首页 > 最新文献

2021 International Conference on Advanced Computing and Endogenous Security最新文献

英文 中文
Leveraging Degree Centrality for Fast Bandwidth Measurement in OpenFlow-based SDN 利用度中心性实现基于openflow的SDN快速带宽测量
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013104
Binghao Yan, Qinrang Liu, Dong Liang, Haiming Zhao, JianLiang Shen
Network optimization and policy deployment need the underlying state information as a reference basis. However, the timeliness of information collection will seriously affect the effectiveness of optimization results. As a key index, link bandwidth has a guiding significance for network management such as routing, queue scheduling and congestion control. In this paper, we use the theory of degree centrality-based critical node ranking in complex networks to implement fast link bandwidth measurements in software-defined networks. Simulation results on several real topologies of different sizes verify the advantages of our scheme over existing algorithms in terms of measurement time overhead and robustness to different measurement methods.
网络优化和策略部署需要底层状态信息作为参考依据。然而,信息采集的时效性会严重影响优化结果的有效性。链路带宽作为一项关键指标,对路由、队列调度和拥塞控制等网络管理具有指导意义。本文利用复杂网络中基于度中心性的关键节点排序理论,实现了软件定义网络中链路带宽的快速测量。在不同尺寸的实际拓扑上的仿真结果验证了该方案在测量时间开销和对不同测量方法的鲁棒性方面优于现有算法。
{"title":"Leveraging Degree Centrality for Fast Bandwidth Measurement in OpenFlow-based SDN","authors":"Binghao Yan, Qinrang Liu, Dong Liang, Haiming Zhao, JianLiang Shen","doi":"10.1109/IEEECONF52377.2022.10013104","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013104","url":null,"abstract":"Network optimization and policy deployment need the underlying state information as a reference basis. However, the timeliness of information collection will seriously affect the effectiveness of optimization results. As a key index, link bandwidth has a guiding significance for network management such as routing, queue scheduling and congestion control. In this paper, we use the theory of degree centrality-based critical node ranking in complex networks to implement fast link bandwidth measurements in software-defined networks. Simulation results on several real topologies of different sizes verify the advantages of our scheme over existing algorithms in terms of measurement time overhead and robustness to different measurement methods.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130791150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of Scientific Workflow Security Scheduling in Clouds 云环境下科学工作流安全调度综述
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013096
Xuanyu Liu, Guozhen Cheng, Ya-wen Wang, Shuai Zhang
With the development of cloud computing technology, more and more scientific researchers choose to deliver scientific workflow tasks to public cloud platforms for execution. This mode effectively reduces scientific research costs while also bringing serious security risks. In response to this problem, this article summarizes the current security issues facing cloud scientific workflows, and analyzes the importance of studying cloud scientific workflow security issues. Then this article analyzes, summarizes and compares the current cloud scientific workflow security methods from three perspectives: system architecture, security model, and security strategy. Finally made a prospect for the future development direction.
随着云计算技术的发展,越来越多的科研人员选择将科研工作流任务交付到公有云平台执行。这种模式在有效降低科研成本的同时,也带来了严重的安全风险。针对这一问题,本文总结了当前云科学工作流面临的安全问题,分析了研究云科学工作流安全问题的重要性。然后从系统架构、安全模型和安全策略三个方面对现有的云科学工作流安全方法进行了分析、总结和比较。最后对未来的发展方向做了展望。
{"title":"Overview of Scientific Workflow Security Scheduling in Clouds","authors":"Xuanyu Liu, Guozhen Cheng, Ya-wen Wang, Shuai Zhang","doi":"10.1109/IEEECONF52377.2022.10013096","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013096","url":null,"abstract":"With the development of cloud computing technology, more and more scientific researchers choose to deliver scientific workflow tasks to public cloud platforms for execution. This mode effectively reduces scientific research costs while also bringing serious security risks. In response to this problem, this article summarizes the current security issues facing cloud scientific workflows, and analyzes the importance of studying cloud scientific workflow security issues. Then this article analyzes, summarizes and compares the current cloud scientific workflow security methods from three perspectives: system architecture, security model, and security strategy. Finally made a prospect for the future development direction.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129849692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks with Multiple Eavesdroppers 多窃听器智能反射面辅助无线通信网络的密钥生成
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013094
Ya Liu, Kaizhi Huang, Shaochuan Yang, Jie Yang, Xiaoli Sun
Physical layer secret key generation (SKG) is a promising supplement for high-level encryption, which leverages the channel reciprocity and the natural randomness of wireless channel. However, practical implementations often exhibit static environment. To solve this problem, this paper proposes a novel secret key generation scheme assisted by an intelligent reflecting surface (IRS) which can smartly reconfigure the radio signal propagation to improve the secret key rate of SKG. Specially, we formulate the minimum achievable secret key capacity in the IRS-assisted multiple-input single-output (MISO) system with multiple eavesdroppers. Then, an optimization framework for designing IRS reflecting coefficients based on the secret key capacity lower bound is proposed. Numerical results show that our optimal IRS-assisted SKG scheme can achieve much higher achievable secret key capacity when compared with two benchmark schemes.
