首页 > 最新文献

2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)最新文献

英文 中文
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System 数字版权管理系统中基于生物特征的鲁棒匿名认证方案
Muhammad A. Khan, Anwer Ghani, M. Obaidat, P. Vijayakumar, Khwaja Mansoor, Shehzad Ashraf Chaudhry
As digital content transmission through the internet is convenient and quick, so the outspread of digital content is very high. However, along with this incredible speed and ease, current communication technologies and computers have also brought with them plenty of digital rights management complications. Digital Rights Management Systems are designed to limit the access to the utilization, alternation, and distribution of persevered digital content. This article scrutinized two recent schemes of Lee et al. and Yu et al. and it is found that these schemes are suspected to an insider attack, stolen smart-card attack, Daniel of services (Dos) attack, and impersonation attack. Furthermore, their proposal also suffers from incorrect issues. To fix these flaws, a robust anonymous authentication scheme using biometrics for Digital Rights Management System is proposed in this article. The proposed scheme is checked for correctness and its security is proved through BAN logic. The performance of the scheme is also analyzed using computation time and communication time. The results show that the designed scheme is highly secure with the same computation and communication cost as the existing protocols.
由于数字内容通过互联网传播方便快捷,因此数字内容的外延性非常高。然而,伴随着这种令人难以置信的速度和易用性,当前的通信技术和计算机也带来了许多数字版权管理的复杂性。数字版权管理系统旨在限制对保留数字内容的使用、更改和分发的访问。本文仔细研究了Lee等人和Yu等人最近提出的两种方案,发现这些方案涉嫌内部攻击、智能卡被盗攻击、服务丹尼尔(Dos)攻击和冒充攻击。此外,他们的建议也存在不正确的问题。为了解决这些缺陷,本文提出了一种基于生物识别技术的数字版权管理系统健壮匿名认证方案。通过BAN逻辑验证了该方案的正确性和安全性。从计算时间和通信时间两方面分析了该方案的性能。结果表明,该方案具有较高的安全性,且计算量和通信成本与现有协议相同。
{"title":"A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System","authors":"Muhammad A. Khan, Anwer Ghani, M. Obaidat, P. Vijayakumar, Khwaja Mansoor, Shehzad Ashraf Chaudhry","doi":"10.1109/CCCI52664.2021.9583219","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583219","url":null,"abstract":"As digital content transmission through the internet is convenient and quick, so the outspread of digital content is very high. However, along with this incredible speed and ease, current communication technologies and computers have also brought with them plenty of digital rights management complications. Digital Rights Management Systems are designed to limit the access to the utilization, alternation, and distribution of persevered digital content. This article scrutinized two recent schemes of Lee et al. and Yu et al. and it is found that these schemes are suspected to an insider attack, stolen smart-card attack, Daniel of services (Dos) attack, and impersonation attack. Furthermore, their proposal also suffers from incorrect issues. To fix these flaws, a robust anonymous authentication scheme using biometrics for Digital Rights Management System is proposed in this article. The proposed scheme is checked for correctness and its security is proved through BAN logic. The performance of the scheme is also analyzed using computation time and communication time. The results show that the designed scheme is highly secure with the same computation and communication cost as the existing protocols.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127902870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles XAI-AV:可解释的自动驾驶汽车信任管理人工智能
Harsh Mankodiya, M. Obaidat, Rajesh Gupta, S. Tanwar
Artificial intelligence (AI) is the most looked up technology with a diverse range of applications across all the fields, whether it is intelligent transportation systems (ITS), medicine, healthcare, military operations, or others. One such application is autonomous vehicles (AVs), which comes under the category of AI in ITS. Vehicular Adhoc Networks (VANET) makes communication possible between AVs in the system. The performance of each vehicle depends upon the information exchanged between AVs. False or malicious information can perturb the whole system leading to severe consequences. Hence, the detection of malicious vehicles is of utmost importance. We use machine learning (ML) algorithms to predict the flaw in the data transmitted. Recent papers that used the stacking ML approach gave an accuracy of 98.44%. Decision tree-based random forest is used to solve the problem in this paper. We achieved accuracy and F1 score of 98.43% and 98.5% respectively on the VeRiMi dataset in this paper. Explainable AI (XAI) is the method and technique to make the complex black-box ML and deep learning (DL) models more interpretable and understandable. We use a particular model interface of the evaluation metrics to explain and measure the model’s performance. Applying XAI to these complex AI models can ensure a cautious use of AI for AVs.
