首页 > 最新文献

2017 International Conference on Progress in Informatics and Computing (PIC)最新文献

英文 中文
Fine-grained sentiment analysis of reviews using shallow semantic information 使用浅层语义信息对评论进行细粒度情感分析
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359549
Hanxiao Shi, Yahui Zhang, Yiqian Zou, Xiaojun Li
There is a growing interest in sharing personal opinions on the Web, such as product reviews, economic analysis, political polls, etc. Existing research focuses on document-based approaches and documents are represented by bag-of-word. However, due to loss of contextual information, this representation fails to capture the associative information between an opinion and its corresponding target. Additionally, several researches focus on sentence-based approaches, which can effectively deal with an attribute-sentiment word pair within one sentence. However, those approaches are unable to process more than one attribute within one sentence. In this paper, we first present an improved sentiment word quantitative method to generate sentiment score for every word in sentiment lexicon. Additionally, we propose a novel identification approach of attribute-modifier-sentiment word triple using shallow semantic information. Experimental results show the feasibility and effectiveness of our approach.
人们对在网络上分享个人观点越来越感兴趣,比如产品评论、经济分析、政治民意调查等。现有的研究主要集中在基于文档的方法上,文档用词袋表示。然而,由于上下文信息的丢失,这种表示无法捕获意见与其相应目标之间的关联信息。此外,一些研究集中在基于句子的方法上,该方法可以有效地处理一个句子中的属性-情感词对。然而,这些方法无法在一个句子中处理多个属性。本文首先提出了一种改进的情感词量化方法,对情感词典中的每个词生成情感分数。此外,我们还提出了一种基于浅语义信息的属性-修饰语-情感词三元组识别方法。实验结果表明了该方法的可行性和有效性。
{"title":"Fine-grained sentiment analysis of reviews using shallow semantic information","authors":"Hanxiao Shi, Yahui Zhang, Yiqian Zou, Xiaojun Li","doi":"10.1109/PIC.2017.8359549","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359549","url":null,"abstract":"There is a growing interest in sharing personal opinions on the Web, such as product reviews, economic analysis, political polls, etc. Existing research focuses on document-based approaches and documents are represented by bag-of-word. However, due to loss of contextual information, this representation fails to capture the associative information between an opinion and its corresponding target. Additionally, several researches focus on sentence-based approaches, which can effectively deal with an attribute-sentiment word pair within one sentence. However, those approaches are unable to process more than one attribute within one sentence. In this paper, we first present an improved sentiment word quantitative method to generate sentiment score for every word in sentiment lexicon. Additionally, we propose a novel identification approach of attribute-modifier-sentiment word triple using shallow semantic information. Experimental results show the feasibility and effectiveness of our approach.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124813779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust your wallet: A new online wallet architecture for Bitcoin 信任你的钱包:一种新的比特币在线钱包架构
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359562
Fangdong Zhu, Wen Chen, Yunpeng Wang, Ping Lin, Tao Li, Xiaochun Cao, Long Yuan
Online wallet has become an important method to manage Bitcoin. In a Bitcoin transaction, online wallet manages the private key automatically, and stores the encrypted private key in remote to ensure the accessibility of Bitcoin anywhere. In the traditional online wallet, the private key is stored centrally in a storage unit. However, if the storage unit is collapsed or hacked, users will suffer the risk of losing their Bitcoins. Motivated by this, in this paper, we propose a new online wallet architecture: HA-eWallet. In HA-eWallet, the transaction of Bitcoin is signed by multiple private keys rather than one, and private keys are stored separately in different places. In addition, we introduce a second service unit to construct the Active-Active architecture to rotate the capability and workload. Besides, we adopt a disaster recovery strategy in our proposed architecture in case of any disaster. According to the running states of each service unit, HA-eWallet have three operation models, and can be switched smoothly. Theoretical analyses and experiments show that: HA-eWallet can achieve higher availability compared with the traditional online wallet architecture, and users will not suffer a loss as long as the number of lost private keys are less than 50% of the users' total number of private keys.
