首页 > 最新文献

2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
A Quantum Generative Adversarial Network-based Intrusion Detection System 基于量子生成对抗网络的入侵检测系统
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00280
Mohamed Abdur Rahman, H. Shahriar, Victor A. Clincy, M. Hossain, M. Rahman
Machine learning has become widely accepted because of its diverse approaches to deal with a variety of cyber security issues. However, their capricious nature of security threats makes classical machine learning cyber systems vulnerable. Moreover, more samples in a big data dataset in classical machine learning approaches could produce the security defence systems weaken. It may create accurate outcomes by processing information which takes longer than expected, or observe poor accuracy because of inefficient training as well as other issues. However, quantum systems have the potential to produce atypical patterns which can not be possible to produce efficiently by classical systems, so we can postulate that quantum computers could use these advantages in that it could outperform the capabilities of classical computers on machine learning tasks. To be specific, an intrusion detection system can detect attack packets or sequence of attack packets at TCP/IP or other protocol level data based on certain patterns present or by profiling to detect anomalies. O(poly(n) gates are required to enable the use of potentially advantageous quantum algorithms with quantum states using he Quantum generative adversarial networks (qGAN) implemented by Qiskit which is a quantum computing tool of IBM.
机器学习因其处理各种网络安全问题的多种方法而被广泛接受。然而,它们反复无常的安全威胁使得传统的机器学习网络系统变得脆弱。此外,在经典机器学习方法中,大数据数据集中的更多样本可能会削弱安全防御系统。它可能会通过处理比预期更长的信息来产生准确的结果,或者由于低效的训练以及其他问题而观察到较差的准确性。然而,量子系统有可能产生经典系统无法有效产生的非典型模式,因此我们可以假设量子计算机可以利用这些优势,因为它可以在机器学习任务上胜过经典计算机的能力。具体而言,入侵检测系统可以根据存在的某些模式或通过分析来检测TCP/IP或其他协议级数据的攻击数据包或攻击数据包序列,以检测异常。使用IBM的量子计算工具Qiskit实现的量子生成对抗网络(qGAN),需要O(poly(n))门来使用具有量子态的潜在优势的量子算法。
{"title":"A Quantum Generative Adversarial Network-based Intrusion Detection System","authors":"Mohamed Abdur Rahman, H. Shahriar, Victor A. Clincy, M. Hossain, M. Rahman","doi":"10.1109/COMPSAC57700.2023.00280","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00280","url":null,"abstract":"Machine learning has become widely accepted because of its diverse approaches to deal with a variety of cyber security issues. However, their capricious nature of security threats makes classical machine learning cyber systems vulnerable. Moreover, more samples in a big data dataset in classical machine learning approaches could produce the security defence systems weaken. It may create accurate outcomes by processing information which takes longer than expected, or observe poor accuracy because of inefficient training as well as other issues. However, quantum systems have the potential to produce atypical patterns which can not be possible to produce efficiently by classical systems, so we can postulate that quantum computers could use these advantages in that it could outperform the capabilities of classical computers on machine learning tasks. To be specific, an intrusion detection system can detect attack packets or sequence of attack packets at TCP/IP or other protocol level data based on certain patterns present or by profiling to detect anomalies. O(poly(n) gates are required to enable the use of potentially advantageous quantum algorithms with quantum states using he Quantum generative adversarial networks (qGAN) implemented by Qiskit which is a quantum computing tool of IBM.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TBCUP: A Transformer-based Code Comments Updating Approach TBCUP:基于转换器的代码注释更新方法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00119
Shifan Liu, Zhanqi Cui, Xiang Chen, Junbiao Yang, Li Li, Liwei Zheng
Good code comments are of great value for program maintenance. However, during the development process, developers often neglect to update the corresponding comments when changing the code, which results in inconsistent comments and affects the maintainability of software. Studies have shown that even in widely used programs, there is a large number of outdated comments. Existing code comment update approaches use long short-term memory (LSTM) model based on encoder-decoder to capture the relationship between code changes and comment updates, to automatically update code comments. However, due to the complexity of code changes, the corresponding comments update results do not perform well. Thus, a Transformer-based automatic update approach for code comments called TBCUP is proposed in this paper. TBCUP uses the multi-head attention mechanism to learn the relationship between code change sequences and comment updates to update comments more accurately. In addition, TBCUP uses the Byte Pair Encoding (BPE) algorithm to build a unified vocabulary for code and corresponding comments to alleviate the problem of out–of-vocabulary (OOV) words while updating comments. With BPE, TBCUP can split or combine words to handle OOV words. The experimental results on the dataset containing 108k sets of code-comment co-evolution samples show that the accuracy of TBCUP is improved by 3.2% in comparison with CUP.
