首页 > 最新文献

2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)最新文献

英文 中文
Wavelet Neural Network Based Link Quality Prediction for Fluctuating Low Power Wireless Links 基于小波神经网络的波动低功耗无线链路质量预测
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449254
Wei Liu, Jinwei Xu, Yu Xia, Ming Xu, Mao Jing, Shunren Hu, Daqing Huang
Low power wireless links are prone to fluctuate when the channel environment changes. In order to reduce the impact of link fluctuations on data transmission, it is necessary to predict the link quality quickly and accurately and make dynamic adjustments according to prediction results. However, existing link quality prediction mechanisms lack sufficient consideration of the impact of link fluctuations, which leads to high prediction errors under the links with large fluctuations such as moderate and sudden changed links. In response to this problem, this paper proposed WNN-LQP, a more effective link quality prediction mechanism under the links with large fluctuations. By taking advantage of the higher resolution of link quality indicator in the transition region as well as the stronger learning ability and higher prediction accuracy of wavelet neural network, WNN-LQP could reduce the prediction errors under moderate and sudden changed links effectively. Compared with the similar mechanism, its prediction errors are reduced by 26.9% under both moderate and sudden changed links.
当信道环境发生变化时,低功率无线链路容易出现波动。为了减少链路波动对数据传输的影响,需要快速准确地预测链路质量,并根据预测结果进行动态调整。然而,现有的链路质量预测机制缺乏对链路波动影响的充分考虑,导致在中等、突变等波动较大的链路下预测误差较大。针对这一问题,本文提出了一种在波动较大的链路下更有效的链路质量预测机制WNN-LQP。WNN-LQP利用过渡区链路质量指标较高的分辨率,以及小波神经网络较强的学习能力和较高的预测精度,可以有效地降低链路中、突变情况下的预测误差。与同类机制相比,在中等和突变环节下,其预测误差都降低了26.9%。
{"title":"Wavelet Neural Network Based Link Quality Prediction for Fluctuating Low Power Wireless Links","authors":"Wei Liu, Jinwei Xu, Yu Xia, Ming Xu, Mao Jing, Shunren Hu, Daqing Huang","doi":"10.1109/ICCCS52626.2021.9449254","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449254","url":null,"abstract":"Low power wireless links are prone to fluctuate when the channel environment changes. In order to reduce the impact of link fluctuations on data transmission, it is necessary to predict the link quality quickly and accurately and make dynamic adjustments according to prediction results. However, existing link quality prediction mechanisms lack sufficient consideration of the impact of link fluctuations, which leads to high prediction errors under the links with large fluctuations such as moderate and sudden changed links. In response to this problem, this paper proposed WNN-LQP, a more effective link quality prediction mechanism under the links with large fluctuations. By taking advantage of the higher resolution of link quality indicator in the transition region as well as the stronger learning ability and higher prediction accuracy of wavelet neural network, WNN-LQP could reduce the prediction errors under moderate and sudden changed links effectively. Compared with the similar mechanism, its prediction errors are reduced by 26.9% under both moderate and sudden changed links.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Joint Coding Scheme Based on Reed-Solomon Codes 基于Reed-Solomon码的联合编码方案
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449143
Hao Wang, Wei Zhang, Yanyan Liu
The joint source-channel coding (JSCC) scheme is applicable to the resource-constrained, real-time, time-varying and low-cost communications. A high-efficient JSCC scheme based on Reed-Solomon (RS) codes is proposed, which can reduce the amount of data transmitted and ensure the reliability of communication system. In addition, a low complexity joint source-channel decoder is proposed, which can implement signal reconstruction and channel decoding through one circuit with high efficiency. The results illustrate that our decoder only needs about 41.1k gates and operates at 500 MHz to achieve the throughput of 3.05 Gb/s, which can be applied to the scenarios of Internet of Things (IoT) and Artificial Intelligence (AI).