网上钱包已经成为管理比特币的一种重要方式。在比特币交易中,在线钱包自动管理私钥,并将加密的私钥远程存储,确保比特币在任何地方都可以访问。在传统的在线钱包中,私钥集中存储在存储单元中。然而,如果存储单元崩溃或被黑客入侵,用户将面临丢失比特币的风险。基于此,本文提出了一种新的在线钱包架构:HA-eWallet。在HA-eWallet中,比特币的交易是由多个私钥而不是一个私钥签名的,私钥分别存储在不同的地方。此外,我们还引入了第二个服务单元来构造双活架构,以轮转能力和工作负载。此外,我们在提出的体系结构中采用了灾难恢复策略,以防发生任何灾难。根据各业务单元的运行状态,HA-eWallet有三种运行模式,可顺利切换。理论分析和实验表明:与传统的在线钱包架构相比,HA-eWallet可以实现更高的可用性,只要丢失的私钥数量小于用户总私钥数量的50%,用户就不会遭受损失。
{"title":"Trust your wallet: A new online wallet architecture for Bitcoin","authors":"Fangdong Zhu, Wen Chen, Yunpeng Wang, Ping Lin, Tao Li, Xiaochun Cao, Long Yuan","doi":"10.1109/PIC.2017.8359562","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359562","url":null,"abstract":"Online wallet has become an important method to manage Bitcoin. In a Bitcoin transaction, online wallet manages the private key automatically, and stores the encrypted private key in remote to ensure the accessibility of Bitcoin anywhere. In the traditional online wallet, the private key is stored centrally in a storage unit. However, if the storage unit is collapsed or hacked, users will suffer the risk of losing their Bitcoins. Motivated by this, in this paper, we propose a new online wallet architecture: HA-eWallet. In HA-eWallet, the transaction of Bitcoin is signed by multiple private keys rather than one, and private keys are stored separately in different places. In addition, we introduce a second service unit to construct the Active-Active architecture to rotate the capability and workload. Besides, we adopt a disaster recovery strategy in our proposed architecture in case of any disaster. According to the running states of each service unit, HA-eWallet have three operation models, and can be switched smoothly. Theoretical analyses and experiments show that: HA-eWallet can achieve higher availability compared with the traditional online wallet architecture, and users will not suffer a loss as long as the number of lost private keys are less than 50% of the users' total number of private keys.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115068709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A blockchain-based verification for sharing data securely 基于区块链的验证,用于安全共享数据
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359552
Y. Liu, Hao-peng Chen, Fei Hu
For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.
为了保护用户的隐私不受他人共享的恶意数据的影响,也为了减轻云的压力,本文提出了一种基于区块链的验证方法。通过使用区块链记录其他人共享数据的哈希值等必要信息,我们可以保证数据用户从第三方来源(如云存储平台)接收的数据确实是原始上传的数据。在对以下方法进行了一些实验后。我们确认,通过我们基于区块链的方法,可以很容易地区分数据是否被恶意人员修改。这种基于区块链的验证方法可以有效地帮助用户确定收到的数据是否正是他想要的。此外,我们的方法将意味着数据不是原始数据,不能打开或执行数据。
{"title":"A blockchain-based verification for sharing data securely","authors":"Y. Liu, Hao-peng Chen, Fei Hu","doi":"10.1109/PIC.2017.8359552","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359552","url":null,"abstract":"For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our article. By using the Blockchain to record the hash value and other necessary information of data sharing by other people, we can guarantee that the data user received from a third-party source (such as a cloud storage platform) is the original uploaded data indeed. After taking some experiments on the following method. We confirm that it can be easily distinguished whether a data has been modified by malicious people through our Blockchain-based approach. This Blockchain-based approach of verification can effectively help users find out if the data received is the one exactly he wants. In addition, our approach will imply that the data is not the original one and that data cannot be opened or executed.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127006488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation and analysis of network coding at network layer 网络层网络编码的评价与分析
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359567
T. Khanzada, A. Mukhtiar, N. Bushra, M. S. Talpur, A. Faisal
Network coding is a potential method that numerous investigators have move forwarded due to its significant advantages to enhance the proficiency of data communication. In this work, utilize simulations to assess the execution of various network topologies employing network coding. By contrasting the results of network and without network coding, it insists that network coding can improve the throughput, end-to-end delays, Packet Delivery Rate (PDR) and consistency. This paper presents the comparative performance analysis of network coding such as, XOR, LNC, and RLNC. The results demonstrates the XOR technique has attractive outcomes and can improve the real time performance metrics i.e.; throughput, end-to-end delay and PDR by substantial limitations. The analysis has been carried out based on packet size and also number of packets to be transmitted. Results illustrates that the network coding facilitate in dependence between networks.
