首页 > 最新文献

2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)最新文献

英文 中文
Solid-liquid dual channel data-driven method for Lagrangian fluid simulation 拉格朗日流体模拟的固液双通道数据驱动方法
Feilong Du, X. Ban, Yalan Zhang, Z. Dong, H. Duan
To solve the problems of low accuracy in long time series prediction and low generality of network parameter model in the existing data-driven Lagrangian fluid simulation, a light neural network prediction model which is physics-based multi-layer shared perceptron was proposed. Each fluid particle is standardized by searching neighbor particles through the optimized parallel processing module. The neural network is used to predict the effect of each neighbor particle on the central particle. The solid-liquid two-state differentiated aggregation operation is used to predict the acceleration of each fluid particle. The experimental results show that, compared with the existing methods, the method proposed in this paper greatly improves the prediction accuracy with less time overhead, and at the same time maintains more fluid motion details. In addition, we can enables more accurate long-term fluid motion prediction. Compared with PointRNN, PointNet++ and other single-channel data-driven methods, we can better deal with the fluid-solid coupling problem, and has wider network versatility.
针对现有数据驱动拉格朗日流体模拟中存在的长时间序列预测精度低、网络参数模型通用性低等问题,提出了一种基于物理的多层共享感知器的轻神经网络预测模型。通过优化后的并行处理模块,通过搜索相邻的流体粒子,对每个流体粒子进行标准化处理。神经网络用于预测每个相邻粒子对中心粒子的影响。采用固液两态微分聚集运算来预测各流体粒子的加速度。实验结果表明,与现有方法相比,本文提出的方法以较少的时间开销大大提高了预测精度,同时保持了更多的流体运动细节。此外,我们可以实现更准确的长期流体运动预测。与PointRNN、PointNet++等单通道数据驱动方法相比,能更好地处理流固耦合问题,具有更广泛的网络通用性。
{"title":"Solid-liquid dual channel data-driven method for Lagrangian fluid simulation","authors":"Feilong Du, X. Ban, Yalan Zhang, Z. Dong, H. Duan","doi":"10.1109/CCCI52664.2021.9583218","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583218","url":null,"abstract":"To solve the problems of low accuracy in long time series prediction and low generality of network parameter model in the existing data-driven Lagrangian fluid simulation, a light neural network prediction model which is physics-based multi-layer shared perceptron was proposed. Each fluid particle is standardized by searching neighbor particles through the optimized parallel processing module. The neural network is used to predict the effect of each neighbor particle on the central particle. The solid-liquid two-state differentiated aggregation operation is used to predict the acceleration of each fluid particle. The experimental results show that, compared with the existing methods, the method proposed in this paper greatly improves the prediction accuracy with less time overhead, and at the same time maintains more fluid motion details. In addition, we can enables more accurate long-term fluid motion prediction. Compared with PointRNN, PointNet++ and other single-channel data-driven methods, we can better deal with the fluid-solid coupling problem, and has wider network versatility.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130424820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CCCI 2021 Cover Page CCCI 2021封面
{"title":"CCCI 2021 Cover Page","authors":"","doi":"10.1109/ccci52664.2021.9583216","DOIUrl":"https://doi.org/10.1109/ccci52664.2021.9583216","url":null,"abstract":"","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Security of RIS-assisted NOMA Networks Over Fisher-Snedecor ℱ Composite Fading Channel fisher - snedecy_复合衰落信道上ris辅助NOMA网络物理层安全性研究
Chunli Song, Xin Zhang
In this paper, we investigate the physical layer security (PLS) for reconfigurable intelligent surface (RIS)-assisted non-orthogonal multiple access (NOMA) system over generalized fading channels. Specifically, we assume that the system is based on RIS access point (AP) and RIS is used to improve the secrecy performance of two legitimate users. We adopt the FisherSnedecor F model to characterize the composite fading and shadowing channel. In particular, novel expressions for the outage probability and secrecy outage probability (SOP) are derived. We verify our analytical results through Monte-Carlo simulations. The results indicate that the secrecy performance is affected by the number of RIS reflecting elements and Fisher-Snedecor F composite fading parameters.
