首页 > 最新文献

2022 IEEE 8th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
T-PPA: A Privacy-Preserving Decentralized Payment System with Efficient Auditability Based on TEE T-PPA:一种基于TEE的高效可审计的保护隐私的去中心化支付系统
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065866
Suozai Li, Ming-jun Huang, Qinghao Wang, Yongxin Zhang, Ning Lu, Wenbo Shi, Hong Lei
Cryptocurrencies such as Bitcoin and Ethereum achieve decentralized payment by maintaining a globally distributed and append-only ledger. Recently, several researchers have sought to achieve privacy-preserving auditing, which is a crucial function for scenarios that require regulatory compliance, for decentralized payment systems. However, those proposed schemes usually cost much time for the cooperation between the auditor and the user due to leveraging complex cryptographic tools such as zero-knowledge proof. To tackle the problem, we present T-PPA, a privacy-preserving decentralized payment system, which provides customizable and efficient auditability by leveraging trusted execution environments (TEEs). T-PPA demands the auditor construct audit programs based on request and execute them in the TEE to protect the privacy of transactions. Then, identity-based encryption (IBE) is employed to construct the separation of power between the agency nodes and the auditor and to protect the privacy of transactions out of TEE. The experimental results show that T-PPA can achieve privacy-preserving audits with acceptable overhead.
比特币和以太坊等加密货币通过维护全球分布式和仅追加的分类账来实现去中心化支付。最近,一些研究人员试图实现保护隐私的审计,这是分散支付系统中需要遵守监管规定的关键功能。然而,由于使用了复杂的加密工具(如零知识证明),这些方案通常需要审计员和用户之间的合作花费大量时间。为了解决这个问题,我们提出了T-PPA,这是一种保护隐私的分散支付系统,它通过利用可信执行环境(tee)提供可定制和高效的可审计性。T-PPA要求审计人员根据请求构建审计程序并在TEE中执行,以保护交易的隐私。然后,采用基于身份的加密(IBE)来构建代理节点与审计员之间的权力分离,并保护TEE外交易的隐私性。实验结果表明,T-PPA可以在可接受的开销下实现隐私保护审计。
{"title":"T-PPA: A Privacy-Preserving Decentralized Payment System with Efficient Auditability Based on TEE","authors":"Suozai Li, Ming-jun Huang, Qinghao Wang, Yongxin Zhang, Ning Lu, Wenbo Shi, Hong Lei","doi":"10.1109/ICCC56324.2022.10065866","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065866","url":null,"abstract":"Cryptocurrencies such as Bitcoin and Ethereum achieve decentralized payment by maintaining a globally distributed and append-only ledger. Recently, several researchers have sought to achieve privacy-preserving auditing, which is a crucial function for scenarios that require regulatory compliance, for decentralized payment systems. However, those proposed schemes usually cost much time for the cooperation between the auditor and the user due to leveraging complex cryptographic tools such as zero-knowledge proof. To tackle the problem, we present T-PPA, a privacy-preserving decentralized payment system, which provides customizable and efficient auditability by leveraging trusted execution environments (TEEs). T-PPA demands the auditor construct audit programs based on request and execute them in the TEE to protect the privacy of transactions. Then, identity-based encryption (IBE) is employed to construct the separation of power between the agency nodes and the auditor and to protect the privacy of transactions out of TEE. The experimental results show that T-PPA can achieve privacy-preserving audits with acceptable overhead.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126293368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel MAC Scheduling Based on Cross-layer Algorithm and Deep Learning 一种基于跨层算法和深度学习的MAC调度方法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065651
Zhiming Liu, Shuangfeng Han
MAC scheduling plays an important role in affecting the performance of wireless communication system and the fairness among users. A significant number of algorithms have been put forward for increasingly complex scenarios in recent years. In this paper, we designed a novel MAC scheduling algorithm for intelligent 6G wireless network based on cross-layer mathematical algorithm and deep learning with Multi-Layer Perceptron (MLP). We define the cross-layer mathematical algorithm part as HI (Human Intelligence) engine and the deep learning part as AI (Artificial Intelligence) engine. Also, we respectively designed the coordination mechanism, required data, respective workflows and specific algorithms for the two engines. To demonstrate the superior performance gains of our proposed methodology, the use case was analyzed with simulation in various traffic scenarios and made performance comparison with traditional solution.