联合信源信道编码(JSCC)方案适用于资源受限、实时、时变和低成本的通信。提出了一种基于RS码的高效JSCC方案,减少了数据传输量,保证了通信系统的可靠性。此外,提出了一种低复杂度的源信道联合解码器,该解码器可以在一个电路中高效地实现信号重构和信道解码。结果表明,我们的解码器只需要约41.1k门,工作频率为500 MHz,吞吐量为3.05 Gb/s,可应用于物联网(IoT)和人工智能(AI)场景。
{"title":"Joint Coding Scheme Based on Reed-Solomon Codes","authors":"Hao Wang, Wei Zhang, Yanyan Liu","doi":"10.1109/ICCCS52626.2021.9449143","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449143","url":null,"abstract":"The joint source-channel coding (JSCC) scheme is applicable to the resource-constrained, real-time, time-varying and low-cost communications. A high-efficient JSCC scheme based on Reed-Solomon (RS) codes is proposed, which can reduce the amount of data transmitted and ensure the reliability of communication system. In addition, a low complexity joint source-channel decoder is proposed, which can implement signal reconstruction and channel decoding through one circuit with high efficiency. The results illustrate that our decoder only needs about 41.1k gates and operates at 500 MHz to achieve the throughput of 3.05 Gb/s, which can be applied to the scenarios of Internet of Things (IoT) and Artificial Intelligence (AI).","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124946824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MRI Reconstruction Using Graph Reasoning Generative Adversarial Network 利用图推理生成对抗网络进行MRI重构
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449191
Wenzhong Zhou, Huiqian Du, Wenbo Mei, Liping Fang
The deep learning-based CS-MRI methods have been demonstrated to be able to reconstruct high-precision MR images. However, it can be observed that most current deep learning-based CS-MRI methods capture long-range dependencies by stacking multiple convolutional layers, which is computationally inefficient. The latent graph neural network has been proposed to efficiently capture long-range dependencies, which can address the above issue. Besides, there are very few works introducing graph neural networks (GNNs) into MRI reconstruction. In this paper, we propose a novel graph reasoning generative adversarial network, termed as GRGAN, by introducing the graph reasoning networks into MRI reconstruction, where the graph reasoning networks are embedded in the generator to capture long-range dependencies more efficiently. In addition, we propose the multi-scale aggregated residual blocks, termed as MARBs, and introduce them into the proposed GRGAN to extract multi-scale feature information effectively. The experimental results demonstrate that the proposed GRGAN surpasses the state-of-the-art deep learning-based CS-MRI methods with fewer model parameters.
基于深度学习的CS-MRI方法已被证明能够重建高精度的MR图像。然而,可以观察到,目前大多数基于深度学习的CS-MRI方法通过堆叠多个卷积层来捕获远程依赖关系,这在计算上效率很低。潜在图神经网络可以有效地捕获远程依赖关系,从而解决上述问题。此外,将图神经网络(gnn)引入MRI重建的研究也很少。在本文中,我们提出了一种新的图推理生成对抗网络,称为GRGAN,通过将图推理网络引入MRI重建中,其中图推理网络嵌入在生成器中以更有效地捕获远程依赖关系。此外,我们提出了多尺度聚集残差块(marb),并将其引入到所提出的GRGAN中,以有效地提取多尺度特征信息。实验结果表明,所提出的GRGAN以更少的模型参数超越了最先进的基于深度学习的CS-MRI方法。
{"title":"MRI Reconstruction Using Graph Reasoning Generative Adversarial Network","authors":"Wenzhong Zhou, Huiqian Du, Wenbo Mei, Liping Fang","doi":"10.1109/ICCCS52626.2021.9449191","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449191","url":null,"abstract":"The deep learning-based CS-MRI methods have been demonstrated to be able to reconstruct high-precision MR images. However, it can be observed that most current deep learning-based CS-MRI methods capture long-range dependencies by stacking multiple convolutional layers, which is computationally inefficient. The latent graph neural network has been proposed to efficiently capture long-range dependencies, which can address the above issue. Besides, there are very few works introducing graph neural networks (GNNs) into MRI reconstruction. In this paper, we propose a novel graph reasoning generative adversarial network, termed as GRGAN, by introducing the graph reasoning networks into MRI reconstruction, where the graph reasoning networks are embedded in the generator to capture long-range dependencies more efficiently. In addition, we propose the multi-scale aggregated residual blocks, termed as MARBs, and introduce them into the proposed GRGAN to extract multi-scale feature information effectively. The experimental results demonstrate that the proposed GRGAN surpasses the state-of-the-art deep learning-based CS-MRI methods with fewer model parameters.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAC Contention Protocol Based on Reinforcement Learning for IoV Communication Environments 基于强化学习的车联网通信环境下MAC争用协议