本文研究了广义衰落信道上可重构智能表面(RIS)辅助非正交多址(NOMA)系统的物理层安全性。具体来说,我们假设系统基于RIS接入点(AP), RIS用于提高两个合法用户的保密性能。我们采用FisherSnedecor F模型来描述复合衰落和阴影信道。特别地,导出了新的中断概率和保密中断概率(SOP)表达式。我们通过蒙特卡罗模拟验证了我们的分析结果。结果表明,RIS反射元素个数和Fisher-Snedecor F复合衰落参数对保密性能有影响。
{"title":"Physical Layer Security of RIS-assisted NOMA Networks Over Fisher-Snedecor ℱ Composite Fading Channel","authors":"Chunli Song, Xin Zhang","doi":"10.1109/CCCI52664.2021.9583201","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583201","url":null,"abstract":"In this paper, we investigate the physical layer security (PLS) for reconfigurable intelligent surface (RIS)-assisted non-orthogonal multiple access (NOMA) system over generalized fading channels. Specifically, we assume that the system is based on RIS access point (AP) and RIS is used to improve the secrecy performance of two legitimate users. We adopt the FisherSnedecor F model to characterize the composite fading and shadowing channel. In particular, novel expressions for the outage probability and secrecy outage probability (SOP) are derived. We verify our analytical results through Monte-Carlo simulations. The results indicate that the secrecy performance is affected by the number of RIS reflecting elements and Fisher-Snedecor F composite fading parameters.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122140052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-Time Instance Segmentation for Low-Cost Mobile Robot Systems Based on Computation Offloading 基于计算卸载的低成本移动机器人系统实时实例分割
Yuanyan Xie, Yu Guo, Yue Chen, Zhenqiang Mi
Instance segmentation can enable mobile robots to obtain the environmental semantic information and accomplish more complex interaction with environments, such as navigation, grasping, and virtual reality. However, low-cost mobile robots have limited onboard resources, and can not afford the massive computation of instance segmentation methods. This paper proposes a real-time instance segmentation framework for mobile robot systems based on computation offloading, which offloads part of computation of the instance segmentation network to the cloud, and leverages the powerful computation resources and sufficient memories on the cloud platform to accelerate the network. First, we formulate the instance segmentation network as the directed acyclic graph, and present its time cost model and energy consumption model. Then, a computation offloading strategy is proposed to reduce the time cost of the whole instance segmentation and the energy consumption on the mobile robot. Our framework has been verified on the representative one-stage method, Yolact, and two-stage method, Mask R-CNN. The results show that our framework can accelerate the execution of instance segmentation network on mobile robots, and achieve the speed of around one second per frame.
实例分割可以使移动机器人获得环境语义信息,完成更复杂的与环境的交互,如导航、抓取、虚拟现实等。然而,低成本移动机器人的机载资源有限,无法承担实例分割方法的大量计算。本文提出了一种基于计算卸载的移动机器人系统实时实例分割框架,将实例分割网络的部分计算卸载到云端,利用云平台强大的计算资源和充足的内存对网络进行加速。首先,将实例分割网络表述为有向无环图,给出了其时间代价模型和能量消耗模型;然后,提出了一种计算卸载策略,以减少整个实例分割的时间成本和移动机器人的能量消耗。我们的框架已经在代表性的一阶段方法Yolact和两阶段方法Mask R-CNN上进行了验证。结果表明,该框架可以加快移动机器人实例分割网络的执行速度,达到每帧1秒左右的速度。
{"title":"Real-Time Instance Segmentation for Low-Cost Mobile Robot Systems Based on Computation Offloading","authors":"Yuanyan Xie, Yu Guo, Yue Chen, Zhenqiang Mi","doi":"10.1109/CCCI52664.2021.9583186","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583186","url":null,"abstract":"Instance segmentation can enable mobile robots to obtain the environmental semantic information and accomplish more complex interaction with environments, such as navigation, grasping, and virtual reality. However, low-cost mobile robots have limited onboard resources, and can not afford the massive computation of instance segmentation methods. This paper proposes a real-time instance segmentation framework for mobile robot systems based on computation offloading, which offloads part of computation of the instance segmentation network to the cloud, and leverages the powerful computation resources and sufficient memories on the cloud platform to accelerate the network. First, we formulate the instance segmentation network as the directed acyclic graph, and present its time cost model and energy consumption model. Then, a computation offloading strategy is proposed to reduce the time cost of the whole instance segmentation and the energy consumption on the mobile robot. Our framework has been verified on the representative one-stage method, Yolact, and two-stage method, Mask R-CNN. The results show that our framework can accelerate the execution of instance segmentation network on mobile robots, and achieve the speed of around one second per frame.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131551926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault-Tolerant Orchestration of Bags-of-Tasks with Application-Directed Checkpointing in a Distributed Environment 分布式环境中具有应用程序导向检查点的任务包容错编排