MAC调度对无线通信系统的性能和用户间的公平性有着重要的影响。近年来,针对日益复杂的场景,提出了大量的算法。本文设计了一种基于跨层数学算法和多层感知机(MLP)深度学习的智能6G无线网络MAC调度算法。我们将跨层数学算法部分定义为HI (Human Intelligence)引擎,将深度学习部分定义为AI (Artificial Intelligence)引擎。并分别设计了两个引擎的协调机制、所需数据、各自的工作流程和具体算法。为了证明我们提出的方法在性能方面的优势,在各种流量场景下对用例进行了仿真分析,并与传统解决方案进行了性能比较。
{"title":"A Novel MAC Scheduling Based on Cross-layer Algorithm and Deep Learning","authors":"Zhiming Liu, Shuangfeng Han","doi":"10.1109/ICCC56324.2022.10065651","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065651","url":null,"abstract":"MAC scheduling plays an important role in affecting the performance of wireless communication system and the fairness among users. A significant number of algorithms have been put forward for increasingly complex scenarios in recent years. In this paper, we designed a novel MAC scheduling algorithm for intelligent 6G wireless network based on cross-layer mathematical algorithm and deep learning with Multi-Layer Perceptron (MLP). We define the cross-layer mathematical algorithm part as HI (Human Intelligence) engine and the deep learning part as AI (Artificial Intelligence) engine. Also, we respectively designed the coordination mechanism, required data, respective workflows and specific algorithms for the two engines. To demonstrate the superior performance gains of our proposed methodology, the use case was analyzed with simulation in various traffic scenarios and made performance comparison with traditional solution.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymmetric Group Key Agreement Protocol from Short Signatures 短签名的非对称组密钥协商协议
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065683
Kunyu Shen, Lei Zhang, Ruisong Zhang, Qihao Fang
Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel notion ensures the confidentiality of communication among group members and allows any external entity to send messages to the group. However, the existing authenticated asymmetric group key agreement protocols are designed in identity-based cryptosystem or certificateless public key cryptosystem, which are not widely deployed. In this paper, we propose an efficient authenticated asymmetric group key agreement protocol. The protocol captures the security of secrecy, known-key security, key-compromise impersonation, unknown key-share and key control while being resistant to active attacks. The security of our protocol is reduced to the k-BDHE problem.
非对称组密钥协议允许一组用户协商一个与多个解密密钥对应的公共加密密钥,并且每个解密密钥只能由一个组成员计算。这种新颖的概念确保了群组成员之间通信的机密性,并允许任何外部实体向群组发送消息。然而,现有的经身份验证的非对称组密钥协商协议都是基于身份的密码体制或无证书的公钥密码体制设计的,没有得到广泛的应用。本文提出了一种高效的经认证的非对称组密钥协商协议。该协议在抵抗主动攻击的同时,捕获了保密、已知密钥安全、密钥泄露模拟、未知密钥共享和密钥控制的安全性。我们协议的安全性被简化为k-BDHE问题。
{"title":"Asymmetric Group Key Agreement Protocol from Short Signatures","authors":"Kunyu Shen, Lei Zhang, Ruisong Zhang, Qihao Fang","doi":"10.1109/ICCC56324.2022.10065683","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065683","url":null,"abstract":"Asymmetric group key agreement allows a group of users to negotiate a public encryption key that corresponds to several decryption keys, and each decryption key can only be computed by one group member. This novel notion ensures the confidentiality of communication among group members and allows any external entity to send messages to the group. However, the existing authenticated asymmetric group key agreement protocols are designed in identity-based cryptosystem or certificateless public key cryptosystem, which are not widely deployed. In this paper, we propose an efficient authenticated asymmetric group key agreement protocol. The protocol captures the security of secrecy, known-key security, key-compromise impersonation, unknown key-share and key control while being resistant to active attacks. The security of our protocol is reduced to the k-BDHE problem.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122302870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Point-Level and Set-Level Deep Representation Learning for Cross-Modal Person Re-identification 跨模态人物再识别的点级和集级深度表示学习
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065694
Jihui Hu, Pengfei Ye, Danyang Li, Lingyun Dong, Xiaopan Chen, Xiaoke Zhu
In practice, significant modality differences usually exist between visible and infrared images, which makes visible-infrared Person Re-Identification (VI-ReID) a challenging research task. Due to the existing influence of pose variation, background changes, and occlusion, there are often outlier samples within the set of images from the same person. These outlier samples can adversely affect the process of learning the cross-modal matching model. The existing VI-ReID methods mainly focus on learning cross-modal feature representation by using image-level discriminant constraints, i.e., the distance between the truly-matching cross-modal images should be smaller than that between wrong-matching cross-modal images. However, most of these methods ignore the adverse influence caused by outliers. To solve the above problems, we proposed a Point-level and Set-level Deep Representation Learning (PSDRL) approach for VI-ReID in this paper. By using the set-level constraint in the process of deep representation learning, the discrepancy between visible and infrared modalities can be decreased, and the adverse effect of outliers can be weakened. By employing the image-level constraint, the discriminability of the obtained deep feature representations can be improved. Extensive experiments are conducted on the publicly available cross-modal Person Re-Identification datasets, including SYSU-MM01 and RegDB. Experimental results demonstrate the effectiveness of the proposed approach.
