首页 > 最新文献

2020 IEEE 6th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
Answer Extraction with Graph Attention Network for Knowledge Graph Question Answering 基于图关注网络的知识图问答答案提取
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345000
J. Zhang, Zhongmin Pei, Wei Xiong, Zhangkai Luo
In the knowledge graph question answering, the graph neural network can be used to encode the subgraph nodes related to the question entity to select the correct answer node. However, existing researches mainly focus on the modalities for the node encoding with graph neural network, ignoring that different types of subgraphs have different requirements for encoding information. To overcome the problem, this paper divides the subgraph into two types: the searching graph and the extending graph. Then we propose an answer extraction method with graph attention network for the searching graph, which can weight the information of neighbor nodes with different attention instead of the average. The hierarchical attention is also introduced to integrate question information into the subgraph node embedding to obtain the node presentation with question dependency. The accuracy of 48.2% is achieved on the CommonsenseQA dataset, which is much higher than the random guess (20%). In addition, the accuracy of the simplified model with no hierarchical attention decreases by 3.5%, which indicates the hierarchical attention mechanism can improve the predictive performance of the proposed model.
在知识图问答中,可以利用图神经网络对问题实体相关的子图节点进行编码,选择正确的答案节点。然而,现有的研究主要集中在图神经网络节点编码的模式上,忽略了不同类型的子图对编码信息的要求不同。为了克服这一问题,本文将子图分为两类:搜索图和扩展图。然后针对搜索图提出了一种基于图关注网络的答案提取方法,该方法可以对不同关注的相邻节点的信息进行加权,而不是平均加权。引入层次关注,将问题信息整合到子图节点嵌入中,得到具有问题依赖关系的节点表示。在CommonsenseQA数据集上实现了48.2%的准确率,远远高于随机猜测(20%)。此外,没有层次注意的简化模型的准确率降低了3.5%,表明层次注意机制可以提高模型的预测性能。
{"title":"Answer Extraction with Graph Attention Network for Knowledge Graph Question Answering","authors":"J. Zhang, Zhongmin Pei, Wei Xiong, Zhangkai Luo","doi":"10.1109/ICCC51575.2020.9345000","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345000","url":null,"abstract":"In the knowledge graph question answering, the graph neural network can be used to encode the subgraph nodes related to the question entity to select the correct answer node. However, existing researches mainly focus on the modalities for the node encoding with graph neural network, ignoring that different types of subgraphs have different requirements for encoding information. To overcome the problem, this paper divides the subgraph into two types: the searching graph and the extending graph. Then we propose an answer extraction method with graph attention network for the searching graph, which can weight the information of neighbor nodes with different attention instead of the average. The hierarchical attention is also introduced to integrate question information into the subgraph node embedding to obtain the node presentation with question dependency. The accuracy of 48.2% is achieved on the CommonsenseQA dataset, which is much higher than the random guess (20%). In addition, the accuracy of the simplified model with no hierarchical attention decreases by 3.5%, which indicates the hierarchical attention mechanism can improve the predictive performance of the proposed model.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123262186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Security Access Strategy for Sensitive Resource of Intelligent Production Line System with Dynamic Attribute Collaboration 基于动态属性协同的智能生产线系统敏感资源安全访问策略
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345298
Mingshi Li, Yue Ma, Zhenyu Yin, Anying Chai, Mengjia Lian, Chunxiao Wang
During the production and processing of the intelligent production line system of the Industrial Internet of Things (IIoT), it is easy to generate risks such as the unauthorized acquisition, tampering and unauthorized control of sensitive information by a third party in the communication. This paper propose and construct a dynamic attribute collaborative security access control strategy for sensitive resources of intelligent production line system in view of the risks and requirements of security access control of perceived information between intelligent production line equipment in the IIoT environment. Based on this strategy, a D-RSBAC (Dynamic-role&sensitivity based access control) model for intelligent production line system security is further established. This strategy realize the relative isolation of equipment processing control information on the basis of ensuring the overall performance of the communication system. This strategy allocate data access permissions dynamically based on roles and resource security levels to prevent sensitive information on the production line from being illegally obtained and tampered with by third parties during communications. This strategy can improve the security and reliability of information access effectively.
