首页 > 最新文献

Other Conferences最新文献

英文 中文
Research on key distribution methods supporting trusted data migration of cloud platform 支持云平台可信数据迁移的密钥分发方法研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3032077
Fuqiang Tian, Jun Mou, Angang Liu, Zhongkui Zhu, Maonan Lin, Hongyu Wu
Cloud computing is a significant leap in the development process of the information industry. It integrates computing, storage, network, and other information resources organically, providing more convenient means for deep sharing and utilization, making the acquisition of information resources no longer limited by time and space. Cloud computing platform has become one of the important components of Information infrastructure, providing an important computing foundation for promoting the Digital transformation of the industry. As cloud computing platforms are increasingly accepted, more and more enterprises are migrating applications and Data migration to the cloud to effectively break through the limitations of local computing and storage resources, and make better use of the development trend of the cloud’s powerful analysis and processing capabilities. Therefore, to ensure the security and credibility of cloud platform Data migration, this paper proposes a key allocation method based on the hash function to support the trusted migration of cloud platform data. Experimental results have shown that the cloud platform key allocation scheme proposed in this article can effectively improve the security capabilities of the cloud platform compared to traditional key allocation schemes.
云计算是信息产业发展进程中的一次重大飞跃。它将计算、存储、网络等信息资源有机整合,为深度共享和利用提供了更加便捷的手段,使信息资源的获取不再受时间和空间的限制。云计算平台已成为信息基础设施的重要组成部分之一,为推动行业数字化转型提供了重要的计算基础。随着云计算平台被越来越多的人所接受,越来越多的企业将应用迁移和数据迁移到云端,以有效突破本地计算和存储资源的限制,更好地利用云端强大的分析和处理能力的发展趋势。因此,为了确保云平台数据迁移的安全性和可信性,本文提出了一种基于哈希函数的密钥分配方法,以支持云平台数据的可信迁移。实验结果表明,与传统的密钥分配方案相比,本文提出的云平台密钥分配方案能有效提高云平台的安全能力。
{"title":"Research on key distribution methods supporting trusted data migration of cloud platform","authors":"Fuqiang Tian, Jun Mou, Angang Liu, Zhongkui Zhu, Maonan Lin, Hongyu Wu","doi":"10.1117/12.3032077","DOIUrl":"https://doi.org/10.1117/12.3032077","url":null,"abstract":"Cloud computing is a significant leap in the development process of the information industry. It integrates computing, storage, network, and other information resources organically, providing more convenient means for deep sharing and utilization, making the acquisition of information resources no longer limited by time and space. Cloud computing platform has become one of the important components of Information infrastructure, providing an important computing foundation for promoting the Digital transformation of the industry. As cloud computing platforms are increasingly accepted, more and more enterprises are migrating applications and Data migration to the cloud to effectively break through the limitations of local computing and storage resources, and make better use of the development trend of the cloud’s powerful analysis and processing capabilities. Therefore, to ensure the security and credibility of cloud platform Data migration, this paper proposes a key allocation method based on the hash function to support the trusted migration of cloud platform data. Experimental results have shown that the cloud platform key allocation scheme proposed in this article can effectively improve the security capabilities of the cloud platform compared to traditional key allocation schemes.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EPTDMS: efficient and privacy-preserving top-k disease matching scheme for cloud-assisted e-healthcare system EPTDMS:用于云辅助电子医疗系统的高效且保护隐私的顶k疾病匹配方案
Pub Date : 2024-06-06 DOI: 10.1117/12.3031898
ou ruan, xin jiang
In modern e-healthcare systems, healthcare providers usually store users' data in cloud servers. Users wish to obtain relevant diagnostic files through data generated by body sensors. We propose an efficient and privacy-preserving Top- k disease matching scheme (called EPTDMS). EPTDMS uses Density-Sensitive Hashing (DSH) to implement fuzzy search in stage one, employs the cosine value to sort the relevant result, and obtains patient diagnostic files. Improvements are made to address the problems of low matching efficiency, high computational overhead, and high communication volume of most privacy-preserving matching schemes. This scheme achieves disease matching with low computation and communication overhead and reduces the average query time.