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449308
Zhonghui Pei, Wei Chen, Luyao Du, Hongjiang Zheng
The Medium Access Control (MAC) layer contention protocol is closely related to the performance of network throughput, end-to-end delay, and access fairness on the Internet of Vehicles (IoV) communication. Based on the MAC layer protocol of the Wireless Access in Vehicular Environments (WAVE) standard system, this paper proposes a MAC layer contention window adaptive adjustment policy using Reinforcement Learning. Through the detection of the number of neighbors and the application of the Q-Learning algorithm, the vehicle can adjust the contention window according to the number of nodes competing for the same channel to adapt to the changing environments of the IoV. Three different MAC protocols are simulated and analyzed under the Vehicle in Network Simulation (Veins) platform. The results show that the proposed MAC protocol based on neighbor detection and Q-Learning performs better than WAVE MAC protocol and general MAC protocol based on Q-Learning.
在车联网通信中,MAC层竞争协议与网络吞吐量、端到端时延、访问公平性等性能密切相关。基于车载环境无线接入(WAVE)标准系统的MAC层协议,提出了一种基于强化学习的MAC层竞争窗口自适应调整策略。通过邻居数量的检测和Q-Learning算法的应用,车辆可以根据竞争同一通道的节点数量调整竞争窗口,以适应车联网环境的变化。在车辆网络仿真(vein)平台下对三种不同的MAC协议进行了仿真和分析。结果表明,基于邻居检测和Q-Learning的MAC协议性能优于WAVE MAC协议和基于Q-Learning的通用MAC协议。
{"title":"MAC Contention Protocol Based on Reinforcement Learning for IoV Communication Environments","authors":"Zhonghui Pei, Wei Chen, Luyao Du, Hongjiang Zheng","doi":"10.1109/ICCCS52626.2021.9449308","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449308","url":null,"abstract":"The Medium Access Control (MAC) layer contention protocol is closely related to the performance of network throughput, end-to-end delay, and access fairness on the Internet of Vehicles (IoV) communication. Based on the MAC layer protocol of the Wireless Access in Vehicular Environments (WAVE) standard system, this paper proposes a MAC layer contention window adaptive adjustment policy using Reinforcement Learning. Through the detection of the number of neighbors and the application of the Q-Learning algorithm, the vehicle can adjust the contention window according to the number of nodes competing for the same channel to adapt to the changing environments of the IoV. Three different MAC protocols are simulated and analyzed under the Vehicle in Network Simulation (Veins) platform. The results show that the proposed MAC protocol based on neighbor detection and Q-Learning performs better than WAVE MAC protocol and general MAC protocol based on Q-Learning.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126168130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Big Data Analytics System Adoption in SMEs of Manufacturing 制造业中小企业大数据分析系统的应用
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449100
W. Tang, Singha Chaveesuk
In the information and communication technology era, the scales and types of big data are expanding rapidly, playing an increasingly important role in business. Big data technology is undoubtedly a big wave between information technology and manufacturing enterprise. However, some small and medium-sized manufacturing enterprises may not adopt and use big data technology as ICT related companies do. In this paper, we use the TOE model to test the factors (technological context, organizational context and environmental context) affecting BDA system adoption in SMEs of manufacturing.
