首页 > 最新文献

2022 IEEE 8th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
Adversarial Samples Defense Strategy Based on Service Orchestration 基于服务编排的对抗性样本防御策略
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065619
Mengxin Zhang, Xiaofeng Qiu
Deep neural networks (DNNs) are playing an increasingly significant role in the modern world. However, they are weak to adversarial samples that are generated by adding specially crafted perturbations. Most defenses against adversarial samples focused on refining the DNN models, which often sacrifice the performance and computational cost of models on benign samples. In this paper, we propose a manifold distance detection method to distinguish legitimate samples and adversarial samples by measuring the different distances on the manifold. The manifold distance detection method neither modifies the protected models nor requires knowledge of the process for generating adversarial samples. Inspired by the effectiveness of the manifold distance detection, we demonstrated a well-designed orchestrated defense strategy, named Manifold Distance Judge (MDJ), which selects the best image processing method that will effectively expand the manifold distance between legitimate and adversarial samples, and thus, enhances the performance of the following manifold distance detection method. Tests on the ImageNet dataset, the MDJ is effective against the most adversarial samples under white-box, gray-box, and black-box attack scenarios. We show empirically that the orchestration strategy MDJ is significantly better than Feature Squeezing on the recall rate. Meanwhile, MDJ achieves high detection rates against CW attack and DI-FGSM attack.
深度神经网络(dnn)在现代世界中发挥着越来越重要的作用。然而,它们对通过添加特制扰动产生的对抗性样本很弱。大多数针对对抗样本的防御都集中在改进DNN模型上,这通常会牺牲模型在良性样本上的性能和计算成本。在本文中,我们提出了一种流形距离检测方法,通过测量流形上的不同距离来区分合法样本和对抗样本。流形距离检测方法既不修改受保护的模型,也不需要了解生成对抗样本的过程。受流形距离检测有效性的启发,我们展示了一种精心设计的精心策划的防御策略,称为流形距离判断(MDJ),它选择最佳的图像处理方法,有效地扩大合法和对抗样本之间的流形距离,从而提高了以下流形距离检测方法的性能。在ImageNet数据集上的测试表明,MDJ在白盒、灰盒和黑盒攻击场景下对大多数对抗性样本都有效。我们的经验表明,编排策略MDJ在召回率上明显优于特征压缩。同时,MDJ对CW攻击和DI-FGSM攻击具有较高的检测率。
{"title":"Adversarial Samples Defense Strategy Based on Service Orchestration","authors":"Mengxin Zhang, Xiaofeng Qiu","doi":"10.1109/ICCC56324.2022.10065619","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065619","url":null,"abstract":"Deep neural networks (DNNs) are playing an increasingly significant role in the modern world. However, they are weak to adversarial samples that are generated by adding specially crafted perturbations. Most defenses against adversarial samples focused on refining the DNN models, which often sacrifice the performance and computational cost of models on benign samples. In this paper, we propose a manifold distance detection method to distinguish legitimate samples and adversarial samples by measuring the different distances on the manifold. The manifold distance detection method neither modifies the protected models nor requires knowledge of the process for generating adversarial samples. Inspired by the effectiveness of the manifold distance detection, we demonstrated a well-designed orchestrated defense strategy, named Manifold Distance Judge (MDJ), which selects the best image processing method that will effectively expand the manifold distance between legitimate and adversarial samples, and thus, enhances the performance of the following manifold distance detection method. Tests on the ImageNet dataset, the MDJ is effective against the most adversarial samples under white-box, gray-box, and black-box attack scenarios. We show empirically that the orchestration strategy MDJ is significantly better than Feature Squeezing on the recall rate. Meanwhile, MDJ achieves high detection rates against CW attack and DI-FGSM attack.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Complexity Multiuser Hybrid Precoding with Partially-Connected Architecture 具有部分连接架构的低复杂度多用户混合预编码
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065937
Jianing Li, Yuan Jiang, Lei Zhao, Bin Wang
Hybrid precoding has evolved into an essential technology in millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems due to the low demand for the number of radio frequency (RF) chains. In this paper, in order to reduce the computational complexity of hybrid precoding, we propose a low-complexity two-stage multiuser hybrid precoding scheme. In the first stage, we focus on how to reduce the computational complexity under the premise of acceptable sum spectral efficiency loss. In the second stage, block diagonalization (BD) method is adopted to design digital precoder and classical water-filling method is utilized to address power allocation problem. Simulation results reveal that the proposed precoding scheme can achieve satisfactory level from the viewpoint of computational complexity, and meanwhile spectral efficiency can be guaranteed.
