首页 > 最新文献

2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)最新文献

英文 中文
The Capability of Wavelet Convolutional Neural Network for Detecting Cyber Attack of Distributed Denial of Service in Smart Grid 小波卷积神经网络检测智能电网分布式拒绝服务攻击的能力
H. Monday, J. Li, G. Nneji, A. Z. Yutra, Bona D. Lemessa, Saifun Nahar, E. James, A. Haq
The electrical system's dependability, security, and efficiency are all improved through smart grid technologies. Its dependence on digital communication technology, on the other hand, introduces new risks and vulnerabilities that should be examined for the purpose to providing effective and trustworthy service delivery. This study presents a method for the detection of distributed denial of service (DDoS) attacks on smart grid infrastructure. Continuous wavelet transform (CWT) is used in the suggested approach to convert one-dimensional traffic data to two-dimensional time-frequency domain scalogram as the input to the wavelet convolutional neural network (WavCovNet) to detect anomalous behavior in the data by distinguishing attack features from normal patterns. Our results demonstrate that the proposed approach detects DDoS attacks with a high rate of detection and with a very low rate of false alarm.
智能电网技术提高了电力系统的可靠性、安全性和效率。另一方面,它对数字通信技术的依赖带来了新的风险和漏洞,为了提供有效和值得信赖的服务,应该对这些风险和漏洞进行审查。本研究提出了一种针对智能电网基础设施的分布式拒绝服务(DDoS)攻击检测方法。该方法采用连续小波变换(CWT)将一维交通数据转换为二维时频域尺度图,作为小波卷积神经网络(WavCovNet)的输入,通过区分攻击特征和正常模式来检测数据中的异常行为。我们的结果表明,所提出的方法检测DDoS攻击具有很高的检测率和非常低的误报率。
{"title":"The Capability of Wavelet Convolutional Neural Network for Detecting Cyber Attack of Distributed Denial of Service in Smart Grid","authors":"H. Monday, J. Li, G. Nneji, A. Z. Yutra, Bona D. Lemessa, Saifun Nahar, E. James, A. Haq","doi":"10.1109/ICCWAMTIP53232.2021.9674080","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674080","url":null,"abstract":"The electrical system's dependability, security, and efficiency are all improved through smart grid technologies. Its dependence on digital communication technology, on the other hand, introduces new risks and vulnerabilities that should be examined for the purpose to providing effective and trustworthy service delivery. This study presents a method for the detection of distributed denial of service (DDoS) attacks on smart grid infrastructure. Continuous wavelet transform (CWT) is used in the suggested approach to convert one-dimensional traffic data to two-dimensional time-frequency domain scalogram as the input to the wavelet convolutional neural network (WavCovNet) to detect anomalous behavior in the data by distinguishing attack features from normal patterns. Our results demonstrate that the proposed approach detects DDoS attacks with a high rate of detection and with a very low rate of false alarm.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network Pruning Based On Architecture Search and Intermediate Representation 基于结构搜索和中间表示的网络剪枝
Dai Xuanhui, Chen Juan, Wen Quan
Network pruning is widely used for compressing large neural networks to save computational resources. In traditional pruning methods, predefined hyperparameters are often required to determine the network structure of the target small network. However, too many hyperparameters are often undesirable. Therefore, we use the transformable architecture search (TAS) method to dynamically search the network structure of each layer when pruning the network width. In the TAS method, the channels number of the pruned network in each layer is represented by a learnable probability distribution. By minimizing computation cost, the probability distribution can be calculated and used to get the width configuration of the target pruned network. Then, the depth of the network was compressed based on the model get in the previous step. The method for compressing depth is block-wise intermediate representation training. This method is based on the hint training, where the network depth is compressed by comparing the intermediate representation of each layer of two equally wide teacher and student models. In the experiments, about 0.4% improvement over the existing method was viewed for the ResNet network on both CIFAR10 and CIFAR100 datasets.