人工智能(AI)是最受关注的技术,在所有领域都有广泛的应用,无论是智能交通系统(ITS)、医学、医疗保健、军事行动还是其他领域。其中一个应用是自动驾驶汽车(AVs),它属于ITS中的人工智能类别。车辆自组织网络(VANET)使系统中自动驾驶汽车之间的通信成为可能。每辆车的性能取决于自动驾驶汽车之间的信息交换。虚假或恶意的信息会扰乱整个系统,导致严重的后果。因此,检测恶意车辆是至关重要的。我们使用机器学习(ML)算法来预测传输数据中的缺陷。最近使用堆叠ML方法的论文给出了98.44%的准确率。本文采用基于决策树的随机森林来解决这一问题。本文在VeRiMi数据集上的准确率和F1分数分别达到了98.43%和98.5%。可解释人工智能(XAI)是一种使复杂的黑箱机器学习和深度学习(DL)模型更具可解释性和可理解性的方法和技术。我们使用评估度量的特定模型接口来解释和度量模型的性能。将XAI应用于这些复杂的AI模型,可以确保自动驾驶汽车谨慎使用AI。
{"title":"XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles","authors":"Harsh Mankodiya, M. Obaidat, Rajesh Gupta, S. Tanwar","doi":"10.1109/CCCI52664.2021.9583190","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583190","url":null,"abstract":"Artificial intelligence (AI) is the most looked up technology with a diverse range of applications across all the fields, whether it is intelligent transportation systems (ITS), medicine, healthcare, military operations, or others. One such application is autonomous vehicles (AVs), which comes under the category of AI in ITS. Vehicular Adhoc Networks (VANET) makes communication possible between AVs in the system. The performance of each vehicle depends upon the information exchanged between AVs. False or malicious information can perturb the whole system leading to severe consequences. Hence, the detection of malicious vehicles is of utmost importance. We use machine learning (ML) algorithms to predict the flaw in the data transmitted. Recent papers that used the stacking ML approach gave an accuracy of 98.44%. Decision tree-based random forest is used to solve the problem in this paper. We achieved accuracy and F1 score of 98.43% and 98.5% respectively on the VeRiMi dataset in this paper. Explainable AI (XAI) is the method and technique to make the complex black-box ML and deep learning (DL) models more interpretable and understandable. We use a particular model interface of the evaluation metrics to explain and measure the model’s performance. Applying XAI to these complex AI models can ensure a cautious use of AI for AVs.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
DPSGD Strategies for Cross-Silo Federated Learning 跨筒仓联邦学习的DPSGD策略
Matthieu Moreau, Tarek Benkhelif
As federated learning (FL) grows and new techniques are created to improve its efficiency and robustness, differential privacy (DP) proved to be a good ally for protecting users’ information. The differentially private version of stochastic gradient descent (DPSGD) is one of the most promising methods for enforcing privacy in machine learning algorithms. The noise added in DPSGD plays an important role in the convergence and performance of a model but also in the resulting privacy guarantee and must thus be chosen carefully. This paper reviews the effects of either selecting fixed or adaptive noise when training federated models under the cross-silo setting. We highlight their strengths and weaknesses and propose a hybrid approach, getting the best of both worlds.
