首页 > 最新文献

2020 IEEE 6th International Conference on Computer and Communications (ICCC)最新文献

英文 中文
A Method for Constructing Heterogeneous Entities Pool in NFV Security Architecture Based on Mimic Defense 基于模拟防御的NFV安全体系结构异构实体池构建方法
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345155
Qingqing Zhang, Hongbo Tang, Wei You, Yingle Li
The characteristics of resource sharing and centralized deployment of network function virtualization (NFV) make the physical boundary under the traditional closed management mode disappear, bringing many new security threats to the network. To improve the security of the NFV network, this paper proposes a network function virtualization security architecture based on mimic defense. At the same time, to ensure the differences between heterogeneous entities, a genetic algorithm-based heterogeneous entities pool construction method is proposed. Simulation results show that this method can effectively guarantee the difference between heterogeneous entities and increase the difficulty of attackers.
网络功能虚拟化(NFV)的资源共享和集中部署的特点,使得传统封闭管理模式下的物理边界消失,给网络带来了许多新的安全威胁。为了提高NFV网络的安全性,提出了一种基于模拟防御的网络功能虚拟化安全体系结构。同时,为了保证异构实体之间的差异性,提出了一种基于遗传算法的异构实体池构建方法。仿真结果表明,该方法能有效保证异构实体之间的差异性,提高攻击者的攻击难度。
{"title":"A Method for Constructing Heterogeneous Entities Pool in NFV Security Architecture Based on Mimic Defense","authors":"Qingqing Zhang, Hongbo Tang, Wei You, Yingle Li","doi":"10.1109/ICCC51575.2020.9345155","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345155","url":null,"abstract":"The characteristics of resource sharing and centralized deployment of network function virtualization (NFV) make the physical boundary under the traditional closed management mode disappear, bringing many new security threats to the network. To improve the security of the NFV network, this paper proposes a network function virtualization security architecture based on mimic defense. At the same time, to ensure the differences between heterogeneous entities, a genetic algorithm-based heterogeneous entities pool construction method is proposed. Simulation results show that this method can effectively guarantee the difference between heterogeneous entities and increase the difficulty of attackers.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123337057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Deep Supervised Hashing Method for Hamming Space Retrieval 一种改进的深度监督哈希法用于汉明空间检索
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345161
Xiangdong Lin, W. Zou, Nan Hu, Jiajun Wang
Due to its storage and computation efficiency, hashing has attracted extensive research on large-scale image retrieval tasks in recent years. This work focuses on Hamming space retrieval which enables the most efficient constant-time search by hash table lookups. In this paper, a novel deep supervised hashing method is proposed to generate highly concentrated hash codes based on a redesigned cross-entropy loss function. We also employ a regularizer term to mitigate the discrepancy between the Euclidean distance and the Hamming distance. Extensive experimental results demonstrate the superior performance of our method compared with existing hashing methods on two large-scale image datasets.
近年来,由于其存储和计算效率高,哈希算法在大规模图像检索任务中得到了广泛的研究。这项工作的重点是汉明空间检索,它可以通过哈希表查找实现最有效的恒定时间搜索。本文提出了一种新的深度监督哈希方法,该方法基于重新设计的交叉熵损失函数生成高度集中的哈希码。我们还使用正则化项来减轻欧几里得距离和汉明距离之间的差异。大量的实验结果表明,在两个大规模图像数据集上,与现有的哈希方法相比,我们的方法具有优越的性能。
{"title":"An Improved Deep Supervised Hashing Method for Hamming Space Retrieval","authors":"Xiangdong Lin, W. Zou, Nan Hu, Jiajun Wang","doi":"10.1109/ICCC51575.2020.9345161","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345161","url":null,"abstract":"Due to its storage and computation efficiency, hashing has attracted extensive research on large-scale image retrieval tasks in recent years. This work focuses on Hamming space retrieval which enables the most efficient constant-time search by hash table lookups. In this paper, a novel deep supervised hashing method is proposed to generate highly concentrated hash codes based on a redesigned cross-entropy loss function. We also employ a regularizer term to mitigate the discrepancy between the Euclidean distance and the Hamming distance. Extensive experimental results demonstrate the superior performance of our method compared with existing hashing methods on two large-scale image datasets.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126538655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compressive-Sensing-Based Antenna Array Calibration With Manifold Separation Technique 基于压缩传感的流形分离技术天线阵列标定
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345107
Tianhan Tan, Daolin Chen, Yisong Xue, Jie Zhuang
Array calibration is the guarantee of various array signal processing algorithms. The conventional calibration methods need a large amount of sampling points and calculations. In this paper, we propose an efficient method based on the manifold separation technique (MST) and compressive sensing (CS) to simplify the calibration process. We use the MST to convert the manifold matrix into the product of the sampling matrix and the 2D discrete Fourier transform base. Then by using the CS, we can reduce the required numbe of the measurement points. The simulation results demonstrate that the proposed method achieves the purpose of calibration with less random measurement data.
