首页 > 最新文献

2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
Authentic Learning of Machine Learning to Ransomware Detection and Prevention 机器学习在勒索软件检测和预防中的真实学习
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00081
Md Jobair Hossain Faruk, Mohammad Masum, H. Shahriar, K. Qian, D. Lo
The primary goal of the authentic learning provides students with an engaging and motivating learning environment for students with hands-on experiences in solving real-world security problems. Each learning topic consists of pre-lab, lab, and post-lab (Pre/Lab/Post) activities. With an authentic learning approach, we design and develop portable labware on Google CoLab for ML for ransomware detection and prevention so that students can access and practice these hands-on labs anywhere and anytime without time tedious installation and configuration which will help students more focus on learning of concepts and getting more experience for hands-on problem-solving skills.
真实学习的主要目标是为学生提供一个有吸引力和激励的学习环境,让学生有解决现实世界安全问题的实践经验。每个学习主题包括实验前、实验和实验后(Pre/ lab /Post)活动。采用真实的学习方法,我们在谷歌CoLab上为ML设计和开发了用于勒索软件检测和预防的便携式实验室软件,使学生可以随时随地访问和练习这些动手实验室,而无需时间繁琐的安装和配置,这将帮助学生更专注于概念的学习,并获得更多动手解决问题的经验技能。
{"title":"Authentic Learning of Machine Learning to Ransomware Detection and Prevention","authors":"Md Jobair Hossain Faruk, Mohammad Masum, H. Shahriar, K. Qian, D. Lo","doi":"10.1109/COMPSAC54236.2022.00081","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00081","url":null,"abstract":"The primary goal of the authentic learning provides students with an engaging and motivating learning environment for students with hands-on experiences in solving real-world security problems. Each learning topic consists of pre-lab, lab, and post-lab (Pre/Lab/Post) activities. With an authentic learning approach, we design and develop portable labware on Google CoLab for ML for ransomware detection and prevention so that students can access and practice these hands-on labs anywhere and anytime without time tedious installation and configuration which will help students more focus on learning of concepts and getting more experience for hands-on problem-solving skills.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114818736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Color-Path: Hair Arrangement Reproduction Support System by Displaying Target Motion in AR 颜色路径:在AR中显示目标运动的毛发排列再现支持系统
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00107
Natsumi Matsui, Ayumi Ohnishi, T. Terada, M. Tsukamoto
Curling irons can create curled hair by heating it. However, because the operation of the curling iron involves six degrees of freedom (6DoF) movements, such as translation and rotation, it is difficult to understand and reproduce by simply watching instructional videos. In this study, we proposed Color-Path, a smart mirror-shaped system that allows users to easily understand how to move a curling iron. The proposed system acquires the moving paths of the curling iron using a camera on a smart mirror and an accelerometer on the curling iron. The system displays the curling iron paths of the target hairstyle on a smart mirror in Augmented Reality (AR). From the evaluation experiments, we confirmed that the system contributed to the reproduction of the moving paths of the curling iron through quantitative evaluation. However, a subjective evaluation showed that our system could not reproduce the appearance of the target hairstyle. The results indicate that the time to heat the hair should be considered.