Georgios L. Stavrinides, H. Karatza
A wide spectrum of applications, ranging from big data analytics to financial risk modeling and genomics, feature a high degree of parallelism, forming bags-of-tasks. Such applications are typically processed on distributed resources and are often prone to transient software failures. Consequently, load balancing and fault tolerance are two crucial aspects of such environments. In this paper, we consider bag-of-tasks jobs that utilize application-directed checkpointing. According to this technique, each component task is responsible for checkpointing its own progress at regular intervals during its execution. When a failure occurs, the affected task is rolled back to its most recent checkpoint and resumes execution. In order to investigate the impact of transient software failures on the performance of the system, we employ four resource allocation strategies, two well-known and two novel ones. The routing policies are compared through simulation experiments, under different task failure probabilities and load cases.
广泛的应用,从大数据分析到金融风险建模和基因组学,都具有高度的并行性,形成了任务包。此类应用程序通常在分布式资源上进行处理,并且经常容易出现短暂的软件故障。因此,负载平衡和容错是这种环境的两个关键方面。在本文中,我们考虑使用应用程序定向检查点的任务袋作业。根据这种技术,每个组件任务在执行过程中负责定期检查自己的进度。发生故障时,受影响的任务回滚到最近的检查点并继续执行。为了研究软件暂态故障对系统性能的影响,我们采用了四种资源分配策略,其中两种是已知的,两种是新的。通过仿真实验,对不同任务失效概率和负载情况下的路由策略进行了比较。
{"title":"Fault-Tolerant Orchestration of Bags-of-Tasks with Application-Directed Checkpointing in a Distributed Environment","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/CCCI52664.2021.9583187","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583187","url":null,"abstract":"A wide spectrum of applications, ranging from big data analytics to financial risk modeling and genomics, feature a high degree of parallelism, forming bags-of-tasks. Such applications are typically processed on distributed resources and are often prone to transient software failures. Consequently, load balancing and fault tolerance are two crucial aspects of such environments. In this paper, we consider bag-of-tasks jobs that utilize application-directed checkpointing. According to this technique, each component task is responsible for checkpointing its own progress at regular intervals during its execution. When a failure occurs, the affected task is rolled back to its most recent checkpoint and resumes execution. In order to investigate the impact of transient software failures on the performance of the system, we employ four resource allocation strategies, two well-known and two novel ones. The routing policies are compared through simulation experiments, under different task failure probabilities and load cases.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132509547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems 数字版权管理系统中基于位置的隐私保护内容分发框架
D. Mishra, M. Obaidat, Ankita Mishra
Advancement in network technology provides an opportunity for e-commerce industries to sell digital content. However, multimedia content has the drawback of easy copy and redistribution, which causes rampant piracy. Digital rights management (DRM) systems are developed to address content piracy. Basically, DRM focuses to control content consumption and distribution. In general, to provide copyright protection, DRM system loses flexibility and creates a severe threat to users’ privacy. Moreover, traditional DRM systems are client-server architecture, which cannot handle strategies geographically. These disadvantages discourage the adoption of DRM systems. At the same time, multi-distributor DRM (MD-DRM) system provides a way to facilitate content distribution more effectively. Most of the existing multi-distributor DRM systems are privacy encroaching and do not discuss the useful content distribution framework. To overcome the drawbacks of existing schemes, we propose a privacy-preserving MD-DRM system, which is flexible enough to support location-based content distribution. The proposed scheme maintains a flexible and transparent content distribution without breaching consumer privacy. Besides, the proposed scheme does not violate accountability parameters. This mechanism makes traitor identification possible without violating the privacy rights of authorized consumers.