工业物联网(IIoT)智能生产线系统在生产加工过程中,在通信过程中容易产生敏感信息被第三方擅自获取、篡改、控制等风险。针对IIoT环境下智能生产线设备间感知信息安全访问控制的风险和需求,提出并构建了智能生产线系统敏感资源的动态属性协同安全访问控制策略。在此基础上,进一步建立了智能生产线系统安全的D-RSBAC (Dynamic-role&sensitivity Based access control)模型。该策略在保证通信系统整体性能的基础上实现了设备处理控制信息的相对隔离。该策略根据角色和资源安全级别动态分配数据访问权限,防止生产线上的敏感信息在通信过程中被第三方非法获取和篡改。该策略可以有效地提高信息访问的安全性和可靠性。
{"title":"A Security Access Strategy for Sensitive Resource of Intelligent Production Line System with Dynamic Attribute Collaboration","authors":"Mingshi Li, Yue Ma, Zhenyu Yin, Anying Chai, Mengjia Lian, Chunxiao Wang","doi":"10.1109/ICCC51575.2020.9345298","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345298","url":null,"abstract":"During the production and processing of the intelligent production line system of the Industrial Internet of Things (IIoT), it is easy to generate risks such as the unauthorized acquisition, tampering and unauthorized control of sensitive information by a third party in the communication. This paper propose and construct a dynamic attribute collaborative security access control strategy for sensitive resources of intelligent production line system in view of the risks and requirements of security access control of perceived information between intelligent production line equipment in the IIoT environment. Based on this strategy, a D-RSBAC (Dynamic-role&sensitivity based access control) model for intelligent production line system security is further established. This strategy realize the relative isolation of equipment processing control information on the basis of ensuring the overall performance of the communication system. This strategy allocate data access permissions dynamically based on roles and resource security levels to prevent sensitive information on the production line from being illegally obtained and tampered with by third parties during communications. This strategy can improve the security and reliability of information access effectively.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125397909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UAV Trajectory Control Against Hostile Jamming in Satellite-UAV Coordination Networks 星-无人机协调网络中敌对干扰下的无人机轨迹控制
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345170
Chen Han, A. Liu, Xiaohu Liang, Lang Ruan, Kaixin Cheng
Large unmanned aerial vehicle (UAV) performs reconnaissance and data collection missions against hostile jamming in satellite-UAV coordination Networks. In this case, the ground base station (BS) is unable to provide access service to the UAV, thus the UAV has to rely on information support from the satellite communication system. Low earth orbit (LEO) satellites provide access beams for UAVs, and the UAV transmits the collected data to the satellite via uplink. Due to the unknown and uncertain environment, it is difficult for large UAV to get an effective planned flight trajectory, and the presence of malicious jamming further exacerbates the complexity of trajectory control. To address this problem, a reinforcement learning (RL) based trajectory control approach is proposed to explore the unknown jamming environment and realize autonomous trajectory planning. Finally, the simulation results prove the effectiveness of the proposed approach.
大型无人机(UAV)在卫星-无人机协调网络中执行侦察和数据收集任务,以对抗敌对干扰。在这种情况下,地面基站(BS)无法为无人机提供接入服务,无人机只能依靠卫星通信系统的信息支持。低地球轨道(LEO)卫星为无人机提供接入波束,并且无人机通过上行链路将收集到的数据传输到卫星。由于环境的未知和不确定,大型无人机难以获得有效的规划飞行轨迹,而恶意干扰的存在进一步加剧了轨迹控制的复杂性。针对这一问题,提出了一种基于强化学习(RL)的轨迹控制方法,探索未知干扰环境,实现自主轨迹规划。最后,仿真结果证明了该方法的有效性。
{"title":"UAV Trajectory Control Against Hostile Jamming in Satellite-UAV Coordination Networks","authors":"Chen Han, A. Liu, Xiaohu Liang, Lang Ruan, Kaixin Cheng","doi":"10.1109/ICCC51575.2020.9345170","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345170","url":null,"abstract":"Large unmanned aerial vehicle (UAV) performs reconnaissance and data collection missions against hostile jamming in satellite-UAV coordination Networks. In this case, the ground base station (BS) is unable to provide access service to the UAV, thus the UAV has to rely on information support from the satellite communication system. Low earth orbit (LEO) satellites provide access beams for UAVs, and the UAV transmits the collected data to the satellite via uplink. Due to the unknown and uncertain environment, it is difficult for large UAV to get an effective planned flight trajectory, and the presence of malicious jamming further exacerbates the complexity of trajectory control. To address this problem, a reinforcement learning (RL) based trajectory control approach is proposed to explore the unknown jamming environment and realize autonomous trajectory planning. Finally, the simulation results prove the effectiveness of the proposed approach.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127032178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A High-Voltage Electric Switch Classification System Based on K-Nearest Neighbor Classifier 基于k -最近邻分类器的高压开关分类系统