网络剪枝被广泛用于压缩大型神经网络以节省计算资源。在传统的剪枝方法中,通常需要预定义的超参数来确定目标小网络的网络结构。然而,过多的超参数通常是不可取的。因此,在对网络宽度进行剪枝时,采用可转换架构搜索(TAS)方法动态搜索各层的网络结构。在TAS方法中,每层修剪网络的通道数用一个可学习的概率分布表示。在计算代价最小的前提下,计算得到的概率分布可用于得到目标剪枝网络的宽度配置。然后,基于前一步得到的模型对网络深度进行压缩。压缩深度的方法是分块中间表示训练。该方法基于提示训练,通过比较两个同样宽的教师和学生模型的每层中间表示来压缩网络深度。在实验中,在CIFAR10和CIFAR100数据集上,ResNet网络比现有方法改进了约0.4%。
{"title":"Network Pruning Based On Architecture Search and Intermediate Representation","authors":"Dai Xuanhui, Chen Juan, Wen Quan","doi":"10.1109/ICCWAMTIP53232.2021.9674132","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674132","url":null,"abstract":"Network pruning is widely used for compressing large neural networks to save computational resources. In traditional pruning methods, predefined hyperparameters are often required to determine the network structure of the target small network. However, too many hyperparameters are often undesirable. Therefore, we use the transformable architecture search (TAS) method to dynamically search the network structure of each layer when pruning the network width. In the TAS method, the channels number of the pruned network in each layer is represented by a learnable probability distribution. By minimizing computation cost, the probability distribution can be calculated and used to get the width configuration of the target pruned network. Then, the depth of the network was compressed based on the model get in the previous step. The method for compressing depth is block-wise intermediate representation training. This method is based on the hint training, where the network depth is compressed by comparing the intermediate representation of each layer of two equally wide teacher and student models. In the experiments, about 0.4% improvement over the existing method was viewed for the ResNet network on both CIFAR10 and CIFAR100 datasets.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131427718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research On Multi - Target Data Association and Location Algorithm Based On Passive Multi - Sensor System 基于无源多传感器系统的多目标数据关联与定位算法研究
Yao Siyi, Xu Jianliang, Shen Weiguo, Wang Li, Li Wanchun
In this paper, the multi-target positioning research is carried out on the basis of a passive multi-sensor reconnaissance system, which requires an algorithm to solve the problem of multi-target data association and positioning in the presence of false alarms and missed detections (also named non-ideal). This paper proposes a new data association and localization algorithm. This new algorithm adopts the method of hierarchical association of data, achieves data association through coarse association and fine association, and finally deletes redundant targets through backtracking. The simulation results show the effectiveness and stability of the algorithm.
本文在无源多传感器侦察系统的基础上进行多目标定位研究,该系统需要一种算法来解决存在虚警和未检出(又称非理想)情况下的多目标数据关联和定位问题。提出了一种新的数据关联与定位算法。该算法采用数据分层关联的方法,通过粗关联和精关联实现数据关联,最后通过回溯删除冗余目标。仿真结果表明了该算法的有效性和稳定性。
{"title":"Research On Multi - Target Data Association and Location Algorithm Based On Passive Multi - Sensor System","authors":"Yao Siyi, Xu Jianliang, Shen Weiguo, Wang Li, Li Wanchun","doi":"10.1109/ICCWAMTIP53232.2021.9674134","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674134","url":null,"abstract":"In this paper, the multi-target positioning research is carried out on the basis of a passive multi-sensor reconnaissance system, which requires an algorithm to solve the problem of multi-target data association and positioning in the presence of false alarms and missed detections (also named non-ideal). This paper proposes a new data association and localization algorithm. This new algorithm adopts the method of hierarchical association of data, achieves data association through coarse association and fine association, and finally deletes redundant targets through backtracking. The simulation results show the effectiveness and stability of the algorithm.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research On Collaborative Management Model of Emergency Supply Chain Based On Blockchain 基于区块链的应急供应链协同管理模型研究
Zhang Jianfang, Zhang Yaqi, Suyan Chen
The relationship between blockchain and emergency supply chain coordination is analyzed, and the utility model of emergency supply chain coordination is established. Applying the characteristics of blockchain technology, the emergency logistics activity process is recorded on the blockchain. When the emergency logistics activity changes, the emergency supply chain members can record the emergency logistics activity changes to ensure that the emergency logistics activity process is open and transparent. Combined with the blockchain smart contract algorithm of emergency supply chain logistics activities, a blockchain-based emergency supply chain synergy model is constructed.