物理层密钥生成(SKG)利用了信道互易性和无线信道的自然随机性,是对高级加密的一种很有前途的补充。然而,实际的实现通常表现为静态环境。为了解决这一问题,本文提出了一种基于智能反射面(IRS)的密钥生成方案,该方案可以智能地重新配置无线电信号的传播,从而提高SKG的密钥速率。特别地,我们制定了具有多个窃听器的irs辅助多输入单输出(MISO)系统中可实现的最小密钥容量。然后,提出了一种基于密钥容量下界的IRS反射系数优化设计框架。数值结果表明,与两种基准方案相比,我们的最优irs辅助SKG方案可以获得更高的可实现密钥容量。
{"title":"Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks with Multiple Eavesdroppers","authors":"Ya Liu, Kaizhi Huang, Shaochuan Yang, Jie Yang, Xiaoli Sun","doi":"10.1109/IEEECONF52377.2022.10013094","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013094","url":null,"abstract":"Physical layer secret key generation (SKG) is a promising supplement for high-level encryption, which leverages the channel reciprocity and the natural randomness of wireless channel. However, practical implementations often exhibit static environment. To solve this problem, this paper proposes a novel secret key generation scheme assisted by an intelligent reflecting surface (IRS) which can smartly reconfigure the radio signal propagation to improve the secret key rate of SKG. Specially, we formulate the minimum achievable secret key capacity in the IRS-assisted multiple-input single-output (MISO) system with multiple eavesdroppers. Then, an optimization framework for designing IRS reflecting coefficients based on the secret key capacity lower bound is proposed. Numerical results show that our optimal IRS-assisted SKG scheme can achieve much higher achievable secret key capacity when compared with two benchmark schemes.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130974599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree 基于梯度提升决策树的网络安全态势要素提取方法
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013351
Zhaorui Ma, Shicheng Zhang, Yiheng Chang, Q. Zhou, Xinhao Hu, Xia Li
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network security situation element acquisition technology has the problems of low extraction accuracy and low extraction efficiency. To solve these problems, a method for extracting network security situation elements based on Gradient Boosting Decision Tree (GBDT) is proposed. This method uses the attribute reduction function of rough set to preprocess the original data, which can effectively reduce redundancy. Furthermore, the initial parameters of GBDT are optimized by quantum particle swarm optimization (QPSO) algorithm to improve stability. Finally, the optimized GBDT classifier is used to classify and train with the reduced data set, and the accuracy of the final classifier is continuously improved by reducing the deviation via iterative optimization. Experiments demonstrate that the proposed algorithm achieves significant results and outperforms several state-of-the-art algorithms to the extraction of network security situation elements on the UNSW-NB15 dataset.