在现代电子医疗系统中,医疗服务提供商通常将用户数据存储在云服务器中。用户希望通过身体传感器生成的数据获得相关诊断文件。我们提出了一种高效且保护隐私的 Top- k 疾病匹配方案(称为 EPTDMS)。EPTDMS 在第一阶段使用密度敏感散列(DSH)实现模糊搜索,利用余弦值对相关结果进行排序,并获取患者诊断文件。针对大多数隐私保护匹配方案存在的匹配效率低、计算开销大、通信量大等问题进行了改进。该方案以较低的计算和通信开销实现了疾病匹配,并缩短了平均查询时间。
{"title":"EPTDMS: efficient and privacy-preserving top-k disease matching scheme for cloud-assisted e-healthcare system","authors":"ou ruan, xin jiang","doi":"10.1117/12.3031898","DOIUrl":"https://doi.org/10.1117/12.3031898","url":null,"abstract":"In modern e-healthcare systems, healthcare providers usually store users' data in cloud servers. Users wish to obtain relevant diagnostic files through data generated by body sensors. We propose an efficient and privacy-preserving Top- k disease matching scheme (called EPTDMS). EPTDMS uses Density-Sensitive Hashing (DSH) to implement fuzzy search in stage one, employs the cosine value to sort the relevant result, and obtains patient diagnostic files. Improvements are made to address the problems of low matching efficiency, high computational overhead, and high communication volume of most privacy-preserving matching schemes. This scheme achieves disease matching with low computation and communication overhead and reduces the average query time.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical software architecture for smart firefighting platform 智能消防平台的分层软件架构
Pub Date : 2024-06-06 DOI: 10.1117/12.3032097
Zixiang Zhang, Nady Slam, Zhengqiang Di, Yu Zhu
To enhance the fire service system, many countries have conducted extensive research on “Smart Firefighting” platform architecture and achieved significant results. However, there are still numerous challenges that persist in the field. To address the challenges related to storage, computing, security, and scalability of large-scale data in the "Smart Firefighting" domain, we have conducted an in-depth study and comparison of existing "Smart Firefighting" platform architectures. Based on the analysis, we propose a novel architectural for the "Smart Firefighting" platform, which combines the strengths of traditional hierarchical architecture with the Cloud-Edge-End architectural, this integration effectively preserves the key features of both architectural styles, and the proposed fusion model is able to satisfy the computation and storage of large amounts of firefighting data while guaranteeing security. This architectural model can serve as a reference for the construction of highly available, high-performance, and more secure and stable "Smart Firefighting" platforms and holds significant importance in accelerating the development and maintenance of "Smart Firefighting" to ensure long-term social stability and security.
为了加强消防系统,许多国家对 "智慧消防 "平台架构进行了广泛研究,并取得了显著成果。然而,该领域仍然存在诸多挑战。针对 "智慧消防 "领域中大规模数据的存储、计算、安全和可扩展性等方面的挑战,我们对现有的 "智慧消防 "平台架构进行了深入研究和比较。在分析的基础上,我们提出了一种新颖的 "智慧消防 "平台架构,该架构结合了传统分层架构和云-边-端架构的优点,这种融合有效地保留了两种架构风格的主要特点,所提出的融合模型能够在保证安全的前提下满足海量消防数据的计算和存储。该架构模型可为构建高可用、高性能、更安全稳定的 "智慧消防 "平台提供参考,对加快 "智慧消防 "的发展和维护,确保社会长治久安具有重要意义。
{"title":"A hierarchical software architecture for smart firefighting platform","authors":"Zixiang Zhang, Nady Slam, Zhengqiang Di, Yu Zhu","doi":"10.1117/12.3032097","DOIUrl":"https://doi.org/10.1117/12.3032097","url":null,"abstract":"To enhance the fire service system, many countries have conducted extensive research on “Smart Firefighting” platform architecture and achieved significant results. However, there are still numerous challenges that persist in the field. To address the challenges related to storage, computing, security, and scalability of large-scale data in the \"Smart Firefighting\" domain, we have conducted an in-depth study and comparison of existing \"Smart Firefighting\" platform architectures. Based on the analysis, we propose a novel architectural for the \"Smart Firefighting\" platform, which combines the strengths of traditional hierarchical architecture with the Cloud-Edge-End architectural, this integration effectively preserves the key features of both architectural styles, and the proposed fusion model is able to satisfy the computation and storage of large amounts of firefighting data while guaranteeing security. This architectural model can serve as a reference for the construction of highly available, high-performance, and more secure and stable \"Smart Firefighting\" platforms and holds significant importance in accelerating the development and maintenance of \"Smart Firefighting\" to ensure long-term social stability and security.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Just-in-time software defect prediction based on feature selection 基于特征选择的即时软件缺陷预测
Pub Date : 2024-06-06 DOI: 10.1117/12.3031976
Shipeng cai, Hongmin Ren
At the present stage, just-time software defect prediction has garnered significant attention from researchers due to its granularity and immediacy. Primarily utilizing machine learning classifiers, these models are trained on information from code repositories to predict whether future changes may lead to defects. However, a current challenge with these classifiers lies in the vast number of features, leading to decreased prediction efficiency. These features not only impact model performance but can sometimes result in a decline in predictive accuracy. This paper explores a feature selection technique that combines random forests and self-attention to discard less important features without compromising performance. Through this approach, the number of features required for training is significantly reduced, often to less than 50% of the original features. In our study across six software projects, we observed that using feature selection in the KNN model led to a 9% improvement in the F1 metric and a 6% improvement in the AUC metric compared to logistic regression and Bayesian models. Finally, we applied SHAP for interpretability analysis of the model. This research contributes to enhancing the accuracy and efficiency of just-in-time software defect prediction, providing valuable insights for research and practice in related fields.
