首页 > 最新文献

2022 IEEE 8th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
A Review of Super Resolution Based on Deep Learning 基于深度学习的超分辨率研究综述
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065896
Qingyang Chen, Z. Qiang, Hong Lin
Super-resolution (SR) is the process of restoring a limited number of low-resolution (LR) images to high-resolution (HR) images. In recent years, with the vigorous development of deep learning in computer vision, its applications in image super resolution have also made significant progress. In this paper we aim to integrate and analyze the existing deep-learning based image super-resolution models, and show several models with the best performance. We divide the models into five main categories based on where the sampling is located in the different models. Then we analyze and compare the different networks architectures. We also list some tips which are effective in super-resolution networks. At the end of this paper, we analyze the existing problems of super-resolution based on deep learning and make an outlook on the future of super-resolution development.
超分辨率(SR)是将有限数量的低分辨率(LR)图像还原为高分辨率(HR)图像的过程。近年来,随着深度学习在计算机视觉领域的蓬勃发展,其在图像超分辨率方面的应用也取得了重大进展。本文旨在对现有的基于深度学习的图像超分辨率模型进行整合和分析,并给出几种性能最好的模型。我们根据采样在不同模型中的位置将模型分为五大类。然后对不同的网络架构进行了分析和比较。我们还列出了一些在超分辨率网络中有效的技巧。最后,分析了基于深度学习的超分辨率存在的问题,并对超分辨率的发展前景进行了展望。
{"title":"A Review of Super Resolution Based on Deep Learning","authors":"Qingyang Chen, Z. Qiang, Hong Lin","doi":"10.1109/ICCC56324.2022.10065896","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065896","url":null,"abstract":"Super-resolution (SR) is the process of restoring a limited number of low-resolution (LR) images to high-resolution (HR) images. In recent years, with the vigorous development of deep learning in computer vision, its applications in image super resolution have also made significant progress. In this paper we aim to integrate and analyze the existing deep-learning based image super-resolution models, and show several models with the best performance. We divide the models into five main categories based on where the sampling is located in the different models. Then we analyze and compare the different networks architectures. We also list some tips which are effective in super-resolution networks. At the end of this paper, we analyze the existing problems of super-resolution based on deep learning and make an outlook on the future of super-resolution development.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unified Detection Method of Boundary and Hole Points Based on Point Cloud Resolution 基于点云分辨率的边界点和孔点统一检测方法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065789
Yongqiang Wang, Di Zhang, Ning Liu, Q. Wan
Target self-occlusion and view limitation of scanning equipment will make boundary and hole points exist in 3D point cloud data. The detection of boundary and hole points is an essential processing step for many related applications, such as the repair of point cloud holes. In this paper, we propose a unified detection algorithm for the point cloud's boundary and hole points. First, the algorithm utilizes the point cloud resolution to define a spherical neighbourhood and establishes the covariance matrix through neighbours. Then, we analyze the covariance matrix and invoke the angle criterion to judge whether the data point is a boundary point. The experimental results are carried out, which indicates that the proposed approach is superior to the comparative methods in time consumption and the success rate of boundary point detection. Furthermore, it is also robust to changes in geometric structure and the number of holes in the point cloud.
