首页 > 最新文献

Proceedings of the 8th International Conference on Communication and Information Processing最新文献

英文 中文
Dynamic resource allocation on Vehicular edge computing and communication 基于车辆边缘计算和通信的动态资源分配
Senyu Yu, Yan Guo, Ning Li, Duan Xue, Cuntao Liu
The improvement of modern communication technology has made the Internet of Vehicles (IoV) advance by leaps and bounds, and promotes the progress of many technologies, such as mobile sensing, vehicular edge computing, sensor networks, satellite positioning, data analysis, etc. Vehicular edge computing (VEC) is an innovative computing paradigm which can provide flexible and reliable computation services for intelligent and connected vehicles. An optimized problem is formulated to minimize the total task offloading time delay by making a tradeoff between vehicle mobility and task nature. To tackle the optimization problem, we proposed the Delay-sensitive half-Determined atomic Search algorithm, called DeshDaS, in which we regard each intelligent vehicle as an atom and strategy as electron and consider electron transition process. Experimental results validate the effectiveness and superior of our algorithm compared with several existed offloading strategy, and the larger average amount of data waiting to be processed, the more significant our advantage is.
现代通信技术的完善,使车联网突飞猛进,推动了移动传感、车载边缘计算、传感器网络、卫星定位、数据分析等诸多技术的进步。车辆边缘计算(vehicle edge computing, VEC)是一种创新的计算范式,能够为智能网联车辆提供灵活可靠的计算服务。通过在车辆机动性和任务性质之间进行权衡,建立了最小化总任务卸载时间延迟的优化问题。为了解决优化问题,我们提出了延迟敏感半确定原子搜索算法(DeshDaS),该算法将每辆智能汽车视为一个原子,将策略视为电子,并考虑电子跃迁过程。实验结果验证了该算法与现有几种卸载策略的有效性和优越性,等待处理的平均数据量越大,优势越显著。
{"title":"Dynamic resource allocation on Vehicular edge computing and communication","authors":"Senyu Yu, Yan Guo, Ning Li, Duan Xue, Cuntao Liu","doi":"10.1145/3571662.3571696","DOIUrl":"https://doi.org/10.1145/3571662.3571696","url":null,"abstract":"The improvement of modern communication technology has made the Internet of Vehicles (IoV) advance by leaps and bounds, and promotes the progress of many technologies, such as mobile sensing, vehicular edge computing, sensor networks, satellite positioning, data analysis, etc. Vehicular edge computing (VEC) is an innovative computing paradigm which can provide flexible and reliable computation services for intelligent and connected vehicles. An optimized problem is formulated to minimize the total task offloading time delay by making a tradeoff between vehicle mobility and task nature. To tackle the optimization problem, we proposed the Delay-sensitive half-Determined atomic Search algorithm, called DeshDaS, in which we regard each intelligent vehicle as an atom and strategy as electron and consider electron transition process. Experimental results validate the effectiveness and superior of our algorithm compared with several existed offloading strategy, and the larger average amount of data waiting to be processed, the more significant our advantage is.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122148237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Enhanced Usage Control for data sharing in Industrial Internet 工业互联网数据共享的增强使用控制
Zhong Na, Kai Li, Wei Liu, Zhifeng Gao
Usage control (UCON) model realizes the usage control of resources by integrating authorization, obligations and conditions and providing characteristics of decision continuity and attribute mutability. In order to better adapt to the data interaction demand in the industrial Internet environment, the enhanced UCON(EN-UCON) model is proposed to extend the UCON model to maintain the persistent control of obligations in the lifecycle of resources usage. Firstly, the continuous monitoring of obligations is implemented through the post obligation model. And then, the performance of the obligation is recorded through the trust level, which will be incorporated into the subsequent authorization strategy as an important factor. Finally, the application of EN-UCON model in the industrial Internet interaction scenario is described through a specific case.