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344925
Haien Wang, Jing Zhang, Yang Zhao, Jun Wang, Xiaorong Du
Classification of high-voltage electric switches is an important operation in industrial manufacturing. However, the electrical shock hazards make it dangerous to human. Therefore, classifying high-voltage electric switches automatically is of great interest for factories. For this purpose, we designed a system based on k-nearest neighbor algorithm and bag of visual words model, which performs well in classifying 3 states of highvoltage electric switches. We achieve the classifying task by 3 steps: extracting features of high-voltage electric switch pictures by using SIFT algorithm; clustering SIFT features of all training pictures as visual words and set up a bag of visual words model; calculating the visual words frequency of each picture and using them as inputs of k-nearest neighbor classifier. With the trained model, we extract SIFT features and count visual words frequency of a new picture to be classified, then predict its state by looking for the k nearest training pictures. An experimental study performed on a set of pictures reveals some good performance of this system, compared to other classification methods such as SVM and VGG-16.
高压电气开关的分类是工业制造中的一项重要操作。然而,它的触电危险使其对人体有危险。因此,对高压电气开关进行自动分类是工厂非常感兴趣的问题。为此,我们设计了一个基于k近邻算法和视觉词袋模型的系统,该系统可以很好地对高压开关的3种状态进行分类。我们通过三个步骤来完成分类任务:利用SIFT算法提取高压开关图像的特征;将所有训练图片的SIFT特征聚类为视觉词,建立视觉词袋模型;计算每张图片的视觉词频率,并将其作为k近邻分类器的输入。利用训练好的模型提取SIFT特征,对待分类新图片的视觉词频率进行计数,然后通过寻找k个最接近的训练图片来预测其状态。在一组图片上进行的实验研究表明,与SVM和VGG-16等其他分类方法相比,该系统具有良好的性能。
{"title":"A High-Voltage Electric Switch Classification System Based on K-Nearest Neighbor Classifier","authors":"Haien Wang, Jing Zhang, Yang Zhao, Jun Wang, Xiaorong Du","doi":"10.1109/ICCC51575.2020.9344925","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344925","url":null,"abstract":"Classification of high-voltage electric switches is an important operation in industrial manufacturing. However, the electrical shock hazards make it dangerous to human. Therefore, classifying high-voltage electric switches automatically is of great interest for factories. For this purpose, we designed a system based on k-nearest neighbor algorithm and bag of visual words model, which performs well in classifying 3 states of highvoltage electric switches. We achieve the classifying task by 3 steps: extracting features of high-voltage electric switch pictures by using SIFT algorithm; clustering SIFT features of all training pictures as visual words and set up a bag of visual words model; calculating the visual words frequency of each picture and using them as inputs of k-nearest neighbor classifier. With the trained model, we extract SIFT features and count visual words frequency of a new picture to be classified, then predict its state by looking for the k nearest training pictures. An experimental study performed on a set of pictures reveals some good performance of this system, compared to other classification methods such as SVM and VGG-16.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCD-NS: Service Customized Deployment of Network Slicing SCD-NS:网络切片的业务定制部署
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345053
Ying Wang, Jidong Zhang, Jiang Liu, Hua Lu, Tao Huang
The fifth generation networks (5G) can support a variety of vertical industries, such as autonomous driving, telemedicine and industrial automation. Network Slicing (NS) is a promising technology for 5G that can provide customized end-to-end network services for multi-tenants. To provide services to tenants according to different service requirements, we model delay and reliability of NS. We propose a method for service-customized deployment of network slicing (SCD-NS), which allocates resources according to different types of network slices. When deploying a network slice, we adopt a two-stage deployment method, in which first stage is virtual node deployment and second stage is virtual link deployment. Since the problem of network slices deployment is usually NP-Hard, we encode the virtual node deployment solution as a chromosome and use genetic algorithms to solve this problem. In the stage of virtual node deployment, we obtain the initial solutions through minimizing the average number of hops between nodes. In the stage of virtual link deployment, we provide adaptive deployment based on the types of network slices. The simulation results show that SCD-NS realizes better service customization and higher network utilization compared with current algorithm.