好的代码注释对程序维护很有价值。然而,在开发过程中,开发人员在更改代码时往往忽略了对相应注释的更新,从而导致注释不一致,影响了软件的可维护性。研究表明,即使在广泛使用的程序中,也存在大量过时的注释。现有的代码注释更新方法采用基于编码器-解码器的长短期记忆(LSTM)模型捕捉代码更改与注释更新之间的关系,实现代码注释的自动更新。但是,由于代码更改的复杂性,相应的注释更新结果不能很好地执行。因此,本文提出了一种基于transformer的代码注释自动更新方法TBCUP。TBCUP使用多头注意机制来学习代码更改序列和注释更新之间的关系,从而更准确地更新注释。此外,TBCUP使用字节对编码(Byte Pair Encoding, BPE)算法为代码和相应的注释构建统一的词汇表,以缓解在更新注释时出现的词汇表外(OOV)词的问题。使用BPE, TBCUP可以拆分或组合单词来处理OOV单词。在包含108k组代码注释协同进化样本的数据集上的实验结果表明,TBCUP的准确率比CUP提高了3.2%。
{"title":"TBCUP: A Transformer-based Code Comments Updating Approach","authors":"Shifan Liu, Zhanqi Cui, Xiang Chen, Junbiao Yang, Li Li, Liwei Zheng","doi":"10.1109/COMPSAC57700.2023.00119","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00119","url":null,"abstract":"Good code comments are of great value for program maintenance. However, during the development process, developers often neglect to update the corresponding comments when changing the code, which results in inconsistent comments and affects the maintainability of software. Studies have shown that even in widely used programs, there is a large number of outdated comments. Existing code comment update approaches use long short-term memory (LSTM) model based on encoder-decoder to capture the relationship between code changes and comment updates, to automatically update code comments. However, due to the complexity of code changes, the corresponding comments update results do not perform well. Thus, a Transformer-based automatic update approach for code comments called TBCUP is proposed in this paper. TBCUP uses the multi-head attention mechanism to learn the relationship between code change sequences and comment updates to update comments more accurately. In addition, TBCUP uses the Byte Pair Encoding (BPE) algorithm to build a unified vocabulary for code and corresponding comments to alleviate the problem of out–of-vocabulary (OOV) words while updating comments. With BPE, TBCUP can split or combine words to handle OOV words. The experimental results on the dataset containing 108k sets of code-comment co-evolution samples show that the accuracy of TBCUP is improved by 3.2% in comparison with CUP.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of the Optimal Meal Detection Strategy for Adults, Adolescents, and Children with Type 1 Diabetes: an in Silico Validation 确定成人、青少年和儿童1型糖尿病患者的最佳膳食检测策略:一项计算机验证
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00266
Federico D'Antoni, M. Bertazzoni, L. Vollero, M. Merone
Current management of Type 1 Diabetes mellitus (T1D) resorts to manual meal announcements from the patient to manage postprandial glycemia; nevertheless, suboptimal glycemic control is observed in real data, with the presence of many hypoglycemic and hyperglycemic events. The utilization of Continuous Glucose Monitoring (CGM) sensors and Artificial Intelligence (AI) is paving the way for improved and automated glycemic control. A step in this direction is represented by the automation of meal detection, which would not require patients to perform tasks such as carbohydrate estimation and meal announcement that are error-prone, especially for children and elderly patients.In this work, we investigate several AI models for meal detection from in silico data of 10 adults, 10 adolescents, and 10 children with T1D using only CGM data, and compare them to the standard detection method based on the glycemic threshold. We generate 30 days of data per patient that include 5 meals per day and introduce human error on carbohydrate estimation to make data more similar to the real ones. The AI models can detect more than 81% of meals from any cohort of patients while producing a relatively small amount of false positives. The feedforward neural network, the support vector machine, and the threshold method are the most promising meal detection strategies for adult, adolescent, and child populations, respectively, and may improve patients’ health and disease management.