卷发棒可以通过加热使头发卷曲。然而,由于卷发棒的操作涉及平移、旋转等6个自由度(6DoF)的动作,单纯通过观看教学视频很难理解和再现。在这项研究中,我们提出了Color-Path,一个智能的镜子形状的系统,让用户很容易地了解如何移动卷发棒。该系统利用智能镜上的摄像头和电熨斗上的加速度计来获取电熨斗的运动路径。该系统在增强现实(AR)的智能镜子上显示目标发型的卷发路径。从评价实验中,通过定量评价,证实了该系统对卷发器运动轨迹的再现有一定的贡献。然而,主观评价表明,我们的系统不能重现目标发型的外观。结果表明,应考虑加热头发的时间。
{"title":"Color-Path: Hair Arrangement Reproduction Support System by Displaying Target Motion in AR","authors":"Natsumi Matsui, Ayumi Ohnishi, T. Terada, M. Tsukamoto","doi":"10.1109/COMPSAC54236.2022.00107","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00107","url":null,"abstract":"Curling irons can create curled hair by heating it. However, because the operation of the curling iron involves six degrees of freedom (6DoF) movements, such as translation and rotation, it is difficult to understand and reproduce by simply watching instructional videos. In this study, we proposed Color-Path, a smart mirror-shaped system that allows users to easily understand how to move a curling iron. The proposed system acquires the moving paths of the curling iron using a camera on a smart mirror and an accelerometer on the curling iron. The system displays the curling iron paths of the target hairstyle on a smart mirror in Augmented Reality (AR). From the evaluation experiments, we confirmed that the system contributed to the reproduction of the moving paths of the curling iron through quantitative evaluation. However, a subjective evaluation showed that our system could not reproduce the appearance of the target hairstyle. The results indicate that the time to heat the hair should be considered.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"538 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-Time Background Replacement Method Based on Estimated Depth for AR Applications 基于估计深度的AR应用实时背景替换方法
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00190
Yoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, T. Yoshihisa, Y. Teranishi
Recent technological advances in Virtual Reality (VR) and Augmented Reality (AR) enable users to experience a high-quality virtual world. In VR applications, the user's physical movement is generally restricted because the situation around the real world cannot be seen. AR allows users to experience virtual worlds without restrictions on physical movement, but the extent to which they are replaced as virtual worlds is limited. In this research, assuming the use of smartphones and tablet devices, a partial virtual world system is implemented by removing only the background part from the real-time real-world image taken by the camera and replacing it with a virtual background.
虚拟现实(VR)和增强现实(AR)的最新技术进步使用户能够体验高质量的虚拟世界。在VR应用中,用户的身体运动通常受到限制,因为无法看到现实世界周围的情况。AR允许用户在不受物理运动限制的情况下体验虚拟世界,但它们被取代为虚拟世界的程度有限。在本研究中,假设使用智能手机和平板设备,通过将相机拍摄的实时真实世界图像中的背景部分移除,并用虚拟背景取而代之,实现部分虚拟世界系统。
{"title":"A Real-Time Background Replacement Method Based on Estimated Depth for AR Applications","authors":"Yoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, T. Yoshihisa, Y. Teranishi","doi":"10.1109/COMPSAC54236.2022.00190","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00190","url":null,"abstract":"Recent technological advances in Virtual Reality (VR) and Augmented Reality (AR) enable users to experience a high-quality virtual world. In VR applications, the user's physical movement is generally restricted because the situation around the real world cannot be seen. AR allows users to experience virtual worlds without restrictions on physical movement, but the extent to which they are replaced as virtual worlds is limited. In this research, assuming the use of smartphones and tablet devices, a partial virtual world system is implemented by removing only the background part from the real-time real-world image taken by the camera and replacing it with a virtual background.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fractus: Orchestration of Distributed Applications in the Drone-Edge-Cloud Continuum 分门别类:无人机边缘云连续体中的分布式应用程序编排
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00134
Nasos Grigoropoulos, S. Lalis
Next-generation drone applications will be distributed, including tasks that need to run at the edge or in the cloud and interact with the drone in a smooth way. In this paper, we propose Fractus, an orchestration framework for the automated deployment of such applications in the drone-edge-cloud continuum. Fractus provides users with abstractions for describing the application's placement and communication requirements, allocates resources in a mission-aware fashion by considering the drone operation area, establishes and maintains connectivity between components by transparently leveraging different networking capabilities, and tackles safety and privacy issues via policy-based access to mobility and sensor resources. We present the design of Fractus and discuss an implementation based on mature software deployment technology. Further, we evaluate the resource requirements of our implementation, showing that it introduces an acceptable overhead, and illustrate its functionality via real field tests and a simulation setup.
