首页 > 最新文献

2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)最新文献

英文 中文
Security Crypto Display that Information Disappears and Appears According to a Certain Temperature and Time 安全密码显示,信息消失,并根据一定的温度和时间出现
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660404
Cheong-Min Shin, Gi-Eun Kim, Kyeong-Gyu Min, Yanqiu Chen, Eugene J Choi, Chang‐Jae Yu, Jae-Hoon Kim
Security displays will be one of the important technologies of the future. So we were able to find a way during the study of displays using polarization. Emission of circularly polarized (CP) light has attracted great attention for improving device performance. The degree of CP emission is defined by the dissymmetric factor, $(q=2(I_{mathrm{L}}-I_{mathrm{R}})/(I_{mathrm{L}}+I_{mathrm{R}})$, where $I_{mathrm{L}}$ and $I_{mathrm{R}}$ denote the intensities of left-handed and right-handed CP light, respectively. Especially, high degree of CP emission was achieved in a helical configuration of mesogenic luminophore by doping a chiral agent [15] or by rubbing two different surfaces [16]. In this work, we investigate the dissymmetric factor of the intrinsic chiral luminophore as a function of elapsed time after sample fabrication. The fluorene moiety containing chirality was used for an emitting layer (EML) and annealed thermally above its mesogenic temperature after coating on the rubbed alignment layer. The EML constructed the twisted structure without any treatment after cooling down at room temperature. The twisted EML generates the CP light, whose dissymmetric factor is governed by helical twisting power (HTP) and thickness of the EML. Interestingly, the dissymmetric factor (gPL) of the photoluminescence (PL) was gradually degraded according to time elapsed after sample preparation. These degradation behaviors were observed in both rapidly and slowly cooling processes. Such phenomenon is expected to be originated from weaker HTP of the intrinsic chirality than the specific chiral dopant such as S(R)05011 [15]. Restoring process of the dissymmetric factor was also investigated. Therefore, using this phenomenon, it can be applied to military security or various security displays.
安全显示将是未来的重要技术之一。所以我们在研究显示器的过程中找到了一种使用偏振的方法。圆偏振光的发射在提高器件性能方面受到广泛关注。CP发射度由不对称因子$(q=2(I_{ mathm {L}}-I_{ mathm {R}})/(I_{ mathm {L}}+I_{ mathm {R}})$定义,其中$I_{ mathm {L}}$和$I_{ mathm {R}}$分别表示左手和右手CP光的强度。特别是,通过掺杂手性剂[15]或摩擦两个不同的表面[16],在中致发光团的螺旋构型中实现了高程度的CP发射。在这项工作中,我们研究了本征手性发光团的不对称因子作为样品制造后经过时间的函数。采用含手性的芴基团作为发光层(EML),涂覆在摩擦取向层上后,对其进行热退火。EML在室温下冷却后,无需任何处理即可构建扭曲结构。扭曲EML产生CP光,其不对称因子由螺旋扭曲功率(HTP)和EML厚度决定。有趣的是,根据样品制备后的时间,光致发光(PL)的不对称因子(gPL)逐渐降低。在快速和慢速冷却过程中均观察到这些降解行为。这种现象可能是由于本征手性的HTP比S(R)05011等特定手性掺杂剂弱[15]所致。研究了不对称因子的恢复过程。因此,利用这种现象,可以应用于军事安防或各种安防显示。
{"title":"Security Crypto Display that Information Disappears and Appears According to a Certain Temperature and Time","authors":"Cheong-Min Shin, Gi-Eun Kim, Kyeong-Gyu Min, Yanqiu Chen, Eugene J Choi, Chang‐Jae Yu, Jae-Hoon Kim","doi":"10.1109/IC-NIDC54101.2021.9660404","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660404","url":null,"abstract":"Security displays will be one of the important technologies of the future. So we were able to find a way during the study of displays using polarization. Emission of circularly polarized (CP) light has attracted great attention for improving device performance. The degree of CP emission is defined by the dissymmetric factor, $(q=2(I_{mathrm{L}}-I_{mathrm{R}})/(I_{mathrm{L}}+I_{mathrm{R}})$, where $I_{mathrm{L}}$ and $I_{mathrm{R}}$ denote the intensities of left-handed and right-handed CP light, respectively. Especially, high degree of CP emission was achieved in a helical configuration of mesogenic luminophore by doping a chiral agent [15] or by rubbing two different surfaces [16]. In this work, we investigate the dissymmetric factor of the intrinsic chiral luminophore as a function of elapsed time after sample fabrication. The fluorene moiety containing chirality was used for an emitting layer (EML) and annealed thermally above its mesogenic temperature after coating on the rubbed alignment layer. The EML constructed the twisted structure without any treatment after cooling down at room temperature. The twisted EML generates the CP light, whose dissymmetric factor is governed by helical twisting power (HTP) and thickness of the EML. Interestingly, the dissymmetric factor (gPL) of the photoluminescence (PL) was gradually degraded according to time elapsed after sample preparation. These degradation behaviors were observed in both rapidly and slowly cooling processes. Such phenomenon is expected to be originated from weaker HTP of the intrinsic chirality than the specific chiral dopant such as S(R)05011 [15]. Restoring process of the dissymmetric factor was also investigated. Therefore, using this phenomenon, it can be applied to military security or various security displays.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Epidemic Dynamics Model Considering Individual Movements and Urban Areas 考虑个体运动和城市区域的流行病动力学模型研究
