and extensibility. By subjecting these platforms to this comprehensive evaluation, we gain invaluable insights into their individual advantages and areas necessitating improvement. A salient finding of the analysis is the absence of personalized learning pathways and adaptive training based on users' unique skills and cognitive patterns. To mitigate this gap, prospective offensive security training platforms could leverage machine learning algorithms to create customized learning experiences. By adopting user activity-driven methodologies, these platforms can tailor training content, challenges, and feedback to meet learners' distinct needs and skill levels. The outcomes of this study contribute to the advancement of offensive security training by outlining the features and attributes of a plausible future platform, grounded in the pivotal considerations necessary for the creation of a more comprehensive and efficient training ecosystem. By integrating personalized learning paths and harnessing the potential of machine learning, forthcoming platforms can provide tailored experiences that optimize learning outcomes and foster enhanced engagement. |
11:00 | Fool Me Once, Shame on Me - A Qualitative Interview Study of Social Engineering Victims ABSTRACT. Security breaches still continue to flourish despite of the many technical measures in place. More often than not, the human users get the blame. Social engineering attacks use various manipulation techniques to fool users into giving away sensitive information or make security mistakes that are further exploited in cyber attacks. This study has investigated how common, cyber-enabled social engineering attacks, such Business Email Compromise (BEC) phishing and romance scams can be used to exploit individuals, systems or organizations. We investigate studies from the literature and apply a qualitative approach based on in-depth interviews with sample victims of such attacks. Our results contribute to the understanding of why established social engineering protection measures sometimes fail and how the victims have experienced the aftermath of such events. Based on our findings and literature comparison, we provide reflections on how mitigations can be improved to reduce the success rate of social engineering attacks. |
11:30 | PRESENTER: Odin Heitmann ABSTRACT. In today’s world of cybersecurity, it is not a question of if an organization will experience a cyber attack, but rather a matter of when it will happen. These incidents can cause significant disruption and financial losses to organizations. Forensic readiness is becoming increasingly crucial as it can help maximize the use of digital evidence and reduce the investigative cost after an attack. It can also aid law enforcement in identifying and prosecuting cybercrime perpetrators. Our observation of cybercrime investigations indicates divergent stakeholder priorities during a cyber attack. Victimized organizations prioritize resuming normal operations, and incident responders focus on restoration, potentially neglecting criminal evidence integrity. Law enforcement involvement occurs post-incident, usually after the initial incident handling is completed. Due to divergent focus areas, there is a lack of a comprehensive overview. This made us question the relationship between forensic readiness practices in the industry and criminal investigations performed by law enforcement after an attack. This paper investigates whether forensic readiness and criminal investigation are aligned. To assess alignment, we compare forensic readiness and criminal investigation definitions and their core components. Our research shows that forensic readiness does not sufficiently focus on criminal investigation; thus, the current forensic readiness approach does not adequately encompass criminal investigations. We propose incorporating criminal investigation integration as a new domain to address this issue while developing future forensic readiness models and practices. Furthermore, we propose using the term cross-organizational investigative readiness instead of forensic readiness to underline the importance of the industry, incident responders, and law enforcement working together to prevent, mitigate, and prosecute cybercrime. |