由于对射频(RF)链数量的要求较低,混合预编码已发展成为毫米波(mmWave)大规模多输入多输出(MIMO)系统中的一项基本技术。为了降低混合预编码的计算复杂度,提出了一种低复杂度的两阶段多用户混合预编码方案。在第一阶段,我们重点研究如何在可接受的和谱效率损失的前提下降低计算复杂度。第二阶段,采用块对角化(BD)方法设计数字预编码器,采用经典充水方法解决功率分配问题。仿真结果表明,从计算复杂度的角度来看,所提出的预编码方案可以达到令人满意的水平,同时保证了频谱效率。
{"title":"Low-Complexity Multiuser Hybrid Precoding with Partially-Connected Architecture","authors":"Jianing Li, Yuan Jiang, Lei Zhao, Bin Wang","doi":"10.1109/ICCC56324.2022.10065937","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065937","url":null,"abstract":"Hybrid precoding has evolved into an essential technology in millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems due to the low demand for the number of radio frequency (RF) chains. In this paper, in order to reduce the computational complexity of hybrid precoding, we propose a low-complexity two-stage multiuser hybrid precoding scheme. In the first stage, we focus on how to reduce the computational complexity under the premise of acceptable sum spectral efficiency loss. In the second stage, block diagonalization (BD) method is adopted to design digital precoder and classical water-filling method is utilized to address power allocation problem. Simulation results reveal that the proposed precoding scheme can achieve satisfactory level from the viewpoint of computational complexity, and meanwhile spectral efficiency can be guaranteed.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Music Generation Road from Statistical Method to Deep Learning 从统计方法到深度学习的音乐生成之路
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065693
Jiayun Xu, Weiting Qu, Dixin Li, Changjiang Zhang
Automatic music generation is regarded as one of the most concerning research areas. However, the current music generation AI model lacks mainstream algorithms and norms, including model evaluation standards and objective music quality measurements. In this paper, we conducted experiments on traditional statistical models, machine learning models and deep learning models to generate music, respectively involving Markov Chain, SVM, Random Forest, LSTM, GAN models and their variants. In addition, we also proposed three new quantitative methods to measure the quality of computer-generated music using technical metrics: the Key Confidence Test, the Random Walk Test and the Word2Vec Similarity Test. These methods could be used to measure the quality of generated music and avoid the subjectivity of manual evaluation, thus providing reference for future music evaluation tasks.