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660546
Boxu Pan, Jie Yang, Yu Wang, Zehao Wang, Yuangeng Zhu, Zhiqiang Zhang
With the rapid spread of COVID-19, hundreds of millions of people worldwide have been infected. In order to cope with the epidemic, experts from various countries have carried out a lot of research works. Most of these works chose to use the traditional SEIR model, but the traditional model doesn't consider the individual's movement in the city. Based on the transmission characteristics of COVID-19, this paper optimized the traditional SEIR model by combining the in-depth mining and processed multiple data, such as the real epidemic data published by some official organizations, as well as data with certain credibility obtained from reference papers, journals or newspapers. Compared with the traditional SEIR model, the proposed model takes into account the impact of individuals' movement and the division of urban functional areas. The outcomes can play a certain role in the prediction and analysis of the spread of the epidemic in cities with regular individuals' movements and functions of urban areas.
随着COVID-19的迅速传播,全球有数亿人受到感染。为了应对这一流行病,各国专家进行了大量的研究工作。这些作品大多选择使用传统的SEIR模型,但是传统模型并没有考虑到个人在城市中的运动。本文根据COVID-19的传播特点,结合对多个数据的深度挖掘和处理,对传统的SEIR模型进行了优化,这些数据包括一些官方机构公布的真实疫情数据,以及从参考论文、期刊或报纸中获得的具有一定可信度的数据。与传统的SEIR模型相比,该模型考虑了个体迁移和城市功能区划分的影响。研究结果可对人群流动规律和城区功能规律的城市疫情传播进行预测和分析。
{"title":"Research of Epidemic Dynamics Model Considering Individual Movements and Urban Areas","authors":"Boxu Pan, Jie Yang, Yu Wang, Zehao Wang, Yuangeng Zhu, Zhiqiang Zhang","doi":"10.1109/IC-NIDC54101.2021.9660546","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660546","url":null,"abstract":"With the rapid spread of COVID-19, hundreds of millions of people worldwide have been infected. In order to cope with the epidemic, experts from various countries have carried out a lot of research works. Most of these works chose to use the traditional SEIR model, but the traditional model doesn't consider the individual's movement in the city. Based on the transmission characteristics of COVID-19, this paper optimized the traditional SEIR model by combining the in-depth mining and processed multiple data, such as the real epidemic data published by some official organizations, as well as data with certain credibility obtained from reference papers, journals or newspapers. Compared with the traditional SEIR model, the proposed model takes into account the impact of individuals' movement and the division of urban functional areas. The outcomes can play a certain role in the prediction and analysis of the spread of the epidemic in cities with regular individuals' movements and functions of urban areas.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The In-Robot Network Structure of Humanoid Robot for Burst Traffic Data Situations 突发交通数据情况下仿人机器人的机器人内网络结构
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660596
T. Tan, Chengyu Cui, Sungkwon Park
According to the basic concept of the In-Robot Network(IRN), an IRN structure that can handle burst data is proposed. According to the existing research on humanoid robots, it can be seen that the current humanoid robots have a high degree of freedom of joints and carry various sensors at the same time to form a huge IRN network. It can be known from existing research that most of the current humanoid robots operate according to preset scenarios and plans. If a special situation occurs, the current IRN structure of a humanoid robot cannot handle a large amount of burst data in a special situation. Therefore, based on the in-vehicle network (IVN) and time-sensitive network (TSN) concepts, an IRN structure that can handle the data generated in the above-mentioned emergencies is proposed in this article. In this IRN structure, the Domain Control Unit (DCU) is used to detect the status of the data stream in each different area to distinguish whether an emergency occurs. Also, according to different emergencies, use different ways to deal with the emergent data. Meanwhile, it is verified by the OMNet++ network simulation tool.