14:15 | GECO: A Twitter Dataset of COVID-19 Misinformation and Conspiracy Theories Related to the Berlin Parliament and Washington Capitol Riots ABSTRACT. On August 29, 2020, a precursor to the widely known January 6 United States Capitol attack in Washington D.C., USA, occurred in Berlin, Germany, where a group of protesters participating in a demonstration against COVID-19 pandemic measures attempted to storm the German parliament in Berlin. While the event in Berlin was less dramatic than January 6 of 2021 in the US - the protesters were repelled by the police, and no serious damage or injuries were reported - in both cases, mobilization through conspiracy theories on social media is widely considered a significant factor leading to both events. In this paper, in order to study such social media content, we present an analysis based on a manually labeled dataset sampled from a large set of COVID-19 related tweets in temporal proximity to the event in Berlin. Moreover, we provide an analysis that is based on a set of tweets following the January 6 United States Capitol event for comparison. The labels distinguish eight different classes of conspiracy theories, as well as other misinformation. This allows for studying the prevalence of different misinformation narratives around events of note. In total 23,417 tweets were labeled manually. The purpose of this dataset analysis is to allow further study of the phenomena, as well as training of machine learning systems with the purpose of detecting conspiracy theory content. |
14:45 | Om å kartleggja mørk materie med maskinlæring ABSTRACT. Gravitasjonslinsing er fenomenet der ljos frå fjerne himmellegeme vert avbøygd av tyngdekraften frå andre himmellegeme, som ofte ikkje er fullt synlege fordi mykje av massen er mørk materie. Observert gjennom ei gravitasjonslinse, framstår fjerne gallaksar som forvrengde. Der er mykje forskingsaktivitet som freistar å karleggja mørk materie ved å studera linseeffektar, men dei matematiske modellane er kompliserte og utrekningane krev i dag mykje manuelt arbeide som er svært tidkrevjande. I denne artikkelen drøftar me korleis me kan kombinera rouletteformalismen åt Chris Clarkson med maskinlæring for automatisk, lokal estimering av linsepotentialet i sterke linser, og me presenterer eit rammeverk med programvare i open kjeldekode for å generera datasett og validera resultat. |
15:15 | I-KAHAN: Image-Enhanced Knowledge-Aware Hierarchical Attention Network for Multi-modal Fake News Detection ABSTRACT. In the quest to combat the proliferation of fake news, accurate detection of fabricated news content has become increasingly desirable. While existing methodologies leverage a variety of news attributes, such as text content and social media comments, few incorporate diverse features from different modalities like images. In this paper, Image-Enhanced Knowledge-Aware Hierarchical Attention Network (I-KAHAN) architecture is proposed as an enhancement to the existing KAHAN architecture. The I-KAHAN architecture utilizes a wide variety of attributes including news content, user comments, external knowledge, and temporal information which are inherited from the KAHAN architecture, and extends it by integrating image-based information as an additional feature. This work contributes to refining and expanding fake news detection methodologies by embracing a more comprehensive range of features and modalities, and offers valuable insights into the effectiveness of various methods for the numerical representation of images, feature aggregation and dimensionality reduction. Experiments conducted on two real-world datasets, PolitiFact and GossipCop, assessing the performance of the I-KAHAN architecture, demonstrated approximately 3% improvement in accuracy over the KAHAN architecture, highlighting the potential benefits of incorporating diverse features and modalities for enhanced fake news detection performance. |
15:45 | Forecasting Hourly Ambulance Demand for Oslo, Norway: A Neuro-Symbolic Method PRESENTER: Ole Jakob Mengshoel ABSTRACT. Forecasting ambulance demand is critical for emergency medical services to allocate their resources as efficiently as possible. This work uses data from Norway's Oslo University Hospital (OUH) to forecast hourly ambulance demand in Oslo and Akershus. To forecast demand, we developed a neuro-symbolic method, DeANN. DeANN integrates statistical decomposition and artificial neural network methods. Statistical decomposition computes trend, seasonal, and residual components from the ambulance demand time series. Using these components, we apply a multilayer perceptron and regression to compute an overall ambulance demand forecast. Based on experimental results, we conclude that our proposed neuro-symbolic approach for ambulance demand forecasting outperforms several baseline models. Our best neuro-symbolic model has a mean squared error of 21.68 and improves on previous results for the OUH data set. |