在信息通信技术时代,大数据的规模和类型正在迅速扩大,在商业中发挥着越来越重要的作用。大数据技术无疑是信息技术与制造企业之间的一股大浪潮。然而,一些中小型制造业企业可能不会像ICT相关企业那样采用和使用大数据技术。本文运用TOE模型检验了影响制造业中小企业采用BDA系统的因素(技术背景、组织背景和环境背景)。
{"title":"Big Data Analytics System Adoption in SMEs of Manufacturing","authors":"W. Tang, Singha Chaveesuk","doi":"10.1109/ICCCS52626.2021.9449100","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449100","url":null,"abstract":"In the information and communication technology era, the scales and types of big data are expanding rapidly, playing an increasingly important role in business. Big data technology is undoubtedly a big wave between information technology and manufacturing enterprise. However, some small and medium-sized manufacturing enterprises may not adopt and use big data technology as ICT related companies do. In this paper, we use the TOE model to test the factors (technological context, organizational context and environmental context) affecting BDA system adoption in SMEs of manufacturing.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Mobile Receivers with Optimal Tilt Angle in Visible Light Communication System 可见光通信系统中最佳倾角移动接收机性能分析
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449314
Lingchuan Kang, Chao Wang, Yu Mu, Xiao-ping Du, Jingshu Xue, Yi-jun Zhu
Aiming at the difficulties that the receiver's field of view and random movement seriously affect the robustness of the visible light communication channel, this paper proposes to use the optimal-tilt-angle receiver as one of the solutions. Firstly, we take the channel capacity as the optimization goal and the Kuhn-Tucker conditions as the optimization tool to deduce the mathematical expression of the optimal tilt angle of the receiver in the single LED scene. Secondly, we propose to use the channel capacity difference between the optimal-tilt-angle receiver and the vertical-up receiver to evaluate the improvement of the channel robustness of the optimal-tilt-angle receiver. Finally, the cumulative distribution function and probability density function of the channel capacity difference are deduced when the receiver moves randomly. The simulation results show that the optimal-tilt-angle receiver improves the channel robustness more obviously in the scenes where the LED has a wide half-power semi-angle, the receiver has a narrow field of view, and the receiver has a wide range of movement.
针对接收机视场和随机运动严重影响可见光通信信道鲁棒性的问题,提出采用最优倾角接收机作为解决方案之一。首先,以信道容量为优化目标,以Kuhn-Tucker条件为优化工具,推导出单LED场景下接收机最优倾斜角的数学表达式;其次,我们提出利用最优倾斜角接收机与垂直向上接收机的信道容量差来评估最优倾斜角接收机信道鲁棒性的提高。最后,推导了接收机随机移动时信道容量差的累积分布函数和概率密度函数。仿真结果表明,在LED半功率半角较宽、接收机视场较窄、接收机运动范围较大的场景下,最优倾斜角度接收机对信道鲁棒性的改善更为明显。
{"title":"Performance Analysis of Mobile Receivers with Optimal Tilt Angle in Visible Light Communication System","authors":"Lingchuan Kang, Chao Wang, Yu Mu, Xiao-ping Du, Jingshu Xue, Yi-jun Zhu","doi":"10.1109/ICCCS52626.2021.9449314","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449314","url":null,"abstract":"Aiming at the difficulties that the receiver's field of view and random movement seriously affect the robustness of the visible light communication channel, this paper proposes to use the optimal-tilt-angle receiver as one of the solutions. Firstly, we take the channel capacity as the optimization goal and the Kuhn-Tucker conditions as the optimization tool to deduce the mathematical expression of the optimal tilt angle of the receiver in the single LED scene. Secondly, we propose to use the channel capacity difference between the optimal-tilt-angle receiver and the vertical-up receiver to evaluate the improvement of the channel robustness of the optimal-tilt-angle receiver. Finally, the cumulative distribution function and probability density function of the channel capacity difference are deduced when the receiver moves randomly. The simulation results show that the optimal-tilt-angle receiver improves the channel robustness more obviously in the scenes where the LED has a wide half-power semi-angle, the receiver has a narrow field of view, and the receiver has a wide range of movement.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Neural Network Based Adaptive Spatial Modulation 基于人工神经网络的自适应空间调制
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449310
Jean Paul Twarayisenze, Zhiquan Bai, Abeer Mohamed, K. Pang, Jingjing Wang, Xinghai Yang, K. Kwak
Adaptive spatial modulation (ASM) is a closed loop feedback transmission technique for multiple-input multiple-output (MIMO) systems, where different modulation orders can be assigned to the transmit antennas based on the available channel conditions. However, the conventional optimal modulation order selection (MOS) schemes in ASM have high computational complexity. In this paper, a supervised learning aided feed-forward artificial neural network (ANN) is proposed to design the MOS in ASM and achieve an effective tradeoff between the system computational complexity and the bit error rate (BER) performance. Specifically, the proposed ANN is utilized to transform the MOS problem in ASM to a multiclass classification problem based on a low search classification method and predict the optimal MOS candidate which maximizes the minimum Euclidean distance. Simulation results reveal that, for a given spectral efficiency (SE), the proposed ANN based ASM scheme outperforms the classical SM scheme and retains the advantages of the conventional ASM scheme but with lower system computational complexity.