在实际应用中,可见光和红外图像之间通常存在显著的模态差异,这使得可见光-红外人体再识别(VI-ReID)成为一项具有挑战性的研究任务。由于位姿变化、背景变化、遮挡等因素的影响,同一个人的图像集中往往存在离群样本。这些异常样本会对跨模态匹配模型的学习过程产生不利影响。现有的VI-ReID方法主要是通过使用图像级判别约束来学习跨模态特征表示,即真实匹配的跨模态图像之间的距离要小于错误匹配的跨模态图像之间的距离。然而,这些方法大多忽略了异常值带来的不利影响。为了解决上述问题,本文提出了一种针对VI-ReID的点级和集级深度表示学习(PSDRL)方法。通过在深度表征学习过程中使用集水平约束,可以减小可见光和红外模态之间的差异,减弱异常值的不利影响。通过使用图像级约束,可以提高获得的深度特征表示的可分辨性。在公开可用的跨模式人员再识别数据集(包括SYSU-MM01和RegDB)上进行了大量实验。实验结果证明了该方法的有效性。
{"title":"Point-Level and Set-Level Deep Representation Learning for Cross-Modal Person Re-identification","authors":"Jihui Hu, Pengfei Ye, Danyang Li, Lingyun Dong, Xiaopan Chen, Xiaoke Zhu","doi":"10.1109/ICCC56324.2022.10065694","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065694","url":null,"abstract":"In practice, significant modality differences usually exist between visible and infrared images, which makes visible-infrared Person Re-Identification (VI-ReID) a challenging research task. Due to the existing influence of pose variation, background changes, and occlusion, there are often outlier samples within the set of images from the same person. These outlier samples can adversely affect the process of learning the cross-modal matching model. The existing VI-ReID methods mainly focus on learning cross-modal feature representation by using image-level discriminant constraints, i.e., the distance between the truly-matching cross-modal images should be smaller than that between wrong-matching cross-modal images. However, most of these methods ignore the adverse influence caused by outliers. To solve the above problems, we proposed a Point-level and Set-level Deep Representation Learning (PSDRL) approach for VI-ReID in this paper. By using the set-level constraint in the process of deep representation learning, the discrepancy between visible and infrared modalities can be decreased, and the adverse effect of outliers can be weakened. By employing the image-level constraint, the discriminability of the obtained deep feature representations can be improved. Extensive experiments are conducted on the publicly available cross-modal Person Re-Identification datasets, including SYSU-MM01 and RegDB. Experimental results demonstrate the effectiveness of the proposed approach.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Traffic Prediction with Self-Supervised Contrastive Learning 基于自监督对比学习的有效交通预测
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066048
Yuqian Song
Taxi demand prediction has recently attracted increasing research interest due to the growing availability of large-scale traffic data, which could empower various real-world applications. Accurate taxi demand prediction can improve vehicle utilization, reduce the time for passengers to wait for taxis, and mitigate traffic congestion. Although both spatial dependencies and temporal dynamics have been considered, most of the previous methods with over-complicated models might easily achieve suboptimal performance due to the overfitting issue. Contrastive unsupervised learning has recently shown encouraging progress, which has great potential to learn effective data representations without extensive manual labeling. In this paper, we utilize contrastive learning to construct an effective auxiliary task to learn feature representations of data in a self-supervised manner. The model learned via contrastive learning can be subsequently applied for downstream tasks, which is proven to be more robust against overfitting. The extensive experiments and evaluations on a large-scale dataset well demonstrate the superiority of our proposed model over other compared methods for taxi demand prediction.