14:15 | Analyzing eyebrow region for morphed image detection ABSTRACT. Facial images in passports are designated as primary identifiers for the verification of travelers according to the International Civil Aviation Organization (ICAO). Hence, it is important to ascertain the sanctity of the facial images stored in the electronic Machine-Readable Travel Document (eMRTD). With the introduction of automated border control (ABC) systems that rely on face recognition for the verification of travelers, it is even more crucial to have a system to ensure that the image stored in the eMRTD is free from any alteration that can hinder or abuse the normal working of a facial recognition system. One such attack against these systems is the face-morphing attack. Even though many techniques exist to detect morphed images, morphing algorithms are also improving to evade these detections. In this work, we analyze the eyebrow region for morphed image detection. The proposed method is based on analyzing the frequency content of the eyebrow region. The method was evaluated on two datasets that each consisted of morphed images created using two algorithms. The findings suggest that the proposed method can serve as a valuable tool in morphed image detection, and can be used in various applications where image authenticity is critical. |
14:45 | Towards CNN-based Level 1 Feature Extraction for Contactless Fingerprint Recognition ABSTRACT. This work examines the detection of ridge orientation patterns, also referred to as level 1 features, from contactless fingerprint images and their classification. We trained two Convolutional Neural Networks (CNNs) to classify fingerprints based on their ridge orientation patterns. Our models were trained on synthetic data generated by SynCoLFinGer. Afterwards, we conducted various experiments for classifying these patterns and evaluated our trained models on four real-world databases: PolyU CB2CL, ISPFDv1 contactless fingerprint database, and two in-house databases. We report the classification accuracy in terms of Classification Error Rate (CER). We achieved CERs between 28% and 38% considering all samples. Due to the amount of low-quality samples included in the database, we use NFIQ 2 to iteratively exclude samples from the databases and report the corresponding CER. We then decided to use NFIQ2 scores to iteratively exclude samples and hence report the impact of low-quality samples. By excluding the lowest scoring 10% of all samples within each database, we achieve CERs of 24% to 35% depending on the databases. While these error rates are still high, they show promise compared to the original values. Although further research is needed to improve results, we show that combining quality-score-based exclusion of images with CNNs trained on synthetic contactless data is a promising method to classify fingerprint patterns. |
15:15 | Morph-PIPE: Plugging in Identity Prior to Enhance Face Morphing Attack Based on Diffusion Model PRESENTER: Haoyu Zhang ABSTRACT. Face-morphing attacks (MA) aim to deceive Face Recognition Systems (FRS) by combining the face images of two or more subjects into a single face image. To evaluate the vulnerability of existing FRS and further develop countermeasures against potential attacks, it is necessary to create diverse morphing algorithms that produce high visual quality and have strong attack potential on FRS. In this work, we propose a novel morphing algorithm using a diffusion model and adding identity prior to strengthening attack potential on the FRS. Compared to existing works using diffusion models, our method can add explicit control of the morph generation process through identity manipulation. We benchmark our proposed approach on an ICAO-compliant face morphing dataset against state-of-the-art (SOTA) morphing algorithms, including one baseline using the diffusion model and two representative morphing algorithms. The results indicate an improvement in the performance of the morphing attack potential compared to the baseline algorithm using diffusion while it achieves comparable attack strength to other SOTA morphing generation algorithms which rely on tedious manual intervention in the creation of morphed images. |
15:45 | Type^2: A Secure and Seamless Biometric Two-Factor Authentication Protocol Using Keystroke Dynamics PRESENTER: Pia Bauspieß ABSTRACT. Password-based user authentication comes with impersonation risks due to poor quality passwords or security breaches of service providers. An additional layer of security can be provided to the authentication through keystroke dynamics, i.e., measuring and comparing users' typing rhythm for their password. While this two-factor authentication is efficient and unobtrusive, the privacy of the biometric characteristics must be ensured. Therefore, we present the Type^2 protocol for secure two-factor authentication based on keystroke dynamics, where the anomaly detection of the latter is executed in the encrypted domain. In an experimental evaluation, we show that our proposed protocol achieves real-time efficiency with an overhead of less than 130 milliseconds compared to password-only authentication. |