阵列标定是各种阵列信号处理算法的保证。传统的校准方法需要大量的采样点和计算量。在本文中,我们提出了一种基于流形分离技术(MST)和压缩感知(CS)的有效方法来简化校准过程。我们使用MST将流形矩阵转换成采样矩阵和二维离散傅里叶变换基的乘积。然后,通过使用CS,我们可以减少所需的测量点数量。仿真结果表明,该方法在较少随机测量数据的情况下达到了标定的目的。
{"title":"Compressive-Sensing-Based Antenna Array Calibration With Manifold Separation Technique","authors":"Tianhan Tan, Daolin Chen, Yisong Xue, Jie Zhuang","doi":"10.1109/ICCC51575.2020.9345107","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345107","url":null,"abstract":"Array calibration is the guarantee of various array signal processing algorithms. The conventional calibration methods need a large amount of sampling points and calculations. In this paper, we propose an efficient method based on the manifold separation technique (MST) and compressive sensing (CS) to simplify the calibration process. We use the MST to convert the manifold matrix into the product of the sampling matrix and the 2D discrete Fourier transform base. Then by using the CS, we can reduce the required numbe of the measurement points. The simulation results demonstrate that the proposed method achieves the purpose of calibration with less random measurement data.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121593234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Reinforcement Learning Based Computing Offloading and Resource Allocation Algorithm for Mobile Edge Networks 基于深度强化学习的移动边缘网络计算卸载与资源分配算法
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345089
Jinwei Xu, Xu Liu, Xiaorong Zhu
With the rapid development of Internet, continuous emergence of various innovative applications makes current mobile network face pressure of lower latency and computing capability. Mobile edge computing (MEC) has been proposed to be a promising solution to reduce the delay of interaction between applications and compensate the deficiencies of traditional cloud computing. In this paper, we propose a computing offloading and resource allocation algorithm to deal with problems in mobile edge networks (MEN), including offloading decision, transmission power and computation resources allocation. With the goal of minimizing the total cost of the system, an algorithm combining Deep Reinforcement Learning (DRL) and Genetic Algorithm (GA) is used to obtain an approximate optimal solution for the system. Simulation results prove the effectiveness of the algorithm.
随着互联网的快速发展,各种创新应用的不断涌现,使得当前的移动网络面临着低时延和计算能力的压力。移动边缘计算(MEC)被认为是一种很有前途的解决方案,可以减少应用程序之间的交互延迟,弥补传统云计算的不足。针对移动边缘网络中存在的卸载决策、传输功率和计算资源分配等问题,提出了一种计算卸载和资源分配算法。以最小化系统总成本为目标,采用深度强化学习(DRL)和遗传算法(GA)相结合的算法来获得系统的近似最优解。仿真结果证明了该算法的有效性。
{"title":"Deep Reinforcement Learning Based Computing Offloading and Resource Allocation Algorithm for Mobile Edge Networks","authors":"Jinwei Xu, Xu Liu, Xiaorong Zhu","doi":"10.1109/ICCC51575.2020.9345089","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345089","url":null,"abstract":"With the rapid development of Internet, continuous emergence of various innovative applications makes current mobile network face pressure of lower latency and computing capability. Mobile edge computing (MEC) has been proposed to be a promising solution to reduce the delay of interaction between applications and compensate the deficiencies of traditional cloud computing. In this paper, we propose a computing offloading and resource allocation algorithm to deal with problems in mobile edge networks (MEN), including offloading decision, transmission power and computation resources allocation. With the goal of minimizing the total cost of the system, an algorithm combining Deep Reinforcement Learning (DRL) and Genetic Algorithm (GA) is used to obtain an approximate optimal solution for the system. Simulation results prove the effectiveness of the algorithm.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Communication Model to Enhance Industrial Wireless Networks based on Time-Sensitive Networks 一种基于时间敏感网络增强工业无线网络的通信模型
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345100
Yue Li, Yue Ma, Zhenyu Yin, Ai Gu, Fulong Xu
With the development of intelligent manufacturing, the traditional industrial communication systems based on field bus and industrial Ethernet can hardly meet its common requirements for complexity and scalability in foreseeable future. In contrast, industrial wireless network is not mature yet, and there are still plenty of problems in velocity, stability, security and other aspects. In this paper, a communication model to enhance the comprehensive performance of industrial wireless networks is proposed based on existing scheduling methods of Time-sensitive networks. The model is composed of 3 parts, each of which specifically solves one of the above problems. This research provides research ideas for building a safer and faster wireless communication system for industrial applications.