目前1型糖尿病(T1D)的管理依赖于患者手动进餐通知来控制餐后血糖;然而,在实际数据中观察到血糖控制不理想,存在许多低血糖和高血糖事件。连续血糖监测(CGM)传感器和人工智能(AI)的应用为改善和自动化血糖控制铺平了道路。朝这个方向迈出的一步是膳食检测的自动化,它不需要患者执行诸如碳水化合物估计和膳食公告等容易出错的任务,特别是对于儿童和老年患者。在这项工作中,我们研究了几种人工智能模型,用于仅使用CGM数据从10名成人,10名青少年和10名T1D儿童的计算机数据中进行膳食检测,并将其与基于血糖阈值的标准检测方法进行比较。我们为每位患者生成了30天的数据,包括每天5顿饭,并引入了碳水化合物估算的人为误差,使数据更接近真实数据。人工智能模型可以从任何一组患者中检测出81%以上的食物,同时产生相对较少的误报。前馈神经网络、支持向量机和阈值方法分别是成人、青少年和儿童人群中最有前途的膳食检测策略,并可能改善患者的健康和疾病管理。
{"title":"Identification of the Optimal Meal Detection Strategy for Adults, Adolescents, and Children with Type 1 Diabetes: an in Silico Validation","authors":"Federico D'Antoni, M. Bertazzoni, L. Vollero, M. Merone","doi":"10.1109/COMPSAC57700.2023.00266","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00266","url":null,"abstract":"Current management of Type 1 Diabetes mellitus (T1D) resorts to manual meal announcements from the patient to manage postprandial glycemia; nevertheless, suboptimal glycemic control is observed in real data, with the presence of many hypoglycemic and hyperglycemic events. The utilization of Continuous Glucose Monitoring (CGM) sensors and Artificial Intelligence (AI) is paving the way for improved and automated glycemic control. A step in this direction is represented by the automation of meal detection, which would not require patients to perform tasks such as carbohydrate estimation and meal announcement that are error-prone, especially for children and elderly patients.In this work, we investigate several AI models for meal detection from in silico data of 10 adults, 10 adolescents, and 10 children with T1D using only CGM data, and compare them to the standard detection method based on the glycemic threshold. We generate 30 days of data per patient that include 5 meals per day and introduce human error on carbohydrate estimation to make data more similar to the real ones. The AI models can detect more than 81% of meals from any cohort of patients while producing a relatively small amount of false positives. The feedforward neural network, the support vector machine, and the threshold method are the most promising meal detection strategies for adult, adolescent, and child populations, respectively, and may improve patients’ health and disease management.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Full-fledged Commit Message Quality Checker Based on Machine Learning 基于机器学习的完整的提交消息质量检查器
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00108
David Faragó, Michael Färber, Christian Petrov
Commit messages (CMs) are an essential part of version control. By providing important context in regard to what has changed and why, they strongly support software maintenance and evolution. But writing good CMs is difficult and often neglected by developers. So far, there is no tool suitable for practice that automatically assesses how well a CM is written, including its meaning and context. Since this task is challenging, we ask the research question: how well can the CM quality, including semantics and context, be measured with machine learning methods? By considering all rules from the most popular CM quality guideline, creating datasets for those rules, and training and evaluating state-of-the-art machine learning models to check those rules, we can answer the research question with: sufficiently well for practice, with the lowest F1 score of 82.9%, for the most challenging task. We develop a full-fledged open-source framework that checks all these CM quality rules. It is useful for research, e.g., automatic CM generation, but most importantly for software practitioners to raise the quality of CMs and thus the maintainability and evolution speed of their software.