下一代无人机应用程序将被分发,包括需要在边缘或云中运行的任务,并以平稳的方式与无人机交互。在本文中,我们提出了fracus,这是一个用于在无人机边缘云连续体中自动部署此类应用程序的编排框架。Fractus为用户提供描述应用程序放置和通信需求的抽象,通过考虑无人机操作区域以任务感知的方式分配资源,通过透明地利用不同的网络功能建立和维护组件之间的连接,并通过基于策略的访问移动性和传感器资源来解决安全和隐私问题。给出了fracus的设计方案,并讨论了基于成熟软件部署技术的实现方案。此外,我们评估了实现的资源需求,表明它引入了可接受的开销,并通过实际的现场测试和模拟设置说明了其功能。
{"title":"Fractus: Orchestration of Distributed Applications in the Drone-Edge-Cloud Continuum","authors":"Nasos Grigoropoulos, S. Lalis","doi":"10.1109/COMPSAC54236.2022.00134","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00134","url":null,"abstract":"Next-generation drone applications will be distributed, including tasks that need to run at the edge or in the cloud and interact with the drone in a smooth way. In this paper, we propose Fractus, an orchestration framework for the automated deployment of such applications in the drone-edge-cloud continuum. Fractus provides users with abstractions for describing the application's placement and communication requirements, allocates resources in a mission-aware fashion by considering the drone operation area, establishes and maintains connectivity between components by transparently leveraging different networking capabilities, and tackles safety and privacy issues via policy-based access to mobility and sensor resources. We present the design of Fractus and discuss an implementation based on mature software deployment technology. Further, we evaluate the resource requirements of our implementation, showing that it introduces an acceptable overhead, and illustrate its functionality via real field tests and a simulation setup.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123731803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries 迈向MLOps的自动化:深度学习库中Bot使用的探索性研究
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00171
A. Rahman, Farzana Ahamed Bhuiyan, M. M. Hassan, H. Shahriar, Fan Wu
Machine learning (ML) operations or MLOps advo-cates for integration of DevOps- related practices into the ML development and deployment process. Adoption of MLOps can be hampered due to a lack of knowledge related to how development tasks can be automated. A characterization of bot usage in ML projects can help practitioners on the types of tasks that can be automated with bots, and apply that knowledge into their ML development and deployment process. To that end, we conduct a preliminary empirical study with 135 issues reported mined from 3 libraries related to deep learning: Keras, PyTorch, and Tensorflow. From our empirical study we observe 9 categories of tasks that are automated with bots. We conclude our work-in-progress paper by providing a list of lessons that we learned from our empirical study.
机器学习(ML)操作或MLOps提倡将与DevOps相关的实践集成到ML开发和部署过程中。由于缺乏与如何自动化开发任务相关的知识,mlop的采用可能会受到阻碍。对机器学习项目中机器人使用情况的描述可以帮助从业者了解机器人可以自动化的任务类型,并将这些知识应用到机器学习开发和部署过程中。为此,我们对从3个与深度学习相关的库(Keras、PyTorch和Tensorflow)中挖掘的135个问题进行了初步的实证研究。从我们的实证研究中,我们观察到机器人自动化的9类任务。我们通过提供我们从实证研究中学到的经验教训清单来结束我们正在进行的论文。
{"title":"Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries","authors":"A. Rahman, Farzana Ahamed Bhuiyan, M. M. Hassan, H. Shahriar, Fan Wu","doi":"10.1109/COMPSAC54236.2022.00171","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00171","url":null,"abstract":"Machine learning (ML) operations or MLOps advo-cates for integration of DevOps- related practices into the ML development and deployment process. Adoption of MLOps can be hampered due to a lack of knowledge related to how development tasks can be automated. A characterization of bot usage in ML projects can help practitioners on the types of tasks that can be automated with bots, and apply that knowledge into their ML development and deployment process. To that end, we conduct a preliminary empirical study with 135 issues reported mined from 3 libraries related to deep learning: Keras, PyTorch, and Tensorflow. From our empirical study we observe 9 categories of tasks that are automated with bots. We conclude our work-in-progress paper by providing a list of lessons that we learned from our empirical study.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts EOSIOAnalyzer:一个有效的EOSIO智能合约静态分析漏洞检测框架
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00124
Wenyuan Li, Jiahao He, Gansen Zhao, Jinji Yang, Shuangyin Li, Ruilin Lai, P. Li, Hua Tang, Haoyu Luo, Ziheng Zhou
EOSIO smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. As EOSIO smart contracts manage valuable assets, they become high-value targets and are subjected to more and more attacks. Tools for protecting EOSIO smart contracts are imperative. This paper proposes EOSIOAnalyzer, an effective static secu-rity analysis framework for EOSIO smart contracts to counter the three most common attacks. The framework consists of three components, the control flow graph builder, the static analyzer and the vulnerability detector. This paper implements an approach to transforming low-level Wasm bytecode into a high-level intermediate representation (Register Transfer Language). Besides, this paper also implements vulnerability detection speci-fications for three popular EOSIO smart contracts vulnerabilities, including Fake EOS Transfer, Forged Transfer Notification and Block Information Dependency. As a proof of concept, this paper conducts experiments to evaluate the effectiveness and efficiency of the EOSIOAnalyzer. The experiment results show that the detection accuracy of the three vulnerabilities is 100 %, 98.8 % and 100%, respectively.