网络编码因其在提高数据通信熟练度方面的显著优势而成为一种有潜力的研究方法。在这项工作中,利用模拟来评估使用网络编码的各种网络拓扑的执行。通过对比网络编码和非网络编码的结果,认为网络编码可以提高吞吐量、端到端延迟、分组交付率(Packet Delivery Rate, PDR)和一致性。本文对异或、LNC和RLNC等网络编码的性能进行了比较分析。结果表明,异或技术具有很好的效果,可以提高实时性能指标,即;吞吐量、端到端延迟和PDR受到实质性限制。分析是根据数据包大小和要传输的数据包数量进行的。结果表明,网络编码促进了网络间的依赖。
{"title":"Evaluation and analysis of network coding at network layer","authors":"T. Khanzada, A. Mukhtiar, N. Bushra, M. S. Talpur, A. Faisal","doi":"10.1109/PIC.2017.8359567","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359567","url":null,"abstract":"Network coding is a potential method that numerous investigators have move forwarded due to its significant advantages to enhance the proficiency of data communication. In this work, utilize simulations to assess the execution of various network topologies employing network coding. By contrasting the results of network and without network coding, it insists that network coding can improve the throughput, end-to-end delays, Packet Delivery Rate (PDR) and consistency. This paper presents the comparative performance analysis of network coding such as, XOR, LNC, and RLNC. The results demonstrates the XOR technique has attractive outcomes and can improve the real time performance metrics i.e.; throughput, end-to-end delay and PDR by substantial limitations. The analysis has been carried out based on packet size and also number of packets to be transmitted. Results illustrates that the network coding facilitate in dependence between networks.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130571461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ACER: An adaptive context-aware ensemble regression model for airfare price prediction ACER:机票价格预测的自适应情境感知集成回归模型
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359563
Tao Liu, Jian Cao, Yudong Tan, Quan-Wu Xiao
Since airlines usually keep their price strategies as commercial secrets and information is always asymmetric, it is difficult for ordinary customers to estimate future flight price changes. However, a reasonable prediction can help customers make decisions when to buy air tickets for a lower price. Flight price prediction can be regarded as a typical time series prediction problem. There are usually two main methods to solve this problem. One is using classical time series prediction methods such as ARIMA, etc. Another is extracting certain features and using regression models. For the latter, sometimes the flight price is context-aware, making it difficult to get an optimized single regression model for the whole price series. Meanwhile, effective context features vary on different air routes and change with time, therefore it is difficult to model context information. In this paper, we propose a context-aware ensemble regression model named ACER which combines different context-aware models and adjusts context features adaptively. Inspired by the idea of bagging and boosting, context features are randomly selected to cluster data efficiently and multiple regression models are trained for data with different contexts. In addition, the context feature list is dynamically adjusted by dropping some irrelevant features. In the experiment on the real data set, our model is compared with the baseline regression model, random forest and classical time series models. The results show that ACER performs much better than the other models.