第五代网络(5G)可以支持各种垂直行业,如自动驾驶、远程医疗和工业自动化。网络切片(Network Slicing, NS)是一项很有前途的5G技术,可以为多租户提供定制的端到端网络服务。为了根据不同的业务需求向租户提供服务,我们对NS的时延和可靠性进行了建模。提出了一种基于服务定制的网络切片(SCD-NS)部署方法,根据不同类型的网络切片分配资源。在部署网络片时,我们采用两阶段部署方法,第一阶段为虚拟节点部署,第二阶段为虚拟链路部署。由于网络切片部署通常是NP-Hard问题,我们将虚拟节点部署方案编码为染色体,并使用遗传算法来解决该问题。在虚拟节点部署阶段,我们通过最小化节点间的平均跳数来获得初始解。在虚拟链路部署阶段,我们提供了基于网络切片类型的自适应部署。仿真结果表明,与现有算法相比,SCD-NS实现了更好的业务定制和更高的网络利用率。
{"title":"SCD-NS: Service Customized Deployment of Network Slicing","authors":"Ying Wang, Jidong Zhang, Jiang Liu, Hua Lu, Tao Huang","doi":"10.1109/ICCC51575.2020.9345053","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345053","url":null,"abstract":"The fifth generation networks (5G) can support a variety of vertical industries, such as autonomous driving, telemedicine and industrial automation. Network Slicing (NS) is a promising technology for 5G that can provide customized end-to-end network services for multi-tenants. To provide services to tenants according to different service requirements, we model delay and reliability of NS. We propose a method for service-customized deployment of network slicing (SCD-NS), which allocates resources according to different types of network slices. When deploying a network slice, we adopt a two-stage deployment method, in which first stage is virtual node deployment and second stage is virtual link deployment. Since the problem of network slices deployment is usually NP-Hard, we encode the virtual node deployment solution as a chromosome and use genetic algorithms to solve this problem. In the stage of virtual node deployment, we obtain the initial solutions through minimizing the average number of hops between nodes. In the stage of virtual link deployment, we provide adaptive deployment based on the types of network slices. The simulation results show that SCD-NS realizes better service customization and higher network utilization compared with current algorithm.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Error Resilience Algorithm for Haptic Communication Based on Remedy-LSTM 基于Remedy-LSTM的触觉通信错误恢复算法
Pub Date : 2020-12-11 DOI: 10.1109/iccc51575.2020.9345145
Yiwen Xu, Quanfei Zheng, Qingxu Lin, Kai Wang, Tiesong Zhao
As a new type of immersion interaction method, haptic communication technology has been widely applied in various fields. Data loss is inevitable during haptic communication, which will have significant negative impact on user's experience. Error resilience algorithm (ERA) is an effective method to solve this problem. However, traditional ERAs are based on linear prediction methods. Existing studies have verified that haptic data is not linear. Therefore, there still leave gaps to improve the performance of ERAs for haptic communication. To this end, this paper proposes an ERA of haptic communication based on an improved long short-term memory (LSTM) neural network. Firstly, an improved LSTM network is constructed by adding remedy gates to realize haptic data prediction, which effectively reduces the prediction error. Then, the presented ERA is implemented with the prediction model. Finally, we establish a simulation platform to compare the performance of the proposed algorithm with the popular-used ERAs in haptic communication. Experimental results show that our algorithm.