使用控制(UCON)模型通过整合授权、义务和条件,提供决策连续性和属性可变性的特点,实现对资源的使用控制。为了更好地适应工业互联网环境下的数据交互需求,提出增强UCON(EN-UCON)模型,对UCON模型进行扩展,保持对资源使用生命周期内义务的持续控制。首先,通过岗位义务模式实现义务的持续监测。然后,通过信任级别记录义务的履行情况,并将其作为重要因素纳入后续的授权策略。最后,通过具体案例描述了EN-UCON模型在工业互联网交互场景中的应用。
{"title":"The Enhanced Usage Control for data sharing in Industrial Internet","authors":"Zhong Na, Kai Li, Wei Liu, Zhifeng Gao","doi":"10.1145/3571662.3571689","DOIUrl":"https://doi.org/10.1145/3571662.3571689","url":null,"abstract":"Usage control (UCON) model realizes the usage control of resources by integrating authorization, obligations and conditions and providing characteristics of decision continuity and attribute mutability. In order to better adapt to the data interaction demand in the industrial Internet environment, the enhanced UCON(EN-UCON) model is proposed to extend the UCON model to maintain the persistent control of obligations in the lifecycle of resources usage. Firstly, the continuous monitoring of obligations is implemented through the post obligation model. And then, the performance of the obligation is recorded through the trust level, which will be incorporated into the subsequent authorization strategy as an important factor. Finally, the application of EN-UCON model in the industrial Internet interaction scenario is described through a specific case.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of Nonlinear Optimal Diffusion Functions over Finite Fields 有限域上非线性最优扩散函数的构造
B. Shen, Yu Zhou
The diffusion function with large branch number is a fundamental building block in the construction of many block ciphers to achieve provable bounds against differential and linear cryptanalysis. Conventional diffusion functions, which are constructed based on linear error-correction code, has the undesirable side effect that a linear diffusion function by itself is “transparent” (i.e., has transition probability of 1) to differential and linear cryptanalysis. Nonlinear diffusion functions are less studied in cryptographic literature, up to now. In this paper, we propose a practical criterion for nonlinear optimal diffusion functions. Using this criterion we construct generally a class of nonlinear optimal diffusion functions over finite field. Unlike the previous constructions, our functions are non-linear, and thus they can provide enhanced protection against differential and linear cryptanalysis.
具有大分支数的扩散函数是构造许多分组密码以实现抗微分和线性密码分析的可证明界的基本组成部分。传统的扩散函数是基于线性纠错码构建的,它有一个不良的副作用,即线性扩散函数本身对微分和线性密码分析是“透明的”(即转移概率为1)。迄今为止,密码学文献中对非线性扩散函数的研究较少。本文给出了非线性最优扩散函数的一个实用判据。利用这一准则构造了有限域上的一类非线性最优扩散函数。与前面的结构不同,我们的函数是非线性的,因此它们可以提供针对微分和线性密码分析的增强保护。
{"title":"Construction of Nonlinear Optimal Diffusion Functions over Finite Fields","authors":"B. Shen, Yu Zhou","doi":"10.1145/3571662.3571679","DOIUrl":"https://doi.org/10.1145/3571662.3571679","url":null,"abstract":"The diffusion function with large branch number is a fundamental building block in the construction of many block ciphers to achieve provable bounds against differential and linear cryptanalysis. Conventional diffusion functions, which are constructed based on linear error-correction code, has the undesirable side effect that a linear diffusion function by itself is “transparent” (i.e., has transition probability of 1) to differential and linear cryptanalysis. Nonlinear diffusion functions are less studied in cryptographic literature, up to now. In this paper, we propose a practical criterion for nonlinear optimal diffusion functions. Using this criterion we construct generally a class of nonlinear optimal diffusion functions over finite field. Unlike the previous constructions, our functions are non-linear, and thus they can provide enhanced protection against differential and linear cryptanalysis.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125953023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Intrusive Load Identification Based on Complex Spectrum and Support Vector Machine 基于复谱和支持向量机的非侵入式负载识别
Lingling Tu, Gaoyan Cai, Bingji Liang, Weining Mao
Aiming at the problem that the load identification accuracy of non-intrusive load monitoring (NILM) is greatly affected by the power of loads and the number of background loads, a non-intrusive load identification method based on the current complex spectrum and support vector machine (SVM) is proposed. Through the high-frequency sampling of the load's voltage and current, the complex spectrum of the current is extracted by the fast Fourier transform (FFT), and the multi-class SVM load identification model is established and optimized to realize the non-intrusive load identification. The algorithm is verified using the PLAID datasets, and the load identification accuracy of the algorithm is compared with SVM classifiers based on total harmonic distortion rate (THD), harmonic component ratio and harmonic amplitude. The results of the experiments show that the proposed method not only improves the identification accuracy of low-power loads, but also has higher identification accuracy and better identification robustness of switching load in multi-load scenarios.
