首页 > 最新文献

2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)最新文献

英文 中文
A FANETs System for Autonomous Aerocraft Flying Formation 自主飞行器编队飞行的FANETs系统
Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang
Flying Ad-Hoc Network is the information bridge for autonomous aerocraft flying formation. This paper mainly investigates a given FANETs application system of autonomous aerocraft flying formation. At first the given FANETs system scheme and its specific characteristics have been described respectively. Also,the communication protocol stack model of five layers and its protocol stack software have been proposed. The communication terminal design and the flying test scene have been discussed. Finally, the test results show the system scheme and its communication protocol stack model are feasible.
飞行自组网是自主飞行器编队飞行的信息桥梁。本文主要研究了一个给定的自主飞行器编队飞行FANETs应用系统。首先介绍了给定的FANETs系统方案及其具体特点。提出了五层通信协议栈模型及其协议栈软件。讨论了通信终端的设计和飞行试验场景。最后,测试结果表明系统方案及其通信协议栈模型是可行的。
{"title":"A FANETs System for Autonomous Aerocraft Flying Formation","authors":"Jinyong Lin, Wenlong Cai, Xiangrui Fan, Wenjie Dong, Shuo Zhang","doi":"10.1109/QRS-C57518.2022.00105","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00105","url":null,"abstract":"Flying Ad-Hoc Network is the information bridge for autonomous aerocraft flying formation. This paper mainly investigates a given FANETs application system of autonomous aerocraft flying formation. At first the given FANETs system scheme and its specific characteristics have been described respectively. Also,the communication protocol stack model of five layers and its protocol stack software have been proposed. The communication terminal design and the flying test scene have been discussed. Finally, the test results show the system scheme and its communication protocol stack model are feasible.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependability Analysis and Verification Technology of Artificial Intelligence Software 人工智能软件可靠性分析与验证技术
Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang
This paper focuses on the dependability analysis and verification technology of artificial intelligence software. Aiming at the dependability problems caused by the uncontrollable algorithm output of artificial intelligence software, misguided learning models and unpredictable software defects, as well as the current intelligent software testing and verification requirements, this paper analyzes the connotation and characteristics of artificial intelligence software dependability, and studies artificial intelligence software dependability mechanism and defect mode analysis method, break through artificial intelligence software dependability verification technology, innovatively build artificial intelligence software dependability index system, and finally form a comprehensive evaluation method for software dependability.
本文主要研究人工智能软件的可靠性分析与验证技术。针对人工智能软件算法输出不可控、学习模型被误导、软件缺陷不可预测等导致的可靠性问题,以及当前智能软件测试验证需求,分析了人工智能软件可靠性的内涵和特点,研究了人工智能软件可靠性机制和缺陷模式分析方法。突破人工智能软件可靠性验证技术,创新构建人工智能软件可靠性指标体系,最终形成软件可靠性综合评价方法。
{"title":"Dependability Analysis and Verification Technology of Artificial Intelligence Software","authors":"Yaming Zhang, Lijin Wu, Xiaomei Shen, Zehua Shen, Tongli Tang","doi":"10.1109/QRS-C57518.2022.00041","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00041","url":null,"abstract":"This paper focuses on the dependability analysis and verification technology of artificial intelligence software. Aiming at the dependability problems caused by the uncontrollable algorithm output of artificial intelligence software, misguided learning models and unpredictable software defects, as well as the current intelligent software testing and verification requirements, this paper analyzes the connotation and characteristics of artificial intelligence software dependability, and studies artificial intelligence software dependability mechanism and defect mode analysis method, break through artificial intelligence software dependability verification technology, innovatively build artificial intelligence software dependability index system, and finally form a comprehensive evaluation method for software dependability.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes 基于脚本的在线广播场景人像跟踪系统模式识别
Qinyun Liu, Xiaopeng Xu
The online broadcast scene is a novel scenario in culture and tourism industry in new period. However, the online broadcast control system has not been solved at the technical level. This research describes a collaborative smart control system for seizing actors and scenarios in broadcast online scene based on drama script with pattern recognition. Based on the script of the cultural and artistic forms under the online broadcast scenario, the training parameters of the pattern recognition algorithm are set to recognize the real-time capture of the face, dress, clothing, etc., and the tracking and overall setting control. The kernel algorithm is set with smart decision making system based for seizing actors and clustering algorithm (discrimination analysis) for seizing different scenarios on stage. Connections between equipment serving for the entire broadcasting drama and online presentations are achieved by the wireless network, software and kernel control system.