随着联邦学习(FL)的发展和新技术的出现以提高其效率和鲁棒性,差分隐私(DP)被证明是保护用户信息的一个很好的盟友。随机梯度下降(DPSGD)的差异隐私版本是机器学习算法中最有前途的隐私保护方法之一。在DPSGD中添加的噪声在模型的收敛性和性能以及由此产生的隐私保证中起着重要作用,因此必须仔细选择。本文综述了在交叉竖井环境下,选择固定噪声和自适应噪声对训练联邦模型的影响。我们强调了它们的优点和缺点,并提出了一种混合的方法,获得两个世界的优点。
{"title":"DPSGD Strategies for Cross-Silo Federated Learning","authors":"Matthieu Moreau, Tarek Benkhelif","doi":"10.1109/CCCI52664.2021.9583220","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583220","url":null,"abstract":"As federated learning (FL) grows and new techniques are created to improve its efficiency and robustness, differential privacy (DP) proved to be a good ally for protecting users’ information. The differentially private version of stochastic gradient descent (DPSGD) is one of the most promising methods for enforcing privacy in machine learning algorithms. The noise added in DPSGD plays an important role in the convergence and performance of a model but also in the resulting privacy guarantee and must thus be chosen carefully. This paper reviews the effects of either selecting fixed or adaptive noise when training federated models under the cross-silo setting. We highlight their strengths and weaknesses and propose a hybrid approach, getting the best of both worlds.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capsule: All you need to know about Tactile Internet in a Nutshell 胶囊:所有你需要知道的触觉互联网在一个果壳
Rajesh Gupta, S. Tanwar, M. Obaidat, Sudhanshu Tyagi, Neeraj Kumar
Machine-to-machine and device-to-device communications are very common in the era of the Internet of things (IoT). In 5G-enabled IoT, massive machine type communication and enhanced Mobile broadband are two supporting protocols ensuring communication among a large number of devices. On the other side, for human-to-machine communication, end-to-end latency, resource availability, high reliability, and end-to-end security are the major hurdles for several applications deployed in different network domains. The above-mentioned issues require a unique solution to maintain Quality of Service and Quality of Experience for industry 4.0 based applications. Therefore, to mitigate the aforementioned issues, here, we present the Tactile Internet, a new technology with its various components in a nutshell. Existing proposals reveal that Tactile Internet can form the interactions between virtual objects and the real environment by maintaining 1ms latency, 99.999% availability, and end-to-end security. Hence, it works like middleware to meet out the ultra-reliable low latency requirements of future 5G-based applications. Moreover, the article provides the possible use cases for Tactile Internet and its usage. Finally, we evaluate the results of applications with Tactile Internet and LTE-A communication networks in the context of data access latency and connection density. Applications with Tactile Internet as a backbone network outperform the traditional LTE-A networks.
机器对机器和设备对设备的通信在物联网(IoT)时代非常普遍。在支持5g的物联网中,大规模机器类型通信和增强型移动宽带是确保大量设备之间通信的两种支持协议。另一方面,对于人机通信,端到端延迟、资源可用性、高可靠性和端到端安全性是部署在不同网络域中的几个应用程序的主要障碍。上述问题需要一个独特的解决方案来维持基于工业4.0的应用程序的服务质量和体验质量。因此,为了缓解上述问题,在这里,我们介绍了触觉互联网,一种新技术,它的各种组成部分。现有的建议表明,触觉互联网可以通过保持1ms的延迟、99.999%的可用性和端到端安全性来形成虚拟物体与真实环境之间的交互。因此,它像中间件一样工作,以满足未来基于5g的应用程序的超可靠低延迟需求。此外,本文还提供了触觉互联网的可能用例及其使用。最后,我们在数据访问延迟和连接密度的背景下评估了触觉互联网和LTE-A通信网络的应用结果。以触觉互联网为骨干网络的应用比传统的LTE-A网络性能更好。
{"title":"Capsule: All you need to know about Tactile Internet in a Nutshell","authors":"Rajesh Gupta, S. Tanwar, M. Obaidat, Sudhanshu Tyagi, Neeraj Kumar","doi":"10.1109/CCCI52664.2021.9583213","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583213","url":null,"abstract":"Machine-to-machine and device-to-device communications are very common in the era of the Internet of things (IoT). In 5G-enabled IoT, massive machine type communication and enhanced Mobile broadband are two supporting protocols ensuring communication among a large number of devices. On the other side, for human-to-machine communication, end-to-end latency, resource availability, high reliability, and end-to-end security are the major hurdles for several applications deployed in different network domains. The above-mentioned issues require a unique solution to maintain Quality of Service and Quality of Experience for industry 4.0 based applications. Therefore, to mitigate the aforementioned issues, here, we present the Tactile Internet, a new technology with its various components in a nutshell. Existing proposals reveal that Tactile Internet can form the interactions between virtual objects and the real environment by maintaining 1ms latency, 99.999% availability, and end-to-end security. Hence, it works like middleware to meet out the ultra-reliable low latency requirements of future 5G-based applications. Moreover, the article provides the possible use cases for Tactile Internet and its usage. Finally, we evaluate the results of applications with Tactile Internet and LTE-A communication networks in the context of data access latency and connection density. Applications with Tactile Internet as a backbone network outperform the traditional LTE-A networks.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Safer Roads: An Efficient VANET-based Pedestrian Protection Scheme 迈向更安全的道路:有效的行人保护计划