网络技术的进步为电子商务行业提供了销售数字内容的机会。然而,多媒体内容具有易于复制和再分发的缺点,这就导致了盗版的猖獗。数字版权管理(DRM)系统的开发是为了解决内容盗版问题。基本上,DRM侧重于控制内容的消费和分发。一般来说,为了提供版权保护,DRM制度失去了灵活性,对用户的隐私造成了严重的威胁。此外,传统的DRM系统是客户机-服务器架构,无法在地理上处理策略。这些缺点阻碍了DRM系统的采用。同时,多分发者DRM (multi-distributor DRM, MD-DRM)系统提供了一种更有效地促进内容分发的方法。现有的多分发者DRM系统大多存在侵犯隐私的问题,并且没有讨论有用的内容分发框架。为了克服现有方案的缺点,我们提出了一种保护隐私的MD-DRM系统,该系统足够灵活,可以支持基于位置的内容分发。建议的方案在不侵犯消费者隐私的情况下保持灵活和透明的内容分发。此外,该方案不违反问责参数。这种机制使得在不侵犯授权消费者隐私权的情况下识别叛逆者成为可能。
{"title":"Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems","authors":"D. Mishra, M. Obaidat, Ankita Mishra","doi":"10.1109/CCCI52664.2021.9583205","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583205","url":null,"abstract":"Advancement in network technology provides an opportunity for e-commerce industries to sell digital content. However, multimedia content has the drawback of easy copy and redistribution, which causes rampant piracy. Digital rights management (DRM) systems are developed to address content piracy. Basically, DRM focuses to control content consumption and distribution. In general, to provide copyright protection, DRM system loses flexibility and creates a severe threat to users’ privacy. Moreover, traditional DRM systems are client-server architecture, which cannot handle strategies geographically. These disadvantages discourage the adoption of DRM systems. At the same time, multi-distributor DRM (MD-DRM) system provides a way to facilitate content distribution more effectively. Most of the existing multi-distributor DRM systems are privacy encroaching and do not discuss the useful content distribution framework. To overcome the drawbacks of existing schemes, we propose a privacy-preserving MD-DRM system, which is flexible enough to support location-based content distribution. The proposed scheme maintains a flexible and transparent content distribution without breaching consumer privacy. Besides, the proposed scheme does not violate accountability parameters. This mechanism makes traitor identification possible without violating the privacy rights of authorized consumers.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection 基于特征选择优化的RF-SVM入侵检测系统
Dongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu
With the emergence of increasingly growing network threats, network security becomes a major issue which causes huge existing and potential losses, such as WannaCry. Various methods had been adopted to maintain network security, among which Intrusion Detection System (IDS) is one of the most essential parts of cybersecurity to defense against sophisticated and ever-growing network attacks. A number of researchers have studied comprehensive datasets and effective approaches to build IDS. Machine learning models are also applied in IDS and obtained considerable results in building better network security system. In this paper, we proposed a two-stage IDS based on machine learning models RF and SVM optimized with Feature Selection algorithm CFS. We also conducted experiments on NSL-KDD benchmark datasets to evaluate the performance of the two-stage IDS, comparing against RF and SVM models respectively. The results demonstrated that our proposed two-stage IDS outperformed RF and SVM with an increase from 4.31% to 14.62% in Precision and a reduction of 93.84% in time than SVM.