网络直播场景是新时期文化旅游行业的新场景。然而,在线直播控制系统在技术层面上一直没有得到解决。本文研究了一种基于戏剧剧本和模式识别的在线直播场景中演员和场景的协同智能控制系统。基于网络直播场景下的文化艺术形式脚本,设置模式识别算法的训练参数,对人脸、服饰、服装等进行实时捕捉识别,并进行跟踪和整体设置控制。核心算法设置了基于捕捉演员的智能决策系统和基于捕捉舞台上不同场景的聚类算法(判别分析)。为整个广播剧服务的设备与在线呈现之间的连接是通过无线网络、软件和核心控制系统实现的。
{"title":"Script Based Pattern Recognition for a Portrait Tracking System on Broadcast Online Scenes","authors":"Qinyun Liu, Xiaopeng Xu","doi":"10.1109/QRS-C57518.2022.00110","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00110","url":null,"abstract":"The online broadcast scene is a novel scenario in culture and tourism industry in new period. However, the online broadcast control system has not been solved at the technical level. This research describes a collaborative smart control system for seizing actors and scenarios in broadcast online scene based on drama script with pattern recognition. Based on the script of the cultural and artistic forms under the online broadcast scenario, the training parameters of the pattern recognition algorithm are set to recognize the real-time capture of the face, dress, clothing, etc., and the tracking and overall setting control. The kernel algorithm is set with smart decision making system based for seizing actors and clustering algorithm (discrimination analysis) for seizing different scenarios on stage. Connections between equipment serving for the entire broadcasting drama and online presentations are achieved by the wireless network, software and kernel control system.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development 基于设计思维的创新计算方法优化市民时尚教育响应智慧城市发展微观层面需求
Yue Wu, Xiang Li, Jiafeng Zhou
This paper proposes a creative computing approach to introduce design thinking principles for optimising fashion design students' capabilities, thereby fulfilling the micro-level needs of smart city development. One of the most typical micro-level needs in smart cities is to optimise citizens' well-being and happiness through problem definition, solution generation and consensus-making based on quick, direct, and up-to-date data and information reflecting citizens' situations. Designers, as citizens and significant constructors of smart cities, usually dedicate themselves to optimising people's life qualities by creating products, services and artistic works based on people's needs. Therefore, the design industry usually expects practitioners to possess the capabilities of defining problems, creating concepts, gathering feedback and redesigning. These capabilities constitute the significant parts of the design thinking principles discussed and justify the importance of introducing design thinking. However, challenges still exist when introducing design thinking for instructors. The primary incentives behind these challenges are instructors' limited knowledge, making it difficult to be on the same page with students when selecting the topics, defining problems, and generating design concepts. A creative computing approach could complement instructors' knowledge to support students' topic selection and novel design generation through data collection, manipulation, and presentation. This approach consists of four modules: i) input module, ii) Topic Generation Module, iii) Topic-Design Connection Module, and iv) Supplementary Knowledge Library Module. The creative computing approach would provide a starting point for studying the possibilities of optimising the communication process between educators/instructors and students.