目标的自遮挡和扫描设备的视野限制会使三维点云数据中存在边界点和孔点。边界点和孔洞点的检测是点云孔洞修复等相关应用中必不可少的处理步骤。本文提出了一种点云边界点和孔点的统一检测算法。该算法首先利用点云分辨率定义球面邻域,并通过邻域建立协方差矩阵;然后,分析协方差矩阵,利用角度判据判断数据点是否为边界点;实验结果表明,该方法在边界点检测的耗时和成功率上都优于比较方法。此外,该算法对点云几何结构和孔数的变化也具有较强的鲁棒性。
{"title":"A Unified Detection Method of Boundary and Hole Points Based on Point Cloud Resolution","authors":"Yongqiang Wang, Di Zhang, Ning Liu, Q. Wan","doi":"10.1109/ICCC56324.2022.10065789","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065789","url":null,"abstract":"Target self-occlusion and view limitation of scanning equipment will make boundary and hole points exist in 3D point cloud data. The detection of boundary and hole points is an essential processing step for many related applications, such as the repair of point cloud holes. In this paper, we propose a unified detection algorithm for the point cloud's boundary and hole points. First, the algorithm utilizes the point cloud resolution to define a spherical neighbourhood and establishes the covariance matrix through neighbours. Then, we analyze the covariance matrix and invoke the angle criterion to judge whether the data point is a boundary point. The experimental results are carried out, which indicates that the proposed approach is superior to the comparative methods in time consumption and the success rate of boundary point detection. Furthermore, it is also robust to changes in geometric structure and the number of holes in the point cloud.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128307956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the Impact of Mindfulness on Employee Green Behavior 正念对员工绿色行为的影响研究
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065998
Wang Lan, Guan Lian
Employee green behavior is a key driver of sustainable competitive advantage. Many academic scholars and practical managers explore how to promote employee green behavior. In the context of carbon peak and carbon neutrality, more and more enterprises are carrying out green transformation strategy. Employee green behavior also plays an important role in this process. This paper elaborates a theoretical framework that relates mindfulness to employee green behavior. We argue organizational identification plays a prominent mediating role in enhancing employee green behavior. Using survey data from a sample of 211 employees, we demonstrated that mindfulness has a positive impact on employee green behavior through organizational identification. Theoretical and managerial implications are discussed.
员工绿色行为是可持续竞争优势的关键驱动因素。许多学术学者和实践管理者都在探索如何促进员工的绿色行为。在碳峰值和碳中和的背景下,越来越多的企业开始实施绿色转型战略。员工的绿色行为在这一过程中也扮演着重要的角色。本文阐述了正念与员工绿色行为之间关系的理论框架。我们认为组织认同在促进员工绿色行为中起着显著的中介作用。利用211名员工的调查数据,我们通过组织认同证明了正念对员工绿色行为有积极的影响。讨论了理论和管理意义。
{"title":"Study on the Impact of Mindfulness on Employee Green Behavior","authors":"Wang Lan, Guan Lian","doi":"10.1109/ICCC56324.2022.10065998","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065998","url":null,"abstract":"Employee green behavior is a key driver of sustainable competitive advantage. Many academic scholars and practical managers explore how to promote employee green behavior. In the context of carbon peak and carbon neutrality, more and more enterprises are carrying out green transformation strategy. Employee green behavior also plays an important role in this process. This paper elaborates a theoretical framework that relates mindfulness to employee green behavior. We argue organizational identification plays a prominent mediating role in enhancing employee green behavior. Using survey data from a sample of 211 employees, we demonstrated that mindfulness has a positive impact on employee green behavior through organizational identification. Theoretical and managerial implications are discussed.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Syzballer: Kernel Fuzzing Based on Basic Block Weight and Multi-armed Bandit Syzballer:基于基本块权和多臂强盗的核模糊
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065711
Zhengyang Huang, Xuyan Song, Yifan Luo, Jun Yang, Baojiang Cui
The Linux operating system is now extensively used on personal computers, cloud platforms, and enterprise servers. The security of the Linux kernel has also increased in importance. Several techniques, such as symbolic execution, data flow analysis, and reinforcement learning, have been adapted for vulnerability discovery in recent years. Among these techniques, fuzzing is the most widely used one. However, the ease of accessing each kernel code basic block has not been considered in previous research. This means many high-risk vulnerabilities cannot be detected. To solve this problem, we present Syzballer, a hybrid fuzzer that combines multi-armed bandits with basic block weight, which is calculated by traversing the control flow graph generated by the kernel source code. First, we compile the kernel source code into LLVM bitcode and use the static analysis tool SVF to compute the weight of each basic block. Then we launched the fuzzer and loaded the weight file. Finally, a multi-armed bandit machine model is used to dynamically alter the task and seed selection. To verify the effectiveness of Syzballer, we compared it with the two most popular kernel fuzzers, Syzkaller and Syzvegas. Experiments have demonstrated that our Syzballer has improved in terms of code coverage and vulnerability detection.