分析了区块链与应急供应链协调的关系,建立了应急供应链协调的实用新型。利用区块链技术的特点,将应急物流活动过程记录在区块链上。当应急物流活动发生变化时,应急供应链成员可以记录应急物流活动变化,确保应急物流活动过程公开透明。结合应急供应链物流活动的区块链智能合约算法,构建了基于区块链的应急供应链协同模型。
{"title":"Research On Collaborative Management Model of Emergency Supply Chain Based On Blockchain","authors":"Zhang Jianfang, Zhang Yaqi, Suyan Chen","doi":"10.1109/ICCWAMTIP53232.2021.9674140","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674140","url":null,"abstract":"The relationship between blockchain and emergency supply chain coordination is analyzed, and the utility model of emergency supply chain coordination is established. Applying the characteristics of blockchain technology, the emergency logistics activity process is recorded on the blockchain. When the emergency logistics activity changes, the emergency supply chain members can record the emergency logistics activity changes to ensure that the emergency logistics activity process is open and transparent. Combined with the blockchain smart contract algorithm of emergency supply chain logistics activities, a blockchain-based emergency supply chain synergy model is constructed.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNFD-SRU: A Distributed Network Fault Detection Method Based on SRU 基于SRU的分布式网络故障检测方法DNFD-SRU
Di Liu, Zhizhao Feng, Zhao Du
Traditional network fault detection methods need to collect data for training, which has data security problems. In recent years, as people pay more and more attention to data privacy, how to ensure data security has become more and more important. At the same time, because the network fault detection needs to meet certain real-time requirements, how to improve the detection speed is also an urgent problem to be solved. Based on the above two problems, this paper proposes a network fault detection algorithm DNFD-SRU based on federated learning and SRU. Federated learning can train the model on the premise of ensuring data security, and SRU has faster training speed.
传统的网络故障检测方法需要采集数据进行训练,存在数据安全问题。近年来,随着人们对数据隐私的日益重视,如何确保数据安全变得越来越重要。同时,由于网络故障检测需要满足一定的实时性要求,如何提高检测速度也是一个亟待解决的问题。针对以上两个问题,本文提出了一种基于联邦学习和SRU的网络故障检测算法DNFD-SRU。联邦学习可以在保证数据安全的前提下训练模型,并且SRU具有更快的训练速度。
{"title":"DNFD-SRU: A Distributed Network Fault Detection Method Based on SRU","authors":"Di Liu, Zhizhao Feng, Zhao Du","doi":"10.1109/ICCWAMTIP53232.2021.9674075","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674075","url":null,"abstract":"Traditional network fault detection methods need to collect data for training, which has data security problems. In recent years, as people pay more and more attention to data privacy, how to ensure data security has become more and more important. At the same time, because the network fault detection needs to meet certain real-time requirements, how to improve the detection speed is also an urgent problem to be solved. Based on the above two problems, this paper proposes a network fault detection algorithm DNFD-SRU based on federated learning and SRU. Federated learning can train the model on the premise of ensuring data security, and SRU has faster training speed.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129870320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and Classification of Rice Plant Disease Using Hybrid Transfer Learning 基于杂交迁移学习的水稻病害识别与分类
Muhammad Hanif Tunio, Liao Jianping, Muhammad Hassaan Farooq Butt, Imran Memon
The Rice crop is considered one of the most widely grown crops in Asia and it is susceptible to various types of illnesses at different stages of production. Food safety and production can be affected by rice plant diseases, as well as a significant decline in the quality and quantity of agricultural goods. Plant diseases can potentially prevent grain harvesting entirely in severe circumstances. As a result, automation of identification and diagnosis of plant disease is widely needed in the agriculture field. Many approaches for doing this problem have been offered with deep learning rising as the preferred method because of its excellent achievement. In this proposed research, we used Hybrid deep CNN transfer learning with rice plant images or the classification and identification of various rice diseases, we employed Transfer Learning to generate our deep learning model using Rice_Leaf_Dataset from a secondary source. The proposed model is 90.8% accurate, Experiments show that the proposed approach is viable, and it can be used to detect plant diseases efficiently and outperformed.
