首页 > 最新文献

Other Conferences最新文献

英文 中文
Research on WCET assessment method of airborne display software 机载显示软件的 WCET 评估方法研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3032008
Junfeng Xu
Airborne display software WCET assessment relies on actual scenario and traditional static analysis and dynamic test methods can not reflect actual scenario requirements. To achieve WCET value closing to actual scenario for resource saving purpose, firstly the typical architecture of airborne display unit is described; secondly, the worst scenario analysis principles for WCET are identified; thirdly, WCET assessment flow and steps are proposed respectively for non-A661 partition and A661 service partition; lastly, the WCET acceptance principles are given in both software level and system level. This research can help to support airborne display software resource assessment and allocation in the early stage of software design.
机载显示软件的 WCET 评估依赖于实际场景,传统的静态分析和动态测试方法无法反映实际场景的要求。为实现WCET值接近实际场景,达到节约资源的目的,首先描述了机载显示单元的典型架构;其次,确定了WCET的最坏场景分析原则;第三,分别提出了非A661分区和A661业务分区的WCET评估流程和步骤;最后,给出了软件级和系统级的WCET验收原则。这项研究有助于在软件设计初期支持机载显示软件资源评估和分配。
{"title":"Research on WCET assessment method of airborne display software","authors":"Junfeng Xu","doi":"10.1117/12.3032008","DOIUrl":"https://doi.org/10.1117/12.3032008","url":null,"abstract":"Airborne display software WCET assessment relies on actual scenario and traditional static analysis and dynamic test methods can not reflect actual scenario requirements. To achieve WCET value closing to actual scenario for resource saving purpose, firstly the typical architecture of airborne display unit is described; secondly, the worst scenario analysis principles for WCET are identified; thirdly, WCET assessment flow and steps are proposed respectively for non-A661 partition and A661 service partition; lastly, the WCET acceptance principles are given in both software level and system level. This research can help to support airborne display software resource assessment and allocation in the early stage of software design.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"183 2","pages":"131751D - 131751D-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141375809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D reconstruction in industrial environments based on an improved neural radiation field method research 基于改进的神经辐射场方法的工业环境三维重建研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3031943
Kaichen Zhou, Tianlun Huang, Weijun Wang, Haowen Luo, Fawad Khan, Ziqian Du, Wei Feng
Neural Radiation Field (NeRF) is driving the development of 3D reconstruction technology. Several NeRF variants have been proposed to improve rendering accuracy and reconstruction speed. One of the most significant variants, TensoRF, uses a 4D tensor to model the radiation field, resulting in improved accuracy and speed. However, reconstruction quality remains limited. This study presents an improved TensoRF that addresses the aforementioned issues by reconstructing its multilayer perceptron network. Increasing the number of neurons in the input and network layers improves the render accuracy. To accelerate the reconstruction speed, we utilized the Nadam optimization algorithm and the RELU6 activation function. Our experiments on various classical datasets demonstrate that the PSNR value of the improved TensoRF is higher than that of the original TensoRF. Additionally, the improved TensoRF has a faster reconstruction speed (≤30min). Finally, we applied the improved TensoRF to a self-made industrial dataset. The results showed better global accuracy and local texture in the reconstructed image.