Linux操作系统目前广泛应用于个人计算机、云平台和企业服务器。Linux内核的安全性也变得越来越重要。近年来,符号执行、数据流分析和强化学习等技术已被用于漏洞发现。在这些技术中,模糊测试是应用最广泛的一种。然而,在以往的研究中,并没有考虑到每个内核代码基本块的访问难易程度。这意味着无法检测到许多高风险漏洞。为了解决这个问题,我们提出了Syzballer,这是一个混合模糊器,它结合了多臂匪和基本块权重,通过遍历内核源代码生成的控制流图来计算。首先,我们将内核源代码编译成LLVM位码,并使用静态分析工具SVF计算每个基本块的权重。然后我们启动了fuzzer并加载了权重文件。最后,利用多臂强盗机模型对任务和种子选择进行动态调整。为了验证Syzballer的有效性,我们将它与两种最流行的内核模糊器Syzkaller和Syzvegas进行了比较。实验表明,我们的Syzballer在代码覆盖和漏洞检测方面有了改进。
{"title":"Syzballer: Kernel Fuzzing Based on Basic Block Weight and Multi-armed Bandit","authors":"Zhengyang Huang, Xuyan Song, Yifan Luo, Jun Yang, Baojiang Cui","doi":"10.1109/ICCC56324.2022.10065711","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065711","url":null,"abstract":"The Linux operating system is now extensively used on personal computers, cloud platforms, and enterprise servers. The security of the Linux kernel has also increased in importance. Several techniques, such as symbolic execution, data flow analysis, and reinforcement learning, have been adapted for vulnerability discovery in recent years. Among these techniques, fuzzing is the most widely used one. However, the ease of accessing each kernel code basic block has not been considered in previous research. This means many high-risk vulnerabilities cannot be detected. To solve this problem, we present Syzballer, a hybrid fuzzer that combines multi-armed bandits with basic block weight, which is calculated by traversing the control flow graph generated by the kernel source code. First, we compile the kernel source code into LLVM bitcode and use the static analysis tool SVF to compute the weight of each basic block. Then we launched the fuzzer and loaded the weight file. Finally, a multi-armed bandit machine model is used to dynamically alter the task and seed selection. To verify the effectiveness of Syzballer, we compared it with the two most popular kernel fuzzers, Syzkaller and Syzvegas. Experiments have demonstrated that our Syzballer has improved in terms of code coverage and vulnerability detection.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128682730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Color Balance and Fusion for Enhancement of Underwater Image 改进的色彩平衡和融合的水下图像增强
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065613
Juniie Chen, Yaiuan Wu
In underwater photography, the absorption and scattering of light may probably cause low contrast, blurred images, and color cast. We present an effective method for improving the quality of underwater images that have been degraded by medium scattering and absorption. It combines color compensation with multi-scale image fusion. Color compensation consists of independently correcting the value of $mathbf{R}$ channel and G-B channel of the input image and adjusting the white balance of the corrected image. After color compensation, the color of degraded image is restored effectively, but the blurring of image edges and details receiving scattering effects cannot be remedied. This problem can be solved by multi-scale image fusion. In our method, we use Gaussian pyramid and Laplace pyramid images for fusion, and these two feature pyramids are constructed by using the image after the illumination adjustment. The experimental results illustrate that dark-area sensitivity, global contrast, and edge sharpness of images have been improved by our methods. Moreover, in terms of visual effects and assessment metrics of underwater images, our method excels over other methods.