Khaled Rabieh, A. Aydogan, Marianne A. Azer
About 1.2 million people lose their lives on roads yearly due to accidents despite the emerging and uprising technology in contemporary vehicles. In addition, 4.4 million people were seriously injured and required medical attention in crashes last year. By employing Vehicle-to-Pedestrian (V2P) communication between drivers and vulnerable road users, fewer casualties are likely to occur and roads are expected to be much safer. In this paper, we propose a lightweight scheme to protect vulnerable road users based on communication between smartphones and on-board units installed in vehicles. Initially, the signal strength is used to estimate the distance between vehicles and pedestrians and predict the occurrence of a collision. Since signal strength alone can result in false alarms, we propose a collision detection algorithm to confirm a collision. The algorithm is run on both sides; the drivers and vulnerable road users to give appropriate and real-time warnings of a potential accident/collision. Vehicles and road users exchange their Global Positioning System (GPS) locations using Dedicated Short Range Communications (DSRC). The algorithm constructs a vector representing the vehicle path and uses efficient and simple mathematical operations to determine if there is a possibility of collision or not. Our scheme contributes to the safety applications of vehicular ad hoc networks. Our experiment’s results confirm that the proposed scheme can effectively detect collisions with minimum computation overhead.
尽管现代汽车技术不断发展,但每年仍有大约120万人因交通事故而丧生。此外,去年有440万人在撞车事故中受重伤并需要治疗。通过在驾驶员和易受伤害的道路使用者之间采用车辆对行人(V2P)通信,可能会减少伤亡,道路也会更加安全。在本文中,我们提出了一种基于智能手机和车载设备之间通信的轻量级方案来保护脆弱的道路使用者。最初,信号强度用于估计车辆与行人之间的距离,并预测碰撞的发生。由于信号强度本身可能导致误报,我们提出了一种碰撞检测算法来确认碰撞。算法在两边运行;司机及易受伤害的道路使用者就可能发生的意外/碰撞发出适当及即时的警告。车辆和道路使用者使用专用短程通信(DSRC)交换全球定位系统(GPS)位置。该算法构造一个表示车辆路径的向量,并使用高效简单的数学运算来确定是否有碰撞的可能性。该方案有助于车辆自组织网络的安全应用。实验结果表明,该方法能够以最小的计算量有效地检测碰撞。
{"title":"Towards Safer Roads: An Efficient VANET-based Pedestrian Protection Scheme","authors":"Khaled Rabieh, A. Aydogan, Marianne A. Azer","doi":"10.1109/CCCI52664.2021.9583221","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583221","url":null,"abstract":"About 1.2 million people lose their lives on roads yearly due to accidents despite the emerging and uprising technology in contemporary vehicles. In addition, 4.4 million people were seriously injured and required medical attention in crashes last year. By employing Vehicle-to-Pedestrian (V2P) communication between drivers and vulnerable road users, fewer casualties are likely to occur and roads are expected to be much safer. In this paper, we propose a lightweight scheme to protect vulnerable road users based on communication between smartphones and on-board units installed in vehicles. Initially, the signal strength is used to estimate the distance between vehicles and pedestrians and predict the occurrence of a collision. Since signal strength alone can result in false alarms, we propose a collision detection algorithm to confirm a collision. The algorithm is run on both sides; the drivers and vulnerable road users to give appropriate and real-time warnings of a potential accident/collision. Vehicles and road users exchange their Global Positioning System (GPS) locations using Dedicated Short Range Communications (DSRC). The algorithm constructs a vector representing the vehicle path and uses efficient and simple mathematical operations to determine if there is a possibility of collision or not. Our scheme contributes to the safety applications of vehicular ad hoc networks. Our experiment’s results confirm that the proposed scheme can effectively detect collisions with minimum computation overhead.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133520265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Catching Unusual Traffic Behavior using TF–IDF-based Port Access Statistics Analysis 基于tf - idf的端口访问统计分析捕获异常流量行为
K. Shima
Detecting the anomalous behavior of traffic is one of the important actions for network operators. In this study, we applied term frequency – inverse document frequency (TF–IDF), which is a popular method used in natural language processing, to detect unusual behavior from network access logs. We mapped the term and document concept to the port number and daily access history, respectively, and calculated the TF–IDF. With this approach, we could obtain ports frequently observed in fewer days compared to other port access activities. Such access behaviors are not always malicious activities; however, such information is a good indicator for starting a deeper analysis of traffic behavior. Using a real-life dataset, we could detect two bot-oriented accesses and one unique UDP traffic.