神经辐射场(NeRF)正在推动三维重建技术的发展。为了提高渲染精度和重建速度,已经提出了几种 NeRF 变体。其中最重要的变体之一是 TensoRF,它使用 4D 张量对辐射场进行建模,从而提高了精度和速度。然而,重建质量仍然有限。本研究提出了一种改进的 TensoRF,通过重建其多层感知器网络来解决上述问题。增加输入层和网络层的神经元数量可提高渲染精度。为了加快重构速度,我们采用了 Nadam 优化算法和 RELU6 激活函数。我们在各种经典数据集上的实验表明,改进后的 TensoRF 的 PSNR 值高于原始 TensoRF。此外,改进型 TensoRF 的重建速度更快(≤30 分钟)。最后,我们将改进后的 TensoRF 应用于自制的工业数据集。结果表明,重建图像的全局精度和局部纹理更好。
{"title":"3D reconstruction in industrial environments based on an improved neural radiation field method research","authors":"Kaichen Zhou, Tianlun Huang, Weijun Wang, Haowen Luo, Fawad Khan, Ziqian Du, Wei Feng","doi":"10.1117/12.3031943","DOIUrl":"https://doi.org/10.1117/12.3031943","url":null,"abstract":"Neural Radiation Field (NeRF) is driving the development of 3D reconstruction technology. Several NeRF variants have been proposed to improve rendering accuracy and reconstruction speed. One of the most significant variants, TensoRF, uses a 4D tensor to model the radiation field, resulting in improved accuracy and speed. However, reconstruction quality remains limited. This study presents an improved TensoRF that addresses the aforementioned issues by reconstructing its multilayer perceptron network. Increasing the number of neurons in the input and network layers improves the render accuracy. To accelerate the reconstruction speed, we utilized the Nadam optimization algorithm and the RELU6 activation function. Our experiments on various classical datasets demonstrate that the PSNR value of the improved TensoRF is higher than that of the original TensoRF. Additionally, the improved TensoRF has a faster reconstruction speed (≤30min). Finally, we applied the improved TensoRF to a self-made industrial dataset. The results showed better global accuracy and local texture in the reconstructed image.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"43 1","pages":"1317513 - 1317513-8"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and implementation of urban water supply pipe network management system based on WebGIS 基于 WebGIS 的城市供水管网管理系统的研究与实施
Pub Date : 2024-06-06 DOI: 10.1117/12.3032002
Xinpei Cai, Sen Lin, sihan cai, Yuxuan Chen
The urban water supply network affects residents' water use experience and the economic benefits of water supply enterprises, and is an important component of the urban underground pipeline network. With the continuous changes in the pipeline network, the urban water supply network has formed a very complex spatial information system. Due to the difficulty in accurately obtaining information about the water supply network and the traditional manual drawing, manual statistics, and manual analysis management mode which cannot handle the gradually complex information of the network, it is currently very difficult to maintain the network. This article analyzes the current situation of China's urban water supply network. Based on the problems of low information query efficiency and errors in network analysis processes, a water supply network WebGIS management system was developed based on database and GIS technology. The system has a total of 17 functions divided into five modules according to function type: display configuration, data queries, information statistics, network analysis, and map printing. The system uses a spatial database to solve the problem of processing complex network information, and its query function can quickly search for network information. By setting conditions, data filtering can be achieved, greatly improving the efficiency of information retrieval. This system uses GIS technology to visualize the water supply network and provides various click events, making the system interactive and improving the efficiency of information retrieval. In terms of spatial analysis, this article found that the water supply network can be represented by a graph, and algorithms from graph theory can be used to search for pipelines and nodes in the network. Therefore, this system has implemented two major functions of connectivity analysis and valve closing analysis in the network analysis module using Dijkstra's algorithm and breadth-first search algorithm respectively. This system can bring great convenience to the daily maintenance of the water supply network and reduce the error rate of maintenance work. Relevant departments of the government can achieve efficient management of the urban water supply network through the system's data query and network analysis functions.