提交消息(CMs)是版本控制的重要组成部分。通过提供关于什么发生了变化以及为什么发生变化的重要上下文,它们有力地支持软件维护和发展。但是编写好的CMs是很困难的,而且经常被开发人员忽视。到目前为止,还没有适合实践的工具可以自动评估CM编写得有多好,包括它的含义和上下文。由于这项任务具有挑战性,我们提出了一个研究问题:用机器学习方法测量CM质量(包括语义和上下文)的效果如何?通过考虑最流行的CM质量指南中的所有规则,为这些规则创建数据集,并训练和评估最先进的机器学习模型来检查这些规则,我们可以回答研究问题:对于实践来说足够好,最低F1分数为82.9%,对于最具挑战性的任务。我们开发了一个成熟的开源框架来检查所有这些CM质量规则。它对研究有用,例如,自动生成CM,但最重要的是软件从业者提高CMs的质量,从而提高其软件的可维护性和演进速度。
{"title":"A Full-fledged Commit Message Quality Checker Based on Machine Learning","authors":"David Faragó, Michael Färber, Christian Petrov","doi":"10.1109/COMPSAC57700.2023.00108","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00108","url":null,"abstract":"Commit messages (CMs) are an essential part of version control. By providing important context in regard to what has changed and why, they strongly support software maintenance and evolution. But writing good CMs is difficult and often neglected by developers. So far, there is no tool suitable for practice that automatically assesses how well a CM is written, including its meaning and context. Since this task is challenging, we ask the research question: how well can the CM quality, including semantics and context, be measured with machine learning methods? By considering all rules from the most popular CM quality guideline, creating datasets for those rules, and training and evaluating state-of-the-art machine learning models to check those rules, we can answer the research question with: sufficiently well for practice, with the lowest F1 score of 82.9%, for the most challenging task. We develop a full-fledged open-source framework that checks all these CM quality rules. It is useful for research, e.g., automatic CM generation, but most importantly for software practitioners to raise the quality of CMs and thus the maintainability and evolution speed of their software.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122393108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning Approaches for Racing and Object Avoidance on AWS DeepRacer 基于AWS DeepRacer的赛车和物体回避的强化学习方法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00129
Jacob McCalip, Mandil Pradhan, Kecheng Yang
Developing autonomous driving models through reinforcement learning is gaining widespread prominence. However, a pervasive problem is developing obstacle avoidance systems. Specifically, optimizing path completion times while avoiding objects is an underdeveloped area of research. AWS DeepRacer’s platform provides a powerful architecture for engineering and analyzing autonomous models. Using AWS DeepRacer, we integrate two pathfinding algorithms, A* and Line-of-Sight (LoS), into this paradigm of autonomous driving. LoS is a novel algorithm that incrementally updates the model’s heading angles to amply reach its destination. We trained three types of models: Centerline, A*, and LoS. The Centerline model utilizes logic from AWS and is practically the only model used by the AWS DeepRacer community that avoids objects. We developed models from A* and LoS that outperformed the default models in time per lap while maintaining commensurate stability.
通过强化学习开发自动驾驶模型正受到广泛关注。然而,一个普遍存在的问题是开发避障系统。具体来说,在避开物体的同时优化路径完成时间是一个不发达的研究领域。AWS DeepRacer平台为自动驾驶模型的工程和分析提供了强大的架构。使用AWS DeepRacer,我们将两种寻路算法A*和视线(LoS)集成到这种自动驾驶模式中。LoS是一种新颖的算法,它增量地更新模型的航向角度以充分到达目标。我们训练了三种类型的模型:Centerline、A*和LoS。Centerline模型利用AWS的逻辑,实际上是AWS DeepRacer社区使用的唯一一个避免对象的模型。我们从A*和LoS开发的模型在每圈时间上优于默认模型,同时保持相应的稳定性。
{"title":"Reinforcement Learning Approaches for Racing and Object Avoidance on AWS DeepRacer","authors":"Jacob McCalip, Mandil Pradhan, Kecheng Yang","doi":"10.1109/COMPSAC57700.2023.00129","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00129","url":null,"abstract":"Developing autonomous driving models through reinforcement learning is gaining widespread prominence. However, a pervasive problem is developing obstacle avoidance systems. Specifically, optimizing path completion times while avoiding objects is an underdeveloped area of research. AWS DeepRacer’s platform provides a powerful architecture for engineering and analyzing autonomous models. Using AWS DeepRacer, we integrate two pathfinding algorithms, A* and Line-of-Sight (LoS), into this paradigm of autonomous driving. LoS is a novel algorithm that incrementally updates the model’s heading angles to amply reach its destination. We trained three types of models: Centerline, A*, and LoS. The Centerline model utilizes logic from AWS and is practically the only model used by the AWS DeepRacer community that avoids objects. We developed models from A* and LoS that outperformed the default models in time per lap while maintaining commensurate stability.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131169224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Graph-Massivizer Approach Toward a European Sustainable Data Center Digital Twin 迈向欧洲可持续数据中心数字孪生的图-大规模方法