EOSIO智能合约是可以由相互不信任的节点组成的网络共同执行的程序。由于EOSIO智能合约管理着有价值的资产,它们成为高价值目标,并受到越来越多的攻击。保护EOSIO智能合约的工具是必不可少的。本文提出EOSIOAnalyzer,这是一个有效的静态安全分析框架,用于EOSIO智能合约,以对抗三种最常见的攻击。该框架由控制流图构建器、静态分析器和漏洞检测器三个部分组成。本文实现了一种将低级Wasm字节码转换为高级中间表示(寄存器传输语言)的方法。此外,本文还对Fake EOS Transfer、Forged Transfer Notification和Block Information Dependency三种流行的EOSIO智能合约漏洞实现了漏洞检测规范。作为概念验证,本文通过实验来评估EOSIOAnalyzer的有效性和效率。实验结果表明,三个漏洞的检测准确率分别为100%、98.8%和100%。
{"title":"EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts","authors":"Wenyuan Li, Jiahao He, Gansen Zhao, Jinji Yang, Shuangyin Li, Ruilin Lai, P. Li, Hua Tang, Haoyu Luo, Ziheng Zhou","doi":"10.1109/COMPSAC54236.2022.00124","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00124","url":null,"abstract":"EOSIO smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. As EOSIO smart contracts manage valuable assets, they become high-value targets and are subjected to more and more attacks. Tools for protecting EOSIO smart contracts are imperative. This paper proposes EOSIOAnalyzer, an effective static secu-rity analysis framework for EOSIO smart contracts to counter the three most common attacks. The framework consists of three components, the control flow graph builder, the static analyzer and the vulnerability detector. This paper implements an approach to transforming low-level Wasm bytecode into a high-level intermediate representation (Register Transfer Language). Besides, this paper also implements vulnerability detection speci-fications for three popular EOSIO smart contracts vulnerabilities, including Fake EOS Transfer, Forged Transfer Notification and Block Information Dependency. As a proof of concept, this paper conducts experiments to evaluate the effectiveness and efficiency of the EOSIOAnalyzer. The experiment results show that the detection accuracy of the three vulnerabilities is 100 %, 98.8 % and 100%, respectively.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130573015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT for Real-time Accessibility Ontology Population to Context-awareness Adapt User Interfaces 物联网用于实时可访问性本体人口以适应上下文感知的用户界面
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00232
Emna Souidi, Lamia Zouhaier, Y. Hlaoui
With the evolution of mobile devices such as laptops, tablets, smartphones, etc., the number of users has also increased, but it is difficult for some people due to their limited abilities. The Internet of Things (IoT) can make people's lives more convenient, and especially important for people with disabilities. This paper presents an approach to semantic representation using ontology. This approach is based on IoT to facilitate the real-time populating of the ontology in the context of adapting User Interfaces (UI) to people with disabilities such as sensory impairments (hearing and vision). IoT technology offers a great service to gain more autonomy and independence for people with disabilities.