水稻被认为是亚洲种植最广泛的作物之一,在生产的不同阶段容易受到各种疾病的影响。粮食安全和生产可能受到水稻植物病害以及农产品质量和数量大幅下降的影响。在恶劣的环境下,植物病害有可能完全阻止谷物的收获。因此,植物病害的自动化识别和诊断在农业领域有着广泛的需求。人们提出了许多解决这一问题的方法,深度学习因其优异的成绩而成为首选方法。在本研究中,我们使用混合深度CNN迁移学习与水稻植物图像或各种水稻病害的分类和识别,我们使用迁移学习来生成我们的深度学习模型,使用来自二手来源的Rice_Leaf_Dataset。该模型的准确率为90.8%,实验表明该方法是可行的,可以有效地用于植物病害检测。
{"title":"Identification and Classification of Rice Plant Disease Using Hybrid Transfer Learning","authors":"Muhammad Hanif Tunio, Liao Jianping, Muhammad Hassaan Farooq Butt, Imran Memon","doi":"10.1109/ICCWAMTIP53232.2021.9674124","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674124","url":null,"abstract":"The Rice crop is considered one of the most widely grown crops in Asia and it is susceptible to various types of illnesses at different stages of production. Food safety and production can be affected by rice plant diseases, as well as a significant decline in the quality and quantity of agricultural goods. Plant diseases can potentially prevent grain harvesting entirely in severe circumstances. As a result, automation of identification and diagnosis of plant disease is widely needed in the agriculture field. Many approaches for doing this problem have been offered with deep learning rising as the preferred method because of its excellent achievement. In this proposed research, we used Hybrid deep CNN transfer learning with rice plant images or the classification and identification of various rice diseases, we employed Transfer Learning to generate our deep learning model using Rice_Leaf_Dataset from a secondary source. The proposed model is 90.8% accurate, Experiments show that the proposed approach is viable, and it can be used to detect plant diseases efficiently and outperformed.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130765672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Mutual Learning Networks Of Actor Relation Graph For Group Activity Recognition 面向群体活动识别的行动者关系图互学习网络
Zhu Ya Lou, L. Fan, Kuang Ping, Feng Dong
The Actor Relation Graph (ARG) is an effective method for detecting group behaviour but still needs improvement in some areas. In this paper, we propose using the sum of absolute differences (SAD) to compute the similarity of characters' appearance, introduce deep mutual learning to support the network's training, and add a visualization model. By training with the extended dataset, the results show that our improved network can achieve the expected better prediction accuracy of group activities.