自适应空间调制(ASM)是一种用于多输入多输出(MIMO)系统的闭环反馈传输技术,它可以根据可用信道条件为发射天线分配不同的调制顺序。然而,ASM中传统的最优调制顺序选择(MOS)方案具有较高的计算复杂度。本文提出了一种监督学习辅助前馈人工神经网络(ANN)来设计ASM中的MOS,并在系统计算复杂度和误码率(BER)性能之间实现了有效的权衡。具体而言,利用该人工神经网络将ASM中的MOS问题转化为基于低搜索分类方法的多类分类问题,并预测出最大最小欧几里得距离的最优MOS候选者。仿真结果表明,在给定的频谱效率(SE)下,本文提出的基于人工神经网络的ASM方案在保留传统ASM方案优点的同时,具有较低的系统计算复杂度。
{"title":"Artificial Neural Network Based Adaptive Spatial Modulation","authors":"Jean Paul Twarayisenze, Zhiquan Bai, Abeer Mohamed, K. Pang, Jingjing Wang, Xinghai Yang, K. Kwak","doi":"10.1109/ICCCS52626.2021.9449310","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449310","url":null,"abstract":"Adaptive spatial modulation (ASM) is a closed loop feedback transmission technique for multiple-input multiple-output (MIMO) systems, where different modulation orders can be assigned to the transmit antennas based on the available channel conditions. However, the conventional optimal modulation order selection (MOS) schemes in ASM have high computational complexity. In this paper, a supervised learning aided feed-forward artificial neural network (ANN) is proposed to design the MOS in ASM and achieve an effective tradeoff between the system computational complexity and the bit error rate (BER) performance. Specifically, the proposed ANN is utilized to transform the MOS problem in ASM to a multiclass classification problem based on a low search classification method and predict the optimal MOS candidate which maximizes the minimum Euclidean distance. Simulation results reveal that, for a given spectral efficiency (SE), the proposed ANN based ASM scheme outperforms the classical SM scheme and retains the advantages of the conventional ASM scheme but with lower system computational complexity.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122008360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Intrusion Detection Method Based on WOA Optimized Hybrid Kernel RVM 一种基于WOA优化混合核RVM的入侵检测方法
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449199
Pan Gao, Meng Yue, Zhi-jun Wu
In recent years, various machine learning algorithms and intelligent optimization algorithms have emerged one after another, and are widely used in intrusion detection. As a highly sparse model, the relevance vector machine (RVM) is very suitable for intrusion detection scenarios with large scale data. The selection of the parameters of the intrusion detection model directly affects the performance of intrusion detection. Therefore, the selection and determination of parameters is a very critical point to obtain better detection performance. At the same time, the classification performance of RVM obviously depends on the kernel function. To ensure the diversity of kernel function, we adopt a hybrid kernel function formed by linear combination. In addition, RVM is easy to fall into the local optimum, and it has large initial value randomness and poor convergence. Aiming at the limitations of the RVM algorithm, we propose a novel WOA-HRVM model, which optimizes the parameters of the hybrid kernel RVM by WOA algorithm to obtain better performance. The proposed WOA-HRVM is evaluated on NSL-KDD and CICIDS2017 dataset. Compared with other algorithms tested, the proposed WOA-HRVM algorithm significantly improves the accuracy and speed of intrusion detection.