14:15 | Operational Backbone Work: Modernization Activities in the Migration of Monolith-Oriented IT Architectures ABSTRACT. To cope with new digital markets, incumbent financial organizations need to modernize their monolithic system portfolio to a more flexible and efficient form. This has proven to be quite challenging since the existing systems are tightly integrated with historical practices. We frame the portfolio as the operational backbone (OB), and ask what are the key activities of OB work in monolithic systems migration, and what is the outcome of such a migration process? Our empirical case is from a big financial institution embarking on a digital journey to modernize its core systems. Our contribution is a migration model that describes the key activities attributed to OB Work, and the role of these activities in modernizing the IT portfolio from a fragmented OB to a more coherent and flexible OB. |
14:45 | Development of a Toolbox on Sustainable ICT across Industry and Academia : The goforIT project ABSTRACT. Climate change and its consequences will provide enormous chal-lenges to society over the next decades. Society needs to address these challenges, both by mitigating the changes and by adapting to them. At the same time, we need to assure that the resulting society is both economically viable and socrially desirable. ICT plays an important role in assuring both environmental, economic, individual, technical and social sustainability. While it is commonly known what sustainability is on a high level, and why we need to change our ways, it was realized at a joint academia-industry panel at NIKT (the Norwegian ICT conference) in November 2019 that ICT-professionals did not necessarily know how they should change their ways. This also applied at the time to academia: Lecturers and those responsible for study programs did not know what should be taught in the different subjects. On this background goforIT (Grønn omstilling for IT-bransjen) was established in February 2020 by a small group of companies and universities. It has since grown to a national network with around 10 universities, 45 private organizations and 4 interest organizations. The development and use of the Sustainability Competence Toolkit is one of the major undertakings of goforIT to be important both for practice and education. The ambition of the authors is to solve the systemic problems for operational sustainability in the industry and the society at large, moving the knowledge development and application in parallel in industry and academia. Developing the toolkit can be looked upon as a type of action design research, given that the developers of the artifact is also some of the main users of this in their day-to-day activities. To understand how to best serve our audience, a group of design professionals have through a service design process undertaken interviews with people in various target audiences in the workforce and academia. |
15:15 | The role of contextual conditions in systems development: The impact of design context on participation in Norwegain Welfare Services PRESENTER: Tangni Cunningham Dahl-Jørgensen ABSTRACT. Human-Computer Interaction and adjacent fields agree that citizen participation is vital in designing digital public services. However, a gap remains between recommendations and how participation is facilitated in practice in the public sector. As challenges to participation remain even in the face of established design standards and best practices, contextual conditions warrant more investigation. Based on this discrepancy, we must clarify how the design context impacts participatory activities. This paper presents an exploratory case study of how designers and caseworkers seek to involve vulnerable persons in a public service project's digital solution development. We identified three interconnected contextual conditions that impact participation in the design process: 1) organizational complexity, 2) recruitment and representation, and 3) power imbalances. This paper contributes to a more nuanced understanding of the role of context as a determinant of participatory outcomes in digital public system design. |
15:45 | Sustainability Design in Mobile Augmented Reality PRESENTER: Dimitra Chasanidou ABSTRACT. This paper describes the sustainability design process of a mobile augmented reality (MAR) application called AudioNear. Through a four-step process and a dedicated workshop with developers, the Sustainability Awareness Framework (SusAF) is applied to capture and connect sustainability issues into dimensions and levels of effects. Among twenty sustainability issues in MAR applications, eight functional issues that are essential to creating a sustainable MAR travel guide experience were identified and developed for AudioNear. First, a comprehensive list of design suggestions was formulated to facilitate sustainability design in MAR applications. Then, high-fidelity mock-ups of AudioNear were developed based on design suggestions, indicating promising results in terms of the sustainability design process. This work contributes to the field of sustainability design and MAR. |