随着网络威胁的日益增多,网络安全成为一个重大问题,造成巨大的现有和潜在损失,如WannaCry。维护网络安全的方法多种多样,其中入侵检测系统(IDS)是网络安全最重要的组成部分之一,可以抵御复杂且日益增长的网络攻击。许多研究人员已经研究了构建入侵检测系统的综合数据集和有效方法。机器学习模型也应用于入侵检测中,并在构建更好的网络安全系统方面取得了可观的成果。本文提出了一种基于特征选择算法CFS优化的机器学习模型RF和SVM的两阶段入侵检测方法。我们还在NSL-KDD基准数据集上进行了实验,分别与RF和SVM模型进行了比较,以评估两阶段IDS的性能。结果表明,我们提出的两阶段IDS比RF和SVM的精度提高了4.31%到14.62%,时间比SVM减少了93.84%。
{"title":"Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection","authors":"Dongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu","doi":"10.1109/CCCI52664.2021.9583206","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583206","url":null,"abstract":"With the emergence of increasingly growing network threats, network security becomes a major issue which causes huge existing and potential losses, such as WannaCry. Various methods had been adopted to maintain network security, among which Intrusion Detection System (IDS) is one of the most essential parts of cybersecurity to defense against sophisticated and ever-growing network attacks. A number of researchers have studied comprehensive datasets and effective approaches to build IDS. Machine learning models are also applied in IDS and obtained considerable results in building better network security system. In this paper, we proposed a two-stage IDS based on machine learning models RF and SVM optimized with Feature Selection algorithm CFS. We also conducted experiments on NSL-KDD benchmark datasets to evaluate the performance of the two-stage IDS, comparing against RF and SVM models respectively. The results demonstrated that our proposed two-stage IDS outperformed RF and SVM with an increase from 4.31% to 14.62% in Precision and a reduction of 93.84% in time than SVM.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122082293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of Encrypted Malicious Traffic Detection* 加密恶意流量检测技术综述*
Yanmiao Li, Hao Guo, Jiangang Hou, Zhen Zhang, Tong Jiang, Zhi Liu
With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without decryption has become a research hotspot. Combined with deep learning, an important branch of machine learning, encrypted malicious traffic detection has achieved good results. This paper reviews the detection of encrypted malicious traffic in recent years. Firstly, we classify encrypted malicious traffic. Secondly, we sorts out the extraction characteristics of encrypted malicious traffic, the key and difficult problems we are facing at present. Then, with encrypted malicious traffic detection technology as the main line, we summarized the current detection model from the four core aspects of data collection, data processing, model training and evaluation improvement. Finally, we analyze the problems and point out future research directions.
随着HTTPS等加密流量越来越多,加密流量不仅可以保护正常流量,还可以保护恶意流量。不加解密的加密恶意流量识别已成为研究热点。结合机器学习的一个重要分支——深度学习,加密恶意流量检测取得了很好的效果。本文综述了近年来加密恶意流量检测的研究进展。首先,对加密的恶意流量进行分类。其次,对加密恶意流量的提取特点、目前面临的关键和难点问题进行了梳理。然后,以加密恶意流量检测技术为主线,从数据采集、数据处理、模型训练和评估改进四个核心方面对目前的检测模型进行了总结。最后,对存在的问题进行了分析,并指出了今后的研究方向。
{"title":"A Survey of Encrypted Malicious Traffic Detection*","authors":"Yanmiao Li, Hao Guo, Jiangang Hou, Zhen Zhang, Tong Jiang, Zhi Liu","doi":"10.1109/CCCI52664.2021.9583191","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583191","url":null,"abstract":"With more and more encrypted traffic such as HTTPS, encrypted traffic protects not only normal traffic, but also malicious traffic. Identification of encrypted malicious traffic without decryption has become a research hotspot. Combined with deep learning, an important branch of machine learning, encrypted malicious traffic detection has achieved good results. This paper reviews the detection of encrypted malicious traffic in recent years. Firstly, we classify encrypted malicious traffic. Secondly, we sorts out the extraction characteristics of encrypted malicious traffic, the key and difficult problems we are facing at present. Then, with encrypted malicious traffic detection technology as the main line, we summarized the current detection model from the four core aspects of data collection, data processing, model training and evaluation improvement. Finally, we analyze the problems and point out future research directions.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122846136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison and analysis of secret image sharing principles 秘密图像共享原理的比较与分析
Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan
Secret image sharing (SIS) means to share a secret image into multiple shadow images, and the secret image can be recovered when a sufficient number of shadow images are obtained. SIS has the advantages of loss tolerance, simple encryption and decryption, scattered storage and so on. This paper describes three realization principles(i.e., the polynomial-based SIS, SIS based on the Chinese remainder theorem and visual secret sharing), verifies them with experiments, and calculates the PSNR, SSIM values and the time cost for each scheme to recover the image. Comparing the values of each index and the visual quality of the restored images can more intuitively reflect the advantages and disadvantages of each scheme. Finally, the advantages and disadvantages of each algorithm are analyzed by combining the theory and experimental results of the algorithm.