本文提出了一种创造性的计算方法,引入设计思维原理,优化服装设计专业学生的能力,从而满足智慧城市发展的微观需求。智慧城市最典型的微观层面需求之一是,通过快速、直接和最新的反映公民情况的数据和信息,通过定义问题、制定解决方案和达成共识,来优化公民的福祉和幸福。设计师作为智慧城市的公民和重要建设者,通常致力于根据人们的需求创造产品、服务和艺术作品,以优化人们的生活品质。因此,设计行业通常期望从业者具备定义问题、创造概念、收集反馈和重新设计的能力。这些能力构成了所讨论的设计思维原则的重要部分,并证明了引入设计思维的重要性。然而,在向教师介绍设计思维时,仍然存在挑战。这些挑战背后的主要动机是教师知识有限,在选择主题、定义问题和生成设计概念时,很难与学生保持一致。创造性的计算方法可以补充教师的知识,以支持学生通过数据收集、操作和演示来选择主题和产生新的设计。该方法由四个模块组成:1)输入模块,2)主题生成模块,3)主题设计连接模块,4)补充知识库模块。创造性的计算方法将为研究优化教育者/教师与学生之间沟通过程的可能性提供一个起点。
{"title":"A Creative Computing Approach to Optimising Citizens' Fashion Education based on Design Thinking for Responding to Micro-Level Needs of Smart City Development","authors":"Yue Wu, Xiang Li, Jiafeng Zhou","doi":"10.1109/QRS-C57518.2022.00114","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00114","url":null,"abstract":"This paper proposes a creative computing approach to introduce design thinking principles for optimising fashion design students' capabilities, thereby fulfilling the micro-level needs of smart city development. One of the most typical micro-level needs in smart cities is to optimise citizens' well-being and happiness through problem definition, solution generation and consensus-making based on quick, direct, and up-to-date data and information reflecting citizens' situations. Designers, as citizens and significant constructors of smart cities, usually dedicate themselves to optimising people's life qualities by creating products, services and artistic works based on people's needs. Therefore, the design industry usually expects practitioners to possess the capabilities of defining problems, creating concepts, gathering feedback and redesigning. These capabilities constitute the significant parts of the design thinking principles discussed and justify the importance of introducing design thinking. However, challenges still exist when introducing design thinking for instructors. The primary incentives behind these challenges are instructors' limited knowledge, making it difficult to be on the same page with students when selecting the topics, defining problems, and generating design concepts. A creative computing approach could complement instructors' knowledge to support students' topic selection and novel design generation through data collection, manipulation, and presentation. This approach consists of four modules: i) input module, ii) Topic Generation Module, iii) Topic-Design Connection Module, and iv) Supplementary Knowledge Library Module. The creative computing approach would provide a starting point for studying the possibilities of optimising the communication process between educators/instructors and students.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133064454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation 基于结构化树输入和AST解码器注意力增强的代码生成方法
Wenjun Wei, Junhua Wu
Automatic code generation based on natural language input is important to research in the field of software engineering. In the past, it was mostly a seq2seq structure and used the RNN model. Input and output are regarded as simple sequences, and syntactic structure information in source information is often ignored. This paper proposes a code generation method Tx(Tree-Tree). It uses structured trees to replace simple word sequences so that the model can better learn the syntactic and semantic information in the source information. Therefore, it can alleviate the long dependency problem caused by too long source information. At the same time, the enhanced attention mechanism is adopted in the decoder to distinguish the influence of different historical actions on the current predicted action. The model is validated on three datasets: DJANGO, CONALA, and ATIS. Compared with some typical models, Tx(Tree-Tree) improves both accuracy and BLEU.
基于自然语言输入的代码自动生成是软件工程领域的一个重要研究课题。在过去,它主要是一个seq2seq结构,并使用RNN模型。输入和输出被视为简单的序列,而源信息中的语法结构信息往往被忽略。本文提出了一种代码生成方法Tx(Tree-Tree)。它使用结构化的树来代替简单的词序列,使模型能够更好地学习源信息中的语法和语义信息。因此,它可以缓解由于源信息过长而导致的长依赖问题。同时,在解码器中采用增强注意机制,区分不同历史动作对当前预测动作的影响。模型在三个数据集上进行了验证:DJANGO、CONALA和ATIS。与一些典型模型相比,Tx(Tree-Tree)既提高了准确率,又提高了BLEU。
{"title":"Code Generation Method based on Structured Tree Input and AST Decoder Attention Augmentation","authors":"Wenjun Wei, Junhua Wu","doi":"10.1109/QRS-C57518.2022.00077","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00077","url":null,"abstract":"Automatic code generation based on natural language input is important to research in the field of software engineering. In the past, it was mostly a seq2seq structure and used the RNN model. Input and output are regarded as simple sequences, and syntactic structure information in source information is often ignored. This paper proposes a code generation method Tx(Tree-Tree). It uses structured trees to replace simple word sequences so that the model can better learn the syntactic and semantic information in the source information. Therefore, it can alleviate the long dependency problem caused by too long source information. At the same time, the enhanced attention mechanism is adopted in the decoder to distinguish the influence of different historical actions on the current predicted action. The model is validated on three datasets: DJANGO, CONALA, and ATIS. Compared with some typical models, Tx(Tree-Tree) improves both accuracy and BLEU.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach Web服务组合和测试的自动化建模:基于UML序列图的方法
Yao Huang, Bingqing Zhang, Yichen Wang
The application of Service-Oriented Architecture (SOA) system software in safety-critical areas such as aerospace is gradually increasing, and the demand of high-quality SOA system software is increasing too. Due to the feature of loose coupling, SOA system software depends strongly on the correctness of the interfaces among services. Web service composition (WSC) testing in the integration phase of service composition thus becomes exceptionally critical. In a model-based testing framework., the test model lays a foundation for the subsequent test activities to proceed smoothly. In this paper, we propose an approach to automate modeling for WSC testing. The idea is to automate the construction of a highly visualized model by fetching adequate test information from two documents in the design phase. Compared to the existing modeling methods, the proposed method is more sufficient in WSC test information extraction. In addition, we also promote the degree of visualization and automation for test modeling. In the end, a case study is conducted to verify the effectiveness of the proposed modeling approach.