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00224
Martin Molan, Junaid Ahmed Khan, Andrea Bartolini, R. Turra, G. Pedrazzi, Michael Cochez, A. Iosup, D. Roman, Jože M. Rožanec, A. Varbanescu, R.-C. Prodan
Modeling and understanding an expensive next-generation data center operating at a sustainable exascale performance remains a challenge yet to solve. The paper presents the approach taken by the Graph-Massivizer project, funded by the European Union, towards a sustainable data center, targeting a massive graph representation and analysis of its digital twin. We introduce five interoperable open-source tools that support this undertaking, creating an automated, sustainable loop of graph creation, analytics, optimization, sustainable resource management, and operation, emphasizing state-of-the-art progress. We plan to employ the tools for designing a massive data center graph, representing a digital twin describing spatial, semantic, and temporal relationships between the monitoring metrics, hardware nodes, cooling equipment, and jobs. The project aims to strengthen Bologna Technopole as a leading European supercomputing and big data hub offering sustainable green computing for improved societally relevant science throughput.
建模和理解以可持续的百亿亿级性能运行的昂贵的下一代数据中心仍然是一个有待解决的挑战。本文介绍了由欧盟资助的graph - massivizer项目所采取的方法,该项目旨在建立一个可持续的数据中心,目标是对其数字孪生进行大规模的图形表示和分析。我们介绍了五个可互操作的开源工具来支持这项工作,创建了一个自动化的、可持续的图形创建、分析、优化、可持续资源管理和操作循环,强调了最先进的进展。我们计划使用这些工具来设计一个大型数据中心图,表示一个数字孪生,描述监控指标、硬件节点、冷却设备和作业之间的空间、语义和时间关系。该项目旨在加强博洛尼亚技术中心作为欧洲领先的超级计算和大数据中心的地位,提供可持续的绿色计算,以提高与社会相关的科学吞吐量。
{"title":"The Graph-Massivizer Approach Toward a European Sustainable Data Center Digital Twin","authors":"Martin Molan, Junaid Ahmed Khan, Andrea Bartolini, R. Turra, G. Pedrazzi, Michael Cochez, A. Iosup, D. Roman, Jože M. Rožanec, A. Varbanescu, R.-C. Prodan","doi":"10.1109/COMPSAC57700.2023.00224","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00224","url":null,"abstract":"Modeling and understanding an expensive next-generation data center operating at a sustainable exascale performance remains a challenge yet to solve. The paper presents the approach taken by the Graph-Massivizer project, funded by the European Union, towards a sustainable data center, targeting a massive graph representation and analysis of its digital twin. We introduce five interoperable open-source tools that support this undertaking, creating an automated, sustainable loop of graph creation, analytics, optimization, sustainable resource management, and operation, emphasizing state-of-the-art progress. We plan to employ the tools for designing a massive data center graph, representing a digital twin describing spatial, semantic, and temporal relationships between the monitoring metrics, hardware nodes, cooling equipment, and jobs. The project aims to strengthen Bologna Technopole as a leading European supercomputing and big data hub offering sustainable green computing for improved societally relevant science throughput.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121636707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning for Regional Subsidence Crisis Prediction in Smart Grid Infrastructure 基于深度学习的智能电网区域沉降危机预测
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00153
Zhaoran Wang, Xiangyu Bai, Yufeng Han
Power infrastructure and its connectivity are central to building a smart grid. The infrastructure regional subsidence caused by environmental factors or geological hazards may devastate grid systems. Therefore, it is critical to forecasting the infrastructure regional subsidence in smart grids. In this study, we used an InSAR time series subsidence dataset based on satellite remote sensing images to train, test and compare four deep learning-based Transformer series prediction models using transfer learning to achieve subsidence crisis monitoring and prediction in smart grid infrastructure areas, considering the influence of environmental factors on infrastructure regional subsidence. Meanwhile, an GIS for subsidence crisis prediction in smart grid infrastructure areas was developed based on the Autoformer model. It helps the power industry maintain the smart grid more efficiently and accurately while also saving a lot of money and labor.