城市供水管网影响着居民的用水体验和供水企业的经济效益,是城市地下管网的重要组成部分。随着管网的不断变化,城市供水管网已经形成了一个非常复杂的空间信息系统。由于供水管网信息难以准确获取,传统的手工绘制、手工统计、手工分析管理模式无法处理逐渐复杂的管网信息,目前供水管网维护难度很大。本文分析了中国城市供水管网的现状。针对供水管网信息查询效率低、管网分析过程存在误差等问题,基于数据库和 GIS 技术开发了供水管网 WebGIS 管理系统。该系统共有 17 项功能,按功能类型分为五个模块:显示配置、数据查询、信息统计、网络分析和地图打印。系统利用空间数据库解决复杂网络信息的处理问题,其查询功能可快速搜索网络信息。通过设置条件,可以实现数据过滤,大大提高了信息检索的效率。该系统利用 GIS 技术将供水管网可视化,并提供各种点击事件,使系统具有交互性,提高了信息检索的效率。在空间分析方面,本文发现供水网络可以用图来表示,图论中的算法可以用来搜索网络中的管道和节点。因此,本系统在网络分析模块中分别采用 Dijkstra 算法和广度优先搜索算法实现了连通性分析和阀门关闭分析两大功能。该系统可为供水管网的日常维护工作带来极大的便利,降低维护工作的出错率。政府相关部门可通过系统的数据查询和网络分析功能实现对城市供水管网的高效管理。
{"title":"Research and implementation of urban water supply pipe network management system based on WebGIS","authors":"Xinpei Cai, Sen Lin, sihan cai, Yuxuan Chen","doi":"10.1117/12.3032002","DOIUrl":"https://doi.org/10.1117/12.3032002","url":null,"abstract":"The urban water supply network affects residents' water use experience and the economic benefits of water supply enterprises, and is an important component of the urban underground pipeline network. With the continuous changes in the pipeline network, the urban water supply network has formed a very complex spatial information system. Due to the difficulty in accurately obtaining information about the water supply network and the traditional manual drawing, manual statistics, and manual analysis management mode which cannot handle the gradually complex information of the network, it is currently very difficult to maintain the network. This article analyzes the current situation of China's urban water supply network. Based on the problems of low information query efficiency and errors in network analysis processes, a water supply network WebGIS management system was developed based on database and GIS technology. The system has a total of 17 functions divided into five modules according to function type: display configuration, data queries, information statistics, network analysis, and map printing. The system uses a spatial database to solve the problem of processing complex network information, and its query function can quickly search for network information. By setting conditions, data filtering can be achieved, greatly improving the efficiency of information retrieval. This system uses GIS technology to visualize the water supply network and provides various click events, making the system interactive and improving the efficiency of information retrieval. In terms of spatial analysis, this article found that the water supply network can be represented by a graph, and algorithms from graph theory can be used to search for pipelines and nodes in the network. Therefore, this system has implemented two major functions of connectivity analysis and valve closing analysis in the network analysis module using Dijkstra's algorithm and breadth-first search algorithm respectively. This system can bring great convenience to the daily maintenance of the water supply network and reduce the error rate of maintenance work. Relevant departments of the government can achieve efficient management of the urban water supply network through the system's data query and network analysis functions.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"25 13","pages":"131751X - 131751X-9"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on privacy data processing based on symmetric encryption algorithm 基于对称加密算法的隐私数据处理研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3031900
Haotong Guo
Nowadays, privacy data has widely stored and shared through the cloud storage services from numerous users and organizations. However, existing cloud services are concentrating on improving the data storage amount and ignore the privacy data protection for data owners. In order to protect the privacy data, data owners may encrypt the information and then upload to the cloud servers. Cloud server cannot guarantee the encryption data are not at-tacked or modified by malicious attackers. In this paper, we propose a novel symmetric encryption algorithm to encrypt the privacy data for users and generate the checks for cloud servers and guarantee the privacy cannot be modified and lost by system errors. From our extensive experimental, we can conclude that our proposed model can achieve the protection of privacy by simulating the different attacks with reasonable response period. Furthermore, we compare our model with existing encryption methods and evaluate the effectiveness performance.