获取网络安全态势要素的主要目的是从离散和孤立的数据中检测和发现潜在的安全威胁。在复杂的网络环境下,现有的网络安全态势元采集技术存在提取精度低、提取效率低等问题。针对这些问题,提出了一种基于梯度提升决策树(GBDT)的网络安全态势元素提取方法。该方法利用粗糙集的属性约简函数对原始数据进行预处理,可以有效地减少冗余。此外,采用量子粒子群优化算法(QPSO)优化GBDT的初始参数,提高稳定性。最后,使用优化后的GBDT分类器对约简后的数据集进行分类和训练,通过迭代优化减少偏差,不断提高最终分类器的准确率。实验表明,该算法在UNSW-NB15数据集的网络安全态势要素提取上取得了显著的效果,并优于几种最先进的算法。
{"title":"An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree","authors":"Zhaorui Ma, Shicheng Zhang, Yiheng Chang, Q. Zhou, Xinhao Hu, Xia Li","doi":"10.1109/IEEECONF52377.2022.10013351","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013351","url":null,"abstract":"The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network security situation element acquisition technology has the problems of low extraction accuracy and low extraction efficiency. To solve these problems, a method for extracting network security situation elements based on Gradient Boosting Decision Tree (GBDT) is proposed. This method uses the attribute reduction function of rough set to preprocess the original data, which can effectively reduce redundancy. Furthermore, the initial parameters of GBDT are optimized by quantum particle swarm optimization (QPSO) algorithm to improve stability. Finally, the optimized GBDT classifier is used to classify and train with the reduced data set, and the accuracy of the final classifier is continuously improved by reducing the deviation via iterative optimization. Experiments demonstrate that the proposed algorithm achieves significant results and outperforms several state-of-the-art algorithms to the extraction of network security situation elements on the UNSW-NB15 dataset.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122984415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remaining Useful Life Prediction via Bayesian Temporal Convolutional Networks 基于贝叶斯时间卷积网络的剩余使用寿命预测
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013353
Siyi Hong, Yi He, Jianpeng Zhang, Chao Jiang, Yingjun Deng
In modern industry, the accurate prediction of remaining useful life(RUL) contributes to the equipment safety and economic effectiveness. Aiming at the RUL prediction, this paper proposed a Bayesian temporal convolutional network (BayesianTCN) under the Bayesian deep learning framework. BayesianTCN outputs not only the RUL prediction, but also the associated confidence interval by Monte-Carlo simulation. This quantifies the RUL prediction uncertainty. Experimental results on CMAPSS datasets show that our model has higher fitting degree and lower uncertainty than BayesianLSTM, and performs well whether in simple or complex conditions.
在现代工业中,准确预测设备的剩余使用寿命(RUL)对设备的安全性和经济效益具有重要意义。针对RUL预测,本文提出了一种基于贝叶斯深度学习框架的贝叶斯时间卷积网络(BayesianTCN)。BayesianTCN不仅输出RUL预测,还通过蒙特卡罗模拟输出相关的置信区间。这量化了RUL预测的不确定性。在CMAPSS数据集上的实验结果表明,与贝叶斯lstm相比,我们的模型具有更高的拟合程度和更低的不确定性,无论在简单条件还是复杂条件下都表现良好。
{"title":"Remaining Useful Life Prediction via Bayesian Temporal Convolutional Networks","authors":"Siyi Hong, Yi He, Jianpeng Zhang, Chao Jiang, Yingjun Deng","doi":"10.1109/IEEECONF52377.2022.10013353","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013353","url":null,"abstract":"In modern industry, the accurate prediction of remaining useful life(RUL) contributes to the equipment safety and economic effectiveness. Aiming at the RUL prediction, this paper proposed a Bayesian temporal convolutional network (BayesianTCN) under the Bayesian deep learning framework. BayesianTCN outputs not only the RUL prediction, but also the associated confidence interval by Monte-Carlo simulation. This quantifies the RUL prediction uncertainty. Experimental results on CMAPSS datasets show that our model has higher fitting degree and lower uncertainty than BayesianLSTM, and performs well whether in simple or complex conditions.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on User Profile based on Interest Dynamic Change Modeling 基于兴趣动态变化建模的用户画像研究
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013338
Hui Miao, Q. Zhou, Huawei Song, F. Wan, Xin Yang
The profile study based on the modeling of the dynamic change of user interest is a research method that realizes the dynamic update of interest tags by constructing the time decay function of interest transfer, and then constructs the dynamic model to achieve more accurate personalized recommendation and other functions. This article mainly introduces the construction of user interest model based on forgetting mechanism,by comparing various interest models, it can be found that the dynamic change model of interest based on the forgetting mechanism is more capable of constructing a user profile system with accurate delivery effects.