由于航空公司通常将其价格策略作为商业机密,而且信息总是不对称的,因此普通客户很难估计未来航班价格的变化。然而,合理的预测可以帮助客户决定何时以较低的价格购买机票。航班价格预测可以看作是一个典型的时间序列预测问题。通常有两种主要方法来解决这个问题。一种是使用经典的时间序列预测方法,如ARIMA等。另一种方法是提取某些特征并使用回归模型。对于后者,有时航班价格是上下文敏感的,这使得很难得到一个针对整个价格序列的优化的单一回归模型。同时,不同航路的有效语境特征不同,且随时间变化,故语境信息建模困难。本文提出了一种上下文感知集成回归模型ACER,该模型结合了不同的上下文感知模型,并自适应地调整上下文特征。受bagging和boosting思想的启发,随机选择上下文特征来有效地聚类数据,并针对不同上下文的数据训练多个回归模型。此外,上下文特性列表通过删除一些不相关的特性来动态调整。在实际数据集的实验中,将该模型与基线回归模型、随机森林模型和经典时间序列模型进行了比较。结果表明,ACER的性能比其他模型要好得多。
{"title":"ACER: An adaptive context-aware ensemble regression model for airfare price prediction","authors":"Tao Liu, Jian Cao, Yudong Tan, Quan-Wu Xiao","doi":"10.1109/PIC.2017.8359563","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359563","url":null,"abstract":"Since airlines usually keep their price strategies as commercial secrets and information is always asymmetric, it is difficult for ordinary customers to estimate future flight price changes. However, a reasonable prediction can help customers make decisions when to buy air tickets for a lower price. Flight price prediction can be regarded as a typical time series prediction problem. There are usually two main methods to solve this problem. One is using classical time series prediction methods such as ARIMA, etc. Another is extracting certain features and using regression models. For the latter, sometimes the flight price is context-aware, making it difficult to get an optimized single regression model for the whole price series. Meanwhile, effective context features vary on different air routes and change with time, therefore it is difficult to model context information. In this paper, we propose a context-aware ensemble regression model named ACER which combines different context-aware models and adjusts context features adaptively. Inspired by the idea of bagging and boosting, context features are randomly selected to cluster data efficiently and multiple regression models are trained for data with different contexts. In addition, the context feature list is dynamically adjusted by dropping some irrelevant features. In the experiment on the real data set, our model is compared with the baseline regression model, random forest and classical time series models. The results show that ACER performs much better than the other models.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114627034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Intemittent control with reinforcement leaning 具有强化学习的间歇性控制
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359514
Haibo Shi, Yaoru Sun, Guangyuan Li
In this study, a hierarchical architecture for the intermittent control under the minimum transition hypothesis (MTH) was implemented. A two-stage hierarchy was adopted to perform the high-level and the low-level control respectively. The high-level controller performed the intermittent control by setting a sequence of goals for the low-level controller. Goal planning as the intermittent control policy was learned with hierarchical deep deterministic policy gradient (h-DDPG) proposed in this study, which is a hierarchical version of the conventional DDPG. The model successfully learned to temporally decompose a complex movement into a sequence of basic motor skills with sparse transitions, as shown in results of the two validation experiments: the trajectory following and the obstacle avoidance tasks.