如今,众多用户和组织通过云存储服务广泛存储和共享隐私数据。然而,现有的云服务只注重提高数据存储量,而忽视了对数据所有者隐私数据的保护。为了保护隐私数据,数据所有者可以对信息进行加密,然后上传到云服务器。云服务器无法保证加密数据不被恶意攻击者攻击或修改。在本文中,我们提出了一种新型对称加密算法,为用户加密隐私数据,并为云服务器生成校验,保证隐私数据不会因系统错误而被修改和丢失。通过大量的实验,我们可以得出结论:我们提出的模型可以通过模拟不同的攻击,在合理的响应时间内实现对隐私的保护。此外,我们还将我们的模型与现有的加密方法进行了比较,并评估了其有效性能。
{"title":"Research on privacy data processing based on symmetric encryption algorithm","authors":"Haotong Guo","doi":"10.1117/12.3031900","DOIUrl":"https://doi.org/10.1117/12.3031900","url":null,"abstract":"Nowadays, privacy data has widely stored and shared through the cloud storage services from numerous users and organizations. However, existing cloud services are concentrating on improving the data storage amount and ignore the privacy data protection for data owners. In order to protect the privacy data, data owners may encrypt the information and then upload to the cloud servers. Cloud server cannot guarantee the encryption data are not at-tacked or modified by malicious attackers. In this paper, we propose a novel symmetric encryption algorithm to encrypt the privacy data for users and generate the checks for cloud servers and guarantee the privacy cannot be modified and lost by system errors. From our extensive experimental, we can conclude that our proposed model can achieve the protection of privacy by simulating the different attacks with reasonable response period. Furthermore, we compare our model with existing encryption methods and evaluate the effectiveness performance.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"112 4","pages":"131750T - 131750T-5"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CBAN: A DDoS detection method based on CNN, BiGRU, and attention mechanism CBAN:基于 CNN、BiGRU 和注意力机制的 DDoS 检测方法
Pub Date : 2024-06-06 DOI: 10.1117/12.3032053
Bing Wang, Yankun Yu, Chunlan Zhao, Jing Jiang
In order to address the obstacles posed by the growing security issues of the Internet of Things to the development of big data, this paper conducts in-depth research on the defense of the most harmful DDoS attack. This paper designs a deep learning model for DDoS detection - CBAN. The CBAN model integrates technologies such as 1D-CNN, BiGRU, and attention mechanism for structural design. This model can effectively extract spatial and temporal features of network traffic data for efficient detection of potential DDoS attacks. The CBAN model has shown excellent performance on the CIC-DDoS-2019 dataset.
针对物联网安全问题日益突出给大数据发展带来的障碍,本文对危害最大的DDoS攻击防御进行了深入研究。本文设计了一种用于 DDoS 检测的深度学习模型--CBAN。CBAN 模型在结构设计上集成了一维-CNN、BiGRU 和注意力机制等技术。该模型能有效提取网络流量数据的时空特征,从而高效检测潜在的 DDoS 攻击。CBAN 模型在 CIC-DDoS-2019 数据集上表现出色。
{"title":"CBAN: A DDoS detection method based on CNN, BiGRU, and attention mechanism","authors":"Bing Wang, Yankun Yu, Chunlan Zhao, Jing Jiang","doi":"10.1117/12.3032053","DOIUrl":"https://doi.org/10.1117/12.3032053","url":null,"abstract":"In order to address the obstacles posed by the growing security issues of the Internet of Things to the development of big data, this paper conducts in-depth research on the defense of the most harmful DDoS attack. This paper designs a deep learning model for DDoS detection - CBAN. The CBAN model integrates technologies such as 1D-CNN, BiGRU, and attention mechanism for structural design. This model can effectively extract spatial and temporal features of network traffic data for efficient detection of potential DDoS attacks. The CBAN model has shown excellent performance on the CIC-DDoS-2019 dataset.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"64 2","pages":"131750I - 131750I-5"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141381564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on a more safe image encryption communication algorithm 研究更安全的图像加密通信算法
Pub Date : 2024-06-06 DOI: 10.1117/12.3032082
Lu Liu, Yuhui Li, Ting Wang, Yuhan Qin, Yuhan Ren
Image encryption has become one of the key techniques for information protection in today's context of increasing number and rising importance of digital communication. The purpose of this paper is to explore a creative image encryption method based on Rijndael algorithm and chaos algorithm, which disambiguates the image, hash value calculation. Then encrypted by Rijndael algorithm and generates a secure ciphertext. Compared to traditional encryption, this algorithm greatly improves the security and speed of encryption by combining multiple encryption techniques, and by conducting several encryption and decryption experiments on this algorithm, we prove that this method has a great prospect for security applications.