现阶段,及时软件缺陷预测因其细粒度和即时性而备受研究人员的关注。这些模型主要利用机器学习分类器,根据代码库中的信息进行训练,以预测未来的更改是否会导致缺陷。然而,这些分类器目前面临的挑战在于特征数量庞大,导致预测效率降低。这些特征不仅会影响模型性能,有时还会导致预测准确率下降。本文探讨了一种特征选择技术,该技术结合了随机森林和自我关注,在不影响性能的前提下舍弃了不太重要的特征。通过这种方法,训练所需的特征数量大大减少,往往不到原始特征的 50%。在对六个软件项目的研究中,我们发现,与逻辑回归和贝叶斯模型相比,在 KNN 模型中使用特征选择可使 F1 指标提高 9%,AUC 指标提高 6%。最后,我们应用 SHAP 对模型进行了可解释性分析。这项研究有助于提高及时软件缺陷预测的准确性和效率,为相关领域的研究和实践提供了有价值的见解。
{"title":"Just-in-time software defect prediction based on feature selection","authors":"Shipeng cai, Hongmin Ren","doi":"10.1117/12.3031976","DOIUrl":"https://doi.org/10.1117/12.3031976","url":null,"abstract":"At the present stage, just-time software defect prediction has garnered significant attention from researchers due to its granularity and immediacy. Primarily utilizing machine learning classifiers, these models are trained on information from code repositories to predict whether future changes may lead to defects. However, a current challenge with these classifiers lies in the vast number of features, leading to decreased prediction efficiency. These features not only impact model performance but can sometimes result in a decline in predictive accuracy. This paper explores a feature selection technique that combines random forests and self-attention to discard less important features without compromising performance. Through this approach, the number of features required for training is significantly reduced, often to less than 50% of the original features. In our study across six software projects, we observed that using feature selection in the KNN model led to a 9% improvement in the F1 metric and a 6% improvement in the AUC metric compared to logistic regression and Bayesian models. Finally, we applied SHAP for interpretability analysis of the model. This research contributes to enhancing the accuracy and efficiency of just-in-time software defect prediction, providing valuable insights for research and practice in related fields.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on adaptive beamforming algorithm based on FPGA 基于 FPGA 的自适应波束成形算法研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3032050
Youbang Su
Abstract: In the field of signal processing, array signal processing is an important part. As an important research direction in the field of array signal processing, beamforming technology has great significance in many fields. In this paper, based on the advantages of FPGA technology, the beam control and adaptive algorithm are studied and the design scheme is proposed. Finally, the design is verified by simulation on ModelSim and Matlab platforms. The experiment proves that the error of this scheme is small and the expected convergence effect can be achieved.