本文提出了一种基于最小过渡假设(MTH)的间歇控制分层结构。采用两阶段层次结构分别进行高层控制和低层控制。高级控制器通过为低级控制器设定一系列目标来执行间歇控制。采用分层深度确定性策略梯度(h-DDPG)学习间歇控制策略的目标规划,这是传统深度确定性策略梯度的分层版本。该模型成功地学会了将一个复杂的运动在时间上分解为一系列具有稀疏过渡的基本运动技能,如轨迹跟随和避障任务两个验证实验的结果所示。
{"title":"Intemittent control with reinforcement leaning","authors":"Haibo Shi, Yaoru Sun, Guangyuan Li","doi":"10.1109/PIC.2017.8359514","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359514","url":null,"abstract":"In this study, a hierarchical architecture for the intermittent control under the minimum transition hypothesis (MTH) was implemented. A two-stage hierarchy was adopted to perform the high-level and the low-level control respectively. The high-level controller performed the intermittent control by setting a sequence of goals for the low-level controller. Goal planning as the intermittent control policy was learned with hierarchical deep deterministic policy gradient (h-DDPG) proposed in this study, which is a hierarchical version of the conventional DDPG. The model successfully learned to temporally decompose a complex movement into a sequence of basic motor skills with sparse transitions, as shown in results of the two validation experiments: the trajectory following and the obstacle avoidance tasks.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124411853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new surrogate for tensor multirank and applications in image and video completion 一种新的张量多秩代理及其在图像和视频补全中的应用
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359523
Teng-Yu Ji, Tingzhu Huang, Xile Zhao, Dong-Lin Sun
How to define and relax the tensor rank is a challenging and meaningful topic. The CP-rank, n-rank, and tensor multirank are three of the most popular definitions. Among them n-rank and tensor multirank are widely studied in the low-rank tensor completion problem, and their relaxations are sum of nuclear norm (SNN) and tensor nuclear norm (TNN), respectively. Both the two kinds of nuclear norm treat the singular values equally, while the different singular values for the practical images represent different physical meanings and should be treated differently. In this paper, we propose a tensor logDet function as the relaxation for tensor multirank rather than TNN. To demonstrate the effectiveness of the proposed function, we introduce the function into the low-rank tensor completion problem and develop an alternating direction method of multipliers (ADMM)-based method. Extensive experiments have shown that the proposed method outperforms the SNN and TNN based methods.
如何定义和松弛张量秩是一个具有挑战性和意义的课题。CP-rank、n-rank和张量multirank是最流行的三个定义。其中n秩和张量多秩在低秩张量补全问题中得到了广泛的研究,它们的弛豫分别是核范数(SNN)和张量核范数(TNN)的和。两种核范数对奇异值的处理都是平等的,而实际图像的不同奇异值所代表的物理意义不同,应区别对待。在本文中,我们提出了一个张量logDet函数作为张量多秩的松弛,而不是TNN。为了证明该函数的有效性,我们将该函数引入到低秩张量补全问题中,并开发了一种基于乘法器交替方向法(ADMM)的方法。大量的实验表明,该方法优于基于SNN和TNN的方法。
{"title":"A new surrogate for tensor multirank and applications in image and video completion","authors":"Teng-Yu Ji, Tingzhu Huang, Xile Zhao, Dong-Lin Sun","doi":"10.1109/PIC.2017.8359523","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359523","url":null,"abstract":"How to define and relax the tensor rank is a challenging and meaningful topic. The CP-rank, n-rank, and tensor multirank are three of the most popular definitions. Among them n-rank and tensor multirank are widely studied in the low-rank tensor completion problem, and their relaxations are sum of nuclear norm (SNN) and tensor nuclear norm (TNN), respectively. Both the two kinds of nuclear norm treat the singular values equally, while the different singular values for the practical images represent different physical meanings and should be treated differently. In this paper, we propose a tensor logDet function as the relaxation for tensor multirank rather than TNN. To demonstrate the effectiveness of the proposed function, we introduce the function into the low-rank tensor completion problem and develop an alternating direction method of multipliers (ADMM)-based method. Extensive experiments have shown that the proposed method outperforms the SNN and TNN based methods.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131336940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hyperspectral image low-rank restoration based spectral-spatial total variation 基于低阶恢复的高光谱图像光谱空间总变分
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359528
Peipei Sun, Hongyi Liu
Hyperspectral image (HSI) is often contaminated by mixed noise in the acquisition process. In this paper, a hyperspectral image low-rank restoration method based spectral-spatial total variation (LRSSTV) is proposed. The spectral high correlation is exploited by low-rank representation and the sparse noise is represented by the /i-norm. Furthermore, to remove the Gaussian noise and enhance the edge information, spectral-spatial adaptive total variation prior knowledge is utilized. Both simulated and real-world data experimental results show that the proposed method can work well in detail preservation and noise removal.