在数字通信数量不断增加、重要性不断提高的今天,图像加密已成为信息保护的关键技术之一。本文旨在探索一种基于 Rijndael 算法和混沌算法的创造性图像加密方法。然后用 Rijndael 算法加密,生成安全的密文。与传统加密相比,该算法通过结合多种加密技术,大大提高了加密的安全性和速度,并通过对该算法进行多次加密和解密实验,证明该方法在安全领域具有广阔的应用前景。
{"title":"Research on a more safe image encryption communication algorithm","authors":"Lu Liu, Yuhui Li, Ting Wang, Yuhan Qin, Yuhan Ren","doi":"10.1117/12.3032082","DOIUrl":"https://doi.org/10.1117/12.3032082","url":null,"abstract":"Image encryption has become one of the key techniques for information protection in today's context of increasing number and rising importance of digital communication. The purpose of this paper is to explore a creative image encryption method based on Rijndael algorithm and chaos algorithm, which disambiguates the image, hash value calculation. Then encrypted by Rijndael algorithm and generates a secure ciphertext. Compared to traditional encryption, this algorithm greatly improves the security and speed of encryption by combining multiple encryption techniques, and by conducting several encryption and decryption experiments on this algorithm, we prove that this method has a great prospect for security applications.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"54 3‐4","pages":"131750R - 131750R-6"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141376372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MCPKI-based certificate chain extension scheme for vTPM 基于 MCPKI 的 vTPM 证书链扩展方案
Pub Date : 2024-06-06 DOI: 10.1117/12.3031946
zhentao xiao, Pan Dong
To meet the trust requirements of complex environments such as cloud platforms, physical trust modules are often virtualized into virtual Trusted Platform Module (vTPM) to function as the root of trust for each virtual machine or container. In remote attestation, vTPM utilize hardware-TPM-based certificate chain extension schemes to ensure its trustworthiness. Existing vTPM certificate chain extension schemes must turn to Privacy Certificates Authority (PCA) for new certificate during every attestation, however, result in excessive computational and communication overheads. To address this issue, this paper proposes a vTPM certificate chain extension scheme based on Multi-Certificate Public Key Infrastructure (MCPKI). This scheme allows unsigned sub-certificates to have the same legitimacy and identity as the root certificate through certificates correlation. In this way, vTPM can have multiple certificates with valid identity and only need to apply to PCA once, which reduces the performance loss caused by repetitive validation in traditional certificate chain extension schemes and enhances the efficiency of Privacy CA certificate issuance. Furthermore, certificate generation is handled by the local vTPM, reducing communication overheads. A new trusted third-party Verification Certificate Authority (VCA) is introduced to share the validation workload of Privacy CA and reduce the reliance on Privacy CA in certificate chain extension. The experiment results demonstrate that this scheme outperforms traditional certificate chain extension schemes in scenarios with multiple certificates requirement.