在水下摄影中,光的吸收和散射可能会导致对比度低、图像模糊和偏色。本文提出了一种有效的方法来改善被介质散射和吸收降低的水下图像质量。它将色彩补偿与多尺度图像融合相结合。色彩补偿包括对输入图像的$mathbf{R}$通道和G-B通道的值进行独立校正,并调整校正后图像的白平衡。经过颜色补偿后,退化图像的颜色得到了有效的恢复,但无法弥补图像边缘和细节受到散射效应的模糊。多尺度图像融合可以解决这一问题。在我们的方法中,我们使用高斯金字塔和拉普拉斯金字塔图像进行融合,并使用光照调整后的图像构建这两个特征金字塔。实验结果表明,该方法提高了图像的暗区灵敏度、全局对比度和边缘清晰度。此外,在水下图像的视觉效果和评估指标方面,我们的方法优于其他方法。
{"title":"Improved Color Balance and Fusion for Enhancement of Underwater Image","authors":"Juniie Chen, Yaiuan Wu","doi":"10.1109/ICCC56324.2022.10065613","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065613","url":null,"abstract":"In underwater photography, the absorption and scattering of light may probably cause low contrast, blurred images, and color cast. We present an effective method for improving the quality of underwater images that have been degraded by medium scattering and absorption. It combines color compensation with multi-scale image fusion. Color compensation consists of independently correcting the value of $mathbf{R}$ channel and G-B channel of the input image and adjusting the white balance of the corrected image. After color compensation, the color of degraded image is restored effectively, but the blurring of image edges and details receiving scattering effects cannot be remedied. This problem can be solved by multi-scale image fusion. In our method, we use Gaussian pyramid and Laplace pyramid images for fusion, and these two feature pyramids are constructed by using the image after the illumination adjustment. The experimental results illustrate that dark-area sensitivity, global contrast, and edge sharpness of images have been improved by our methods. Moreover, in terms of visual effects and assessment metrics of underwater images, our method excels over other methods.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129320531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional Analysis and Comparison of Network Novel Review and Main Text 网络小说评论与正文的情感分析与比较
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065818
Tao Yan, Wenjun Hou
As the network grows in popularity, so does the popularity of network novels based on the network platform. Simultaneously, the network novel platform has amassed a huge number of network novels with unique network reviews-“Benzhangshuo”. The purpose of this article is to use text emotional analysis technology to extract and visualize emotional information in the main text and “Benzhangshuo”, as well as to assess their properties and their relationship. It can make recommendations for content development, retrieval channels, and network innovative recommendations. This study divides the emotion types in the network novel text and “Benzhangshuo” using an emotion analysis method based on an emotion dictionary. The experimental results demonstrate that the main text and “Benzhangshuo” in the popular novel Da Wang Rao Ming” have essentially the same emotion distribution principles, but the proportion of the two emotion distribution is different.
随着网络的普及,基于网络平台的网络小说也越来越受欢迎。同时,网络小说平台也积累了大量具有独特网络评论的网络小说——“本掌说”。本文的目的是利用文本情感分析技术对主文本和“本章说”中的情感信息进行提取和可视化,并评估它们的属性和关系。它可以为内容开发、检索渠道和网络创新推荐提供建议。本研究采用基于情感词典的情感分析方法对网络小说文本和《本章说》中的情感类型进行了划分。实验结果表明,通俗小说《大王饶明》中的主文本和“本章说”具有本质上相同的情感分布原则,但两者的情感分布比例不同。
{"title":"Emotional Analysis and Comparison of Network Novel Review and Main Text","authors":"Tao Yan, Wenjun Hou","doi":"10.1109/ICCC56324.2022.10065818","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065818","url":null,"abstract":"As the network grows in popularity, so does the popularity of network novels based on the network platform. Simultaneously, the network novel platform has amassed a huge number of network novels with unique network reviews-“Benzhangshuo”. The purpose of this article is to use text emotional analysis technology to extract and visualize emotional information in the main text and “Benzhangshuo”, as well as to assess their properties and their relationship. It can make recommendations for content development, retrieval channels, and network innovative recommendations. This study divides the emotion types in the network novel text and “Benzhangshuo” using an emotion analysis method based on an emotion dictionary. The experimental results demonstrate that the main text and “Benzhangshuo” in the popular novel Da Wang Rao Ming” have essentially the same emotion distribution principles, but the proportion of the two emotion distribution is different.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124594058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low Complexity Neural Network-Based BP Decoder for Polar Codes 一种基于低复杂度神经网络的极码BP解码器