检测流量异常行为是网络运营商的重要工作之一。在这项研究中,我们应用术语频率-逆文档频率(TF-IDF),这是自然语言处理中常用的一种方法,从网络访问日志中检测异常行为。我们将术语和文档概念分别映射到端口号和每日访问历史,并计算TF-IDF。使用这种方法,与其他端口访问活动相比,我们可以在更短的时间内获得经常观察的端口。这种访问行为并不总是恶意活动;然而,这些信息是开始对交通行为进行更深入分析的一个很好的指标。使用真实的数据集,我们可以检测到两个面向机器人的访问和一个唯一的UDP流量。
{"title":"Catching Unusual Traffic Behavior using TF–IDF-based Port Access Statistics Analysis","authors":"K. Shima","doi":"10.1109/CCCI52664.2021.9583212","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583212","url":null,"abstract":"Detecting the anomalous behavior of traffic is one of the important actions for network operators. In this study, we applied term frequency – inverse document frequency (TF–IDF), which is a popular method used in natural language processing, to detect unusual behavior from network access logs. We mapped the term and document concept to the port number and daily access history, respectively, and calculated the TF–IDF. With this approach, we could obtain ports frequently observed in fewer days compared to other port access activities. Such access behaviors are not always malicious activities; however, such information is a good indicator for starting a deeper analysis of traffic behavior. Using a real-life dataset, we could detect two bot-oriented accesses and one unique UDP traffic.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133334192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reference-based Image Super-Resolution by Dual-Variational AutoEncoder 基于参考的图像超分辨率双变分自编码器
Mengyao Yang, Junpeng Qi
Due to severe information loss of low-resolution images, the development of single-image super-resolution methods is limited. Recently, the reference-based image super-resolution methods, which super-resolve the low-resolution inputs with the guidance of high-resolution reference images are emerging. In this paper, we design a Dual-Variational AutoEncoder (DVAE) for reference-based image super-resolution task, which can learn the high-frequency information and latent distribution of the high-resolution reference images as priors to improve the restoration quality of image super-resolution. Moreover, a hierarchical variational autoencoder strategy is exploited to further study latent space. Complementary to a quantitative evaluation, we demonstrate the effectiveness of the proposed approach.