为满足云平台等复杂环境的信任要求,物理信任模块通常被虚拟成虚拟可信平台模块(vTPM),作为每个虚拟机或容器的信任根。在远程验证中,vTPM 利用基于硬件-TPM 的证书链扩展方案来确保其可信度。现有的 vTPM 证书链扩展方案必须在每次验证时向隐私证书颁发机构(PCA)申请新证书,但这会导致过高的计算和通信开销。为解决这一问题,本文提出了一种基于多证书公钥基础设施(MCPKI)的 vTPM 证书链扩展方案。该方案通过证书关联,使未签名的子证书具有与根证书相同的合法性和身份。这样,vTPM 可以拥有多个有效身份的证书,只需向 PCA 申请一次,减少了传统证书链扩展方案中重复验证造成的性能损失,提高了隐私 CA 证书签发的效率。此外,证书生成由本地 vTPM 处理,减少了通信开销。该方案引入了一个新的可信第三方验证证书机构(VCA),以分担隐私 CA 的验证工作量,减少证书链扩展对隐私 CA 的依赖。实验结果表明,在需要多个证书的情况下,该方案优于传统的证书链扩展方案。
{"title":"MCPKI-based certificate chain extension scheme for vTPM","authors":"zhentao xiao, Pan Dong","doi":"10.1117/12.3031946","DOIUrl":"https://doi.org/10.1117/12.3031946","url":null,"abstract":"To meet the trust requirements of complex environments such as cloud platforms, physical trust modules are often virtualized into virtual Trusted Platform Module (vTPM) to function as the root of trust for each virtual machine or container. In remote attestation, vTPM utilize hardware-TPM-based certificate chain extension schemes to ensure its trustworthiness. Existing vTPM certificate chain extension schemes must turn to Privacy Certificates Authority (PCA) for new certificate during every attestation, however, result in excessive computational and communication overheads. To address this issue, this paper proposes a vTPM certificate chain extension scheme based on Multi-Certificate Public Key Infrastructure (MCPKI). This scheme allows unsigned sub-certificates to have the same legitimacy and identity as the root certificate through certificates correlation. In this way, vTPM can have multiple certificates with valid identity and only need to apply to PCA once, which reduces the performance loss caused by repetitive validation in traditional certificate chain extension schemes and enhances the efficiency of Privacy CA certificate issuance. Furthermore, certificate generation is handled by the local vTPM, reducing communication overheads. A new trusted third-party Verification Certificate Authority (VCA) is introduced to share the validation workload of Privacy CA and reduce the reliance on Privacy CA in certificate chain extension. The experiment results demonstrate that this scheme outperforms traditional certificate chain extension schemes in scenarios with multiple certificates requirement.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"115 12","pages":"131751I - 131751I-9"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiview stereo reconstruction based on context-aware transformer 基于上下文感知变换器的多视图立体重建
Pub Date : 2024-06-06 DOI: 10.1117/12.3032052
Zhaoxu Tian
This paper tackles the challenges inherent in existing Multi-View Stereo (MVS) methods, which often struggle with scenes that have repetitive textures and complex scenarios, leading to reconstructions that lack quality, completeness, and accuracy. To address these issues, we introduce a novel deep learning network, Clo-PatchmatchNet, which leverages context-aware Transformers for enhanced performance. The network's architecture starts with a feature extraction module that processes image features. These features are then input into a learnable Patchmatch algorithm, creating an initial depth map. This map undergoes further refinement to yield the final, detailed depth map. A key innovation in our approach is the integration of a context-aware Transformer block, known as Cloblock, into the feature extraction stage. This allows the network to effectively capture both global contextual information and high-frequency local details, enhancing feature matching across various views. Our experimental evaluations, conducted on the Technical University of Denmark (DTU) dataset, reveal that Clo-PatchmatchNet outperforms the traditional PatchmatchNet by achieving a 2.5% improvement in reconstruction completeness and a 1.2% increase in accuracy, resulting in an overall enhancement of 1.7%. Moreover, when compared to other contemporary methods, our proposed solution demonstrates superior performance in terms of both completeness and overall quality, marking a significant advancement in the field of 3D reconstruction.