高光谱图像在采集过程中经常受到混合噪声的污染。提出了一种基于光谱空间全变分(LRSSTV)的高光谱图像低秩恢复方法。通过低秩表示利用谱的高相关性,用/i范数表示稀疏噪声。此外,利用谱空间自适应全变分先验知识去除高斯噪声,增强边缘信息。仿真和实际数据实验结果表明,该方法具有较好的细节保存和去噪效果。
{"title":"Hyperspectral image low-rank restoration based spectral-spatial total variation","authors":"Peipei Sun, Hongyi Liu","doi":"10.1109/PIC.2017.8359528","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359528","url":null,"abstract":"Hyperspectral image (HSI) is often contaminated by mixed noise in the acquisition process. In this paper, a hyperspectral image low-rank restoration method based spectral-spatial total variation (LRSSTV) is proposed. The spectral high correlation is exploited by low-rank representation and the sparse noise is represented by the /i-norm. Furthermore, to remove the Gaussian noise and enhance the edge information, spectral-spatial adaptive total variation prior knowledge is utilized. Both simulated and real-world data experimental results show that the proposed method can work well in detail preservation and noise removal.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133592956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient anonymous attribute-based encryption with access policy hidden for cloud computing 高效匿名基于属性的加密,访问策略隐藏,适用于云计算
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359555
Chanying Huang, Kedong Yan, Songjie Wei, Gongxuan Zhang, Dong Hoon Lee
Cloud computing is a revolutionary information technology paradigm, which provides users with unlimited, scalale, low-cost and convenient resource services, but when data is outsourced to a semi-trusted cloud server, challenging security issues such as user privacy, access control, etc. still urgently need to be addressed. Attribute-based encryption (ABE) scheme can provide sufficient data security and fine-grained access control for cloud data. However, the limitation of ABE is that user's privacy would be disclosed with the access policy (structure) stored in clear text. Some works sacrificed the computing efficiency, key length or ciphertext size for privacy concerns. To overcome these problems, this paper proposes an efficient anonymous attributebased encryption scheme with access policy hidden. Using the idea of Boolean equivalent transformation, the proposed scheme can achieve fast encryption and protect the privacy for both data owner and legitimate access user. In addition, the proposed scheme can satisfy constant secret key length and reasonable size of ciphertext requirements. We conduct theoretical security analysis, and carry out experiments to prove that the proposed scheme has good performance in terms of computational, communication and storage overheads.