针对非侵入式负荷监测(NILM)的负荷识别精度受负荷功率和背景负荷数量影响较大的问题,提出了一种基于当前复杂谱和支持向量机(SVM)的非侵入式负荷识别方法。通过对负载电压和电流的高频采样,利用快速傅里叶变换(FFT)提取电流的复谱,建立并优化多类SVM负载识别模型,实现非侵入式负载识别。利用PLAID数据集对算法进行了验证,并与基于总谐波失真率(THD)、谐波分量比和谐波幅值的SVM分类器进行了负载识别精度比较。实验结果表明,该方法不仅提高了低功耗负载的识别精度,而且在多负载场景下对切换负载具有更高的识别精度和更好的识别鲁棒性。
{"title":"Non-Intrusive Load Identification Based on Complex Spectrum and Support Vector Machine","authors":"Lingling Tu, Gaoyan Cai, Bingji Liang, Weining Mao","doi":"10.1145/3571662.3571665","DOIUrl":"https://doi.org/10.1145/3571662.3571665","url":null,"abstract":"Aiming at the problem that the load identification accuracy of non-intrusive load monitoring (NILM) is greatly affected by the power of loads and the number of background loads, a non-intrusive load identification method based on the current complex spectrum and support vector machine (SVM) is proposed. Through the high-frequency sampling of the load's voltage and current, the complex spectrum of the current is extracted by the fast Fourier transform (FFT), and the multi-class SVM load identification model is established and optimized to realize the non-intrusive load identification. The algorithm is verified using the PLAID datasets, and the load identification accuracy of the algorithm is compared with SVM classifiers based on total harmonic distortion rate (THD), harmonic component ratio and harmonic amplitude. The results of the experiments show that the proposed method not only improves the identification accuracy of low-power loads, but also has higher identification accuracy and better identification robustness of switching load in multi-load scenarios.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Learning based on Asynchronized Discriminator GAN for remote sensing image segmentation 基于异步判别器GAN的分布式学习遥感图像分割
Mingkang Yuan, Ye Li, Jiaxi Sun, Baokun Shi, Jinzhong Xu, Lele Xu, Yisu Wang
Remote sensing images are usually distributed in different departments and contain private information, so they normally cannot be available publicly. However, it is a trend to jointly use remote sensing images from different departments, because it normally enables the model to capture more information and remote sensing image analysis based on deep learning generally requires lots of training data. To address the above problem, in this paper, we apply a distributed asynchronized discriminator GAN framework (DGAN) to jointly learn remote sensing images from different client nodes. The DGAN is composed of multiple distributed discriminators and a central generator, and only the synthetic remote sensing images generated by the DGAN are used to train a semantic segmentation model. Based on DGAN, we establish an experimental platform composed of multiple different hosts, which adopts socket and multi-process technology to realize asynchronous communication between hosts, and visualize the training and testing process. During DGAN training, instead of original remote sensing images or convolutional network model information, only synthetic images, losses and labeled images are exchanged between nodes. Therefore, the DGAN well protects the privacy and security of the original remote sensing images. We verify the performance of the DGAN on three remote sensing image datasets (City-OSM, WHU and Kaggle Ship). In the experiments, we take different distributions of remote sensing images in client nodes into consideration. The experiments show that the DGAN has a great capacity for distributed remote sensing image learning without sharing the original remote sensing images or the convolutional network model. Moreover, compared with a centralized GAN trained on all remote sensing images collected from all client nodes, the DGAN can achieve almost the same performance in semantic segmentation tasks for remote sensing images.