摘要: 在信号处理领域,阵列信号处理是重要的组成部分。作为阵列信号处理领域的一个重要研究方向,波束成形技术在很多领域都具有重要意义。本文基于 FPGA 技术的优势,对波束控制和自适应算法进行了研究,并提出了设计方案。最后,在 ModelSim 和 Matlab 平台上对设计方案进行了仿真验证。实验证明,该方案误差较小,达到了预期的收敛效果。
{"title":"Research on adaptive beamforming algorithm based on FPGA","authors":"Youbang Su","doi":"10.1117/12.3032050","DOIUrl":"https://doi.org/10.1117/12.3032050","url":null,"abstract":"Abstract: In the field of signal processing, array signal processing is an important part. As an important research direction in the field of array signal processing, beamforming technology has great significance in many fields. In this paper, based on the advantages of FPGA technology, the beam control and adaptive algorithm are studied and the design scheme is proposed. Finally, the design is verified by simulation on ModelSim and Matlab platforms. The experiment proves that the error of this scheme is small and the expected convergence effect can be achieved.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FMAMPN: lightweight feature map attention multipath network for semantic segmentation of remote sensing image FMAMPN:用于遥感图像语义分割的轻量级特征图注意多径网络
Pub Date : 2024-06-06 DOI: 10.1117/12.3031941
Songqi Hou, Ying Yuan
Deep neural networks excel in remote sensing image semantic segmentation, but existing methods, despite their sophistication, often focus on channel and spatial dependencies within identical feature maps. This can lead to a uniform treatment of diverse feature maps, hindering information exchange and impacting model efficacy. To address this, we introduce Feature Map Attention, dynamically modulating weights based on interdependencies among various feature maps. This fosters connections and feature fusion, enhancing the model's capability to represent features. Importantly, this improvement comes with minimal additional computational expense. We also incorporate multipath skip connections, efficiently transmitting features at various scales from encoder to decoder, boosting overall model effectiveness. Our FMAMPN, a lightweight neural network, outperforms other state-of-the-art lightweight models across various datasets.
深度神经网络在遥感图像语义分割方面表现出色,但现有方法尽管复杂,却往往侧重于相同特征图中的通道和空间依赖关系。这可能导致对不同特征图的统一处理,阻碍信息交流并影响模型功效。为了解决这个问题,我们引入了 "特征图关注"(Feature Map Attention),根据不同特征图之间的相互依赖性动态调节权重。这促进了连接和特征融合,增强了模型表示特征的能力。重要的是,这种改进只需最小的额外计算费用。我们还加入了多路跳转连接,有效地将不同规模的特征从编码器传输到解码器,从而提高了模型的整体效率。我们的轻量级神经网络 FMAMPN 在各种数据集上的表现优于其他最先进的轻量级模型。
{"title":"FMAMPN: lightweight feature map attention multipath network for semantic segmentation of remote sensing image","authors":"Songqi Hou, Ying Yuan","doi":"10.1117/12.3031941","DOIUrl":"https://doi.org/10.1117/12.3031941","url":null,"abstract":"Deep neural networks excel in remote sensing image semantic segmentation, but existing methods, despite their sophistication, often focus on channel and spatial dependencies within identical feature maps. This can lead to a uniform treatment of diverse feature maps, hindering information exchange and impacting model efficacy. To address this, we introduce Feature Map Attention, dynamically modulating weights based on interdependencies among various feature maps. This fosters connections and feature fusion, enhancing the model's capability to represent features. Importantly, this improvement comes with minimal additional computational expense. We also incorporate multipath skip connections, efficiently transmitting features at various scales from encoder to decoder, boosting overall model effectiveness. Our FMAMPN, a lightweight neural network, outperforms other state-of-the-art lightweight models across various datasets.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved method for reverse engineering ECU firmware 改进的 ECU 固件逆向工程方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3032054
Yuhao Qiu
We found that there are existing academic studies on reverse engineering the firmware that implements Bluetooth and USB protocols to study their security. Electronic Control Unit (ECU) firmware implements the Controller Area Network (CAN) protocol, which is commonly used to implement the communication of the vehicle’s internal network. With the development and growth of electric vehicles, the security of the vehicle network is becoming increasingly important. This paper proposes a method to reverse engineer ECU firmware, which can efficiently help us quickly identify the library functions in the firmware and reduce the errors that may occur during reverse engineering.