现有的多视图立体(Multi-View Stereo,MVS)方法往往难以处理具有重复纹理和复杂场景的场景,导致重建的质量、完整性和准确性不足。为了解决这些问题,我们引入了一种新型深度学习网络--Clo-PatchmatchNet,它利用上下文感知变换器来提高性能。该网络的架构从处理图像特征的特征提取模块开始。然后将这些特征输入可学习的 Patchmatch 算法,创建初始深度图。该图经过进一步细化,最终生成详细的深度图。我们方法中的一项关键创新是在特征提取阶段集成了一个上下文感知变换器模块(称为 Cloblock)。这使得网络能够有效捕捉全局上下文信息和高频局部细节,从而增强不同视图的特征匹配。我们在丹麦技术大学(DTU)的数据集上进行的实验评估显示,Clo-PatchmatchNet 优于传统的 PatchmatchNet,重建完整性提高了 2.5%,准确性提高了 1.2%,整体提高了 1.7%。此外,与其他当代方法相比,我们提出的解决方案在完整性和整体质量方面都表现出了卓越的性能,标志着三维重建领域的重大进步。
{"title":"Multiview stereo reconstruction based on context-aware transformer","authors":"Zhaoxu Tian","doi":"10.1117/12.3032052","DOIUrl":"https://doi.org/10.1117/12.3032052","url":null,"abstract":"This paper tackles the challenges inherent in existing Multi-View Stereo (MVS) methods, which often struggle with scenes that have repetitive textures and complex scenarios, leading to reconstructions that lack quality, completeness, and accuracy. To address these issues, we introduce a novel deep learning network, Clo-PatchmatchNet, which leverages context-aware Transformers for enhanced performance. The network's architecture starts with a feature extraction module that processes image features. These features are then input into a learnable Patchmatch algorithm, creating an initial depth map. This map undergoes further refinement to yield the final, detailed depth map. A key innovation in our approach is the integration of a context-aware Transformer block, known as Cloblock, into the feature extraction stage. This allows the network to effectively capture both global contextual information and high-frequency local details, enhancing feature matching across various views. Our experimental evaluations, conducted on the Technical University of Denmark (DTU) dataset, reveal that Clo-PatchmatchNet outperforms the traditional PatchmatchNet by achieving a 2.5% improvement in reconstruction completeness and a 1.2% increase in accuracy, resulting in an overall enhancement of 1.7%. Moreover, when compared to other contemporary methods, our proposed solution demonstrates superior performance in terms of both completeness and overall quality, marking a significant advancement in the field of 3D reconstruction.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"128 5","pages":"131750U - 131750U-5"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141377024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on key privacy protection technologies supporting flexible distributed resource layered aggregation transactions 支持灵活分布式资源分层聚合交易的关键隐私保护技术研究
Pub Date : 2024-06-06 DOI: 10.1117/12.3031931
Shuang Sun, Xiangbo Zhu, Weiyu Wang, Xuesen Zhang, Huan He
In the "dual carbon" goal background, massive, dispersed, and ubiquitous distributed resources are becoming an important component of China's power system. However, distributed flexible resources faced with security issues, such as data loss, data tampering, and privacy breaches, during the process of participating in power trading by aggregation method. Therefore, this article proposes key privacy protection technologies to support flexible resource hierarchical aggregation transactions. Through fully analyzing the current situation of flexible resource hierarchical aggregation transaction and the existing privacy leakage problems, this paper designs a collaborative interaction process of flexible resource hierarchical aggregation transactions, and implements privacy protection for electricity enterprises participating in aggregation and benefit distribution in a trustworthy and autonomous manner.