遥感图像通常分布在不同的部门,包含私人信息,因此通常不能公开获取。然而,联合使用不同部门的遥感图像是一个趋势,因为它通常可以使模型捕获更多的信息,而基于深度学习的遥感图像分析通常需要大量的训练数据。为了解决上述问题,本文采用分布式异步判别器GAN框架(DGAN)对不同客户端节点的遥感图像进行联合学习。DGAN由多个分布式鉴别器和一个中央生成器组成,仅使用DGAN生成的合成遥感图像来训练语义分割模型。基于DGAN,我们建立了一个由多台不同主机组成的实验平台,该平台采用套接字和多进程技术实现主机间异步通信,并将训练和测试过程可视化。在DGAN训练过程中,节点之间只交换合成图像、损失图像和标记图像,而不是原始遥感图像或卷积网络模型信息。因此,DGAN很好地保护了原始遥感图像的隐私性和安全性。我们在三个遥感图像数据集(City-OSM, WHU和Kaggle Ship)上验证了DGAN的性能。在实验中,我们考虑了客户端节点遥感图像的不同分布。实验表明,在不共享原始遥感图像和卷积网络模型的情况下,DGAN具有很强的分布式遥感图像学习能力。此外,与对从所有客户端节点收集的所有遥感图像进行集中训练的GAN相比,DGAN在遥感图像的语义分割任务中可以达到几乎相同的性能。
{"title":"Distributed Learning based on Asynchronized Discriminator GAN for remote sensing image segmentation","authors":"Mingkang Yuan, Ye Li, Jiaxi Sun, Baokun Shi, Jinzhong Xu, Lele Xu, Yisu Wang","doi":"10.1145/3571662.3571668","DOIUrl":"https://doi.org/10.1145/3571662.3571668","url":null,"abstract":"Remote sensing images are usually distributed in different departments and contain private information, so they normally cannot be available publicly. However, it is a trend to jointly use remote sensing images from different departments, because it normally enables the model to capture more information and remote sensing image analysis based on deep learning generally requires lots of training data. To address the above problem, in this paper, we apply a distributed asynchronized discriminator GAN framework (DGAN) to jointly learn remote sensing images from different client nodes. The DGAN is composed of multiple distributed discriminators and a central generator, and only the synthetic remote sensing images generated by the DGAN are used to train a semantic segmentation model. Based on DGAN, we establish an experimental platform composed of multiple different hosts, which adopts socket and multi-process technology to realize asynchronous communication between hosts, and visualize the training and testing process. During DGAN training, instead of original remote sensing images or convolutional network model information, only synthetic images, losses and labeled images are exchanged between nodes. Therefore, the DGAN well protects the privacy and security of the original remote sensing images. We verify the performance of the DGAN on three remote sensing image datasets (City-OSM, WHU and Kaggle Ship). In the experiments, we take different distributions of remote sensing images in client nodes into consideration. The experiments show that the DGAN has a great capacity for distributed remote sensing image learning without sharing the original remote sensing images or the convolutional network model. Moreover, compared with a centralized GAN trained on all remote sensing images collected from all client nodes, the DGAN can achieve almost the same performance in semantic segmentation tasks for remote sensing images.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117190787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Waveform RF Stealth Performance Based on Relative Entropy 基于相对熵的波形射频隐身性能评价
Min Zhao, Siyu Xu, Bing-Gang Sun
RF stealth waveform design is an essential technology in RF stealth radar. LPI performance evaluation of waveforms becomes more and more critical. Several radars transmit waveforms are designed through compound modulation, and the relative entropy between the signal and Gaussian White Noise is used as an index to evaluate the LPI performance of the waveform. At the same time, two methods of ambiguity function and interception factor are used to compare and verify them. The final simulation realizes the quantitative evaluation of waveform RF stealth performance based on relative entropy.