秘密图像共享(SIS)是指将一个秘密图像共享为多个阴影图像,当获得足够数量的阴影图像时,就可以恢复秘密图像。SIS具有容错、加解密简单、分散存储等优点。本文阐述了三种实现原则(即:通过实验验证了基于多项式的SIS、基于中国剩余定理的SIS和基于视觉秘密共享的SIS),并计算了每种方案恢复图像的PSNR、SSIM值和时间成本。比较各指标的取值和恢复后图像的视觉质量,可以更直观地反映出各方案的优劣。最后,结合算法的理论和实验结果,分析了每种算法的优缺点。
{"title":"Comparison and analysis of secret image sharing principles","authors":"Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan","doi":"10.1109/CCCI52664.2021.9583215","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583215","url":null,"abstract":"Secret image sharing (SIS) means to share a secret image into multiple shadow images, and the secret image can be recovered when a sufficient number of shadow images are obtained. SIS has the advantages of loss tolerance, simple encryption and decryption, scattered storage and so on. This paper describes three realization principles(i.e., the polynomial-based SIS, SIS based on the Chinese remainder theorem and visual secret sharing), verifies them with experiments, and calculates the PSNR, SSIM values and the time cost for each scheme to recover the image. Comparing the values of each index and the visual quality of the restored images can more intuitively reflect the advantages and disadvantages of each scheme. Finally, the advantages and disadvantages of each algorithm are analyzed by combining the theory and experimental results of the algorithm.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114868387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and visualization of solid-liquid phase transition and interactive using particle-based method 基于粒子的固液相变及相互作用的仿真与可视化
Zihao Liu, Yanrui Xu, Xiaokun Wang, X. Ban, Z. Zheng
The simulation and visualization of natural phenomena has been widely studied in computer graphics. But those studies are less involved in complex phenomena, such as solid-liquid interaction and transition. We propose a method for simulation and visualization of solid-liquid heat conduction and phase transition using Smooth Particle Hydrodynamics(SPH) based on Fourier law. To achieve a realistic phase transition, spatio-temporal discretization of solid-liquid two-phase material, we map the temperature field to solid and liquid particles and combining with the heat conduction model. Our method includes heat conduction between solid and liquid, solid and surrounding air, and latent heat caused by phase transition. The experimental results show that our method can realize stable heat conduction and smooth phase transition from solid to liquid with accurate simulation details and visualization effects.
自然现象的模拟和可视化在计算机图形学中得到了广泛的研究。但这些研究较少涉及复杂的现象,如固液相互作用和转变。提出了一种基于傅立叶定律的光滑粒子流体力学(SPH)模拟和可视化固液热传导和相变的方法。为了实现固液两相材料的相变、时空离散化,我们将温度场映射到固体和液体颗粒上,并结合热传导模型。我们的方法包括固体与液体之间的热传导,固体与周围空气之间的热传导,以及相变引起的潜热。实验结果表明,该方法可以实现稳定的热传导和从固体到液体的平滑相变,具有精确的模拟细节和可视化效果。
{"title":"Simulation and visualization of solid-liquid phase transition and interactive using particle-based method","authors":"Zihao Liu, Yanrui Xu, Xiaokun Wang, X. Ban, Z. Zheng","doi":"10.1109/CCCI52664.2021.9583207","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583207","url":null,"abstract":"The simulation and visualization of natural phenomena has been widely studied in computer graphics. But those studies are less involved in complex phenomena, such as solid-liquid interaction and transition. We propose a method for simulation and visualization of solid-liquid heat conduction and phase transition using Smooth Particle Hydrodynamics(SPH) based on Fourier law. To achieve a realistic phase transition, spatio-temporal discretization of solid-liquid two-phase material, we map the temperature field to solid and liquid particles and combining with the heat conduction model. Our method includes heat conduction between solid and liquid, solid and surrounding air, and latent heat caused by phase transition. The experimental results show that our method can realize stable heat conduction and smooth phase transition from solid to liquid with accurate simulation details and visualization effects.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124324837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1