近年来,各种机器学习算法和智能优化算法相继出现,并广泛应用于入侵检测中。相关向量机(RVM)作为一种高度稀疏的模型,非常适合于大规模数据的入侵检测场景。入侵检测模型参数的选择直接影响到入侵检测的性能。因此,参数的选择和确定是获得更好的检测性能的一个非常关键的点。同时,RVM的分类性能明显依赖于核函数。为了保证核函数的多样性,我们采用线性组合形成的混合核函数。此外,RVM容易陷入局部最优,初值随机性大,收敛性差。针对RVM算法的局限性,提出了一种新的WOA- hrvm模型,该模型通过WOA算法对混合内核RVM的参数进行优化,以获得更好的性能。在NSL-KDD和CICIDS2017数据集上对所提出的WOA-HRVM进行了评估。与已测试的其他算法相比,本文提出的WOA-HRVM算法显著提高了入侵检测的准确性和速度。
{"title":"A Novel Intrusion Detection Method Based on WOA Optimized Hybrid Kernel RVM","authors":"Pan Gao, Meng Yue, Zhi-jun Wu","doi":"10.1109/ICCCS52626.2021.9449199","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449199","url":null,"abstract":"In recent years, various machine learning algorithms and intelligent optimization algorithms have emerged one after another, and are widely used in intrusion detection. As a highly sparse model, the relevance vector machine (RVM) is very suitable for intrusion detection scenarios with large scale data. The selection of the parameters of the intrusion detection model directly affects the performance of intrusion detection. Therefore, the selection and determination of parameters is a very critical point to obtain better detection performance. At the same time, the classification performance of RVM obviously depends on the kernel function. To ensure the diversity of kernel function, we adopt a hybrid kernel function formed by linear combination. In addition, RVM is easy to fall into the local optimum, and it has large initial value randomness and poor convergence. Aiming at the limitations of the RVM algorithm, we propose a novel WOA-HRVM model, which optimizes the parameters of the hybrid kernel RVM by WOA algorithm to obtain better performance. The proposed WOA-HRVM is evaluated on NSL-KDD and CICIDS2017 dataset. Compared with other algorithms tested, the proposed WOA-HRVM algorithm significantly improves the accuracy and speed of intrusion detection.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116870864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data-free Knowledge Distillation via Adversarial* 通过Adversarial*的无数据知识蒸馏
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449145
Yu Jin, Zhaofan Qiu, GengQuan Xie, Jinye Cai, Chao Li, Liwen Shen
Network Compression is a challenging task, but it is crucial for using the deeper network in the low-performance device. If the original training datasets could be obtained, the traditional network compression approaches are useful for training a compact deep model. This paper proposes a novel framework for knowledge distillation without original training datasets via Generative Adversarial Network(GAN). We arrange the fixed pre-trained deeper network and the compact network as the discriminators to generate the training dataset. We also use the deeper network and the compact network as the generators, then introduce one simple full connection network as the discriminator to compress the complex network. We propose (i) a series of new images generation loss functions. (ii) a knowledge distillation method via generating adversarial networks. Finally, we show the superiority of our approach by contrasting with SOTA by benchmark datasets.