射频隐身波形设计是射频隐身雷达的关键技术。波形的LPI性能评价变得越来越重要。通过复合调制设计了几种雷达发射波形,并以信号与高斯白噪声之间的相对熵作为评价波形LPI性能的指标。同时,采用模糊函数和拦截因子两种方法对其进行比较验证。最后仿真实现了基于相对熵的波形射频隐身性能定量评价。
{"title":"Evaluation of Waveform RF Stealth Performance Based on Relative Entropy","authors":"Min Zhao, Siyu Xu, Bing-Gang Sun","doi":"10.1145/3571662.3571685","DOIUrl":"https://doi.org/10.1145/3571662.3571685","url":null,"abstract":"RF stealth waveform design is an essential technology in RF stealth radar. LPI performance evaluation of waveforms becomes more and more critical. Several radars transmit waveforms are designed through compound modulation, and the relative entropy between the signal and Gaussian White Noise is used as an index to evaluate the LPI performance of the waveform. At the same time, two methods of ambiguity function and interception factor are used to compare and verify them. The final simulation realizes the quantitative evaluation of waveform RF stealth performance based on relative entropy.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post quantum identity authentication mechanism in blockchain 区块链中的后量子身份认证机制
Peng Duan, Bo Zhou
The blockchain technology has developed rapidly in recent years and has been widely used in all walks of life. However, most of the authentication systems adopted by the current blockchain technology are public key infrastructure based on large integer decomposition or discrete logarithm difficulties, and these cryptosystems are not secure in the quantum environment. Therefore, this paper considers an identity based post quantum authentication system applicable to the blockchain, which provides anti quantum protection and eliminates the dependence on public key certificates. Under the control of the supervision node, the authentication system has the key revocation function.
区块链技术近年来发展迅速,已广泛应用于各行各业。然而,目前区块链技术采用的认证系统大多是基于大整数分解或离散对数困难的公钥基础设施,这些密码系统在量子环境下并不安全。因此,本文考虑了一种适用于区块链的基于身份的后量子认证系统,该系统提供反量子保护,消除了对公钥证书的依赖。在监督节点的控制下,认证系统具有密钥撤销功能。
{"title":"Post quantum identity authentication mechanism in blockchain","authors":"Peng Duan, Bo Zhou","doi":"10.1145/3571662.3571682","DOIUrl":"https://doi.org/10.1145/3571662.3571682","url":null,"abstract":"The blockchain technology has developed rapidly in recent years and has been widely used in all walks of life. However, most of the authentication systems adopted by the current blockchain technology are public key infrastructure based on large integer decomposition or discrete logarithm difficulties, and these cryptosystems are not secure in the quantum environment. Therefore, this paper considers an identity based post quantum authentication system applicable to the blockchain, which provides anti quantum protection and eliminates the dependence on public key certificates. Under the control of the supervision node, the authentication system has the key revocation function.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129736909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Tracking Algorithm Based on Extended Target Gaussian Mixture PHD Filter 基于扩展目标高斯混合PHD滤波器的优化跟踪算法
Li-wei Guo, Xinglin Shen, Shanzhu Xiao, Huanzhang Lu
Under low signal-to-noise ratio (SNR) target tracking, poor target information and high clutter limit the tracking effect. Extended targets potentially generate more than one measurement per time step. Multiple extended targets tracking is therefore can be used to improve tracking performance with low SNR, due to the expanded data than point targets tracking. Based on the classical probability hypothesis density (PHD) filter, the extended target PHD (ET- PHD) filter is proposed to track multiple extended targets. The main contribution of this paper is the improvement of the classical extended target Gaussian-mixture probability hypothesis density (ET-GM-PHD) filter. A method based on the ET-GM-PHD filter is proposed for decreasing false alarms and improving measurement set partition performance under low SNR cases. The optimized method is shown a better tracking performance in estimation accuracy of the targets number and targets state in comparison with a point PHD filter.