电力基础设施及其互联互通是建设智能电网的核心。环境因素或地质灾害引起的基础设施区域沉降可能对电网系统造成破坏。因此,智能电网基础设施区域沉降预测至关重要。本研究利用基于卫星遥感影像的InSAR时间序列沉降数据集,考虑环境因素对基础设施区域沉降的影响,采用迁移学习方法,训练、测试和比较4种基于深度学习的Transformer系列预测模型,实现智能电网基础设施区域沉降危机监测与预测。同时,基于Autoformer模型,开发了智能电网基础设施区域沉降危机预测GIS。它帮助电力行业更有效、更准确地维护智能电网,同时也节省了大量资金和劳动力。
{"title":"Deep Learning for Regional Subsidence Crisis Prediction in Smart Grid Infrastructure","authors":"Zhaoran Wang, Xiangyu Bai, Yufeng Han","doi":"10.1109/COMPSAC57700.2023.00153","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00153","url":null,"abstract":"Power infrastructure and its connectivity are central to building a smart grid. The infrastructure regional subsidence caused by environmental factors or geological hazards may devastate grid systems. Therefore, it is critical to forecasting the infrastructure regional subsidence in smart grids. In this study, we used an InSAR time series subsidence dataset based on satellite remote sensing images to train, test and compare four deep learning-based Transformer series prediction models using transfer learning to achieve subsidence crisis monitoring and prediction in smart grid infrastructure areas, considering the influence of environmental factors on infrastructure regional subsidence. Meanwhile, an GIS for subsidence crisis prediction in smart grid infrastructure areas was developed based on the Autoformer model. It helps the power industry maintain the smart grid more efficiently and accurately while also saving a lot of money and labor.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132717498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SILK: Constraint-guided Hybrid Fuzzing 约束引导混合模糊测试
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00086
Junhao Li, Yujian Zhang
Hybrid fuzzing combines fuzzing and concolic execution which leverages the high-throughput feature of fuzzing to explore easy-to-reach code, and the powerful constraint solving capability of concolic execution to explore code wrapped in complex constraints. Based on our observations, existing hybrid fuzzers are still not efficient for the following two reasons. First, fuzzing often gets stuck in deep paths leading to the delayed discovery of vulnerabilities. Second, coarse-grained interaction strategies cannot effectively launch concolic execution. To solve the above problems, we propose a constraint-guided hybrid fuzzing approach (CGHF) that leverages the constraints’ static analysis information and dynamic execution information. CGHF contains two main techniques: an evolutionary algorithm based on path exploration difficulty and an interaction strategy guided by the execution state of constraints. Specifically, in the fuzzing phase, we evaluate the path exploration difficulty and guide the fuzzer to explore in the order of difficulty from low to high. In addition, we design a coordinator to monitor the constraints’ dynamic execution information and select the most deserving constraints to be solved for the concolic execution. We implement a prototype called SILK and compare its effectiveness on eight open source programs with other state-of-the-art fuzzers. The results show that SILK improved path coverage by 10%-45% and branch coverage by 5%-10% compared with other fuzzers.