由于大规模交通数据的可用性日益增加,出租车需求预测最近吸引了越来越多的研究兴趣,这可能会赋予各种现实世界的应用。准确的出租车需求预测可以提高车辆利用率,减少乘客等待出租车的时间,缓解交通拥堵。虽然考虑了空间依赖性和时间动态性,但由于过拟合问题,以往大多数模型过于复杂的方法很容易达到次优性能。对比无监督学习最近取得了令人鼓舞的进展,它有很大的潜力在没有大量人工标记的情况下学习有效的数据表示。在本文中,我们利用对比学习构造一个有效的辅助任务,以自监督的方式学习数据的特征表示。通过对比学习获得的模型可以随后应用于下游任务,这被证明对过拟合具有更强的鲁棒性。在大规模数据集上进行的大量实验和评估很好地证明了我们提出的模型在出租车需求预测方面优于其他比较方法。
{"title":"Effective Traffic Prediction with Self-Supervised Contrastive Learning","authors":"Yuqian Song","doi":"10.1109/ICCC56324.2022.10066048","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066048","url":null,"abstract":"Taxi demand prediction has recently attracted increasing research interest due to the growing availability of large-scale traffic data, which could empower various real-world applications. Accurate taxi demand prediction can improve vehicle utilization, reduce the time for passengers to wait for taxis, and mitigate traffic congestion. Although both spatial dependencies and temporal dynamics have been considered, most of the previous methods with over-complicated models might easily achieve suboptimal performance due to the overfitting issue. Contrastive unsupervised learning has recently shown encouraging progress, which has great potential to learn effective data representations without extensive manual labeling. In this paper, we utilize contrastive learning to construct an effective auxiliary task to learn feature representations of data in a self-supervised manner. The model learned via contrastive learning can be subsequently applied for downstream tasks, which is proven to be more robust against overfitting. The extensive experiments and evaluations on a large-scale dataset well demonstrate the superiority of our proposed model over other compared methods for taxi demand prediction.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121096227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Battlefield Situation Visualization System Based on OSG 基于OSG的战场态势可视化系统的设计与实现
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065972
Yanming Zhao, Ping Guo, Chang Liu, Wanying Song
In view of the increasing multidimensional, detailed and dynamic nature of modern battlefield situation, the traditional two-dimensional (2D) battlefield situation visualization can no longer satisfy the needs of battlefield command and decision-making. Based on the in-depth study of OpenSceneGraph (OSG) and Qt. This paper designs and implements a three-dimensional (3D) visualization system of battlefield situation. This system combined with the radar system, uses User Datagram Protocol (UDP) protocol for real-time data communication. It is designed and implemented from four parts: resource management database, 3D visualization platform, radar system and interactive function realization. And the interactive function, such as radar beam dynamic scanning display, battlefield situation information display and playback, and real-time data communication, etc, are mainly designed in this system. The visualization results shows that the 3D visualization system has good real-time performance, comprehensive functions and strong sense of immersion. It has reference and guiding significance for the research and development of various application systems of 3D situation.