在低信噪比的目标跟踪条件下,目标信息差、杂波高限制了跟踪效果。扩展目标可能在每个时间步产生多个测量。多扩展目标跟踪因此可以用于提高低信噪比的跟踪性能,由于数据比点目标跟踪扩展。在经典概率假设密度(PHD)滤波器的基础上,提出了扩展目标密度(ET- PHD)滤波器,用于跟踪多个扩展目标。本文的主要贡献是改进了经典的扩展目标高斯混合概率假设密度滤波器(ET-GM-PHD)。提出了一种基于ET-GM-PHD滤波器的低信噪比下减少误报和提高测量集分割性能的方法。与点PHD滤波相比,优化后的方法在目标数和目标状态的估计精度方面具有更好的跟踪性能。
{"title":"Optimization Tracking Algorithm Based on Extended Target Gaussian Mixture PHD Filter","authors":"Li-wei Guo, Xinglin Shen, Shanzhu Xiao, Huanzhang Lu","doi":"10.1145/3571662.3571687","DOIUrl":"https://doi.org/10.1145/3571662.3571687","url":null,"abstract":"Under low signal-to-noise ratio (SNR) target tracking, poor target information and high clutter limit the tracking effect. Extended targets potentially generate more than one measurement per time step. Multiple extended targets tracking is therefore can be used to improve tracking performance with low SNR, due to the expanded data than point targets tracking. Based on the classical probability hypothesis density (PHD) filter, the extended target PHD (ET- PHD) filter is proposed to track multiple extended targets. The main contribution of this paper is the improvement of the classical extended target Gaussian-mixture probability hypothesis density (ET-GM-PHD) filter. A method based on the ET-GM-PHD filter is proposed for decreasing false alarms and improving measurement set partition performance under low SNR cases. The optimized method is shown a better tracking performance in estimation accuracy of the targets number and targets state in comparison with a point PHD filter.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 1D-CNN prediction model for stroke classification based on EEG signal 基于脑电信号的脑卒中分类1D-CNN预测模型
Teng Wang, Fenglian Li, Xueying Zhang, Lixia Huang, Wenhui Jia
Stroke is an acute cerebrovascular disease with high mortality and disability. Computer-aided interventional diagnosis is a necessary measure to improve the efficiency of stroke diagnosis by using modern advanced medical instruments and machine learning methods. Electroencephalogram (EEG) as a diagnostic means, is a test that measures the electrical activity of the brain through electrodes attached to the scalp to find changes in brain activity. EEG detection has the advantages of low cost, simple and easy to implement, and no physical harm and psychological stress to patients. Studies have shown that EEG signal might be useful in diagnosing stroke. By using machine learning methods, EEG signals can be used to classify stroke patients and normal subjects, or subtypes. Stroke is generally divided into two types: ischemic stroke and hemorrhagic stroke. How to classify ischemic and hemorrhagic strokes based on stroke patients’ EEG data by constructing prediction model is the main purpose on this paper. In recent years, researchers have developed many technologies in the field of stroke classification prediction based on EEG signals, using a variety of machine learning methods to ensure the improvement of prediction accuracy. The typical methods usually extract the time domain, frequency domain or spatial domain features of EEG signals before establishing a stroke classification model. However, the quality of the extracted features cannot be guaranteed in stroke patient or subtype classification. In addition, EEG feature extraction is usually computationally expensive. The main goal of this paper is to propose a novel classification prediction model using an end-to-end deep neural network that avoids the process of manual feature extraction. This paper proposes a one-dimensional convolutional neural network (1D-CNN) classification model based on stroke EEG signal. The model includes four convolutional blocks, a global average pooling layer, a dropout layer, and a SoftMax layer. Each convolution block consists of two convolution layers and a pool layer for extracting features and reducing the number of parameters. A one-dimensional convolution kernel is used in order to match the characteristics of EEG one-dimensional time domain signal. The model can automatically extract the features of stroke EEG signal for classifying stroke by using convolutional layers. The EEG data of clinical stroke patients collected from the neurology department of a hospital are used in the experiments. Long Short-Term Memory (LSTM) model is also used as a benchmark to achieve end-to-end prediction for verifying the proposed model performance. The experimental results show that the proposed 1D-CNN prediction model has good prediction performance, with an accuracy of 90.53%, a precision of 87.90%, a sensitivity of 91.60%, and a specificity of 89.65%. It is much higher than the prediction result of LSTM model.