面向服务的体系结构(SOA)系统软件在航空航天等安全关键领域的应用日益增多,对高质量SOA系统软件的需求也日益增长。由于松耦合的特性,SOA系统软件在很大程度上依赖于服务之间接口的正确性。因此,服务组合集成阶段的Web服务组合(WSC)测试变得异常关键。在基于模型的测试框架中。,测试模型为后续测试活动的顺利进行奠定了基础。在本文中,我们提出了一种为WSC测试自动建模的方法。这个想法是通过在设计阶段从两个文档中获取足够的测试信息来自动构建高度可视化的模型。与现有的建模方法相比,该方法在WSC测试信息提取方面更加充分。此外,我们还提高了测试建模的可视化和自动化程度。最后,通过一个案例研究验证了所提出的建模方法的有效性。
{"title":"Automated Modeling of Web Service Composition and Testing: A UML Sequence Diagram-Based Approach","authors":"Yao Huang, Bingqing Zhang, Yichen Wang","doi":"10.1109/QRS-C57518.2022.00037","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00037","url":null,"abstract":"The application of Service-Oriented Architecture (SOA) system software in safety-critical areas such as aerospace is gradually increasing, and the demand of high-quality SOA system software is increasing too. Due to the feature of loose coupling, SOA system software depends strongly on the correctness of the interfaces among services. Web service composition (WSC) testing in the integration phase of service composition thus becomes exceptionally critical. In a model-based testing framework., the test model lays a foundation for the subsequent test activities to proceed smoothly. In this paper, we propose an approach to automate modeling for WSC testing. The idea is to automate the construction of a highly visualized model by fetching adequate test information from two documents in the design phase. Compared to the existing modeling methods, the proposed method is more sufficient in WSC test information extraction. In addition, we also promote the degree of visualization and automation for test modeling. In the end, a case study is conducted to verify the effectiveness of the proposed modeling approach.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130887244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks 基于mini - exception神经网络的面部表情识别轻量级卷积神经网络
Changjian Li, Dongcheng Li, Man Zhao, Hui Li
This paper builds a convolutional neural network model based on Xception; we delete the fully connected layer in the traditional convolutional neural network model and use four depthwise separable convolutions to replace the convolution layer in convolutional neural network; we use batch normalization to process the output data after each convolution operation, and use the ReLU activation function to add nonlinear factors to the output data, and finally use the SoftMax function for final result classification. Our model achieved an accuracy rate of 73% on the FER2013 dataset, which is a particular improvement compared to the original model Xception. We design and implement a facial recognition system that can be used for static images and real-time recognition, which can quickly and accurately recognize authentic facial expressions.
本文建立了一个基于exception的卷积神经网络模型;我们删除了传统卷积神经网络模型中的全连通层,用四个深度可分离的卷积来代替卷积神经网络中的卷积层;我们在每次卷积操作后使用批处理归一化处理输出数据,并使用ReLU激活函数对输出数据添加非线性因子,最后使用SoftMax函数对最终结果进行分类。我们的模型在FER2013数据集上实现了73%的准确率,与原始模型exception相比,这是一个特别的改进。我们设计并实现了一种可以用于静态图像和实时识别的面部识别系统,可以快速准确地识别真实的面部表情。
{"title":"A Light-Weight Convolutional Neural Network for Facial Expression Recognition using Mini-Xception Neural Networks","authors":"Changjian Li, Dongcheng Li, Man Zhao, Hui Li","doi":"10.1109/QRS-C57518.2022.00104","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00104","url":null,"abstract":"This paper builds a convolutional neural network model based on Xception; we delete the fully connected layer in the traditional convolutional neural network model and use four depthwise separable convolutions to replace the convolution layer in convolutional neural network; we use batch normalization to process the output data after each convolution operation, and use the ReLU activation function to add nonlinear factors to the output data, and finally use the SoftMax function for final result classification. Our model achieved an accuracy rate of 73% on the FER2013 dataset, which is a particular improvement compared to the original model Xception. We design and implement a facial recognition system that can be used for static images and real-time recognition, which can quickly and accurately recognize authentic facial expressions.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Metadata in PDF Files Published by Police Agencies in Japan 分析日本警察机构出版的PDF文件中的元数据
Taichi Hasegawa, Taiichi Saito, R. Sasaki
In recent years, new types of cyber attacks called targeted attacks have been observed. It targets specific organizations or individuals, while usual large-scale attacks do not focus on specific targets. Organizations have published many Word or PDF files on their websites. These files may provide the starting point for targeted attacks if they include hidden data unintentionally generated in the authoring process. Adhatarao and Lauradoux analyzed hidden data found in the PDF files published by security agencies in many countries and showed that many PDF files potentially leak information like author names, details on the information system and computer architecture. In this study, we analyze hidden data of PDF files published on the website of police agencies in Japan and compare the results with Adhatarao and Lauradoux's. We gathered 110989 PDF files. 56% of gathered PDF files contain personal names, organization names, usernames, or numbers that seem to be IDs within the organizations. 96% of PDF files contain software names.