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065804
Y. Mao, Shizhan Cheng, Xingcheng Liu, En Zou
In recent years, neural network-based BP decoders for polar codes have draw much attention, due to their faster convergence and better error-correction performance compared with conventional BP decoders. However, the prior neural BP decoders have high storage cost and training complexity due to massive number of training weights, and the performance improvement is slight. In this work, we first propose a 2D-MSMS algorithm with a shared weight scheme, in which the nodes in the same layer share a weight among different iterations. These learnable weights are optimized by deep learning techniques. Then, we propose a CRC-Aided relaxed 2D-MSMS polar de-coder by introducing relaxation method and CRC-Aided early termination scheme. Simulation results show that our proposed decoder can effectively improve BER performance at medium to high SNR and reduce the amount of training weights by more than 95%.
近年来,基于神经网络的极性码BP解码器因其收敛速度快、纠错性能好而备受关注。然而,现有的神经BP解码器由于训练权值过多,存储成本高,训练复杂度高,性能提升甚微。在这项工作中,我们首先提出了一种具有共享权值方案的2D-MSMS算法,其中同一层的节点在不同迭代之间共享权值。这些可学习权重通过深度学习技术进行优化。然后,通过引入弛豫方法和crc辅助提前终止方案,提出了一种crc辅助弛豫2D-MSMS极性解码器。仿真结果表明,该解码器能够有效提高中高信噪比下的误码率,训练权值减少95%以上。
{"title":"A Low Complexity Neural Network-Based BP Decoder for Polar Codes","authors":"Y. Mao, Shizhan Cheng, Xingcheng Liu, En Zou","doi":"10.1109/ICCC56324.2022.10065804","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065804","url":null,"abstract":"In recent years, neural network-based BP decoders for polar codes have draw much attention, due to their faster convergence and better error-correction performance compared with conventional BP decoders. However, the prior neural BP decoders have high storage cost and training complexity due to massive number of training weights, and the performance improvement is slight. In this work, we first propose a 2D-MSMS algorithm with a shared weight scheme, in which the nodes in the same layer share a weight among different iterations. These learnable weights are optimized by deep learning techniques. Then, we propose a CRC-Aided relaxed 2D-MSMS polar de-coder by introducing relaxation method and CRC-Aided early termination scheme. Simulation results show that our proposed decoder can effectively improve BER performance at medium to high SNR and reduce the amount of training weights by more than 95%.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124696523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Cloud Computing Security & Privacy Protection of Massive Unstructured Multi-Modal Data 海量非结构化多模态数据的云计算安全与隐私保护研究
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065870
Hui Yang, Yang Cao
With the rapid development of big data and AI technologies, the sharing and opening-up, development and utilization of big data from government, medical becomes into one of our priorities. However, a problem that has puzzled us for a long time is that, the usage rate of massive unstructured multi-modal data as an absolute main body is still very low, which seriously restricts the circulation of data factors and faces the increasingly serious challenge of security-compliance. To speed up the circulation process and value release of data factors, this paper proposed a security-compliant and lightweight cloud computing model for massive unstructured multi-modal data. The implementation method includes multi-modal feature recognition and extraction from unstructured big data with NLP, CNN, image processing, audio processing technologies, fast and safe cipher-text calculation, and cipher-text retrieval with HE (homomorphic encryption) against the feature index database, and multi-modal data fusion, etc. With the above model & algorithms including the optimization solution of the HE algorithm, we verified the “compute-able but invisible” of massive cross-media unstructured data, and proved the security, validity, and time efficiency.