由于低分辨率图像严重的信息丢失,限制了单图像超分辨率方法的发展。近年来,基于参考图像的超分辨率方法应运而生,该方法在高分辨率参考图像的引导下对低分辨率输入进行超分辨率处理。本文设计了一种基于参考图像超分辨率任务的双变分自动编码器(Dual-Variational AutoEncoder, DVAE),它可以预先学习高分辨率参考图像的高频信息和潜在分布,从而提高图像超分辨率的恢复质量。此外,利用层次变分自编码器策略进一步研究潜在空间。作为定量评估的补充,我们证明了所提出方法的有效性。
{"title":"Reference-based Image Super-Resolution by Dual-Variational AutoEncoder","authors":"Mengyao Yang, Junpeng Qi","doi":"10.1109/CCCI52664.2021.9583193","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583193","url":null,"abstract":"Due to severe information loss of low-resolution images, the development of single-image super-resolution methods is limited. Recently, the reference-based image super-resolution methods, which super-resolve the low-resolution inputs with the guidance of high-resolution reference images are emerging. In this paper, we design a Dual-Variational AutoEncoder (DVAE) for reference-based image super-resolution task, which can learn the high-frequency information and latent distribution of the high-resolution reference images as priors to improve the restoration quality of image super-resolution. Moreover, a hierarchical variational autoencoder strategy is exploited to further study latent space. Complementary to a quantitative evaluation, we demonstrate the effectiveness of the proposed approach.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Soil Images using Convolution Neural Networks 基于卷积神经网络的土壤图像分类
Kajal Chatterjee, M. Obaidat, Debabrata Samanta, B. Sadoun, SK Hafizul Islam, Rajdeep Chatterjee
Classification of soil is crucial for the agricultural domain as it is an essential task in geology and engineering domains. Various procedures are proposed to classify soil types in the literature, but many of them consumed much time or required specially designed equipments/applications. Classification of soil involves the accounting of various factors due to its diversified nature. It can be observed that several critical domain-oriented decisions often depend on the type of soil like farmers might be benefitted from knowing the kind of soil to choose crops accordingly for cultivation. We have employed different Convolution Neural Network (CNN) architectures to identify the soil type accurately in real-time. This paper describes the comparative evaluation in terms of performances of various CNN architectures, namely, ResNet50, VGG19, MobileNetV2, VGG16, NASNetMobile, and InceptionV3. These CNN models are used to classify four types of soils: Clay, Black, Alluvial, and Red. The performance of the ResNet50 model is the best with a training accuracy and training loss of 99.47% and 0.0252, respectively compared to other competing models considered in this paper.
土壤分类是农业领域的一项重要工作,也是地质和工程领域的一项重要工作。文献中提出了各种土壤类型分类方法,但其中许多方法耗时长或需要专门设计的设备/应用程序。土壤的分类由于其多样性,涉及到各种因素的核算。可以观察到,一些关键的面向领域的决策通常取决于土壤的类型,比如农民可能会从了解土壤的类型中受益,从而相应地选择作物进行种植。我们采用了不同的卷积神经网络(CNN)架构来实时准确地识别土壤类型。本文对ResNet50、VGG19、MobileNetV2、VGG16、NASNetMobile和InceptionV3等几种CNN架构的性能进行了比较评估。这些CNN模型被用来对四种类型的土壤进行分类:粘土、黑色、冲积和红色。与本文考虑的其他竞争模型相比,ResNet50模型的训练准确率和训练损失分别为99.47%和0.0252,性能最好。
{"title":"Classification of Soil Images using Convolution Neural Networks","authors":"Kajal Chatterjee, M. Obaidat, Debabrata Samanta, B. Sadoun, SK Hafizul Islam, Rajdeep Chatterjee","doi":"10.1109/CCCI52664.2021.9583192","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583192","url":null,"abstract":"Classification of soil is crucial for the agricultural domain as it is an essential task in geology and engineering domains. Various procedures are proposed to classify soil types in the literature, but many of them consumed much time or required specially designed equipments/applications. Classification of soil involves the accounting of various factors due to its diversified nature. It can be observed that several critical domain-oriented decisions often depend on the type of soil like farmers might be benefitted from knowing the kind of soil to choose crops accordingly for cultivation. We have employed different Convolution Neural Network (CNN) architectures to identify the soil type accurately in real-time. This paper describes the comparative evaluation in terms of performances of various CNN architectures, namely, ResNet50, VGG19, MobileNetV2, VGG16, NASNetMobile, and InceptionV3. These CNN models are used to classify four types of soils: Clay, Black, Alluvial, and Red. The performance of the ResNet50 model is the best with a training accuracy and training loss of 99.47% and 0.0252, respectively compared to other competing models considered in this paper.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133813744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Discover Community Structure in Network by Optimization Algorithm Based on Modular Function 基于模块化函数的优化算法发现网络中的社区结构
Xiaoling Guo, Y. Yang, Xinyu Song, Hongmiao Yao, Fudong Zhang
Analyzing the structure of complex networks accurately and efficiently has become one hot topic due to the large-scale network in recent academic research. The existing optimization methods for community mining are mostly based on the function Q proposed by Newman. In this paper we introduce two complex network clustering algorithm models FN and spectral clustering. They are both aimed to maximize the value of function Q, the differences are that FN uses overall information and spectral clustering uses spectral graph theory. Then finally we apply these algorithms to analyze Chinese aviation network and come to conclude that Chinese aviation network is mainly composed of East-West and North-South routes, with which we can arrange the community structure.