根据机器人内网络(IRN)的基本概念,提出了一种能够处理突发数据的IRN结构。根据现有的仿人机器人研究可以看出,目前的仿人机器人关节自由度高,同时携带各种传感器,形成一个庞大的IRN网络。从现有的研究中可以知道,目前大多数人形机器人都是按照预设的场景和计划进行操作的。如果发生特殊情况,目前仿人机器人的IRN结构无法处理特殊情况下的大量突发数据。因此,本文基于车载网络(IVN)和时间敏感网络(TSN)的概念,提出了一种能够处理上述突发事件中产生的数据的车载网络结构。在这种IRN结构中,DCU (Domain Control Unit)用于检测各个区域的数据流状态,从而判断是否发生紧急情况。同时,根据不同的紧急情况,采用不同的方式处理紧急数据。同时,通过omnet++网络仿真工具进行了验证。
{"title":"The In-Robot Network Structure of Humanoid Robot for Burst Traffic Data Situations","authors":"T. Tan, Chengyu Cui, Sungkwon Park","doi":"10.1109/IC-NIDC54101.2021.9660596","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660596","url":null,"abstract":"According to the basic concept of the In-Robot Network(IRN), an IRN structure that can handle burst data is proposed. According to the existing research on humanoid robots, it can be seen that the current humanoid robots have a high degree of freedom of joints and carry various sensors at the same time to form a huge IRN network. It can be known from existing research that most of the current humanoid robots operate according to preset scenarios and plans. If a special situation occurs, the current IRN structure of a humanoid robot cannot handle a large amount of burst data in a special situation. Therefore, based on the in-vehicle network (IVN) and time-sensitive network (TSN) concepts, an IRN structure that can handle the data generated in the above-mentioned emergencies is proposed in this article. In this IRN structure, the Domain Control Unit (DCU) is used to detect the status of the data stream in each different area to distinguish whether an emergency occurs. Also, according to different emergencies, use different ways to deal with the emergent data. Meanwhile, it is verified by the OMNet++ network simulation tool.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121404030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mutual Authentication and Distributed Key Management with Permissioned Blockchain in MEC-Enabled Vehicular Networks 基于许可区块链的mec车辆网络相互认证和分布式密钥管理
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660532
Cong Meng, Heli Zhang, Hong Ji, Xi Li
As a critical technology of network security, key management has attracted attention in mobile edge computing (MEC)-enabled vehicular networks. However, the traditional centralized key management methods are vulnerable to single points of failure. In this case, we propose a distributed key management scheme for MEC-enabled vehicular networks. Within this scheme, we use permissioned blockchain to store the key and present a new transaction format while key registration, update, and revocation are included. Considering the high mobility of the vehicle, we design a lightweight mutual authentication protocol to ensure that the vehicle can access MEC servers quickly and safely. Finally, the simulation results prove that our proposed scheme can achieve a lower authentication delay, less communication overhead, and higher security compared with traditional key management.