近年来,人们观察到一种被称为目标攻击的新型网络攻击。它针对特定的组织或个人,而通常的大规模攻击并不关注特定的目标。组织在其网站上发布了许多Word或PDF文件。如果这些文件包含在编写过程中无意中生成的隐藏数据,则可能为有针对性的攻击提供起点。Adhatarao和Lauradoux分析了在许多国家安全机构发布的PDF文件中发现的隐藏数据,发现许多PDF文件可能会泄露作者姓名、信息系统细节和计算机架构等信息。在本研究中,我们分析了日本警察机构网站上公布的PDF文件的隐藏数据,并与Adhatarao和Lauradoux的结果进行了比较。我们收集了110989个PDF文件。收集到的PDF文件中有56%包含个人姓名、组织名称、用户名或看似是组织内id的数字。96%的PDF文件包含软件名称。
{"title":"Analyzing Metadata in PDF Files Published by Police Agencies in Japan","authors":"Taichi Hasegawa, Taiichi Saito, R. Sasaki","doi":"10.1109/QRS-C57518.2022.00029","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00029","url":null,"abstract":"In recent years, new types of cyber attacks called targeted attacks have been observed. It targets specific organizations or individuals, while usual large-scale attacks do not focus on specific targets. Organizations have published many Word or PDF files on their websites. These files may provide the starting point for targeted attacks if they include hidden data unintentionally generated in the authoring process. Adhatarao and Lauradoux analyzed hidden data found in the PDF files published by security agencies in many countries and showed that many PDF files potentially leak information like author names, details on the information system and computer architecture. In this study, we analyze hidden data of PDF files published on the website of police agencies in Japan and compare the results with Adhatarao and Lauradoux's. We gathered 110989 PDF files. 56% of gathered PDF files contain personal names, organization names, usernames, or numbers that seem to be IDs within the organizations. 96% of PDF files contain software names.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning for Video Summarization with Semantic Reward 基于语义奖励的视频摘要深度强化学习
Haoran Sun, Xiaolong Zhu, Conghua Zhou
Video summarization aims to improve the efficiency of large-scale video browsing through producting concise summaries. It has been popular among many scenarios such as video surveillance, video review and data annotation. Traditional video summarization techniques focus on filtration in image features dimension or image semantics dimension. However, such techniques can make a large amount of possible useful information lost, especially for many videos with rich text semantics like interviews, teaching videos, in that only the information relevant to the image dimension will be retained. In order to solve the above problem, this paper considers video summarization as a continuous multi-dimensional decision-making process. Specifically, the summarization model predicts a probability for each frame and its corresponding text, and then we designs reward methods for each of them. Finally, comprehensive summaries in two dimensions, i.e. images and semantics, is generated. This approach is not only unsupervised and does not rely on labels and user interaction, but also decouples the semantic and image summarization models to provide more usable interfaces for subsequent engineering use.