随着智能制造的发展,基于现场总线和工业以太网的传统工业通信系统在可预见的未来将难以满足其对复杂性和可扩展性的普遍要求。相比之下,工业无线网络还不成熟,在速度、稳定性、安全性等方面还存在很多问题。本文在现有时敏网络调度方法的基础上,提出了一种提高工业无线网络综合性能的通信模型。该模型由3个部分组成,每个部分具体解决上述一个问题。本研究为构建更安全、更快的工业应用无线通信系统提供了研究思路。
{"title":"A Communication Model to Enhance Industrial Wireless Networks based on Time-Sensitive Networks","authors":"Yue Li, Yue Ma, Zhenyu Yin, Ai Gu, Fulong Xu","doi":"10.1109/ICCC51575.2020.9345100","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345100","url":null,"abstract":"With the development of intelligent manufacturing, the traditional industrial communication systems based on field bus and industrial Ethernet can hardly meet its common requirements for complexity and scalability in foreseeable future. In contrast, industrial wireless network is not mature yet, and there are still plenty of problems in velocity, stability, security and other aspects. In this paper, a communication model to enhance the comprehensive performance of industrial wireless networks is proposed based on existing scheduling methods of Time-sensitive networks. The model is composed of 3 parts, each of which specifically solves one of the above problems. This research provides research ideas for building a safer and faster wireless communication system for industrial applications.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Algorithm for Adaptive Communication Frame Length Based on Modbus Protocol 一种基于Modbus协议的自适应通信帧长的改进算法
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345057
Yao Yuanyuan, Chen Meng
The original Modbus protocol will inevitably cause high bit error rate when there are link problems in the network. Therefore, many experts have proposed to change the frame length according to the BER (bit error rate) to improve the link utilization. However, the link stability of this algorithm is very poor, which leads to the reduction of transmission efficiency. In order to solve the instability problem caused by the traditional adaptive frame length algorithm, an improved adaptive frame length adjustment algorithm is proposed in this paper. According to the average frame error rate in the time period, the method of “fast decrease, slow increase” is used to adjust the data frame length at different levels of FER (frame error rate). This algorithm not only improves the transmission rate, but also improves the stability of the link. Finally, this paper takes the servo drive data acquisition system as the carrier, and verifies the effectiveness of the algorithm through experiments.