密钥管理作为网络安全的一项关键技术,在基于移动边缘计算(MEC)的车载网络中备受关注。然而,传统的集中式密钥管理方法容易出现单点故障。在这种情况下,我们提出了一种分布式密钥管理方案,用于支持mec的车辆网络。在该方案中,我们使用许可的区块链来存储密钥并呈现新的交易格式,同时包含密钥注册,更新和撤销。考虑到车辆的高机动性,我们设计了一个轻量级的相互认证协议,以确保车辆能够快速安全地访问MEC服务器。仿真结果表明,与传统的密钥管理方法相比,该方案具有较低的认证延迟、较低的通信开销和较高的安全性。
{"title":"Mutual Authentication and Distributed Key Management with Permissioned Blockchain in MEC-Enabled Vehicular Networks","authors":"Cong Meng, Heli Zhang, Hong Ji, Xi Li","doi":"10.1109/IC-NIDC54101.2021.9660532","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660532","url":null,"abstract":"As a critical technology of network security, key management has attracted attention in mobile edge computing (MEC)-enabled vehicular networks. However, the traditional centralized key management methods are vulnerable to single points of failure. In this case, we propose a distributed key management scheme for MEC-enabled vehicular networks. Within this scheme, we use permissioned blockchain to store the key and present a new transaction format while key registration, update, and revocation are included. Considering the high mobility of the vehicle, we design a lightweight mutual authentication protocol to ensure that the vehicle can access MEC servers quickly and safely. Finally, the simulation results prove that our proposed scheme can achieve a lower authentication delay, less communication overhead, and higher security compared with traditional key management.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132380505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Single- and Multi-carrier Signals Using CNN Based Deep Learning 基于CNN深度学习的单载波和多载波信号分类
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660515
S. An, Mingyu Jang, D. Yoon
In a non-cooperative context, to recover data from the received signal, the receiver must estimate the communication parameters used in the transmitter. In this paper, we propose an algorithm for classifying single-carrier and multi-carrier signals by using convolutional neural network based deep learning and analyze classification performance. Simulation results show that the proposed algorithm outperforms the conventional methods in an additive white Gaussian noise channel and Rician fading channel.
在非合作环境中,为了从接收到的信号中恢复数据,接收端必须估计发送端使用的通信参数。本文提出了一种基于卷积神经网络深度学习的单载波和多载波信号分类算法,并分析了分类性能。仿真结果表明,该算法在加性高斯白噪声信道和梯度衰落信道中优于传统方法。
{"title":"Classification of Single- and Multi-carrier Signals Using CNN Based Deep Learning","authors":"S. An, Mingyu Jang, D. Yoon","doi":"10.1109/IC-NIDC54101.2021.9660515","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660515","url":null,"abstract":"In a non-cooperative context, to recover data from the received signal, the receiver must estimate the communication parameters used in the transmitter. In this paper, we propose an algorithm for classifying single-carrier and multi-carrier signals by using convolutional neural network based deep learning and analyze classification performance. Simulation results show that the proposed algorithm outperforms the conventional methods in an additive white Gaussian noise channel and Rician fading channel.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Tunable Routing Algorithm for Integerated Terrestrial-Satellite Networks Based on the Space-Time Graph 基于空时图的地星综合网络可调路由算法
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660472
Yingjie Deng, Yu Liu
Integrated terrestrial-satellite networks have the advantages of wide coverage, long communication distance, strong mobile access capability, which form a good complementary relationship with 5G cellular network and have a bright future. However, integrated terrestrial-satellite network is a typical DTN network with time varying topology, in which whole end-to-end paths are hardly to be established. It is significant to design a routing algorithm for the integrated terrestrial-satellite networks. In order to solve the routing problem of satellite network, in this paper, a space-time graph model is first constructed. Inspired by the minimum-cost constrained multipath routing (MCMP) algorithm, a minimum-delay constrained multipath routing (MDMP) algorithm is proposed to minimize routing delay. Furthermore, a tunable minimum-delay-cost constrained multipath routing (TMMP) algorithm is proposed, which considers the optimization of both routing delay and energy cost with linear weighting method. Simulation results prove the effectiveness of MDMP algorithm and TMMP algorithm.