脑卒中是一种死亡率高、致残率高的急性脑血管疾病。计算机辅助介入诊断是利用现代先进医疗仪器和机器学习方法提高脑卒中诊断效率的必要措施。脑电图(EEG)作为一种诊断手段,是一种通过连接在头皮上的电极来测量大脑电活动的测试,以发现大脑活动的变化。脑电图检测具有成本低、简单易实现、对患者无身体伤害和心理压力等优点。研究表明脑电图信号可能对中风的诊断有用。通过使用机器学习方法,脑电图信号可以用来区分中风患者和正常受试者,或亚型。中风一般分为两种:缺血性中风和出血性中风。如何根据脑卒中患者的脑电图数据构建预测模型,对缺血性脑卒中和出血性脑卒中进行分类是本文研究的主要目的。近年来,研究人员在基于脑电信号的脑卒中分类预测领域开发了许多技术,使用多种机器学习方法来保证预测精度的提高。典型的方法通常是提取脑电信号的时域、频域或空间特征,然后建立脑卒中分类模型。然而,在脑卒中患者或亚型分类中,提取的特征的质量不能得到保证。此外,脑电信号特征提取通常是计算昂贵的。本文的主要目标是提出一种新的基于端到端深度神经网络的分类预测模型,避免了人工特征提取的过程。提出了一种基于脑卒中脑电信号的一维卷积神经网络(1D-CNN)分类模型。该模型包括四个卷积块、一个全局平均池化层、一个dropout层和一个SoftMax层。每个卷积块由两个卷积层和一个用于提取特征和减少参数数量的池层组成。为了匹配脑电信号的一维时域特征,采用了一维卷积核。该模型利用卷积层自动提取脑电信号特征,对脑卒中进行分类。实验采用某医院神经内科临床脑卒中患者的脑电图数据。长短期记忆(LSTM)模型也被用作基准来实现端到端预测,以验证所提出的模型的性能。实验结果表明,本文提出的1D-CNN预测模型具有良好的预测性能,准确率为90.53%,精密度为87.90%,灵敏度为91.60%,特异性为89.65%。这比LSTM模型的预测结果要高得多。
{"title":"A 1D-CNN prediction model for stroke classification based on EEG signal","authors":"Teng Wang, Fenglian Li, Xueying Zhang, Lixia Huang, Wenhui Jia","doi":"10.1145/3571662.3571695","DOIUrl":"https://doi.org/10.1145/3571662.3571695","url":null,"abstract":"Stroke is an acute cerebrovascular disease with high mortality and disability. Computer-aided interventional diagnosis is a necessary measure to improve the efficiency of stroke diagnosis by using modern advanced medical instruments and machine learning methods. Electroencephalogram (EEG) as a diagnostic means, is a test that measures the electrical activity of the brain through electrodes attached to the scalp to find changes in brain activity. EEG detection has the advantages of low cost, simple and easy to implement, and no physical harm and psychological stress to patients. Studies have shown that EEG signal might be useful in diagnosing stroke. By using machine learning methods, EEG signals can be used to classify stroke patients and normal subjects, or subtypes. Stroke is generally divided into two types: ischemic stroke and hemorrhagic stroke. How to classify ischemic and hemorrhagic strokes based on stroke patients’ EEG data by constructing prediction model is the main purpose on this paper. In recent years, researchers have developed many technologies in the field of stroke classification prediction based on EEG signals, using a variety of machine learning methods to ensure the improvement of prediction accuracy. The typical methods usually extract the time domain, frequency domain or spatial domain features of EEG signals before establishing a stroke classification model. However, the quality of the extracted features cannot be guaranteed in stroke patient or subtype classification. In addition, EEG feature extraction is usually computationally expensive. The main goal of this paper is to propose a novel classification prediction model using an end-to-end deep neural network that avoids the process of manual feature extraction. This paper proposes a one-dimensional convolutional neural network (1D-CNN) classification model based on stroke EEG signal. The model includes four convolutional blocks, a global average pooling layer, a dropout layer, and a SoftMax layer. Each convolution block consists of two convolution layers and a pool layer for extracting features and reducing the number of parameters. A one-dimensional convolution kernel is used in order to match the characteristics of EEG one-dimensional time domain signal. The model can automatically extract the features of stroke EEG signal for classifying stroke by using convolutional layers. The EEG data of clinical stroke patients collected from the neurology department of a hospital are used in the experiments. Long Short-Term Memory (LSTM) model is also used as a benchmark to achieve end-to-end prediction for verifying the proposed model performance. The experimental results show that the proposed 1D-CNN prediction model has good prediction performance, with an accuracy of 90.53%, a precision of 87.90%, a sensitivity of 91.60%, and a specificity of 89.65%. It is much higher than the prediction result of LSTM model.","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123652213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An encrypted traffic classification method based on contrastive learning 基于对比学习的加密流量分类方法