随着笔记本电脑,平板电脑,智能手机等移动设备的发展,用户数量也在增加,但由于一些人的能力有限,这对他们来说很难。物联网(IoT)可以使人们的生活更加便利,对残疾人来说尤其重要。提出了一种基于本体的语义表示方法。这种方法基于物联网,以促进在适应用户界面(UI)的情况下实时填充本体,以适应感官障碍(听力和视觉)等残疾人。物联网技术为残疾人获得更多的自主权和独立性提供了很好的服务。
{"title":"IoT for Real-time Accessibility Ontology Population to Context-awareness Adapt User Interfaces","authors":"Emna Souidi, Lamia Zouhaier, Y. Hlaoui","doi":"10.1109/COMPSAC54236.2022.00232","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00232","url":null,"abstract":"With the evolution of mobile devices such as laptops, tablets, smartphones, etc., the number of users has also increased, but it is difficult for some people due to their limited abilities. The Internet of Things (IoT) can make people's lives more convenient, and especially important for people with disabilities. This paper presents an approach to semantic representation using ontology. This approach is based on IoT to facilitate the real-time populating of the ontology in the context of adapting User Interfaces (UI) to people with disabilities such as sensory impairments (hearing and vision). IoT technology offers a great service to gain more autonomy and independence for people with disabilities.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130309740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
NKMH: A Neural Efficient Recommendation Based on Neighborhood Key Information Aggregation of Modified Hawkes NKMH:一种基于邻域关键信息聚合的改进Hawkes神经高效推荐
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00035
Xin Xu, Nan Wang, Huijie Jin, Yang Liu, Kun Li
The rapid development of neural networks has con-tributed to the increasing maturity of recommendation systems. However, deep neural networks have poor interpretability for models and do not show strong advantages for sparse data and noisy data. Recently, Hawkes process has become more and more focused for its good interpretability with probabilistic models. Based on this, we proposes A Neural Efficient Recommendation Model Based on Neighborhood Key Information Aggregation of Modified Hawkes(NKMH). The model utilizes a neural network and designs three modules to jointly fit the modified Hawkes process. It not only inherits the high interpretability of Hawkes, but also effectively solves the problem of poor prediction ability of the Hawkes process. Besides, we present a novel key information search strategy(KISS), which can effectively remove the noise in a session and alleviate the sparsity of the data to some extent. Extensive experiments on two datasets show that the NKMH model outperforms many current popular models.
神经网络的快速发展促进了推荐系统的日益成熟。然而,深度神经网络对模型的可解释性较差,对稀疏数据和噪声数据没有表现出很强的优势。近年来,霍克斯过程因其具有较好的概率模型可解释性而受到越来越多的关注。在此基础上,提出了一种基于邻域关键信息聚合的改进Hawkes(NKMH)神经网络高效推荐模型。该模型利用神经网络,设计了三个模块来共同拟合改进的Hawkes过程。它既继承了Hawkes过程的高可解释性,又有效地解决了Hawkes过程预测能力差的问题。此外,我们提出了一种新的关键信息搜索策略(KISS),可以有效地去除会话中的噪声,在一定程度上缓解数据的稀疏性。在两个数据集上的大量实验表明,NKMH模型优于当前许多流行的模型。
{"title":"NKMH: A Neural Efficient Recommendation Based on Neighborhood Key Information Aggregation of Modified Hawkes","authors":"Xin Xu, Nan Wang, Huijie Jin, Yang Liu, Kun Li","doi":"10.1109/COMPSAC54236.2022.00035","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00035","url":null,"abstract":"The rapid development of neural networks has con-tributed to the increasing maturity of recommendation systems. However, deep neural networks have poor interpretability for models and do not show strong advantages for sparse data and noisy data. Recently, Hawkes process has become more and more focused for its good interpretability with probabilistic models. Based on this, we proposes A Neural Efficient Recommendation Model Based on Neighborhood Key Information Aggregation of Modified Hawkes(NKMH). The model utilizes a neural network and designs three modules to jointly fit the modified Hawkes process. It not only inherits the high interpretability of Hawkes, but also effectively solves the problem of poor prediction ability of the Hawkes process. Besides, we present a novel key information search strategy(KISS), which can effectively remove the noise in a session and alleviate the sparsity of the data to some extent. Extensive experiments on two datasets show that the NKMH model outperforms many current popular models.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"45 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ValidatorRep: Blockchain-based Trust Management for Ensuring Accountability in Crowdsourcing ValidatorRep:基于区块链的信任管理,确保众包中的问责制