地星融合网具有覆盖范围广、通信距离远、移动接入能力强等优势,与5G蜂窝网络形成良好的互补关系,前景广阔。然而,地星一体化网络是典型的时变拓扑DTN网络,很难建立完整的端到端路径。地星一体化网络的路由算法设计具有重要意义。为了解决卫星网络的路由问题,本文首先构造了一个时空图模型。在最小代价约束多路径路由(MCMP)算法的启发下,提出了最小化路由延迟的最小延迟约束多路径路由(MDMP)算法。在此基础上,提出了一种可调最小延迟代价约束多路径路由算法,该算法采用线性加权法同时考虑路由延迟和能量代价的优化。仿真结果证明了MDMP算法和TMMP算法的有效性。
{"title":"A Tunable Routing Algorithm for Integerated Terrestrial-Satellite Networks Based on the Space-Time Graph","authors":"Yingjie Deng, Yu Liu","doi":"10.1109/IC-NIDC54101.2021.9660472","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660472","url":null,"abstract":"Integrated terrestrial-satellite networks have the advantages of wide coverage, long communication distance, strong mobile access capability, which form a good complementary relationship with 5G cellular network and have a bright future. However, integrated terrestrial-satellite network is a typical DTN network with time varying topology, in which whole end-to-end paths are hardly to be established. It is significant to design a routing algorithm for the integrated terrestrial-satellite networks. In order to solve the routing problem of satellite network, in this paper, a space-time graph model is first constructed. Inspired by the minimum-cost constrained multipath routing (MCMP) algorithm, a minimum-delay constrained multipath routing (MDMP) algorithm is proposed to minimize routing delay. Furthermore, a tunable minimum-delay-cost constrained multipath routing (TMMP) algorithm is proposed, which considers the optimization of both routing delay and energy cost with linear weighting method. Simulation results prove the effectiveness of MDMP algorithm and TMMP algorithm.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131435576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Security Integrated Attestation Scheme for Embedded Devices 嵌入式设备安全集成认证方案
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660438
Jiangnan Lin, Qiuxin Wu
With the development of the Internet of Things, embedded devices have become increasingly frequent in people's daily use. However, with the influx of a huge amount of heterogeneous embedded devices, its security has become an important issue. To face with such problems, remote attestation is undoubtedly a suitable security technology. Nevertheless, traditional remote attestation is limited to verifying the performance of devices as large and heterogeneous devices enter daily life. Therefore, this paper proposes a many-to-one swarm attestation and recovery scheme. Besides, the reputation mechanism and Merkel tree measurement method are introduced to reduce the attestation and recovery time of the scheme, and greatly reducing the energy consumption.
随着物联网的发展,嵌入式设备在人们的日常使用中越来越频繁。然而,随着大量异构嵌入式设备的涌入,其安全性已成为一个重要问题。面对这样的问题,远程认证无疑是一种合适的安全技术。然而,随着大型异构设备进入日常生活,传统的远程认证仅限于验证设备的性能。为此,本文提出了一种多对一的群体认证与恢复方案。此外,引入信誉机制和默克尔树测量方法,减少了方案的认证和恢复时间,大大降低了能耗。
{"title":"A Security Integrated Attestation Scheme for Embedded Devices","authors":"Jiangnan Lin, Qiuxin Wu","doi":"10.1109/IC-NIDC54101.2021.9660438","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660438","url":null,"abstract":"With the development of the Internet of Things, embedded devices have become increasingly frequent in people's daily use. However, with the influx of a huge amount of heterogeneous embedded devices, its security has become an important issue. To face with such problems, remote attestation is undoubtedly a suitable security technology. Nevertheless, traditional remote attestation is limited to verifying the performance of devices as large and heterogeneous devices enter daily life. Therefore, this paper proposes a many-to-one swarm attestation and recovery scheme. Besides, the reputation mechanism and Merkel tree measurement method are introduced to reduce the attestation and recovery time of the scheme, and greatly reducing the energy consumption.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation 具有链聚合的可验证协同学习
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660520
Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma
As many countries have promulgated laws on the protection of user data privacy, how to legally use user data has become a hot topic. With the emergence of collaborative learning, also known as federated learning, multiple participants can create a common, robust, and secure machine learning model aimed at addressing such critical issues of data sharing as privacy, security, and access, etc. Unfortunately, existing research shows that collaborative learning is not as secure as it claims, and the gradient leakage is still a key problem. To deal with this problem, a collaborative learning solution based on chained secure multi-party computing has been proposed recently. However, there are two security issues in this scheme that remain unsolved. First, if semi-honest users collude, the honest users' gradient also leaks. Second, if one of the users fails, it also cannot guarantee the correctness of the aggregation results. In this paper, we propose a privacy-preserving and verifiable chain collaborative learning scheme to solve this problem. First, we design a gradient encryption method, which can solve the problem of gradient leakage. Second, we create a verifiable method based on homomorphic hash technology. This method can ensure the correctness of users' aggregation results. At the same time, it can also track users who aggregate wrong. Compared with other solutions, our scheme is more efficient.