随着现代战场态势的多维化、精细化和动态性日益增强,传统的二维(2D)战场态势可视化已经不能满足战场指挥决策的需要。本文在深入研究OpenSceneGraph (OSG)和Qt的基础上,设计并实现了一个战场态势三维可视化系统。本系统结合雷达系统,采用用户数据报协议(UDP)协议进行实时数据通信。从资源管理数据库、三维可视化平台、雷达系统和交互功能实现四个部分进行设计与实现。该系统主要设计了雷达波束动态扫描显示、战场态势信息显示与回放、实时数据通信等交互功能。可视化结果表明,该三维可视化系统实时性好,功能全面,沉浸感强。对各种三维态势应用系统的研究和开发具有参考和指导意义。
{"title":"Design and Implementation of Battlefield Situation Visualization System Based on OSG","authors":"Yanming Zhao, Ping Guo, Chang Liu, Wanying Song","doi":"10.1109/ICCC56324.2022.10065972","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065972","url":null,"abstract":"In view of the increasing multidimensional, detailed and dynamic nature of modern battlefield situation, the traditional two-dimensional (2D) battlefield situation visualization can no longer satisfy the needs of battlefield command and decision-making. Based on the in-depth study of OpenSceneGraph (OSG) and Qt. This paper designs and implements a three-dimensional (3D) visualization system of battlefield situation. This system combined with the radar system, uses User Datagram Protocol (UDP) protocol for real-time data communication. It is designed and implemented from four parts: resource management database, 3D visualization platform, radar system and interactive function realization. And the interactive function, such as radar beam dynamic scanning display, battlefield situation information display and playback, and real-time data communication, etc, are mainly designed in this system. The visualization results shows that the 3D visualization system has good real-time performance, comprehensive functions and strong sense of immersion. It has reference and guiding significance for the research and development of various application systems of 3D situation.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121059665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Sensitive Text Classification Based on Knowledge Base and Hybrid Network 基于知识库和混合网络的敏感文本分类研究
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065790
Yongfeng Li, Hongliang Wang, Xueting Li, Pengfei Xiu
Aiming at the problems that convolution neural network is not sufficient to extract text features, it is difficult to capture long text structure information and sentence semantic relationship, and neural network can only extract the surface features of text, and it is difficult to obtain the implicit features of sentences when classifying text, this paper proposes a hybrid neural network text classification method based on a knowledge base. By extracting keywords from the category text, the keyword weight is calculated according to the co-occurrence relationship, and the category keyword knowledge base is constructed. It integrates CNN and bilstm, introduces attention mechanism, enhances the ability to extract local and temporal features of text, and improves the accuracy of text classification in combination with knowledge base information. The experimental results on the CNews dataset show that compared with TextCNN, TextRCNN, BILSTM and Bert models, this model can effectively improve the accuracy of text classification.
针对卷积神经网络不足以提取文本特征、难以捕获长文本结构信息和句子语义关系、神经网络在对文本进行分类时只能提取文本表面特征、难以获取句子隐含特征等问题,提出了一种基于知识库的混合神经网络文本分类方法。通过从分类文本中提取关键词,根据共现关系计算关键词权重,构建分类关键词知识库。它将CNN与bilstm相结合,引入注意机制,增强了提取文本局部特征和时态特征的能力,并结合知识库信息提高了文本分类的准确率。在CNews数据集上的实验结果表明,与TextCNN、TextRCNN、BILSTM和Bert模型相比,该模型能有效提高文本分类的准确率。
{"title":"Research on Sensitive Text Classification Based on Knowledge Base and Hybrid Network","authors":"Yongfeng Li, Hongliang Wang, Xueting Li, Pengfei Xiu","doi":"10.1109/ICCC56324.2022.10065790","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065790","url":null,"abstract":"Aiming at the problems that convolution neural network is not sufficient to extract text features, it is difficult to capture long text structure information and sentence semantic relationship, and neural network can only extract the surface features of text, and it is difficult to obtain the implicit features of sentences when classifying text, this paper proposes a hybrid neural network text classification method based on a knowledge base. By extracting keywords from the category text, the keyword weight is calculated according to the co-occurrence relationship, and the category keyword knowledge base is constructed. It integrates CNN and bilstm, introduces attention mechanism, enhances the ability to extract local and temporal features of text, and improves the accuracy of text classification in combination with knowledge base information. The experimental results on the CNews dataset show that compared with TextCNN, TextRCNN, BILSTM and Bert models, this model can effectively improve the accuracy of text classification.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CryptoDetection: A Cryptography Misuse Detection Method Based on Bi-LSTM CryptoDetection:一种基于Bi-LSTM的密码误用检测方法
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065788
C. An, Donglei Zhang, Xinjie Gao, Xueqiong Zhu
As the dramatic increase of both number and types of IoT devices, especially the ones have stringent requirements on complexity, development period and cost, cryptography misuses are becoming increasingly common which will have a tremendous influence on the security and privacy protection. To address the above question, this paper studies the feature of 73 cryptography misuses, proposes a cryptography detection method based on Bi-LSTM which can learns forward and backward simultaneously, and then developes a prototype tool called CryptoDetection for Java source code. Experimental results have shown that the proposed detection method achieves 92% accuracy, 92% precision, 91% recall and 92% f1-score, which respectively outperforms the best one among all the compared state-of-the-art techniques.