网络压缩是一项具有挑战性的任务,但它对于在低性能设备中使用更深层次的网络至关重要。如果能够获得原始的训练数据集,传统的网络压缩方法对于训练一个紧凑的深度模型是有用的。本文提出了一种基于生成对抗网络(GAN)的无需原始训练数据集的知识蒸馏新框架。我们将固定的预训练深度网络和紧凑网络作为判别器来生成训练数据集。在此基础上,引入一种简单的全连接网络作为判别器,对复杂网络进行压缩。我们提出(i)一系列新的图像生成损失函数。(ii)通过生成对抗网络的知识蒸馏方法。最后,我们通过对比基于基准数据集的SOTA来证明我们方法的优越性。
{"title":"Data-free Knowledge Distillation via Adversarial*","authors":"Yu Jin, Zhaofan Qiu, GengQuan Xie, Jinye Cai, Chao Li, Liwen Shen","doi":"10.1109/ICCCS52626.2021.9449145","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449145","url":null,"abstract":"Network Compression is a challenging task, but it is crucial for using the deeper network in the low-performance device. If the original training datasets could be obtained, the traditional network compression approaches are useful for training a compact deep model. This paper proposes a novel framework for knowledge distillation without original training datasets via Generative Adversarial Network(GAN). We arrange the fixed pre-trained deeper network and the compact network as the discriminators to generate the training dataset. We also use the deeper network and the compact network as the generators, then introduce one simple full connection network as the discriminator to compress the complex network. We propose (i) a series of new images generation loss functions. (ii) a knowledge distillation method via generating adversarial networks. Finally, we show the superiority of our approach by contrasting with SOTA by benchmark datasets.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128266610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method 用格基约简法对RSA大解密指数的一个特例进行密码分析
Pub Date : 2021-04-23 DOI: 10.1109/ICCCS52626.2021.9449268
Majid Mumtaz, Ping Luo
RSA public key cryptosystem is the “de-facto” standard, provides confidentiality and privacy security services over the internet. At Eurocrypt 1999, Boneh and Durfee proposed a polynomial time attacks on RSA small decryption key exponent. Their attacks worked by exploiting the lattice and sub lattice structure using lattice based Coppersmith's method to solve a modular polynomials, when $d < N^{0.284}$ and $d < N^{0.292}$ respectively. In this work, we propose a new attack on some special case of Boneh and Durfee's attack method with respect to large decryption exponent (i.e. $d=N^{epsilon} > e=N^{alpha}$, where $alpha$ and $epsilon$ are the encryption and decryption exponents respectively) for some $alphaleqepsilon$. The condition $d > phi(N)-N^{epsilon}$ satisfies our devised attack and the experimental outcome certifies that an RSA cryptosystem with large decryption exponent successfully revealed the weak keys through lattice basis reduction method.
RSA公钥密码系统是“事实上的”标准,在互联网上提供机密性和隐私安全服务。在Eurocrypt 1999上,Boneh和Durfee提出了一种针对RSA小解密密钥指数的多项式时间攻击方法。他们的攻击是通过利用晶格和亚晶格结构,使用基于晶格的Coppersmith方法来解决模多项式,分别为$d < N^{0.284}$和$d < N^{0.292}$。在这项工作中,我们针对一些$alphaleqepsilon$的大解密指数(即$d=N^{epsilon} > e=N^{alpha}$,其中$alpha$和$epsilon$分别是加密指数和解密指数)的Boneh和Durfee攻击方法的一些特殊情况提出了一种新的攻击方法。该条件$d > phi(N)-N^{epsilon}$满足我们设计的攻击,实验结果证明了一个大解密指数的RSA密码系统通过格基约简方法成功地揭示了弱密钥。
{"title":"Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method","authors":"Majid Mumtaz, Ping Luo","doi":"10.1109/ICCCS52626.2021.9449268","DOIUrl":"https://doi.org/10.1109/ICCCS52626.2021.9449268","url":null,"abstract":"RSA public key cryptosystem is the “de-facto” standard, provides confidentiality and privacy security services over the internet. At Eurocrypt 1999, Boneh and Durfee proposed a polynomial time attacks on RSA small decryption key exponent. Their attacks worked by exploiting the lattice and sub lattice structure using lattice based Coppersmith's method to solve a modular polynomials, when $d < N^{0.284}$ and $d < N^{0.292}$ respectively. In this work, we propose a new attack on some special case of Boneh and Durfee's attack method with respect to large decryption exponent (i.e. $d=N^{epsilon} > e=N^{alpha}$, where $alpha$ and $epsilon$ are the encryption and decryption exponents respectively) for some $alphaleqepsilon$. The condition $d > phi(N)-N^{epsilon}$ satisfies our devised attack and the experimental outcome certifies that an RSA cryptosystem with large decryption exponent successfully revealed the weak keys through lattice basis reduction method.","PeriodicalId":376290,"journal":{"name":"2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1