随着许多国家都颁布了保护用户数据隐私的法律,如何合法使用用户数据成为了一个热门话题。随着协作学习(也称为联邦学习)的出现,多个参与者可以创建一个通用的、健壮的、安全的机器学习模型,旨在解决数据共享的关键问题,如隐私、安全性和访问等。遗憾的是,现有的研究表明,协作学习并不像它声称的那样安全,梯度泄漏仍然是一个关键问题。针对这一问题,最近提出了一种基于链式安全多方计算的协同学习解决方案。然而,该方案中有两个安全问题尚未解决。首先,如果半诚实用户串通,诚实用户的梯度也会泄漏。其次,如果其中一个用户失败,也不能保证聚合结果的正确性。在本文中,我们提出了一个隐私保护和可验证的链协同学习方案来解决这一问题。首先,我们设计了一种梯度加密方法,该方法可以解决梯度泄漏问题。其次,我们创建了一种基于同态哈希技术的可验证方法。该方法可以保证用户聚合结果的正确性。同时,它还可以追踪聚合错误的用户。与其他方案相比,我们的方案效率更高。
{"title":"Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation","authors":"Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma","doi":"10.1109/IC-NIDC54101.2021.9660520","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660520","url":null,"abstract":"As many countries have promulgated laws on the protection of user data privacy, how to legally use user data has become a hot topic. With the emergence of collaborative learning, also known as federated learning, multiple participants can create a common, robust, and secure machine learning model aimed at addressing such critical issues of data sharing as privacy, security, and access, etc. Unfortunately, existing research shows that collaborative learning is not as secure as it claims, and the gradient leakage is still a key problem. To deal with this problem, a collaborative learning solution based on chained secure multi-party computing has been proposed recently. However, there are two security issues in this scheme that remain unsolved. First, if semi-honest users collude, the honest users' gradient also leaks. Second, if one of the users fails, it also cannot guarantee the correctness of the aggregation results. In this paper, we propose a privacy-preserving and verifiable chain collaborative learning scheme to solve this problem. First, we design a gradient encryption method, which can solve the problem of gradient leakage. Second, we create a verifiable method based on homomorphic hash technology. This method can ensure the correctness of users' aggregation results. At the same time, it can also track users who aggregate wrong. Compared with other solutions, our scheme is more efficient.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thermal Face Detection for High-Speed AI Thermometer 高速人工智能温度计的热人脸检测
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660583
W. Lee, Hyucksung Kwon, Jungwook Choi
In the era of COVID-19, temperature measurement becomes a crucial procedure for protecting public spaces against the virus. Artificial intelligence techniques such as object detection deep neural networks (DNNs) have been adopted to enhance the accuracy of contactless temperature measurement. However, the computation-demanding nature of DNNs, along with the time-consuming fusion of video and thermal camera frames, raises hurdles for the cost-effective deployment of such AI thermometer systems. In this work, we propose a high-speed and cost-effective implementation of an AI thermometer. We develop a thermal face detection network to detect faces for temperature measurement without a video camera. We optimize the proposed network's precision and structure to exploit high-throughput reduced-precision computations available in the embedded AI platforms. The resulting AI thermometer system demonstrates a live temperature measurement with a speed of 160 frames per second.