触觉通信技术作为一种新型的沉浸式交互方式,在各个领域得到了广泛的应用。在触觉交流过程中,数据丢失是不可避免的,这将对用户体验产生重大的负面影响。错误恢复算法(ERA)是解决这一问题的有效方法。然而,传统的era是基于线性预测方法的。现有的研究已经证实,触觉数据不是线性的。因此,在触觉通信方面,era的性能还有很大的提高空间。为此,本文提出了一种基于改进长短期记忆(LSTM)神经网络的触觉通信ERA。首先,通过添加补救门构建改进的LSTM网络实现触觉数据预测,有效降低了预测误差;然后,利用预测模型实现了所提出的ERA。最后,我们建立了一个仿真平台,将该算法与触觉通信中常用的era算法的性能进行比较。实验结果证明了我们的算法。
{"title":"Error Resilience Algorithm for Haptic Communication Based on Remedy-LSTM","authors":"Yiwen Xu, Quanfei Zheng, Qingxu Lin, Kai Wang, Tiesong Zhao","doi":"10.1109/iccc51575.2020.9345145","DOIUrl":"https://doi.org/10.1109/iccc51575.2020.9345145","url":null,"abstract":"As a new type of immersion interaction method, haptic communication technology has been widely applied in various fields. Data loss is inevitable during haptic communication, which will have significant negative impact on user's experience. Error resilience algorithm (ERA) is an effective method to solve this problem. However, traditional ERAs are based on linear prediction methods. Existing studies have verified that haptic data is not linear. Therefore, there still leave gaps to improve the performance of ERAs for haptic communication. To this end, this paper proposes an ERA of haptic communication based on an improved long short-term memory (LSTM) neural network. Firstly, an improved LSTM network is constructed by adding remedy gates to realize haptic data prediction, which effectively reduces the prediction error. Then, the presented ERA is implemented with the prediction model. Finally, we establish a simulation platform to compare the performance of the proposed algorithm with the popular-used ERAs in haptic communication. Experimental results show that our algorithm.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115999045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge-Concerned Embedding for Multiplex Heterogeneous Network 多路异构网络的边缘相关嵌入
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345158
Wei Dai, Yanlei Shang
Network embedding (or graph embedding) has been researched and used widely in recent years especially in academic and e-commerce area. Most methods pay more attention to homogeneous networks with single-typed nodes or edges. However, networks in real world are more complex and larger, consisting of multiple types of nodes, edges and even node attributes. Existing algorithms treat these multiplex heterogeneous networks as homogeneous network, ignoring correlations among different node types and edge types even deep semantic information. In light of these issues, we developed a new framework to solve heterogeneous network embedding problems. We mainly focus on Attributed Multiplex Heterogeneous Network but our method can apply to both heterogeneous and homogeneous networks. We also propose an edge-concerned metapath strategy to guide random walk, providing walking guidance among different layers separated by edge type and then leverages a heterogeneous skip-gram model to compute overall node embeddings. We conduct quantitative experiments to evaluate our method on four public dataset: Amazon, Youtube, DBLP and Movielens. As demonstrated by experimental results, our method achieves statistically significant improvements over compared previous methods on link prediction tasks. We also explore the parameter sensitivity of our proposed model to figure out function fluctuation while tuning parameters.
网络嵌入(又称图嵌入)近年来在学术界和电子商务领域得到了广泛的研究和应用。大多数方法更多地关注具有单一类型节点或边的同构网络。然而,现实世界中的网络更加复杂和庞大,由多种类型的节点、边甚至节点属性组成。现有算法将这些多重异构网络视为同质网络,忽略了不同节点类型和边缘类型之间的相关性,甚至忽略了深层语义信息。针对这些问题,我们开发了一个新的框架来解决异构网络嵌入问题。我们主要研究的是异构网络,但我们的方法既适用于异构网络也适用于同质网络。我们还提出了一种关注边缘的元路径策略来引导随机行走,在边缘类型分隔的不同层之间提供行走指导,然后利用异构跳格模型来计算整体节点嵌入。我们在Amazon、Youtube、DBLP和Movielens四个公共数据集上进行了定量实验来评估我们的方法。实验结果表明,我们的方法在链路预测任务上取得了统计上显著的改进。我们还探讨了所提出模型的参数敏感性,以便在调整参数时找出函数的波动。
{"title":"Edge-Concerned Embedding for Multiplex Heterogeneous Network","authors":"Wei Dai, Yanlei Shang","doi":"10.1109/ICCC51575.2020.9345158","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345158","url":null,"abstract":"Network embedding (or graph embedding) has been researched and used widely in recent years especially in academic and e-commerce area. Most methods pay more attention to homogeneous networks with single-typed nodes or edges. However, networks in real world are more complex and larger, consisting of multiple types of nodes, edges and even node attributes. Existing algorithms treat these multiplex heterogeneous networks as homogeneous network, ignoring correlations among different node types and edge types even deep semantic information. In light of these issues, we developed a new framework to solve heterogeneous network embedding problems. We mainly focus on Attributed Multiplex Heterogeneous Network but our method can apply to both heterogeneous and homogeneous networks. We also propose an edge-concerned metapath strategy to guide random walk, providing walking guidance among different layers separated by edge type and then leverages a heterogeneous skip-gram model to compute overall node embeddings. We conduct quantitative experiments to evaluate our method on four public dataset: Amazon, Youtube, DBLP and Movielens. As demonstrated by experimental results, our method achieves statistically significant improvements over compared previous methods on link prediction tasks. We also explore the parameter sensitivity of our proposed model to figure out function fluctuation while tuning parameters.