行动者关系图(ARG)是一种有效的群体行为检测方法,但在某些领域仍有待改进。在本文中,我们提出使用绝对差和(SAD)来计算字符外观的相似性,引入深度相互学习来支持网络的训练,并添加可视化模型。通过对扩展数据集的训练,结果表明改进后的网络可以达到预期的较好的群体活动预测精度。
{"title":"Mutual Learning Networks Of Actor Relation Graph For Group Activity Recognition","authors":"Zhu Ya Lou, L. Fan, Kuang Ping, Feng Dong","doi":"10.1109/ICCWAMTIP53232.2021.9674170","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674170","url":null,"abstract":"The Actor Relation Graph (ARG) is an effective method for detecting group behaviour but still needs improvement in some areas. In this paper, we propose using the sum of absolute differences (SAD) to compute the similarity of characters' appearance, introduce deep mutual learning to support the network's training, and add a visualization model. By training with the extended dataset, the results show that our improved network can achieve the expected better prediction accuracy of group activities.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126647059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HKDP: A Hybrid Approach On Knowledge Distillation and Pruning for Neural Network Compression 基于知识精馏和剪枝的神经网络压缩混合方法
Chen Hongle, Shi Qirui, Chen Juan, Wen Quan
A popular method for shrinking over-parameterized networks nowadays is pruning, which can efficiently reduce the number of computational parameters and computational cost of the network and has almost the same high accuracy as the original network. The general weighted pruning algorithm can only reduce the number of parameters based on the original network structure, but cannot reduce the width and depth of the pruned network. While the knowledge distillation algorithm can solve the problem by compressing the network structure, it cannot make further modifications on the processed network. To further reduce the network structure, we propose a model compression algorithm, HKDP, a hybrid method combining knowledge distillation and network pruning that can significantly reduce the overall size of the network and maintain substantial accuracy. This approach obtains the advantages of knowledge distillation and pruning, which achieves 10 times higher compression rate and 2 percent higher accuracy than using either algorithm alone. Concretely, we apply a stage-wise knowledge distillation algorithm in the front that can quickly and efficiently reduce the original model structure; we also apply a Stochastic Gradient Descent (SGD) based pruning method and introduce the concept of global sparsity, which allows us to customize the compression rate of the model. Our experiments on CIFAR-10 and MNIST show that our hybrid optimization algorithm has higher model accuracy and model compression ratio compared to other competitors' network compression algorithms.
目前比较流行的一种压缩过参数化网络的方法是剪枝,这种方法可以有效地减少网络的计算参数数量和计算成本,并且具有与原始网络几乎相同的高精度。一般的加权剪枝算法只能在原有网络结构的基础上减少参数的数量,而不能减少剪枝后网络的宽度和深度。知识蒸馏算法可以通过压缩网络结构来解决问题,但不能对处理后的网络进行进一步的修改。为了进一步减少网络结构,我们提出了一种模型压缩算法HKDP,这是一种结合知识蒸馏和网络修剪的混合方法,可以显着减少网络的整体规模并保持较高的准确性。该方法具有知识精馏和剪枝的优点,压缩率比单独使用任一算法提高10倍,准确率提高2%。具体而言,我们在前面采用了一种分阶段的知识精馏算法,可以快速有效地简化原始模型结构;我们还应用了基于随机梯度下降(SGD)的剪枝方法,并引入了全局稀疏性的概念,这使得我们可以自定义模型的压缩率。我们在CIFAR-10和MNIST上的实验表明,与其他竞争对手的网络压缩算法相比,我们的混合优化算法具有更高的模型精度和模型压缩比。
{"title":"HKDP: A Hybrid Approach On Knowledge Distillation and Pruning for Neural Network Compression","authors":"Chen Hongle, Shi Qirui, Chen Juan, Wen Quan","doi":"10.1109/ICCWAMTIP53232.2021.9674054","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674054","url":null,"abstract":"A popular method for shrinking over-parameterized networks nowadays is pruning, which can efficiently reduce the number of computational parameters and computational cost of the network and has almost the same high accuracy as the original network. The general weighted pruning algorithm can only reduce the number of parameters based on the original network structure, but cannot reduce the width and depth of the pruned network. While the knowledge distillation algorithm can solve the problem by compressing the network structure, it cannot make further modifications on the processed