音乐自动生成一直是人们关注的研究领域之一。然而,目前的音乐生成AI模型缺乏主流的算法和规范,包括模型评价标准和客观的音乐质量测量。在本文中,我们分别在传统的统计模型、机器学习模型和深度学习模型上进行了音乐生成实验,分别涉及Markov Chain、SVM、Random Forest、LSTM、GAN模型及其变体。此外,我们还提出了三种新的定量方法来使用技术指标来衡量计算机生成音乐的质量:关键置信度测试、随机漫步测试和Word2Vec相似性测试。这些方法可以用来衡量生成音乐的质量,避免人工评价的主观性,为以后的音乐评价工作提供参考。
{"title":"The Music Generation Road from Statistical Method to Deep Learning","authors":"Jiayun Xu, Weiting Qu, Dixin Li, Changjiang Zhang","doi":"10.1109/ICCC56324.2022.10065693","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065693","url":null,"abstract":"Automatic music generation is regarded as one of the most concerning research areas. However, the current music generation AI model lacks mainstream algorithms and norms, including model evaluation standards and objective music quality measurements. In this paper, we conducted experiments on traditional statistical models, machine learning models and deep learning models to generate music, respectively involving Markov Chain, SVM, Random Forest, LSTM, GAN models and their variants. In addition, we also proposed three new quantitative methods to measure the quality of computer-generated music using technical metrics: the Key Confidence Test, the Random Walk Test and the Word2Vec Similarity Test. These methods could be used to measure the quality of generated music and avoid the subjectivity of manual evaluation, thus providing reference for future music evaluation tasks.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122780421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
k-Means-Based Tactile Data Recognition Method for Sharp and Dangerous Objects for Robots 基于k均值的机器人尖锐危险物体触觉数据识别方法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066027
Jing Yang, Shunyu Cen, Xiangyu Zhang, Honglin Luo, Taohong Zhao, Guangshu Wei, Zukun Yu, Qinglang Li
A robot senses its surroundings through its “skin.” Through this tactile sensing method, a robot can obtain tactile data of various shapes and sharp objects. Then, a robot can analyze whether objects are sharp and dangerous through these tactile data. This study proposes a k-means algorithm-based tactile data recognition method for sharp and dangerous objects for robots. It develops a distributed pressure tactile sensing device that aims to simulate how the human skin layer works. By using this device, multiple sets of data are obtained after collecting the data of seven types of objects with different degrees of sharpness, namely, a hobby knife, sharp pliers, a diamond-shaped block, a square charger, a pencil-shaped block, a ping-pong ball, and a cylindrical block. The data are classified and stored using the k-means algorithm. By sensing the data of the seven types of sharp objects studied in this work in real time on the developed device for analysis, human brain's judgment on the sharpness of the objects is simulated. Through the analysis of a large amount of experimental data and algorithm optimization, experimental results show that the device can recognize relatively regular square objects, objects with curved surfaces with small changes in the radius of curvature, and objects with tips of less complexity. Recognition accuracy can reach 95%.
机器人通过“皮肤”感知周围环境。通过这种触觉传感方法,机器人可以获得各种形状和尖锐物体的触觉数据。然后,机器人可以通过这些触觉数据分析物体是否锋利和危险。本研究提出了一种基于k-means算法的机器人尖锐危险物体触觉数据识别方法。它开发了一种分布式压力触觉传感装置,旨在模拟人类皮肤层的工作原理。使用该设备,可以采集7种不同锐度物体的数据,分别是:爱好刀、尖钳、菱形块、方形充电器、铅笔形块、乒乓球、圆柱形块。使用k-means算法对数据进行分类和存储。通过在研制的分析装置上实时感知本工作所研究的七种尖锐物体的数据,模拟人脑对物体尖锐程度的判断。通过对大量实验数据的分析和算法优化,实验结果表明,该装置可以识别相对规则的正方形物体,曲率半径变化较小的曲面物体,以及复杂性较小的尖端物体。识别准确率可达95%。