我们发现,目前已有学术研究对执行蓝牙和 USB 协议的固件进行逆向工程,以研究其安全性。电子控制单元(ECU)固件实现了控制器局域网(CAN)协议,该协议通常用于实现汽车内部网络的通信。随着电动汽车的发展和壮大,汽车网络的安全性变得越来越重要。本文提出了一种对 ECU 固件进行逆向工程的方法,可以有效地帮助我们快速识别固件中的库函数,减少逆向工程中可能出现的错误。
{"title":"An improved method for reverse engineering ECU firmware","authors":"Yuhao Qiu","doi":"10.1117/12.3032054","DOIUrl":"https://doi.org/10.1117/12.3032054","url":null,"abstract":"We found that there are existing academic studies on reverse engineering the firmware that implements Bluetooth and USB protocols to study their security. Electronic Control Unit (ECU) firmware implements the Controller Area Network (CAN) protocol, which is commonly used to implement the communication of the vehicle’s internal network. With the development and growth of electric vehicles, the security of the vehicle network is becoming increasingly important. This paper proposes a method to reverse engineer ECU firmware, which can efficiently help us quickly identify the library functions in the firmware and reduce the errors that may occur during reverse engineering.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic mapping based on CVE and ATT&CK 基于 CVE 和 ATT&CK 的自动映射
Pub Date : 2024-06-06 DOI: 10.1117/12.3032103
Lei Wang, Li Sun, Duo Shang, Huihong He, Guangtao Nie, Haikuo Dong
The CVE is a database of cyber security vulnerabilities that describe the characteristics of vulnerabilities. MITRE ATT&CK formalizes attack patterns (including attack tactics and techniques) through abstract theory, and gives corresponding mitigation schemes, so it is significant to identify ATT&CK attack information from CVE. Since there is no link between the two, this paper proposes a Transformer-based mapping scheme to automatically map CVE’s to ATT&CK, and verify it on the CVE dataset, which has a good mapping effect and provides security operators with Intuitive reference.
CVE 是一个描述漏洞特征的网络安全漏洞数据库。MITRE ATT&CK 通过抽象理论将攻击模式(包括攻击战术和技术)形式化,并给出相应的缓解方案,因此从 CVE 中识别 ATT&CK 攻击信息意义重大。由于二者之间没有联系,本文提出了一种基于 Transformer 的映射方案,将 CVE 自动映射到 ATT&CK,并在 CVE 数据集上进行验证,映射效果良好,为安全操作人员提供了直观的参考。
{"title":"Automatic mapping based on CVE and ATT&CK","authors":"Lei Wang, Li Sun, Duo Shang, Huihong He, Guangtao Nie, Haikuo Dong","doi":"10.1117/12.3032103","DOIUrl":"https://doi.org/10.1117/12.3032103","url":null,"abstract":"The CVE is a database of cyber security vulnerabilities that describe the characteristics of vulnerabilities. MITRE ATT&CK formalizes attack patterns (including attack tactics and techniques) through abstract theory, and gives corresponding mitigation schemes, so it is significant to identify ATT&CK attack information from CVE. Since there is no link between the two, this paper proposes a Transformer-based mapping scheme to automatically map CVE’s to ATT&CK, and verify it on the CVE dataset, which has a good mapping effect and provides security operators with Intuitive reference.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method for microservice partitioning of monolithic systems based on multifeature fusion 基于多特征融合的单体系统微服务分区方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3031975
Xiaoyan Gao, Junfeng Zhao
With the popularity of microservices architecture, how to refactor a monolithic system into a microservices architecture has become a challenge. Traditional system refactoring strategies often focus on a single aspect, such as conducting source code analysis or system load analysis in isolation. This approach has a limited perspective and cannot comprehensively integrate the diverse characteristics of the system for refactoring. This paper proposes a microservices partitioning method for monolithic systems that integrates multiple features. Firstly, it integrates source code and runtime system data to comprehensively acquire system characteristics. By calculating the semantic similarity of class documents, the similarity of abstract syntax trees, and the frequency of interaction between classes, three types of weights are generated. Then, by assigning different weights, a comprehensive weight is calculated to construct an undirected weighted graph representing dependency relationships. Finally, the Chinese Whisper clustering algorithm is used to partition monolithic systems, obtaining suitable microservice modules. Experimental results show that this method can help developers better understand and partition the system, achieving a microservices architecture with high cohesion and low coupling.