随着物联网设备数量和类型的急剧增加,特别是对复杂性、开发周期和成本要求越来越高的设备,加密滥用现象日益普遍,这将对安全与隐私保护产生巨大影响。针对上述问题,本文研究了73种密码误用的特点,提出了一种基于Bi-LSTM的同时向前学习和向后学习的密码检测方法,并针对Java源代码开发了一个名为CryptoDetection的原型工具。实验结果表明,该检测方法的准确率为92%,精密度为92%,召回率为91%,f1-score为92%,分别优于目前比较的几种检测方法。
{"title":"CryptoDetection: A Cryptography Misuse Detection Method Based on Bi-LSTM","authors":"C. An, Donglei Zhang, Xinjie Gao, Xueqiong Zhu","doi":"10.1109/ICCC56324.2022.10065788","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065788","url":null,"abstract":"As the dramatic increase of both number and types of IoT devices, especially the ones have stringent requirements on complexity, development period and cost, cryptography misuses are becoming increasingly common which will have a tremendous influence on the security and privacy protection. To address the above question, this paper studies the feature of 73 cryptography misuses, proposes a cryptography detection method based on Bi-LSTM which can learns forward and backward simultaneously, and then developes a prototype tool called CryptoDetection for Java source code. Experimental results have shown that the proposed detection method achieves 92% accuracy, 92% precision, 91% recall and 92% f1-score, which respectively outperforms the best one among all the compared state-of-the-art techniques.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Precoding Scheme with Enhanced Spectral Efficiency for Cell-Free Massive MIMO Downlink 提高无小区大规模MIMO下行链路频谱效率的联合预编码方案
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065761
Yufei Qiao, Xu Qiao, Run Luo, Zhencong Dai, Longxiang Yang
The cell-free massive multiple-input multiple-output (MIMO) system is a promising technology for B5G and 6G, it owns large spectral and power efficiency. However, the precoding scheme can affect the system downlink spectral efficiency obviously. Maximum-ratio transmission (MRT) is the most common precoding scheme used in cell-free massive MIMO systems, which maximizes the power of the desired signal, but is unable to suppress interference. Centralized zero-forcing (CZF) is a precoding scheme with strong interference cancellation ability, but can not support too many users because of the high computational complexity and limited front-haul capacity. In order to suppress interference and satisfy the requirement of system scalability, we propose a joint precoding scheme with enhanced spectral efficiency, named Scalable Joint Zero-Forcing Precoding (SJZF), which deploys different zero-forcing precoding schemes with the degree of inter-APs interference. We derive a closed-form expression of the achievable spectral efficiency (SE) for SJZF, under the assumption of independent rayleigh fading channel and pilot contamination. Based on the characteristics of the SE expression, we propose a novel random pilot assignment method, and a max-min fairness power optimization algorithm, to improve the system's SE obviously. Numerical results show that the SE of our SJZF outperforms other conventional precoding schemes, approaching CZF, but have affordable computation complexity.
无小区大规模多输入多输出(MIMO)系统是一项很有前途的B5G和6G技术,它具有很高的频谱和功率效率。然而,预编码方案对系统下行频谱效率有明显的影响。最大比传输(MRT)是无小区大规模MIMO系统中最常用的预编码方案,它能最大限度地提高期望信号的功率,但不能抑制干扰。集中式强制零(CZF)是一种干扰消除能力强的预编码方案,但由于计算复杂度高,前传容量有限,无法支持过多的用户。为了抑制干扰和满足系统可扩展性的要求,提出了一种提高频谱效率的联合预编码方案——可扩展联合强制零预编码(SJZF),该方案根据ap间干扰的程度部署不同的强制零预编码方案。在独立瑞利衰落信道和导频污染的假设下,导出了SJZF的可实现谱效率(SE)的封闭表达式。根据SE表达式的特点,提出了一种新的随机导频分配方法和最大最小公平功率优化算法,明显提高了系统的SE。数值结果表明,我们的SJZF的SE优于其他传统的预编码方案,接近CZF,但具有合理的计算复杂度。
{"title":"Joint Precoding Scheme with Enhanced Spectral Efficiency for Cell-Free Massive MIMO Downlink","authors":"Yufei Qiao, Xu Qiao, Run Luo, Zhencong Dai, Longxiang Yang","doi":"10.1109/ICCC56324.2022.10065761","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065761","url":null,"abstract":"The cell-free massive multiple-input multiple-output (MIMO) system is a promising technology for B5G and 6G, it owns large spectral and power efficiency. However, the precoding scheme can affect the system downlink spectral efficiency obviously. Maximum-ratio transmission (MRT) is the most common precoding scheme used in cell-free massive MIMO systems, which maximizes the power of the desired signal, but is unable to suppress interference. Centralized zero-forcing (CZF) is a precoding scheme with strong interference cancellation ability, but can not support too many users because of the high computational complexity and limited front-haul