视频摘要旨在通过生成简洁的摘要来提高大规模视频浏览的效率。在视频监控、视频点评、数据标注等场景中得到广泛应用。传统的视频摘要技术侧重于图像特征维度或图像语义维度的过滤。但是,这种技术会使大量可能有用的信息丢失,特别是对于许多具有丰富文本语义的视频,如访谈、教学视频,只保留与图像维度相关的信息。为了解决上述问题,本文将视频摘要视为一个连续的多维决策过程。具体来说,摘要模型预测了每一帧及其对应文本的概率,然后为每一帧及其对应文本设计奖励方法。最后,生成图像和语义两个维度的综合总结。这种方法不仅是无监督的,不依赖于标签和用户交互,而且还解耦了语义和图像摘要模型,为后续工程使用提供了更多可用的接口。
{"title":"Deep Reinforcement Learning for Video Summarization with Semantic Reward","authors":"Haoran Sun, Xiaolong Zhu, Conghua Zhou","doi":"10.1109/QRS-C57518.2022.00119","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00119","url":null,"abstract":"Video summarization aims to improve the efficiency of large-scale video browsing through producting concise summaries. It has been popular among many scenarios such as video surveillance, video review and data annotation. Traditional video summarization techniques focus on filtration in image features dimension or image semantics dimension. However, such techniques can make a large amount of possible useful information lost, especially for many videos with rich text semantics like interviews, teaching videos, in that only the information relevant to the image dimension will be retained. In order to solve the above problem, this paper considers video summarization as a continuous multi-dimensional decision-making process. Specifically, the summarization model predicts a probability for each frame and its corresponding text, and then we designs reward methods for each of them. Finally, comprehensive summaries in two dimensions, i.e. images and semantics, is generated. This approach is not only unsupervised and does not rely on labels and user interaction, but also decouples the semantic and image summarization models to provide more usable interfaces for subsequent engineering use.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks 实际电信基站网络中小区故障影响下的弹性分析
Zongqi Xue, Zhenglin Liang
With the importance of wireless telecommunication services increasing in our daily lives and society operation, the demand for reliable telecommunication networks rapidly grows. However, in contrast to the high reliability of the core telecom systems, the base stations have low redundancy and high failure rate, which lead to a bottleneck in the reliability improvement of the telecommunication network. To figure out the characteristic of the reliability of the base station network, we analyze the compensation mechanism upon the failures of the base station cell by practice data. The results show that the loss of demands caused by base station failures can be compensated by two types of resilience: intrasector resilience and inter-sector resilience. Intra-sector resilience describes the demands absorption occurred between co-sector cells in a base station. Inter-sector resilience is manifested in the demand absorption by the neighbor base stations. We observe these two types of resilience in practical cases and analyze their compensation effects. The results of this paper show that resilience widely exists in base station network and act as an important factor in ensuring the reliability of telecommunication network.
随着无线通信业务在人们日常生活和社会运行中的重要性日益增加,人们对可靠的电信网络的需求迅速增长。然而,与电信核心系统的高可靠性相比,基站的冗余度低,故障率高,成为电信网络可靠性提升的瓶颈。为了解基站网络可靠性的特点,结合实际数据分析了基站单元故障的补偿机制。结果表明,基站故障造成的需求损失可以通过两种类型的弹性来补偿:部门内弹性和部门间弹性。扇区内弹性描述了基站中共扇区单元之间发生的需求吸收。扇区间弹性表现为相邻基站对需求的吸收。我们在实际案例中观察这两种类型的弹性,并分析它们的补偿效应。研究结果表明,弹性在基站网络中广泛存在,是保证电信网络可靠性的重要因素。
{"title":"Resilience Analysis under the Impact of Cell Failures in the Practical Telecommunication base Station Networks","authors":"Zongqi Xue, Zhenglin Liang","doi":"10.1109/QRS-C57518.2022.00131","DOIUrl":"https://doi.org/10.1109/QRS-C57518.2022.00131","url":null,"abstract":"With the importance of wireless telecommunication services increasing in our daily lives and society operation, the demand for reliable telecommunication networks rapidly grows. However, in contrast to the high reliability of the core telecom systems, the base stations have low redundancy and high failure rate, which lead to a bottleneck in the reliability improvement of the telecommunication network. To figure out the characteristic of the reliability of the base station network, we analyze the compensation mechanism upon the failures of the base station cell by practice data. The results show that the loss of demands caused by base station failures can be compensated by two types of resilience: intrasector resilience and inter-sector resilience. Intra-sector resilience describes the demands absorption occurred between co-sector cells in a base station. Inter-sector resilience is manifested in the demand absorption by the neighbor base stations. We observe these two types of resilience in practical cases and analyze their compensation effects. The results of this paper show that resilience widely exists in base station network and act as an important factor in ensuring the reliability of telecommunication network.","PeriodicalId":183728,"journal":{"name":"2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1