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00121
Ruilin Lai, Gansen Zhao
Crowdsourcing as a computing paradigm, has been widely used in industries and services. Accountability in crowdsourcing services enables participants to work honestly and improves the quality of services. The realization of accountability requires trusted evidence, multiparty verification, and fair reward or punishment. Blockchain technology, which is inherently tamper-resistant, traceable, and decentralized, puts forward a direction for realizing the requirements. However, in the process of data management and decentralized verification, it is hard to achieve a better trade-off between efficiency and security. This paper proposes a blockchain-based verification scheme integrated by trust management, ‘validatorRep’, that is suitable to enhance accountability in the crowdsourcing system. In detail, a decoupled blockchain model is proposed for the differentiated storage of business transactions and log transactions during data interaction. Additionally, a fine-grained trust model is proposed, including both the rep-utation of participants and the trust relationship between participants. Based on fine-grained trust, the decentralized verification scheme is designed to guarantee secure data access, trusted verification, and fair reward or punishment. Finally, the proposed framework is deployed on the Ethereum platform to observe its effectiveness and overall performance. Simulation results also reveal that the proposed fine-grained trust model can provide efficient accountability for crowdsourcing.
众包作为一种计算范式,已广泛应用于工业和服务业。众包服务中的问责制使参与者能够诚实地工作,并提高服务质量。问责制的实现需要可信的证据、多方核查和公平的奖惩。区块链技术本身具有防篡改、可追溯、去中心化的特点,为实现这些需求提出了一个方向。然而,在数据管理和去中心化验证的过程中,很难在效率和安全性之间实现更好的权衡。本文提出了一种基于区块链的验证方案,该方案集成了信任管理,即“validatorRep”,适用于增强众包系统中的问责制。针对数据交互过程中业务事务和日志事务的差异化存储,提出了一种解耦的区块链模型。此外,还提出了一个细粒度的信任模型,该模型既包括参与者的声誉,也包括参与者之间的信任关系。基于细粒度信任,去中心化验证方案旨在保证安全的数据访问、可信的验证和公平的奖惩。最后,将提出的框架部署在以太坊平台上,观察其有效性和整体性能。仿真结果表明,所提出的细粒度信任模型能够为众包提供有效的问责机制。
{"title":"ValidatorRep: Blockchain-based Trust Management for Ensuring Accountability in Crowdsourcing","authors":"Ruilin Lai, Gansen Zhao","doi":"10.1109/COMPSAC54236.2022.00121","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00121","url":null,"abstract":"Crowdsourcing as a computing paradigm, has been widely used in industries and services. Accountability in crowdsourcing services enables participants to work honestly and improves the quality of services. The realization of accountability requires trusted evidence, multiparty verification, and fair reward or punishment. Blockchain technology, which is inherently tamper-resistant, traceable, and decentralized, puts forward a direction for realizing the requirements. However, in the process of data management and decentralized verification, it is hard to achieve a better trade-off between efficiency and security. This paper proposes a blockchain-based verification scheme integrated by trust management, ‘validatorRep’, that is suitable to enhance accountability in the crowdsourcing system. In detail, a decoupled blockchain model is proposed for the differentiated storage of business transactions and log transactions during data interaction. Additionally, a fine-grained trust model is proposed, including both the rep-utation of participants and the trust relationship between participants. Based on fine-grained trust, the decentralized verification scheme is designed to guarantee secure data access, trusted verification, and fair reward or punishment. Finally, the proposed framework is deployed on the Ethereum platform to observe its effectiveness and overall performance. Simulation results also reveal that the proposed fine-grained trust model can provide efficient accountability for crowdsourcing.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards trustworthy tracing responsibility of collaborative software engineering artefacts of student's software projects 对学生软件项目的协作软件工程工件的可信赖的跟踪责任
Pub Date : 2022-06-01 DOI: 10.1109/COMPSAC54236.2022.00030
João Almeida, Vasco Amaral