随着大数据和人工智能技术的快速发展,政府、医疗大数据的共享、开放、开发和利用成为我们的重点之一。但长期困扰我们的一个问题是,海量非结构化多模态数据作为绝对主体的使用率仍然很低,严重制约了数据要素的流通,面临着日益严峻的安全合规性挑战。为了加快数据要素的流通过程和价值释放,本文提出了一种安全轻量级的海量非结构化多模态数据云计算模型。实现方法包括利用NLP、CNN、图像处理、音频处理技术对非结构化大数据进行多模态特征识别和提取,快速安全的密文计算,利用HE(同态加密)对特征索引数据库进行密文检索,以及多模态数据融合等。通过上述模型和算法,包括HE算法的优化解,验证了海量跨媒体非结构化数据的“可计算但不可见”,证明了其安全性、有效性和时间效率。
{"title":"Research on Cloud Computing Security & Privacy Protection of Massive Unstructured Multi-Modal Data","authors":"Hui Yang, Yang Cao","doi":"10.1109/ICCC56324.2022.10065870","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065870","url":null,"abstract":"With the rapid development of big data and AI technologies, the sharing and opening-up, development and utilization of big data from government, medical becomes into one of our priorities. However, a problem that has puzzled us for a long time is that, the usage rate of massive unstructured multi-modal data as an absolute main body is still very low, which seriously restricts the circulation of data factors and faces the increasingly serious challenge of security-compliance. To speed up the circulation process and value release of data factors, this paper proposed a security-compliant and lightweight cloud computing model for massive unstructured multi-modal data. The implementation method includes multi-modal feature recognition and extraction from unstructured big data with NLP, CNN, image processing, audio processing technologies, fast and safe cipher-text calculation, and cipher-text retrieval with HE (homomorphic encryption) against the feature index database, and multi-modal data fusion, etc. With the above model & algorithms including the optimization solution of the HE algorithm, we verified the “compute-able but invisible” of massive cross-media unstructured data, and proved the security, validity, and time efficiency.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130496303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Vision Categorization with Vision Transformer: A Survey 基于视觉变压器的细粒度视觉分类研究进展
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065990
Yong Zhang, W. Chen, Ying Zang
Fine-grained visual classification (FGVC) is to identify subcategories with very small differences from image data with large intra-class differences and small inter-class differences. It is a very challenging task in the field of computer vision. With the rapid development of deep learning, FGVC algorithms have developed from traditional strong supervised learning, which relies on a large amount of manual annotation information, to weakly supervised learning. Weakly supervised learning includes algorithms based on traditional deep convolutional neural networks and based on vision transformer (ViT). In recent years, ViT has shown strong performance in FGVC and tends to surpass deep convolutional neural networks. This paper first introduces the purpose and characteristics of fine-grained image classification tasks, then introduces the corresponding public datasets and traditional convolutional network-based algorithms, discusses the performance of ViT-based algorithms and their advantages and disadvantages, and finally summarizes these algorithms.