混合模糊测试结合了模糊测试和协同执行,利用了模糊测试的高吞吐量特性来探索易于到达的代码,而协同执行的强大约束求解能力来探索包裹在复杂约束中的代码。根据我们的观察,由于以下两个原因,现有的混合模糊器仍然效率不高。首先,模糊测试经常陷入深度路径,导致漏洞的发现延迟。其次,粗粒度交互策略不能有效地启动集合执行。为了解决上述问题,我们提出了一种约束引导混合模糊方法(CGHF),该方法利用约束的静态分析信息和动态执行信息。CGHF包含两种主要技术:基于路径探索难度的进化算法和基于约束执行状态的交互策略。具体来说,在模糊阶段,我们对路径探索难度进行评估,引导模糊器按照难度由低到高的顺序进行探索。此外,我们设计了一个协调器来监控约束的动态执行信息,并选择最值得求解的约束进行集合执行。我们实现了一个名为SILK的原型,并将其在8个开源程序中的有效性与其他最先进的fuzzers进行了比较。结果表明,与其他模糊器相比,SILK将路径覆盖率提高了10% ~ 45%,分支覆盖率提高了5% ~ 10%。
{"title":"SILK: Constraint-guided Hybrid Fuzzing","authors":"Junhao Li, Yujian Zhang","doi":"10.1109/COMPSAC57700.2023.00086","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00086","url":null,"abstract":"Hybrid fuzzing combines fuzzing and concolic execution which leverages the high-throughput feature of fuzzing to explore easy-to-reach code, and the powerful constraint solving capability of concolic execution to explore code wrapped in complex constraints. Based on our observations, existing hybrid fuzzers are still not efficient for the following two reasons. First, fuzzing often gets stuck in deep paths leading to the delayed discovery of vulnerabilities. Second, coarse-grained interaction strategies cannot effectively launch concolic execution. To solve the above problems, we propose a constraint-guided hybrid fuzzing approach (CGHF) that leverages the constraints’ static analysis information and dynamic execution information. CGHF contains two main techniques: an evolutionary algorithm based on path exploration difficulty and an interaction strategy guided by the execution state of constraints. Specifically, in the fuzzing phase, we evaluate the path exploration difficulty and guide the fuzzer to explore in the order of difficulty from low to high. In addition, we design a coordinator to monitor the constraints’ dynamic execution information and select the most deserving constraints to be solved for the concolic execution. We implement a prototype called SILK and compare its effectiveness on eight open source programs with other state-of-the-art fuzzers. The results show that SILK improved path coverage by 10%-45% and branch coverage by 5%-10% compared with other fuzzers.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information 基于元图的应用推荐:结合行为信息和发布信息
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00039
Jinyi Wang, Tong Li, Hongyu Gao
Faced with so many mobile applications in the app store, users have difficulties finding their preferred mobile applications. Existing studies do not comprehensively consider implicit feedback in mobile applications and thus do not combine behavioral information and published information together to make recommendations. This paper proposes a novel method to recommend mobile applications based on metagraph embedding using the combination of behavioral information and published information. Specifically, this paper constructed a conceptual model using the combinations of behavioral information and published information that could well portray users and mobile applications. Based on this conceptual model, six metagraphs are designed to interpret the multidimensional relationships between users and mobile applications in the model. By random walking guided by each metagraph, a series of node sequences that could express node neighborhood are obtained. Finally, the similarity between users and apps is calculated using the embedded vector of each node, and the recommendations are given to the user. Based on a real-world dataset, we evaluate the performance of our method. The experimental result shows that our method outperforms existing models and methods in all metrics, in which the average F1-measure increases by 19.21%, and the average NDCG increases by 4.99%.
面对应用商店中如此多的手机应用,用户很难找到自己喜欢的手机应用。现有的研究没有全面考虑移动应用中的隐性反馈,因此没有将行为信息和发布信息结合起来提出建议。本文提出了一种基于元图嵌入的移动应用推荐方法,该方法将行为信息和发布信息相结合。具体而言,本文构建了一个结合行为信息和发布信息的概念模型,可以很好地描述用户和移动应用程序。在此概念模型的基础上,设计了六个元图来解释模型中用户与移动应用之间的多维关系。在每个元图的引导下随机行走,得到一系列能够表达节点邻域的节点序列。最后,利用每个节点的嵌入向量计算用户与应用之间的相似度,并向用户给出推荐。基于真实世界的数据集,我们评估了我们的方法的性能。实验结果表明,我们的方法在所有指标上都优于现有的模型和方法,其中F1-measure平均提高19.21%,NDCG平均提高4.99%。