由于网络的规模化,准确、高效地分析复杂网络的结构已成为近年来学术界研究的热点之一。现有的社区挖掘优化方法大多基于Newman提出的Q函数。本文介绍了两种复杂网络聚类算法模型FN和谱聚类。它们都是为了使函数Q的值最大化,不同的是FN使用整体信息,而谱聚类使用谱图理论。最后应用这些算法对中国航空网络进行分析,得出中国航空网络主要由东西航线和南北航线组成,可以据此安排社区结构。
{"title":"Discover Community Structure in Network by Optimization Algorithm Based on Modular Function","authors":"Xiaoling Guo, Y. Yang, Xinyu Song, Hongmiao Yao, Fudong Zhang","doi":"10.1109/CCCI52664.2021.9583200","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583200","url":null,"abstract":"Analyzing the structure of complex networks accurately and efficiently has become one hot topic due to the large-scale network in recent academic research. The existing optimization methods for community mining are mostly based on the function Q proposed by Newman. In this paper we introduce two complex network clustering algorithm models FN and spectral clustering. They are both aimed to maximize the value of function Q, the differences are that FN uses overall information and spectral clustering uses spectral graph theory. Then finally we apply these algorithms to analyze Chinese aviation network and come to conclude that Chinese aviation network is mainly composed of East-West and North-South routes, with which we can arrange the community structure.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127141502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Traffic Prediction assisted Routing Algorithm for Elastic Optical Networks 弹性光网络流量预测辅助路由算法
A. Valkanis, Georgios I. Papadimitriou, Petros Nicopolitidis, G. Beletsioti, Emmanouel Varvarigos
Elastic optical networks (EONs) are expected to cover the huge bandwidth demands, which will arise in the coming years from both the applications’ evolution and the implementation of 5G and Internet of Things technologies. Harvesting the flexibility offered by EONs in the management of resources, poses challenges for the research community in terms of creating mechanisms that will maximize their efficiency. One of the main research fields in this direction is the prediction of the traffic in the backbone networks and the utilization of this information for efficient resource management. In this work, we present a traffic prediction assisted routing algorithm for elastic optical networks, which improves their overall performance. Detailed simulation scenarios confirm the effectiveness of the proposed routing algorithm, which improves the network blocking probability in comparison to related algorithms from the literature.
弹性光网络(eon)预计将满足未来几年应用的发展以及5G和物联网技术的实施所带来的巨大带宽需求。利用永续网络在资源管理方面提供的灵活性,为研究界提出了挑战,即如何建立将永续网络效率最大化的机制。该方向的主要研究方向之一是对骨干网的流量进行预测并利用这些信息进行有效的资源管理。在这项工作中,我们提出了一种流量预测辅助路由算法,以提高弹性光网络的整体性能。详细的仿真场景验证了所提出的路由算法的有效性,与文献中的相关算法相比,该算法提高了网络阻塞概率。
{"title":"A Traffic Prediction assisted Routing Algorithm for Elastic Optical Networks","authors":"A. Valkanis, Georgios I. Papadimitriou, Petros Nicopolitidis, G. Beletsioti, Emmanouel Varvarigos","doi":"10.1109/CCCI52664.2021.9583188","DOIUrl":"https://doi.org/10.1109/CCCI52664.2021.9583188","url":null,"abstract":"Elastic optical networks (EONs) are expected to cover the huge bandwidth demands, which will arise in the coming years from both the applications’ evolution and the implementation of 5G and Internet of Things technologies. Harvesting the flexibility offered by EONs in the management of resources, poses challenges for the research community in terms of creating mechanisms that will maximize their efficiency. One of the main research fields in this direction is the prediction of the traffic in the backbone networks and the utilization of this information for efficient resource management. In this work, we present a traffic prediction assisted routing algorithm for elastic optical networks, which improves their overall performance. Detailed simulation scenarios confirm the effectiveness of the proposed routing algorithm, which improves the network blocking probability in comparison to related algorithms from the literature.","PeriodicalId":136382,"journal":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1