基于用户兴趣动态变化建模的剖面研究是一种通过构建兴趣转移的时间衰减函数来实现兴趣标签动态更新,进而构建动态模型来实现更精准的个性化推荐等功能的研究方法。本文主要介绍了基于遗忘机制的用户兴趣模型的构建,通过对各种兴趣模型的比较,可以发现基于遗忘机制的兴趣动态变化模型更能够构建具有准确传递效果的用户档案系统。
{"title":"Research on User Profile based on Interest Dynamic Change Modeling","authors":"Hui Miao, Q. Zhou, Huawei Song, F. Wan, Xin Yang","doi":"10.1109/IEEECONF52377.2022.10013338","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013338","url":null,"abstract":"The profile study based on the modeling of the dynamic change of user interest is a research method that realizes the dynamic update of interest tags by constructing the time decay function of interest transfer, and then constructs the dynamic model to achieve more accurate personalized recommendation and other functions. This article mainly introduces the construction of user interest model based on forgetting mechanism,by comparing various interest models, it can be found that the dynamic change model of interest based on the forgetting mechanism is more capable of constructing a user profile system with accurate delivery effects.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126565818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on security protection technology for 5G cloud network 5G云网络安全防护技术研究
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013352
Wei You, Mingyan Xu, Deqiang Zhou
5G core network introduces service based architecture, software defined network, network function virtualization and other new technologies, showing the characteristics of IT and Internet. The new architecture and new technologies not only bring convenience to 5G but also introduce new security threats, especially the unknown security threats caused by unknown vulnerabilities or backdoors. This paper mainly introduces the security threats after the application of software defined network, network function virtualization and other technologies to 5G, summarizes the security solutions proposed by standardization organizations and academia, and puts forward a new idea of building a high-level secure 5G core network based on the endogenous safety and security.
5G核心网引入了基于服务的架构、软件定义网络、网络功能虚拟化等新技术,展现了IT和互联网的特点。新架构、新技术在给5G带来便利的同时,也带来了新的安全威胁,尤其是未知漏洞或后门带来的未知安全威胁。本文主要介绍了软件定义网络、网络功能虚拟化等技术应用于5G后面临的安全威胁,总结了标准化组织和学术界提出的安全解决方案,提出了基于内生安全和保障构建高水平安全的5G核心网的新思路。
{"title":"Research on security protection technology for 5G cloud network","authors":"Wei You, Mingyan Xu, Deqiang Zhou","doi":"10.1109/IEEECONF52377.2022.10013352","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013352","url":null,"abstract":"5G core network introduces service based architecture, software defined network, network function virtualization and other new technologies, showing the characteristics of IT and Internet. The new architecture and new technologies not only bring convenience to 5G but also introduce new security threats, especially the unknown security threats caused by unknown vulnerabilities or backdoors. This paper mainly introduces the security threats after the application of software defined network, network function virtualization and other technologies to 5G, summarizes the security solutions proposed by standardization organizations and academia, and puts forward a new idea of building a high-level secure 5G core network based on the endogenous safety and security.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Identity Authentication scheme for Internet of Vehicles based on moving target Defense 基于移动目标防御的车联网匿名身份认证方案
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013357
Songhao Bai, Zhen Zhang
As one of the effective methods to enhance traffic safety and improve traffic efficiency, the Internet of vehicles has attracted wide attention from all walks of life. V2X secure communication, as one of the research hotspots of the Internet of vehicles, also has many security and privacy problems. Attackers can use these vulnerabilities to obtain vehicle identity information and location information, and can also attack vehicles through camouflage.Therefore, the identity authentication process in vehicle network communication must be effectively protected. The anonymous identity authentication scheme based on moving target defense proposed in this paper not only ensures the authenticity and integrity of information sources, but also avoids the disclosure of vehicle identity information.