capacity. In order to suppress interference and satisfy the requirement of system scalability, we propose a joint precoding scheme with enhanced spectral efficiency, named Scalable Joint Zero-Forcing Precoding (SJZF), which deploys different zero-forcing precoding schemes with the degree of inter-APs interference. We derive a closed-form expression of the achievable spectral efficiency (SE) for SJZF, under the assumption of independent rayleigh fading channel and pilot contamination. Based on the characteristics of the SE expression, we propose a novel random pilot assignment method, and a max-min fairness power optimization algorithm, to improve the system's SE obviously. Numerical results show that the SE of our SJZF outperforms other conventional precoding schemes, approaching CZF, but have affordable computation complexity.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121715542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Design of Router Debugging based Neighbor Cache States Change of IPv6 Nodes 基于IPv6节点邻居缓存状态变化的路由器调试实验设计
Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065779
Liancheng Zhang, Wenwen Du, Lanxin Cheng, Yi Guo, Wenbo Ding, Xupan Ma
Current IPv6 node neighbor cache teaching practices focus on theoretical introductions and graphical explanations, and lack targeted experiments on neighbor cache states change. Since the neighbor cache states of IPv6 nodes change rapidly and some specific states are difficult to observe, the EVE-NG platform, which can combine Cisco router debugging with Wireshark packet capture and analysis, is introduced to experimental teaching to set up two comparative verification experiments of IPv6 neighbor cache states change, which are states observation of IPv6 node neighbor cache based on address resolution and packet parsing, and refined observation of IPv6 node neighbor cache states based on router debugging. Through these two phased experiments, students can not only visually observe the changes of the neighbor cache states of IPv6 nodes, but also deeply understand the timer and event-triggered change mechanism of the neighbor cache states of IPv6 nodes. Judging from actual teaching practices of two different classes, the EVE-NG experimental platform and two phased experiments have been well evaluated by the students, which have achieved good experimental teaching effects.
目前的IPv6节点邻居缓存教学实践以理论介绍和图形化解释为主,缺乏针对邻居缓存状态变化的针对性实验。针对IPv6节点邻居缓存状态变化快,一些具体状态难以观察的问题,将能够将Cisco路由器调试与Wireshark抓包分析相结合的EVE-NG平台引入实验教学,搭建了基于地址解析和数据包解析的IPv6节点邻居缓存状态观察两个IPv6邻居缓存状态变化的对比验证实验。基于路由器调试的IPv6节点邻居缓存状态的精细观察。通过这两个阶段的实验,学生不仅可以直观地观察IPv6节点邻居缓存状态的变化,还可以深入了解IPv6节点邻居缓存状态的定时器和事件触发变化机制。从两个不同班级的实际教学实践来看,EVE-NG实验平台和两个阶段的实验得到了学生的好评,取得了良好的实验教学效果。
{"title":"Experimental Design of Router Debugging based Neighbor Cache States Change of IPv6 Nodes","authors":"Liancheng Zhang, Wenwen Du, Lanxin Cheng, Yi Guo, Wenbo Ding, Xupan Ma","doi":"10.1109/ICCC56324.2022.10065779","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065779","url":null,"abstract":"Current IPv6 node neighbor cache teaching practices focus on theoretical introductions and graphical explanations, and lack targeted experiments on neighbor cache states change. Since the neighbor cache states of IPv6 nodes change rapidly and some specific states are difficult to observe, the EVE-NG platform, which can combine Cisco router debugging with Wireshark packet capture and analysis, is introduced to experimental teaching to set up two comparative verification experiments of IPv6 neighbor cache states change, which are states observation of IPv6 node neighbor cache based on address resolution and packet parsing, and refined observation of IPv6 node neighbor cache states based on router debugging. Through these two phased experiments, students can not only visually observe the changes of the neighbor cache states of IPv6 nodes, but also deeply understand the timer and event-triggered change mechanism of the neighbor cache states of IPv6 nodes. Judging from actual teaching practices of two different classes, the EVE-NG experimental platform and two phased experiments have been well evaluated by the students, which have achieved good experimental teaching effects.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"7 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113944447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 8th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1