随着微服务架构的流行,如何将单体系统重构为微服务架构成为一项挑战。传统的系统重构策略往往只关注单一方面,如孤立地进行源代码分析或系统负载分析。这种方法视角有限,无法全面整合系统的各种特性进行重构。本文提出了一种针对单体系统的微服务分区方法,该方法集成了多种特性。首先,它整合了源代码和运行时系统数据,全面获取系统特征。通过计算类文档的语义相似性、抽象语法树的相似性和类之间的交互频率,生成三种权重。然后,通过分配不同的权重,计算出一个综合权重,从而构建一个代表依赖关系的无向加权图。最后,利用中文悄悄话聚类算法对单体系统进行分区,得到合适的微服务模块。实验结果表明,这种方法可以帮助开发人员更好地理解和划分系统,实现高内聚、低耦合的微服务架构。
{"title":"A method for microservice partitioning of monolithic systems based on multifeature fusion","authors":"Xiaoyan Gao, Junfeng Zhao","doi":"10.1117/12.3031975","DOIUrl":"https://doi.org/10.1117/12.3031975","url":null,"abstract":"With the popularity of microservices architecture, how to refactor a monolithic system into a microservices architecture has become a challenge. Traditional system refactoring strategies often focus on a single aspect, such as conducting source code analysis or system load analysis in isolation. This approach has a limited perspective and cannot comprehensively integrate the diverse characteristics of the system for refactoring. This paper proposes a microservices partitioning method for monolithic systems that integrates multiple features. Firstly, it integrates source code and runtime system data to comprehensively acquire system characteristics. By calculating the semantic similarity of class documents, the similarity of abstract syntax trees, and the frequency of interaction between classes, three types of weights are generated. Then, by assigning different weights, a comprehensive weight is calculated to construct an undirected weighted graph representing dependency relationships. Finally, the Chinese Whisper clustering algorithm is used to partition monolithic systems, obtaining suitable microservice modules. Experimental results show that this method can help developers better understand and partition the system, achieving a microservices architecture with high cohesion and low coupling.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141375973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Based on QUBO models with quantum-inspired algorithms to enhance the CVQKD systems to ensure security of hacking 基于 QUBO 模型与量子启发算法,增强 CVQKD 系统,确保黑客攻击的安全性
Pub Date : 2024-06-06 DOI: 10.1117/12.3031949
Feiyue Zhu, Haifeng Qiu, Ziyu Wang
This paper presents the need for innovative solutions to optimize computational power networks and the application of quantum computing to tackle real-world challenges. Our research addresses this critical issue by developing a robust pre-training scheme that integrates Quantum Unweighted Quadratic Unconstrained Binary Optimization (QUBO) models with quantum-inspired algorithms. This approach aims to enhance the adversarial robustness of CVQKD systems, ensuring their security in the face of sophisticated hacking attempts. Our experimental results demonstrate that the proposed strategy effectively defends against adversarial attacks while maintaining the integrity of secret keys, showcasing the adaptability and efficiency of QUBO models in quantum communication scenarios. This work not only contributes to the broader application of QUBO models in quantum communication but also provides a robust pre-training scheme that can be generalized and transplanted to other machine learning-assisted systems, significantly improving their security in the face of adversarial attacks.
本文介绍了优化计算能力网络对创新解决方案的需求,以及量子计算在应对现实世界挑战中的应用。我们的研究通过开发一种稳健的预训练方案来解决这一关键问题,该方案将量子非加权二次无约束二元优化(QUBO)模型与量子启发算法相结合。这种方法旨在增强 CVQKD 系统的对抗鲁棒性,确保其在面对复杂黑客攻击时的安全性。我们的实验结果表明,所提出的策略能有效抵御对抗性攻击,同时保持密钥的完整性,展示了 QUBO 模型在量子通信场景中的适应性和效率。这项工作不仅有助于 QUBO 模型在量子通信中的更广泛应用,还提供了一种稳健的预训练方案,可以推广并移植到其他机器学习辅助系统中,从而显著提高这些系统在面对对抗性攻击时的安全性。
{"title":"Based on QUBO models with quantum-inspired algorithms to enhance the CVQKD systems to ensure security of hacking","authors":"Feiyue Zhu, Haifeng Qiu, Ziyu Wang","doi":"10.1117/12.3031949","DOIUrl":"https://doi.org/10.1117/12.3031949","url":null,"abstract":"This paper presents the need for innovative solutions to optimize computational power networks and the application of quantum computing to tackle real-world challenges. Our research addresses this critical issue by developing a robust pre-training scheme that integrates Quantum Unweighted Quadratic Unconstrained Binary Optimization (QUBO) models with quantum-inspired algorithms. This approach aims to enhance the adversarial robustness of CVQKD systems, ensuring their security in the face of sophisticated hacking attempts. Our experimental results demonstrate that the proposed strategy effectively defends against adversarial attacks while maintaining the integrity of secret keys, showcasing the adaptability and efficiency of QUBO models in quantum communication scenarios. This work not only contributes to the broader application of QUBO models in quantum communication but also provides a robust pre-training scheme that can be generalized and transplanted to other machine learning-assisted systems, significantly improving their security in the face of adversarial attacks.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Other Conferences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1