{"title":"k-Means-Based Tactile Data Recognition Method for Sharp and Dangerous Objects for Robots","authors":"Jing Yang, Shunyu Cen, Xiangyu Zhang, Honglin Luo, Taohong Zhao, Guangshu Wei, Zukun Yu, Qinglang Li","doi":"10.1109/ICCC56324.2022.10066027","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066027","url":null,"abstract":"A robot senses its surroundings through its “skin.” Through this tactile sensing method, a robot can obtain tactile data of various shapes and sharp objects. Then, a robot can analyze whether objects are sharp and dangerous through these tactile data. This study proposes a k-means algorithm-based tactile data recognition method for sharp and dangerous objects for robots. It develops a distributed pressure tactile sensing device that aims to simulate how the human skin layer works. By using this device, multiple sets of data are obtained after collecting the data of seven types of objects with different degrees of sharpness, namely, a hobby knife, sharp pliers, a diamond-shaped block, a square charger, a pencil-shaped block, a ping-pong ball, and a cylindrical block. The data are classified and stored using the k-means algorithm. By sensing the data of the seven types of sharp objects studied in this work in real time on the developed device for analysis, human brain's judgment on the sharpness of the objects is simulated. Through the analysis of a large amount of experimental data and algorithm optimization, experimental results show that the device can recognize relatively regular square objects, objects with curved surfaces with small changes in the radius of curvature, and objects with tips of less complexity. Recognition accuracy can reach 95%.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122815340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of NR Positioning Evolution: From Scenarios to Techniques NR定位演进分析:从场景到技术
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065808
Hang Yin, Bowen Wang, Nanxi Li, Jianchi Zhu, X. She
The development of 5G generates the promotion of mMTC scenarios such as HOT and V2X, which highlights the requirements of positioning enhancement. In this paper, NR positioning evolution is analyzed from 3GPP standard perspective. we provide the analysis of basic positioning method introduced in Rel-16 and summary the enhancement for improving the accuracy and reducing the latency on NR positioning in Rel-17. Moreover, in order to meet the services' requirement defined in 3GPP SA WG, we propose the potential techniques that can enhance the NR positioning for the newly introduced scenarios in Rel-18.
5G的发展催生了HOT、V2X等mMTC场景的推广,凸显了定位增强的需求。本文从3GPP标准的角度分析NR定位演进。分析了Rel-16中引入的基本定位方法,总结了Rel-17中为提高NR定位精度和降低时延所做的改进。此外,为了满足3GPP SA工作组定义的业务需求,我们提出了可以增强Rel-18中新引入场景的NR定位的潜在技术。
{"title":"Analysis of NR Positioning Evolution: From Scenarios to Techniques","authors":"Hang Yin, Bowen Wang, Nanxi Li, Jianchi Zhu, X. She","doi":"10.1109/ICCC56324.2022.10065808","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065808","url":null,"abstract":"The development of 5G generates the promotion of mMTC scenarios such as HOT and V2X, which highlights the requirements of positioning enhancement. In this paper, NR positioning evolution is analyzed from 3GPP standard perspective. we provide the analysis of basic positioning method introduced in Rel-16 and summary the enhancement for improving the accuracy and reducing the latency on NR positioning in Rel-17. Moreover, in order to meet the services' requirement defined in 3GPP SA WG, we propose the potential techniques that can enhance the NR positioning for the newly introduced scenarios in Rel-18.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Service-Based RAN via Multi-state Markov Chain 基于多状态马尔可夫链的基于服务的无线局域网性能分析
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066043
Huimin Zhang, Guangyi Liu, N. Li, Zhou Tong, Quan Zhao, Junshuai Sun
Service-based radio access network (RAN) which enables RAN to support diversified applications and vertical industries has aroused the widespread interest. The feasibility verification of the new architecture is particularly important before further research, which is the focus of this paper. This work presents the multi-state Markov approach into the service-based RAN for performance analysis. The key phases, namely orchestration and transmission phase, are extracted to build the multi-state Markov model. And the closed expression of the Markov characteristics are given. We set the simulator according to cell deployment and the task processing to validate the proposed model. Also, the evaluation results of Markov characteristics and typical performance metrics are provided which shows the accuracy of our model.