云计算是一种革命性的信息技术范式,它为用户提供了无限的、可扩展的、低成本的、便捷的资源服务,但当数据外包给半可信的云服务器时,用户隐私、访问控制等具有挑战性的安全问题仍然迫切需要解决。基于属性的加密(ABE)方案可以为云数据提供足够的数据安全性和细粒度的访问控制。但是ABE的局限性在于,访问策略(结构)以明文形式存储时,用户的隐私会被泄露。有些作品为了保护隐私牺牲了计算效率、密钥长度或密文大小。为了克服这些问题,本文提出了一种有效的基于匿名属性、隐藏访问策略的加密方案。该方案采用布尔等价变换思想,既能实现快速加密,又能保护数据所有者和合法访问用户的隐私。此外,该方案能够满足密钥长度恒定和密文大小合理的要求。我们进行了理论安全性分析,并通过实验证明了该方案在计算、通信和存储开销方面具有良好的性能。
{"title":"Efficient anonymous attribute-based encryption with access policy hidden for cloud computing","authors":"Chanying Huang, Kedong Yan, Songjie Wei, Gongxuan Zhang, Dong Hoon Lee","doi":"10.1109/PIC.2017.8359555","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359555","url":null,"abstract":"Cloud computing is a revolutionary information technology paradigm, which provides users with unlimited, scalale, low-cost and convenient resource services, but when data is outsourced to a semi-trusted cloud server, challenging security issues such as user privacy, access control, etc. still urgently need to be addressed. Attribute-based encryption (ABE) scheme can provide sufficient data security and fine-grained access control for cloud data. However, the limitation of ABE is that user's privacy would be disclosed with the access policy (structure) stored in clear text. Some works sacrificed the computing efficiency, key length or ciphertext size for privacy concerns. To overcome these problems, this paper proposes an efficient anonymous attributebased encryption scheme with access policy hidden. Using the idea of Boolean equivalent transformation, the proposed scheme can achieve fast encryption and protect the privacy for both data owner and legitimate access user. In addition, the proposed scheme can satisfy constant secret key length and reasonable size of ciphertext requirements. We conduct theoretical security analysis, and carry out experiments to prove that the proposed scheme has good performance in terms of computational, communication and storage overheads.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An importance-based approach for mining approximate roles 一种基于重要性的近似角色挖掘方法
Pub Date : 2017-12-01 DOI: 10.1109/PIC.2017.8359589
Lei Sun, Ning Pan, Liangsheng He, Zhiqiang Zhu
Role Based Access Control (RBAC) has become the de facto access control model in recent years. In order to deploy RBAC, organizations have to define a set of roles from the existing user-permission assignment relationships, the process of which is called role mining. There have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be necessary because the user-permission assignment (UPA) relationships are dynamic. In this paper, we define the evaluation criterion and the 6-Approx Important Role Mining Problem (6-IRMP) which is proved to be NP-complete first, then we propose a heuristic bottom-up role mining approach that reduces the total number of roles with important assignments and permissions preserved. Furthermore, we carry out the experiments with public datasets to evaluate our approach and the experimental results compared with other algorithms demonstrate the effectiveness of our proposed approach.
基于角色的访问控制(RBAC)近年来已成为事实上的访问控制模型。为了部署RBAC,组织必须从现有的用户权限分配关系中定义一组角色,这个过程称为角色挖掘。由于用户权限分配(UPA)关系是动态的,因此已经提出了许多角色挖掘算法来设计完整和正确的角色集。在本文中,我们首先定义了评价标准和证明了np完全的6-近似重要角色挖掘问题(6-IRMP),然后提出了一种启发式自底向上的角色挖掘方法,该方法减少了保留重要分配和权限的角色总数。此外,我们在公共数据集上进行了实验来评估我们的方法,并将实验结果与其他算法进行了比较,证明了我们提出的方法的有效性。
{"title":"An importance-based approach for mining approximate roles","authors":"Lei Sun, Ning Pan, Liangsheng He, Zhiqiang Zhu","doi":"10.1109/PIC.2017.8359589","DOIUrl":"https://doi.org/10.1109/PIC.2017.8359589","url":null,"abstract":"Role Based Access Control (RBAC) has become the de facto access control model in recent years. In order to deploy RBAC, organizations have to define a set of roles from the existing user-permission assignment relationships, the process of which is called role mining. There have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be necessary because the user-permission assignment (UPA) relationships are dynamic. In this paper, we define the evaluation criterion and the 6-Approx Important Role Mining Problem (6-IRMP) which is proved to be NP-complete first, then we propose a heuristic bottom-up role mining approach that reduces the total number of roles with important assignments and permissions preserved. Furthermore, we carry out the experiments with public datasets to evaluate our approach and the experimental results compared with other algorithms demonstrate the effectiveness of our proposed approach.","PeriodicalId":370588,"journal":{"name":"2017 International Conference on Progress in Informatics and Computing (PIC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124730182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 International Conference on Progress in Informatics and Computing (PIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1