车联网作为增强交通安全、提高交通效率的有效手段之一,受到了社会各界的广泛关注。V2X安全通信作为车联网的研究热点之一,也存在许多安全和隐私问题。攻击者可以利用这些漏洞获取车辆身份信息和位置信息,也可以通过伪装对车辆进行攻击。因此,必须对车载网络通信中的身份认证过程进行有效保护。本文提出的基于移动目标防御的匿名身份认证方案既保证了信息源的真实性和完整性,又避免了车辆身份信息的泄露。
{"title":"Anonymous Identity Authentication scheme for Internet of Vehicles based on moving target Defense","authors":"Songhao Bai, Zhen Zhang","doi":"10.1109/IEEECONF52377.2022.10013357","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013357","url":null,"abstract":"As one of the effective methods to enhance traffic safety and improve traffic efficiency, the Internet of vehicles has attracted wide attention from all walks of life. V2X secure communication, as one of the research hotspots of the Internet of vehicles, also has many security and privacy problems. Attackers can use these vulnerabilities to obtain vehicle identity information and location information, and can also attack vehicles through camouflage.Therefore, the identity authentication process in vehicle network communication must be effectively protected. The anonymous identity authentication scheme based on moving target defense proposed in this paper not only ensures the authenticity and integrity of information sources, but also avoids the disclosure of vehicle identity information.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey of fault tolerance hardware architecture 容错硬件体系结构综述
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013336
Kai Liu, Yu Li, Ouyang Ling
Fault tolerance is gaining more and more attention for the increasing need of reliability in industrial, automotive and aerospace applications. This paper presents a survey of the fault tolerance mechanism to provide reliability against radiation-induced soft errors at the hardware architectural level. Multiple types of error detection and error recovery mechanisms based on lockstep are described in this article, and a discussion of their advantages and disadvantages is given at the end.
由于工业、汽车和航空航天应用对可靠性的要求越来越高,容错技术越来越受到人们的关注。本文介绍了一种容错机制,以在硬件架构级别提供抗辐射引起的软错误的可靠性。本文介绍了基于lockstep的多种类型的错误检测和错误恢复机制,并讨论了它们的优缺点。
{"title":"A survey of fault tolerance hardware architecture","authors":"Kai Liu, Yu Li, Ouyang Ling","doi":"10.1109/IEEECONF52377.2022.10013336","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013336","url":null,"abstract":"Fault tolerance is gaining more and more attention for the increasing need of reliability in industrial, automotive and aerospace applications. This paper presents a survey of the fault tolerance mechanism to provide reliability against radiation-induced soft errors at the hardware architectural level. Multiple types of error detection and error recovery mechanisms based on lockstep are described in this article, and a discussion of their advantages and disadvantages is given at the end.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Named Entity Recognition Incorporating Chinese Segmentation Information 基于中文分词信息的命名实体识别
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013348
Shiyuan Yu, Shuming Guo, Ruiyang Huang, Jianpeng Zhang, Ke Su, Nan Hu
Word-level information is crucial for Chinese named entity recognition. Presently, most works have achieved better performance by extracting word-level information into character-level representations through existing lexicons, but the maintenance of lexical lists is a major challenge. In this paper, we present the NIMSI model, proposing the incorporation of multiple segmentation information to enhance recognition, using a trilogy to align character-level attention with word-level attention to construct features of segmented information in Chinese text. Also, we use a simple but effective method to directly incorporate multi-segmentation information into character-level representations. Finally, as the experiments on the three benchmark datasets show, our model effectively incorporates segmentation information and alleviates the segmentation errors.
词级信息对中文命名实体识别至关重要。目前,大多数作品都是利用已有的词汇将词级信息提取为字符级表示,取得了较好的效果,但词汇表的维护是一个主要的挑战。在本文中,我们提出了NIMSI模型,提出了结合多个分词信息来增强识别,使用三部曲对齐字级注意和词级注意来构建中文文本中分词信息的特征。此外,我们还使用了一种简单而有效的方法将多段信息直接合并到字符级表示中。最后,在三个基准数据集上的实验表明,我们的模型有效地融合了分割信息,减轻了分割误差。
{"title":"Named Entity Recognition Incorporating Chinese Segmentation Information","authors":"Shiyuan Yu, Shuming Guo, Ruiyang Huang, Jianpeng Zhang, Ke Su, Nan Hu","doi":"10.1109/IEEECONF52377.2022.10013348","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013348","url":null,"abstract":"Word-level information is crucial for Chinese named entity recognition. Presently, most works have achieved better performance by extracting word-level information into character-level representations through existing lexicons, but the maintenance of lexical lists is a major challenge. In this paper, we present the NIMSI model, proposing the incorporation of multiple segmentation information to enhance recognition, using a trilogy to align character-level attention with word-level attention to construct features of segmented information in Chinese text. Also, we use a simple but effective method to directly incorporate multi-segmentation information into character-level representations. Finally, as the experiments on the three benchmark datasets show, our model effectively incorporates segmentation information and alleviates the segmentation errors.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"57 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133940748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Advanced Computing and Endogenous Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1