network. To further reduce the network structure, we propose a model compression algorithm, HKDP, a hybrid method combining knowledge distillation and network pruning that can significantly reduce the overall size of the network and maintain substantial accuracy. This approach obtains the advantages of knowledge distillation and pruning, which achieves 10 times higher compression rate and 2 percent higher accuracy than using either algorithm alone. Concretely, we apply a stage-wise knowledge distillation algorithm in the front that can quickly and efficiently reduce the original model structure; we also apply a Stochastic Gradient Descent (SGD) based pruning method and introduce the concept of global sparsity, which allows us to customize the compression rate of the model. Our experiments on CIFAR-10 and MNIST show that our hybrid optimization algorithm has higher model accuracy and model compression ratio compared to other competitors' network compression algorithms.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Firmblock: A Scalable Blockchain-Based Malware-Proof Firmware Update Architecture with Revocation for IoT Devices Firmblock:一种可扩展的基于区块链的防恶意软件固件更新架构,可撤销物联网设备
Collins Sey, Hang Lei, Weizhong Qian, Xiaoyu Li, Linda Delali Fiasam, Ruchao Sha, Zirui He
In recent years, the smart city paradigm continues to receive major advancements which is helping to improve the quality of life of people within the environment. The Internet of Things (IoT) which represents the backbone of the Smart City paradigm is receiving exponential growth. This exponential growth is also companied by some challenge which need to be addressed to further support the ever-growing demand of the IoT devices. Secure firmware update and distribution mechanisms is a major stage in the lifecycle of IoT devices management. Although the Internet Engineering Task Force (IETF) Software Updates for Internet of Things (SUIT) have started preparing software update models for IoT devices, scalability of secure firmware update distribution and centralization exists as challenges for the current model. In this paper, we propose a blockchain based firmware update architecture for IoT devices. The proposed architecture ensures secure distribution of firmware updates, malware-proof and solves the author-disappearing issue. We introduced a key revocation mechanism to secure the IoT environment from malicious devices. We further secure centralized entities that are susceptible to targeting attacks and single point of failure problem that is critical to the system by integrating all activities into the blockchain as transactions. The proposed model in this paper achieves effective and efficient security for IoT device update, as well as addressing the targeting attack and the author-disappearing issue in IoT device management.
近年来,智慧城市模式继续取得重大进展,这有助于提高人们在环境中的生活质量。代表智慧城市范例支柱的物联网(IoT)正在呈指数级增长。这种指数级增长也伴随着一些需要解决的挑战,以进一步支持物联网设备不断增长的需求。安全固件更新和分发机制是物联网设备管理生命周期中的一个主要阶段。尽管互联网工程任务组(IETF)物联网软件更新(SUIT)已经开始为物联网设备准备软件更新模型,但安全固件更新分发和集中的可扩展性仍然是当前模型面临的挑战。在本文中,我们提出了一种基于区块链的物联网设备固件更新架构。所提出的架构确保了固件更新的安全分发,防恶意软件,并解决了作者消失问题。我们引入了一个密钥撤销机制,以保护物联网环境免受恶意设备的攻击。通过将所有活动作为交易集成到区块链中,我们进一步保护易受目标攻击和单点故障问题影响的集中式实体,这对系统至关重要。本文提出的模型为物联网设备更新提供了有效、高效的安全保障,同时也解决了物联网设备管理中的目标攻击和作者消失问题。
{"title":"Firmblock: A Scalable Blockchain-Based Malware-Proof Firmware Update Architecture with Revocation for IoT Devices","authors":"Collins Sey, Hang Lei, Weizhong Qian, Xiaoyu Li, Linda Delali Fiasam, Ruchao Sha, Zirui He","doi":"10.1109/ICCWAMTIP53232.2021.9674092","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674092","url":null,"abstract":"In recent years, the smart city paradigm continues to receive major advancements which is helping to improve the quality of life of people within the environment. The Internet of Things (IoT) which represents the backbone of the Smart City paradigm is receiving exponential growth. This exponential growth is also companied by some challenge which need to be addressed to further support the ever-growing demand of the IoT devices. Secure firmware