基于业务的无线接入网(RAN)使RAN能够支持多样化的应用和垂直行业,引起了人们的广泛关注。在进一步研究之前,新架构的可行性验证尤为重要,这是本文的重点。这项工作将多状态马尔可夫方法引入到基于服务的RAN中进行性能分析。提取关键阶段,即编排和传输阶段,构建多状态马尔可夫模型。并给出了马尔可夫特征的封闭表达式。我们根据单元部署和任务处理设置模拟器来验证所提出的模型。最后给出了马尔可夫特征和典型性能指标的评价结果,验证了模型的准确性。
{"title":"Performance Analysis of Service-Based RAN via Multi-state Markov Chain","authors":"Huimin Zhang, Guangyi Liu, N. Li, Zhou Tong, Quan Zhao, Junshuai Sun","doi":"10.1109/ICCC56324.2022.10066043","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066043","url":null,"abstract":"Service-based radio access network (RAN) which enables RAN to support diversified applications and vertical industries has aroused the widespread interest. The feasibility verification of the new architecture is particularly important before further research, which is the focus of this paper. This work presents the multi-state Markov approach into the service-based RAN for performance analysis. The key phases, namely orchestration and transmission phase, are extracted to build the multi-state Markov model. And the closed expression of the Markov characteristics are given. We set the simulator according to cell deployment and the task processing to validate the proposed model. Also, the evaluation results of Markov characteristics and typical performance metrics are provided which shows the accuracy of our model.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Alternate Control Delayed Systems 模糊交替控制延迟系统
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065957
Ning Tang, Yuming Feng, B. Onasanya, Wei Zhang
This paper studies the asymptotic stability of nonlin-ear systems which is regulated by using fuzzy impulsive control. First of all, the system was formulated, the Lyapunov function was constructed, and then the fuzzy control component required for the nonlinear system to exhibit global asymptotic exponential stability under the regulation of the impulsive controller was developed. A unique fuzzy concept was introduced herein, which, compared to the conventional precise counterpart, was defined to perform only scalar approximations. Subsequently, a set of conditions sufficient for global asymptotic exponential stability was proposed for the impulsive controller. Halany inequality and its key generalizations were used while working out the mathematical proofs. Finally, examples were given to verify the general results obtained and their applicability.
研究了用模糊脉冲控制调节非线性耳系统的渐近稳定性问题。首先对系统进行公式化,构造Lyapunov函数,然后推导出在脉冲控制器的调节下非线性系统呈现全局渐近指数稳定性所需的模糊控制分量。本文引入了一个独特的模糊概念,与传统的精确概念相比,它被定义为只执行标量近似。随后,给出了脉冲控制器全局渐近指数稳定的充分条件。在数学证明中使用了Halany不等式及其关键推广。最后通过算例验证了所得的一般结果及其适用性。
{"title":"Fuzzy Alternate Control Delayed Systems","authors":"Ning Tang, Yuming Feng, B. Onasanya, Wei Zhang","doi":"10.1109/ICCC56324.2022.10065957","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065957","url":null,"abstract":"This paper studies the asymptotic stability of nonlin-ear systems which is regulated by using fuzzy impulsive control. First of all, the system was formulated, the Lyapunov function was constructed, and then the fuzzy control component required for the nonlinear system to exhibit global asymptotic exponential stability under the regulation of the impulsive controller was developed. A unique fuzzy concept was introduced herein, which, compared to the conventional precise counterpart, was defined to perform only scalar approximations. Subsequently, a set of conditions sufficient for global asymptotic exponential stability was proposed for the impulsive controller. Halany inequality and its key generalizations were used while working out the mathematical proofs. Finally, examples were given to verify the general results obtained and their applicability.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Key Agreement Scheme for UAV Network 一种无人机网络轻量级密钥协议方案
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065747
J. Liu, Lin Yuan, Zhi-Shang Feng, Xiong Chen, Zhi-Cheng Hang
With the wide application of Unmanned Aerial Vehicles (UAV), safety issues have become increasingly prominent. this paper proposes a lightweight key agreement scheme for UAV network (UAV-KAS) to solve the security problem of UAV communication, we use one-way hash for mutual identity authentication and Elliptic Curve Diffie-Hellman (ECDH) for key agreement, which improves the security of key agreement and reduces the calculation and communication cost of key agreement. The security and performance analysis show that the UAV-KAS has higher security and lower calculation cost. The proposed scheme improves the communication security problem of autonomous cooperation of UAVs. Moreover, it supports the joining and exiting of UAV, which improves the robustness of the UAVs network and can be applied to the dynamic network of UAVs with limited resources.