{"title":"Application Recommendation based on Metagraphs: Combining Behavioral and Published Information","authors":"Jinyi Wang, Tong Li, Hongyu Gao","doi":"10.1109/COMPSAC57700.2023.00039","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00039","url":null,"abstract":"Faced with so many mobile applications in the app store, users have difficulties finding their preferred mobile applications. Existing studies do not comprehensively consider implicit feedback in mobile applications and thus do not combine behavioral information and published information together to make recommendations. This paper proposes a novel method to recommend mobile applications based on metagraph embedding using the combination of behavioral information and published information. Specifically, this paper constructed a conceptual model using the combinations of behavioral information and published information that could well portray users and mobile applications. Based on this conceptual model, six metagraphs are designed to interpret the multidimensional relationships between users and mobile applications in the model. By random walking guided by each metagraph, a series of node sequences that could express node neighborhood are obtained. Finally, the similarity between users and apps is calculated using the embedded vector of each node, and the recommendations are given to the user. Based on a real-world dataset, we evaluate the performance of our method. The experimental result shows that our method outperforms existing models and methods in all metrics, in which the average F1-measure increases by 19.21%, and the average NDCG increases by 4.99%.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131988555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Obfuscators to Test Compilers: A Metamorphic Experience 使用模糊器测试编译器:一种变形的体验
Pub Date : 2023-06-01 DOI: 10.1109/COMPSAC57700.2023.00276
I. Cho, D. Towey, Pushpendu Kar
Android compilers play a crucial role in Android app development. The correctness of the apps relies on the compilers because the source code of the app is translated into the target language by the compilers. The use of obfuscators is becoming the standard in app development to prevent reverse engineering or code tampering. Despite their importance, both compilers and obfuscators lack an oracle, which is the mechanism to determine the correctness of the execution, and hence they can be called untestable software. Metamorphic Testing (MT) is a state-of-the-art testing method that can test untestable software. MT tests software based on Metamorphic Relations (MRs). Recent studies have shown that program transformation, an MT-based compiler-testing strategy, is highly effective in revealing bugs in compilers. However, this strategy requires sophisticated tools that could take significant time to develop. Therefore, program transformation using obfuscators is proposed. Based on research into testing obfuscators using MT, it is suggested that an MT-based compiler-testing strategy could be achieved by using obfuscators. In addition, this method has the potential to detect bugs in both compilers and obfuscators. This paper reports on our experience using MT techniques to test compilers and obfuscators. We present three related MRs, two of which uncover evidence of faults.
Android编译器在Android应用程序开发中起着至关重要的作用。应用程序的正确性依赖于编译器,因为应用程序的源代码由编译器翻译成目标语言。使用混淆器正在成为应用程序开发中的标准,以防止逆向工程或代码篡改。尽管它们很重要,但编译器和混淆器都缺乏一个oracle,即确定执行正确性的机制,因此它们可以被称为不可测试的软件。变形测试(MT)是一种可以测试不可测试软件的最新测试方法。MT测试软件基于变质关系(MRs)。最近的研究表明,程序转换是一种基于mt的编译器测试策略,在发现编译器中的错误方面非常有效。然而,这种策略需要复杂的工具,可能需要花费大量时间来开发。因此,提出了使用混淆器进行程序转换的方法。通过对模糊器测试的研究,提出了一种基于模糊器的编译器测试策略。此外,该方法有可能检测编译器和混淆器中的错误。本文报告了我们使用MT技术测试编译器和混淆器的经验。我们提出了三个相关的MRs,其中两个发现了断层的证据。
{"title":"Using Obfuscators to Test Compilers: A Metamorphic Experience","authors":"I. Cho, D. Towey, Pushpendu Kar","doi":"10.1109/COMPSAC57700.2023.00276","DOIUrl":"https://doi.org/10.1109/COMPSAC57700.2023.00276","url":null,"abstract":"Android compilers play a crucial role in Android app development. The correctness of the apps relies on the compilers because the source code of the app is translated into the target language by the compilers. The use of obfuscators is becoming the standard in app development to prevent reverse engineering or code tampering. Despite their importance, both compilers and obfuscators lack an oracle, which is the mechanism to determine the correctness of the execution, and hence they can be called untestable software. Metamorphic Testing (MT) is a state-of-the-art testing method that can test untestable software. MT tests software based on Metamorphic Relations (MRs). Recent studies have shown that program transformation, an MT-based compiler-testing strategy, is highly effective in revealing bugs in compilers. However, this strategy requires sophisticated tools that could take significant time to develop. Therefore, program transformation using obfuscators is proposed. Based on research into testing obfuscators using MT, it is suggested that an MT-based compiler-testing strategy could be achieved by using obfuscators. In addition, this method has the potential to detect bugs in both compilers and obfuscators. This paper reports on our experience using MT techniques to test compilers and obfuscators. We present three related MRs, two of which uncover evidence of faults.","PeriodicalId":296288,"journal":{"name":"2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1