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive Mechanism Design for Mobile Crowdsensing Considering Social Networks 考虑社交网络的移动众筹激励机制设计
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345046
Danying Guo, Xinxin Feng, Haifeng Zheng
Based on the popularity of intelligent embedded devices, mobile crowdsensing emerged as a new paradigm of crowdsourcing perception. However, it often faces the problem of low data quality caused by the insufficient number of participators. In this paper, we propose an incentive mechanism for mobile crowdsensing considering social networks. Our mechanism takes into account the social networks of mobile users, which is not only to reward users for data contribution, but also for solicitation behavior, so as to expand the number of participators under budget constraints, and to select users with high-capability. We prove by the theory that the proposed mechanism satisfies individual rationality, truthfulness, solicitation incentives, and budget effectiveness. Besides, the simulation results show that the mechanism can effectively motivate users' long-term participation and high-quality data collection.
基于智能嵌入式设备的普及,移动众测作为众包感知的新范式应运而生。然而,它经常面临参与者数量不足导致的数据质量低的问题。在本文中,我们提出了一种考虑社交网络的移动众感激励机制。我们的机制考虑了移动用户的社交网络,既对用户的数据贡献进行奖励,也对用户的邀约行为进行奖励,从而在预算约束下扩大参与者数量,选择能力较高的用户。通过理论证明,该机制满足个体理性、真实性、征集激励和预算有效性。仿真结果表明,该机制能够有效激励用户的长期参与和高质量的数据收集。
{"title":"Incentive Mechanism Design for Mobile Crowdsensing Considering Social Networks","authors":"Danying Guo, Xinxin Feng, Haifeng Zheng","doi":"10.1109/ICCC51575.2020.9345046","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345046","url":null,"abstract":"Based on the popularity of intelligent embedded devices, mobile crowdsensing emerged as a new paradigm of crowdsourcing perception. However, it often faces the problem of low data quality caused by the insufficient number of participators. In this paper, we propose an incentive mechanism for mobile crowdsensing considering social networks. Our mechanism takes into account the social networks of mobile users, which is not only to reward users for data contribution, but also for solicitation behavior, so as to expand the number of participators under budget constraints, and to select users with high-capability. We prove by the theory that the proposed mechanism satisfies individual rationality, truthfulness, solicitation incentives, and budget effectiveness. Besides, the simulation results show that the mechanism can effectively motivate users' long-term participation and high-quality data collection.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121907296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UAV Assisted Localization Scheme of WSNs Using RSSI and CSI Information 基于RSSI和CSI信息的无人机辅助wsn定位方案
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344880
Bohong Xiang, Feng Yan, Yaping Zhu, Tao Wu, Weiwei Xia, Jingming Pang, Wanzhu Liu, Gang Heng, Lianfeng Shen
In recent years, the research of high-precision positioning with wireless sensor networks has attracted a lot of attention, especially in the scenarios of UAV (unmanned aerial vehicles) assisted positioning. This paper proposes a new method of getting more accurate range information. In contrast to existing traditional works, we use multiple range information instead of a single distance information. First, a UAV transmits beacon packets to each sensor node at random positions and all nodes record RSSI (Received Signal Strength Indicator) vectors. We can estimate the distance between nodes by comparing the similarity of RSSI vectors. Second, we estimate the distance between two nodes by means of comparing their CSI (channel state Information) to UAV. Finally, we use Kalman filter to fuse the two-range information. And we can get more accurate range information for positioning. Simulations validate high localization accuracy of the proposed algorithm. Besides, the numbers of beacons transmitted by UAV and the energy consumption can be reduced in the simulation.