在新冠肺炎时代,温度测量成为保护公共场所免受病毒感染的关键程序。人工智能技术如物体检测深度神经网络(dnn)已被用于提高非接触式温度测量的准确性。然而,深度神经网络的计算需求特性,以及视频和热像仪帧的耗时融合,为这种人工智能温度计系统的成本效益部署带来了障碍。在这项工作中,我们提出了一种高速且具有成本效益的人工智能温度计实现方法。我们开发了一个热人脸检测网络,可以在没有摄像机的情况下检测人脸进行温度测量。我们优化了所提出的网络的精度和结构,以利用嵌入式人工智能平台中可用的高通量低精度计算。由此产生的人工智能温度计系统以每秒160帧的速度演示了实时温度测量。
{"title":"Thermal Face Detection for High-Speed AI Thermometer","authors":"W. Lee, Hyucksung Kwon, Jungwook Choi","doi":"10.1109/IC-NIDC54101.2021.9660583","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660583","url":null,"abstract":"In the era of COVID-19, temperature measurement becomes a crucial procedure for protecting public spaces against the virus. Artificial intelligence techniques such as object detection deep neural networks (DNNs) have been adopted to enhance the accuracy of contactless temperature measurement. However, the computation-demanding nature of DNNs, along with the time-consuming fusion of video and thermal camera frames, raises hurdles for the cost-effective deployment of such AI thermometer systems. In this work, we propose a high-speed and cost-effective implementation of an AI thermometer. We develop a thermal face detection network to detect faces for temperature measurement without a video camera. We optimize the proposed network's precision and structure to exploit high-throughput reduced-precision computations available in the embedded AI platforms. The resulting AI thermometer system demonstrates a live temperature measurement with a speed of 160 frames per second.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"17 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132149633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Building Age Prediction from Street View Images 从街景图像自动预测建筑物年龄
Pub Date : 2021-11-17 DOI: 10.1109/IC-NIDC54101.2021.9660554
Maoran Sun, Fan Zhang, Fábio Duarte
Building age is a key factor for building energy efficiency, valuation of real estate objects and urban planning, while previous research has been limited by the available building age data and efficient ways to estimate building age information. This paper presents an automated workflow for estimating building age from street view images. A building age dataset consisting of street view images that are labeled with the date of construction is created for Amsterdam. We designed a deep convolutional neural network for the estimation of building age and achieved a total accuracy of 81%. This research utilizes publicly available data, street view images, and construction dates of buildings, to perform the estimation of building age with an automated manner.
建筑楼龄是影响建筑节能、房地产估价和城市规划的关键因素,但现有的建筑楼龄数据和有效的估算方法限制了以往的研究。本文提出了一种从街景图像中估计建筑物年龄的自动化工作流程。为阿姆斯特丹创建了一个建筑年龄数据集,该数据集由标有建筑日期的街景图像组成。我们设计了一个深度卷积神经网络来估计建筑年龄,总准确率达到81%。本研究利用公开可用的数据、街景图像和建筑物的建造日期,以自动化的方式对建筑物的年龄进行估计。
{"title":"Automatic Building Age Prediction from Street View Images","authors":"Maoran Sun, Fan Zhang, Fábio Duarte","doi":"10.1109/IC-NIDC54101.2021.9660554","DOIUrl":"https://doi.org/10.1109/IC-NIDC54101.2021.9660554","url":null,"abstract":"Building age is a key factor for building energy efficiency, valuation of real estate objects and urban planning, while previous research has been limited by the available building age data and efficient ways to estimate building age information. This paper presents an automated workflow for estimating building age from street view images. A building age dataset consisting of street view images that are labeled with the date of construction is created for Amsterdam. We designed a deep convolutional neural network for the estimation of building age and achieved a total accuracy of 81%. This research utilizes publicly available data, street view images, and construction dates of buildings, to perform the estimation of building age with an automated manner.","PeriodicalId":264468,"journal":{"name":"2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131679466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1