随着无人机的广泛应用,安全问题日益突出。针对无人机通信的安全问题,提出了一种轻量级的无人机网络密钥协议方案,采用单向哈希进行相互身份认证,采用椭圆曲线Diffie-Hellman (ECDH)进行密钥协议,提高了密钥协议的安全性,降低了密钥协议的计算和通信成本。安全性和性能分析表明,该系统具有较高的安全性和较低的计算成本。该方案改善了无人机自主协作的通信安全问题。此外,它支持无人机的加入和退出,提高了无人机网络的鲁棒性,可以应用于资源有限的无人机动态网络。
{"title":"A Lightweight Key Agreement Scheme for UAV Network","authors":"J. Liu, Lin Yuan, Zhi-Shang Feng, Xiong Chen, Zhi-Cheng Hang","doi":"10.1109/ICCC56324.2022.10065747","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065747","url":null,"abstract":"With the wide application of Unmanned Aerial Vehicles (UAV), safety issues have become increasingly prominent. this paper proposes a lightweight key agreement scheme for UAV network (UAV-KAS) to solve the security problem of UAV communication, we use one-way hash for mutual identity authentication and Elliptic Curve Diffie-Hellman (ECDH) for key agreement, which improves the security of key agreement and reduces the calculation and communication cost of key agreement. The security and performance analysis show that the UAV-KAS has higher security and lower calculation cost. The proposed scheme improves the communication security problem of autonomous cooperation of UAVs. Moreover, it supports the joining and exiting of UAV, which improves the robustness of the UAVs network and can be applied to the dynamic network of UAVs with limited resources.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decoupled Teacher for Semi-Supervised Drone Detection 半监督无人机检测的解耦教师
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065897
Jiawei Wang, Tianyu Song, Yan Zhang, Shengmin Wang, Wenhui Lin, Zhigang Wang, Yuanyuan Qiao
Aerial drones come in handy in a variety of science and research applications, sometimes even cause privacy harms during aerial surveillance. In many anti-drone situations, detection, tracking, and classification of drones are of great significance to secure the airspace. Drones are small in size, different in appearance, and have different flight attitudes for various flight environments, which makes the drone data sets too expensive to annotate and the foreground-background imbalance occurs in drone detection. Previous works on drone detection have focused on supervised learning, which depends on large labeled data set. To alleviate the problem of scarce labeled data sets, Semi-Supervised Learning can be employed to leverage unlabeled samples. In this paper, we propose a Semi-Supervised Object Detection method Decoupled Teacher to use unlabeled data and address the foreground-background imbalance issue. Specifically, Decoupled Teacher decouples the Exponential Moving Average mechanism in the general SSOD paradigm, and applies a fusion method of weak/strong data augmentation. We have bench-marked our method and the state-of-the-art SSOD methods using two publicly available drone data sets. The experiment results demonstrate the superior performance of our approach compared with the state-of-the-art methods.
