ABSTRACT
Xhaul, a mobile transport network, is a critical lifeline in imminent global crises: the combination of the COVID-19 pandemic and geopolitical conflict. Not only did the Russia-Ukraine war cause a global energy crisis, but it also put more energy stress on the 5G Xhaul. It also shows that the sustainability of a country depends on the unbroken Xhaul. Meanwhile, the COVID-19 outbreak has triggered the largest human-virus war of this century. It needs the ubiquitous 5G Xhaul to monitor the spread of COVID-19. Once crises occur, turning them into opportunities often requires new ways of seeing, considering, and responding to the 5G Xhaul provisioning. Facing more unpredictable situations, Chunghwa Telecom (CHT), the largest service provider in Taiwan, embraces the challenges and proposes practical solutions. This study aims to discuss the new 5G Xhaul provisioning strategies to achieve sustainable development goals in this turbulent era. © 2022 IEEE.
ABSTRACT
In the fight against the COVID-19 pandemic, many social activities have moved online;society's overwhelming reliance on the complex cyberspace makes its security more important than ever. In this paper, we propose and develop an intelligent system named Dr.HIN to protect users against the evolving Android malware attacks in the COVID-19 era and beyond. In Dr.HIN, besides app content, we propose to consider higher-level semantics and social relations among apps, developers and mobile devices to comprehensively depict Android apps;and then we introduce a structured heterogeneous information network (HIN) to model the complex relations and exploit meta-path guided strategy to learn node (i.e., app) representations from HIN. As the representations of malware could be highly entangled with benign apps in the complex ecosystem of development, it poses a new challenge of learning the latent explanatory factors hidden in the HIN embeddings to detect the evolving malware. To address this challenge, we propose to integrate domain priors generated from different views (i.e., app content, app authorship, app installation) to devise an adversarial disentangler to separate the distinct, informative factors of variations hidden in the HIN embeddings for large-scale Android malware detection. This is the first attempt of disentangled representation learning in HIN data. Promising experimental results based on real sample collections from security industry demonstrate the performance of Dr.HIN in evolving Android malware detection, by comparison with baselines and popular mobile security products.