Current document version control systems (VCS) are prone to impersonation in changes to the artefacts and their update history, risking its credibility. This is particularly problematic in specific application domains such as in Education, where teachers have to have the means to prevent and detect students' unethical behaviour or fraud, as grading is one of the essential pillars of trust in the correction and fairness in the conduct of the educational system. Therefore, there is a need for a completely secure, trustworthy and easy-to-use version management of digital artefacts, which can be used to introduce students to the world of version control. We thus propose a blockchain-based solution for version control of engineering artefacts. The goal is to facilitate collaboration in a multi-user area, like the education field, and track changes in a trusted and secure manner. As a proof of concept, we designed and implemented a solution using the Hyperledger Fabric Network to govern and regulate file version control functions among students and teachers. Our prototype is hosted on the cloud and uses Git and GitHub to hash and store the different artefact versions and the blockchain network to keep all the changes in a perpetual and immutable way tracing to their respective authors non-prone to forgery. Besides constructing the proof of concept tool prototype, we conducted a usability experiment. The results of the usability tests were positive, with users with limited experience in version control systems starting to use and comprehend the solution in little time. The next step will be to generalize and evolve this tool to other application scenarios where trustworthy tracing is essential.
当前的文档版本控制系统(VCS)很容易在工件及其更新历史的更改中进行模拟,从而危及其可信度。这在特定的应用领域尤其成问题,例如在教育领域,教师必须有办法防止和发现学生的不道德行为或欺诈,因为评分是对教育系统行为的纠正和公平信任的重要支柱之一。因此,需要一种完全安全、值得信赖和易于使用的数字工件版本管理,它可以用来向学生介绍版本控制的世界。因此,我们提出了一种基于区块链的解决方案,用于工程工件的版本控制。其目标是促进多用户领域(如教育领域)的协作,并以可信和安全的方式跟踪更改。作为概念验证,我们设计并实现了一个使用Hyperledger Fabric Network来管理和规范学生和教师之间的文件版本控制功能的解决方案。我们的原型托管在云上,使用Git和GitHub来散列和存储不同的工件版本,并使用区块链网络以永久和不可变的方式保持所有更改,跟踪到各自的作者,不易伪造。除了构建概念验证工具原型外,我们还进行了可用性实验。可用性测试的结果是积极的,在版本控制系统方面经验有限的用户在很短的时间内开始使用和理解解决方案。下一步是将此工具推广和发展到其他应用程序场景,在这些场景中,可信跟踪是必不可少的。
{"title":"Towards trustworthy tracing responsibility of collaborative software engineering artefacts of student's software projects","authors":"João Almeida, Vasco Amaral","doi":"10.1109/COMPSAC54236.2022.00030","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00030","url":null,"abstract":"Current document version control systems (VCS) are prone to impersonation in changes to the artefacts and their update history, risking its credibility. This is particularly problematic in specific application domains such as in Education, where teachers have to have the means to prevent and detect students' unethical behaviour or fraud, as grading is one of the essential pillars of trust in the correction and fairness in the conduct of the educational system. Therefore, there is a need for a completely secure, trustworthy and easy-to-use version management of digital artefacts, which can be used to introduce students to the world of version control. We thus propose a blockchain-based solution for version control of engineering artefacts. The goal is to facilitate collaboration in a multi-user area, like the education field, and track changes in a trusted and secure manner. As a proof of concept, we designed and implemented a solution using the Hyperledger Fabric Network to govern and regulate file version control functions among students and teachers. Our prototype is hosted on the cloud and uses Git and GitHub to hash and store the different artefact versions and the blockchain network to keep all the changes in a perpetual and immutable way tracing to their respective authors non-prone to forgery. Besides constructing the proof of concept tool prototype, we conducted a usability experiment. The results of the usability tests were positive, with users with limited experience in version control systems starting to use and comprehend the solution in little time. The next step will be to generalize and evolve this tool to other application scenarios where trustworthy tracing is essential.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1