近年来,利用无线传感器网络进行高精度定位的研究备受关注,特别是在无人机辅助定位的场景下。本文提出了一种获取更精确距离信息的新方法。与现有的传统作品相比,我们使用了多个距离信息而不是单一的距离信息。首先,无人机向随机位置的每个传感器节点发送信标数据包,所有节点记录RSSI (Received Signal Strength Indicator,接收信号强度指标)向量。我们可以通过比较RSSI向量的相似性来估计节点之间的距离。其次,我们通过将两个节点的信道状态信息CSI (channel state Information)与无人机进行比较来估计节点之间的距离。最后,利用卡尔曼滤波对双量程信息进行融合。并且可以得到更精确的距离信息进行定位。仿真结果表明,该算法具有较高的定位精度。此外,仿真还可以减少无人机发射信标的数量和能耗。
{"title":"UAV Assisted Localization Scheme of WSNs Using RSSI and CSI Information","authors":"Bohong Xiang, Feng Yan, Yaping Zhu, Tao Wu, Weiwei Xia, Jingming Pang, Wanzhu Liu, Gang Heng, Lianfeng Shen","doi":"10.1109/ICCC51575.2020.9344880","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344880","url":null,"abstract":"In recent years, the research of high-precision positioning with wireless sensor networks has attracted a lot of attention, especially in the scenarios of UAV (unmanned aerial vehicles) assisted positioning. This paper proposes a new method of getting more accurate range information. In contrast to existing traditional works, we use multiple range information instead of a single distance information. First, a UAV transmits beacon packets to each sensor node at random positions and all nodes record RSSI (Received Signal Strength Indicator) vectors. We can estimate the distance between nodes by comparing the similarity of RSSI vectors. Second, we estimate the distance between two nodes by means of comparing their CSI (channel state Information) to UAV. Finally, we use Kalman filter to fuse the two-range information. And we can get more accurate range information for positioning. Simulations validate high localization accuracy of the proposed algorithm. Besides, the numbers of beacons transmitted by UAV and the energy consumption can be reduced in the simulation.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Minimum Output Energy Beamforming Based on Support Vector Regression 基于支持向量回归的最小输出能量波束形成
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345174
Chong Cong, Rongrong Qian, Wenping Ren
We propose a beamforming method based on Support Vector Regression (SVR) for uniform linear arrays (ULAs). In the proposed algorithm, a diagonal value is added to the covariance matrix of the structural risk item, to ensure the matrix invertible. Moreover, the proposed method not only carries out the minimum output energy, but also averts the low robustness caused by the direction of arrival mismatch and the limited number of snapshots. Performance of the proposed algorithm is evaluated by numerical simulations, which is compared with the minimum variance distortionless response (MVDR). It is illustrated that the SVR-based algorithm performs better than MVDR with small samples and high signal-to-noise ratio (SNR) scenarios.
提出一种基于支持向量回归(SVR)的均匀线性阵列波束形成方法。在该算法中,在结构风险项的协方差矩阵中增加对角值,以保证矩阵可逆。该方法不仅实现了最小的输出能量,而且避免了由于到达方向不匹配和快照数量有限而导致的低鲁棒性。通过数值模拟对该算法的性能进行了评价,并与最小方差无失真响应(MVDR)进行了比较。结果表明,在小样本和高信噪比的情况下,基于svr的算法优于MVDR。
{"title":"Minimum Output Energy Beamforming Based on Support Vector Regression","authors":"Chong Cong, Rongrong Qian, Wenping Ren","doi":"10.1109/ICCC51575.2020.9345174","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345174","url":null,"abstract":"We propose a beamforming method based on Support Vector Regression (SVR) for uniform linear arrays (ULAs). In the proposed algorithm, a diagonal value is added to the covariance matrix of the structural risk item, to ensure the matrix invertible. Moreover, the proposed method not only carries out the minimum output energy, but also averts the low robustness caused by the direction of arrival mismatch and the limited number of snapshots. Performance of the proposed algorithm is evaluated by numerical simulations, which is compared with the minimum variance distortionless response (MVDR). It is illustrated that the SVR-based algorithm performs better than MVDR with small samples and high signal-to-noise ratio (SNR) scenarios.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE 6th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1