在 "双碳 "目标背景下,海量、分散、泛在的分布式资源正成为中国电力系统的重要组成部分。然而,分布式柔性资源在以聚合方式参与电力交易的过程中,面临着数据丢失、数据篡改、隐私泄露等安全问题。因此,本文提出了支持柔性资源分级聚合交易的隐私保护关键技术。通过充分分析柔性资源分级撮合交易的现状和存在的隐私泄露问题,本文设计了柔性资源分级撮合交易的协同交互流程,以可信、自主的方式为参与撮合和利益分配的电力企业实现隐私保护。
{"title":"Research on key privacy protection technologies supporting flexible distributed resource layered aggregation transactions","authors":"Shuang Sun, Xiangbo Zhu, Weiyu Wang, Xuesen Zhang, Huan He","doi":"10.1117/12.3031931","DOIUrl":"https://doi.org/10.1117/12.3031931","url":null,"abstract":"In the \"dual carbon\" goal background, massive, dispersed, and ubiquitous distributed resources are becoming an important component of China's power system. However, distributed flexible resources faced with security issues, such as data loss, data tampering, and privacy breaches, during the process of participating in power trading by aggregation method. Therefore, this article proposes key privacy protection technologies to support flexible resource hierarchical aggregation transactions. Through fully analyzing the current situation of flexible resource hierarchical aggregation transaction and the existing privacy leakage problems, this paper designs a collaborative interaction process of flexible resource hierarchical aggregation transactions, and implements privacy protection for electricity enterprises participating in aggregation and benefit distribution in a trustworthy and autonomous manner.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"10 7","pages":"131750W - 131750W-12"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141378759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BGP prefix hijack detection algorithm based on MOAS event feature 基于 MOAS 事件特征的 BGP 前缀劫持检测算法
Pub Date : 2024-06-06 DOI: 10.1117/12.3032047
Kaiyu Chen
Border Gateway Protocol (BGP) is the Internet standard inter-domain routing protocol, has become an important infrastructure of the Internet. Due to the limitation of the initial design, BGP prefix hijacking is a kind of BGP security problem that needs to be solved urgently. This paper proposes a BGP prefix hijack detection algorithm based on Multiple Origin AS (MOAS) event feature, discovering and restoring MOAS events from BGP packets, and creating an event matrix for MOAS events based on the changes of source AS observed from different observation points over time. According to the MOAS event matrix, the eigenvalue of the event is calculated from the perspective of the overall probability of the event and the local visibility of the observation point. Finally, the characteristic value of the MOAS event is compared with the exception event threshold to determine whether the event is an exception event, and then the BGP prefix hijacking is found. Compared with the prefix hijacking detection algorithm based on source AS validity, the detection results of this algorithm have higher accuracy. This method is more practical in detecting prefix hijacking according to the characteristics of the event itself.
边界网关协议(BGP)是互联网标准的域间路由协议,已成为互联网的重要基础设施。由于初始设计的局限性,BGP 前缀劫持是一种亟待解决的 BGP 安全问题。本文提出了一种基于多源AS(MOAS)事件特征的BGP前缀劫持检测算法,从BGP数据包中发现并还原MOAS事件,并根据不同观测点观测到的源AS随时间的变化建立MOAS事件矩阵。根据 MOAS 事件矩阵,从事件的整体概率和观测点的本地可见性角度计算事件的特征值。最后,将 MOAS 事件的特征值与异常事件阈值进行比较,判断该事件是否为异常事件,进而发现 BGP 前缀劫持。与基于源 AS 有效性的前缀劫持检测算法相比,该算法的检测结果具有更高的准确性。根据事件本身的特征检测前缀劫持,这种方法更实用。
{"title":"BGP prefix hijack detection algorithm based on MOAS event feature","authors":"Kaiyu Chen","doi":"10.1117/12.3032047","DOIUrl":"https://doi.org/10.1117/12.3032047","url":null,"abstract":"Border Gateway Protocol (BGP) is the Internet standard inter-domain routing protocol, has become an important infrastructure of the Internet. Due to the limitation of the initial design, BGP prefix hijacking is a kind of BGP security problem that needs to be solved urgently. This paper proposes a BGP prefix hijack detection algorithm based on Multiple Origin AS (MOAS) event feature, discovering and restoring MOAS events from BGP packets, and creating an event matrix for MOAS events based on the changes of source AS observed from different observation points over time. According to the MOAS event matrix, the eigenvalue of the event is calculated from the perspective of the overall probability of the event and the local visibility of the observation point. Finally, the characteristic value of the MOAS event is compared with the exception event threshold to determine whether the event is an exception event, and then the BGP prefix hijacking is found. Compared with the prefix hijacking detection algorithm based on source AS validity, the detection results of this algorithm have higher accuracy. This method is more practical in detecting prefix hijacking according to the characteristics of the event itself.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"14 2","pages":"131750P - 131750P-9"},"PeriodicalIF":0.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141379271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Other Conferences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1