细粒度视觉分类(FGVC)是从类内差异大、类间差异小的图像数据中识别差异很小的子类别。在计算机视觉领域,这是一项非常具有挑战性的任务。随着深度学习的快速发展,FGVC算法已经从传统的依赖大量人工标注信息的强监督学习发展到弱监督学习。弱监督学习包括基于传统深度卷积神经网络的算法和基于视觉变换(ViT)的算法。近年来,ViT在FGVC中表现出较强的性能,并有超越深度卷积神经网络的趋势。本文首先介绍了细粒度图像分类任务的目的和特点,然后介绍了相应的公共数据集和传统的基于卷积网络的算法,讨论了基于vit的算法的性能及其优缺点,最后对这些算法进行了总结。
{"title":"Fine-Grained Vision Categorization with Vision Transformer: A Survey","authors":"Yong Zhang, W. Chen, Ying Zang","doi":"10.1109/ICCC56324.2022.10065990","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065990","url":null,"abstract":"Fine-grained visual classification (FGVC) is to identify subcategories with very small differences from image data with large intra-class differences and small inter-class differences. It is a very challenging task in the field of computer vision. With the rapid development of deep learning, FGVC algorithms have developed from traditional strong supervised learning, which relies on a large amount of manual annotation information, to weakly supervised learning. Weakly supervised learning includes algorithms based on traditional deep convolutional neural networks and based on vision transformer (ViT). In recent years, ViT has shown strong performance in FGVC and tends to surpass deep convolutional neural networks. This paper first introduces the purpose and characteristics of fine-grained image classification tasks, then introduces the corresponding public datasets and traditional convolutional network-based algorithms, discusses the performance of ViT-based algorithms and their advantages and disadvantages, and finally summarizes these algorithms.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Power Allocation and Relay Design for Low-Latency and Energy-efficiency Ground-Ocean Network 低延迟高能效地海网络联合功率分配与中继设计
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065770
Xu Dong, Piming Ma, Lei Zhang, Lu Zhang
In this paper, we study the low-cost and high-speed information services for users at the sea and low-latency information services for vehicle-to-vehicle(V2V) users near the shore. We formulate the power allocation and relay design problem as a power minimization problem while fulfilling the rate constraints of both vessel users and vehicular users additionally with the low-latency requirement of the vehicular users. Using the Lyapunov optimization theory, the original problem is first transformed to a Lyapunov-drift-plus-penalty minimization problem. Then, an iterative algorithm is proposed to decompose the original problem into two non-convex sub-problems, while the sub-problem 1 can be solved using the feasible point pursuit successive convex approximation(FPP-SCA) algorithm and the sub-problem 2 can be solved by the SCA and the Lagrangian dual method. Finally, simulation results show that our proposed algorithm is beneficial in energy efficiency while guaranteeing the quality-of-service(QoS) requirement of vessel users and vehicular users.
本文研究了面向海上用户的低成本、高速信息服务和面向近岸车对车(V2V)用户的低延迟信息服务。我们将功率分配和继电器设计问题表述为功率最小化问题,同时满足船舶用户和车辆用户的速率约束,同时满足车辆用户的低延迟要求。首先利用李雅普诺夫优化理论,将原问题转化为李雅普诺夫漂移+惩罚最小化问题。然后,提出一种迭代算法将原问题分解为两个非凸子问题,其中子问题1可采用可行点追踪连续凸逼近(FPP-SCA)算法求解,子问题2可采用可行点追踪连续凸逼近和拉格朗日对偶方法求解。最后,仿真结果表明,该算法在保证船舶用户和车辆用户服务质量(QoS)要求的同时,有利于提高能源效率。
{"title":"Joint Power Allocation and Relay Design for Low-Latency and Energy-efficiency Ground-Ocean Network","authors":"Xu Dong, Piming Ma, Lei Zhang, Lu Zhang","doi":"10.1109/ICCC56324.2022.10065770","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065770","url":null,"abstract":"In this paper, we study the low-cost and high-speed information services for users at the sea and low-latency information services for vehicle-to-vehicle(V2V) users near the shore. We formulate the power allocation and relay design problem as a power minimization problem while fulfilling the rate constraints of both vessel users and vehicular users additionally with the low-latency requirement of the vehicular users. Using the Lyapunov optimization theory, the original problem is first transformed to a Lyapunov-drift-plus-penalty minimization problem. Then, an iterative algorithm is proposed to decompose the original problem into two non-convex sub-problems, while the sub-problem 1 can be solved using the feasible point pursuit successive convex approximation(FPP-SCA) algorithm and the sub-problem 2 can be solved by the SCA and the Lagrangian dual method. Finally, simulation results show that our proposed algorithm is beneficial in energy efficiency while guaranteeing the quality-of-service(QoS) requirement of vessel users and vehicular users.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 8th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1