Si Tian, Yating Gao, Guoquan Yuan, Ru Zhang, Jinmeng Zhao, Song Zhang
Network traffic classification has become an important part of network management, which is conducive to realizing intelligent network operation and maintenance, improving network quality of service (QoS), and ensuring network security. With the rapid development of various applications and protocols, more and more encrypted traffic appears in the network. Due to the loss of semantic information after traffic encryption, poor content intelligibility, and difficulty in feature extraction, traditional detection methods are no longer applicable. Existing solutions mainly rely on the powerful feature self-learning ability of end-to-end deep neural networks to identify encrypted traffic. However, such methods are overly dependent on data size, and it has been experimentally proven that it is often difficult to achieve satisfactory results when validating across datasets. In order to solve this problem, this paper proposes an encrypted traffic identification method based on contrastive learning. First, the clustering method is used to expand the labeled data set. When the encrypted traffic features are difficult to extract, it is only necessary to learn the feature space to achieve discrimination.more suitable for encrypted traffic identification. When validating across datasets, only fine-tuning is required on a small amount of labeled data to achieve good recognition results. Compared with the end-to-end learning method, there is an improvement of about 5%. CCS CONCEPTS • Security and privacy • Network security • Security protocols
网络流分类已成为网络管理的重要组成部分,有利于实现网络运维智能化,提高网络服务质量(QoS),保障网络安全。随着各种应用和协议的快速发展,网络中出现了越来越多的加密流量。由于流量加密后语义信息丢失,内容可理解性差,特征提取困难,传统的检测方法已不再适用。现有的解决方案主要依靠端到端深度神经网络强大的特征自学习能力来识别加密流量。然而,这些方法过于依赖于数据的大小,并且实验证明,在跨数据集验证时,通常很难获得令人满意的结果。为了解决这一问题,本文提出了一种基于对比学习的加密流量识别方法。首先,采用聚类方法对标记数据集进行扩展。当加密流量特征难以提取时,只需要学习特征空间即可实现判别。更适合加密流量识别。当跨数据集进行验证时,只需要对少量标记数据进行微调就可以获得良好的识别结果。与端到端学习方法相比,提高了约5%。CCS概念•安全和隐私•网络安全•安全协议
{"title":"An encrypted traffic classification method based on contrastive learning","authors":"Si Tian, Yating Gao, Guoquan Yuan, Ru Zhang, Jinmeng Zhao, Song Zhang","doi":"10.1145/3571662.3571678","DOIUrl":"https://doi.org/10.1145/3571662.3571678","url":null,"abstract":"Network traffic classification has become an important part of network management, which is conducive to realizing intelligent network operation and maintenance, improving network quality of service (QoS), and ensuring network security. With the rapid development of various applications and protocols, more and more encrypted traffic appears in the network. Due to the loss of semantic information after traffic encryption, poor content intelligibility, and difficulty in feature extraction, traditional detection methods are no longer applicable. Existing solutions mainly rely on the powerful feature self-learning ability of end-to-end deep neural networks to identify encrypted traffic. However, such methods are overly dependent on data size, and it has been experimentally proven that it is often difficult to achieve satisfactory results when validating across datasets. In order to solve this problem, this paper proposes an encrypted traffic identification method based on contrastive learning. First, the clustering method is used to expand the labeled data set. When the encrypted traffic features are difficult to extract, it is only necessary to learn the feature space to achieve discrimination.more suitable for encrypted traffic identification. When validating across datasets, only fine-tuning is required on a small amount of labeled data to achieve good recognition results. Compared with the end-to-end learning method, there is an improvement of about 5%. CCS CONCEPTS • Security and privacy • Network security • Security protocols","PeriodicalId":235407,"journal":{"name":"Proceedings of the 8th International Conference on Communication and Information Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115895417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 8th International Conference on Communication and Information Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1