update and distribution mechanisms is a major stage in the lifecycle of IoT devices management. Although the Internet Engineering Task Force (IETF) Software Updates for Internet of Things (SUIT) have started preparing software update models for IoT devices, scalability of secure firmware update distribution and centralization exists as challenges for the current model. In this paper, we propose a blockchain based firmware update architecture for IoT devices. The proposed architecture ensures secure distribution of firmware updates, malware-proof and solves the author-disappearing issue. We introduced a key revocation mechanism to secure the IoT environment from malicious devices. We further secure centralized entities that are susceptible to targeting attacks and single point of failure problem that is critical to the system by integrating all activities into the blockchain as transactions. The proposed model in this paper achieves effective and efficient security for IoT device update, as well as addressing the targeting attack and the author-disappearing issue in IoT device management.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125144103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification of Tor Anonymous Network Traffic Based on Machine Learning 基于机器学习的Tor匿名网络流量识别
Wang Juan, C. Shimin, Zhao Jun, Han Bin, Shi Lei
In order to identify Tor anonymous network traffic which was generated by the most widely used anonymous network in the world, analyzing the features that can be used to recognize Tor traffic based on meek pluggable transport, and proposing a method based on machine learning to classify Tor traffic. Tor traffic identification aimed at Tor-Meek traffic which using Meek traffic confusion technology in Tor network. To determine the flow characteristics that can be used to identify Tor traffic from the original feature set, RandomForest feature selection method is used to evaluate the importance of these features, and select the available feature subset. The Tor traffic classifier is constructed by using C4.5, RandomForest and KNN algorithms to identify Tor traffic. Experiment shows that Tor traffic identification methods based on three classification algorithms can effectively identify Tor anonymous network traffic, for different versions of Tor client, the precise and recall are all greater than 94% when identify Tor traffic.
为了识别目前世界上使用最广泛的匿名网络所产生的Tor匿名网络流量,分析了基于meek可插拔传输的Tor流量识别特征,提出了一种基于机器学习的Tor流量分类方法。Tor流量识别针对Tor-Meek流量,在Tor网络中使用了Meek流量混淆技术。为了从原始特征集中确定可用于识别Tor流量的流量特征,使用随机森林特征选择方法评估这些特征的重要性,并选择可用的特征子集。使用C4.5、RandomForest和KNN算法构建Tor流量分类器来识别Tor流量。实验表明,基于三种分类算法的Tor流量识别方法能够有效识别Tor匿名网络流量,对于不同版本的Tor客户端,识别Tor流量的准确率和召回率均大于94%。
{"title":"Identification of Tor Anonymous Network Traffic Based on Machine Learning","authors":"Wang Juan, C. Shimin, Zhao Jun, Han Bin, Shi Lei","doi":"10.1109/ICCWAMTIP53232.2021.9674056","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674056","url":null,"abstract":"In order to identify Tor anonymous network traffic which was generated by the most widely used anonymous network in the world, analyzing the features that can be used to recognize Tor traffic based on meek pluggable transport, and proposing a method based on machine learning to classify Tor traffic. Tor traffic identification aimed at Tor-Meek traffic which using Meek traffic confusion technology in Tor network. To determine the flow characteristics that can be used to identify Tor traffic from the original feature set, RandomForest feature selection method is used to evaluate the importance of these features, and select the available feature subset. The Tor traffic classifier is constructed by using C4.5, RandomForest and KNN algorithms to identify Tor traffic. Experiment shows that Tor traffic identification methods based on three classification algorithms can effectively identify Tor anonymous network traffic, for different versions of Tor client, the precise and recall are all greater than 94% when identify Tor traffic.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1