无人机在各种科学研究应用中派上了用场,有时甚至在空中监视过程中造成隐私伤害。在许多反无人机的情况下,对无人机的检测、跟踪和分类对保障空域安全具有重要意义。无人机体积小,外形各异,对不同的飞行环境有不同的飞行姿态,这使得无人机数据集标注成本过高,在无人机检测中出现了前景与背景的不平衡。以前在无人机检测方面的工作主要集中在监督学习上,这依赖于大型标记数据集。为了缓解标记数据集稀缺的问题,可以使用半监督学习来利用未标记的样本。在本文中,我们提出了一种半监督对象检测方法,解耦教师来使用未标记的数据,并解决前景和背景的不平衡问题。具体而言,解耦的教师解耦了一般SSOD范式中的指数移动平均机制,并采用了弱/强数据增强的融合方法。我们使用两个公开的无人机数据集对我们的方法和最先进的SSOD方法进行了基准测试。实验结果表明,与现有的方法相比,我们的方法具有更好的性能。
{"title":"Decoupled Teacher for Semi-Supervised Drone Detection","authors":"Jiawei Wang, Tianyu Song, Yan Zhang, Shengmin Wang, Wenhui Lin, Zhigang Wang, Yuanyuan Qiao","doi":"10.1109/ICCC56324.2022.10065897","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065897","url":null,"abstract":"Aerial drones come in handy in a variety of science and research applications, sometimes even cause privacy harms during aerial surveillance. In many anti-drone situations, detection, tracking, and classification of drones are of great significance to secure the airspace. Drones are small in size, different in appearance, and have different flight attitudes for various flight environments, which makes the drone data sets too expensive to annotate and the foreground-background imbalance occurs in drone detection. Previous works on drone detection have focused on supervised learning, which depends on large labeled data set. To alleviate the problem of scarce labeled data sets, Semi-Supervised Learning can be employed to leverage unlabeled samples. In this paper, we propose a Semi-Supervised Object Detection method Decoupled Teacher to use unlabeled data and address the foreground-background imbalance issue. Specifically, Decoupled Teacher decouples the Exponential Moving Average mechanism in the general SSOD paradigm, and applies a fusion method of weak/strong data augmentation. We have bench-marked our method and the state-of-the-art SSOD methods using two publicly available drone data sets. The experiment results demonstrate the superior performance of our approach compared with the state-of-the-art methods.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122198378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Beam Handover Algorithm Based on Reinforcement Learning for mmWave System 基于强化学习的毫米波系统自适应波束切换算法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065827
Jianzhong Yi, Chao Dong, K. Niu, Qiulin Xue, Junping Zhang
In millimeter wave (mmWave) frequency band, the link quality is greatly affected by the environment. Coupled with the dense deployment of mmWave access points (APs) and the using of beamforming technology, beam handovers frequently occur in mobile communication systems. This paper optimizes the mmWave beam handover process using the Q-Learning method. Our proposed algorithm learns and senses the complex communication environment by the beam reporting information from the users. We consider the effects of handover cost and historical beam quality during the handover process. The adaptive handover threshold is obtained by querying the Q table according to the current state. Simulation results show that our proposed algorithm reduces the number of beam handover times and improves the system performance compared with the original scheme in the 3GPP protocol.
在毫米波(mmWave)频段,链路质量受环境影响较大。随着毫米波接入点(ap)的密集部署和波束形成技术的使用,在移动通信系统中经常发生波束切换。本文采用Q-Learning方法对毫米波波束切换过程进行了优化。我们提出的算法通过用户的波束报告信息来学习和感知复杂的通信环境。在切换过程中考虑了切换成本和历史波束质量的影响。根据当前状态查询Q表,获得自适应切换阈值。仿真结果表明,与3GPP协议中的原方案相比,本文提出的算法减少了波束切换次数,提高了系统性能。
{"title":"Adaptive Beam Handover Algorithm Based on Reinforcement Learning for mmWave System","authors":"Jianzhong Yi, Chao Dong, K. Niu, Qiulin Xue, Junping Zhang","doi":"10.1109/ICCC56324.2022.10065827","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065827","url":null,"abstract":"In millimeter wave (mmWave) frequency band, the link quality is greatly affected by the environment. Coupled with the dense deployment of mmWave access points (APs) and the using of beamforming technology, beam handovers frequently occur in mobile communication systems. This paper optimizes the mmWave beam handover process using the Q-Learning method. Our proposed algorithm learns and senses the complex communication environment by the beam reporting information from the users. We consider the effects of handover cost and historical beam quality during the handover process. The adaptive handover threshold is obtained by querying the Q table according to the current state. Simulation results show that our proposed algorithm reduces the number of beam handover times and improves the system performance compared with the original scheme in the 3GPP protocol.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116837828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 8th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1