当网络中存在链路问题时,原有的Modbus协议不可避免地会造成较高的误码率。因此,许多专家提出根据误码率(BER)来改变帧长,以提高链路利用率。然而,该算法的链路稳定性很差,导致传输效率降低。为了解决传统自适应帧长算法带来的不稳定性问题,本文提出了一种改进的自适应帧长调整算法。根据时间段内的平均帧错误率,采用“快降慢增”的方法对不同帧错误率水平下的数据帧长进行调整。该算法不仅提高了传输速率,而且提高了链路的稳定性。最后,本文以伺服驱动数据采集系统为载体,通过实验验证算法的有效性。
{"title":"An Improved Algorithm for Adaptive Communication Frame Length Based on Modbus Protocol","authors":"Yao Yuanyuan, Chen Meng","doi":"10.1109/ICCC51575.2020.9345057","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345057","url":null,"abstract":"The original Modbus protocol will inevitably cause high bit error rate when there are link problems in the network. Therefore, many experts have proposed to change the frame length according to the BER (bit error rate) to improve the link utilization. However, the link stability of this algorithm is very poor, which leads to the reduction of transmission efficiency. In order to solve the instability problem caused by the traditional adaptive frame length algorithm, an improved adaptive frame length adjustment algorithm is proposed in this paper. According to the average frame error rate in the time period, the method of “fast decrease, slow increase” is used to adjust the data frame length at different levels of FER (frame error rate). This algorithm not only improves the transmission rate, but also improves the stability of the link. Finally, this paper takes the servo drive data acquisition system as the carrier, and verifies the effectiveness of the algorithm through experiments.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"52 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114117944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Two-Layer Moving Target Defense for Image Classification in Adversarial Environment 对抗环境下图像分类的两层运动目标防御
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345217
Ye Peng, Guobin Fu, Yingguang Luo, Qi Yu, Bin Li, Jia Hu
Deep learning plays an increasingly important role in various fields due to its superior performance, and it also achieves advanced recognition performance in the field of image classification. However, the vulnerability of deep learning in the adversarial environment cannot be ignored, and the prediction result of the model is likely to be affected by the small perturbations added to the samples by the adversary. In this paper, we propose a two-layer dynamic defense method based on defensive techniques pool and retrained branch model pool. First, we randomly select defense methods from the defense pool to process the input. The perturbation ability of the adversarial samples preprocessed by different defense methods changed, which would produce different classification results. In addition, we conduct adversarial training based on the original model and dynamically generate multiple branch models. The classification results of these branch models for the same adversarial sample is inconsistent. We can detect the adversarial samples by using the inconsistencies in the output results of the two layers. The experimental results show that the two-layer dynamic defense method we designed achieves a good defense effect.
深度学习以其优越的性能在各个领域发挥着越来越重要的作用,在图像分类领域也取得了先进的识别性能。然而,深度学习在对抗环境中的脆弱性不容忽视,模型的预测结果很可能会受到对手给样本添加的微小扰动的影响。本文提出了一种基于防御技术池和再训练分支模型池的两层动态防御方法。首先,我们从防御池中随机选择防御方法来处理输入。不同防御方法预处理的对抗样本的摄动能力不同,分类结果也不同。此外,我们在原始模型的基础上进行对抗性训练,动态生成多个分支模型。对于同一对抗样本,这些分支模型的分类结果并不一致。我们可以利用两层输出结果的不一致性来检测对抗性样本。实验结果表明,所设计的双层动态防御方法取得了良好的防御效果。
{"title":"A Two-Layer Moving Target Defense for Image Classification in Adversarial Environment","authors":"Ye Peng, Guobin Fu, Yingguang Luo, Qi Yu, Bin Li, Jia Hu","doi":"10.1109/ICCC51575.2020.9345217","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345217","url":null,"abstract":"Deep learning plays an increasingly important role in various fields due to its superior performance, and it also achieves advanced recognition performance in the field of image classification. However, the vulnerability of deep learning in the adversarial environment cannot be ignored, and the prediction result of the model is likely to be affected by the small perturbations added to the samples by the adversary. In this paper, we propose a two-layer dynamic defense method based on defensive techniques pool and retrained branch model pool. First, we randomly select defense methods from the defense pool to process the input. The perturbation ability of the adversarial samples preprocessed by different defense methods changed, which would produce different classification results. In addition, we conduct adversarial training based on the original model and dynamically generate multiple branch models. The classification results of these branch models for the same adversarial sample is inconsistent. We can detect the adversarial samples by using the inconsistencies in the output results of the two layers. The experimental results show that the two-layer dynamic defense method we designed achieves a good defense effect.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114207361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Flexible Deployment Scheme for Virtual Network Function Based on Reinforcement Learning 一种基于强化学习的虚拟网络功能灵活部署方案
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344881
J. Yao, Meijuan Chen
Network function virtualization (NFV) technology is widely used in network slicing in 5G networks and traffic processing in wide area network. However, with the increasing of service requests during the life cycle of a virtual network function (VNF), how to flexibly deploy the VNF becomes a key problem to make maximum use of the limited capacity of the physical network resources, and meanwhile satisfy the requirements of quality of service (QoS) in NFV scenario. In this paper, aiming to solve whether and how to scale VNF on demand, we formulated this problem as a non-convex linear mathematical optimization model where the optimization goal is to minimize the delay and energy consumption of the service function chain (SFC). Specifically, we propose a VNF flexible deployment scheme based on Reinforcement Learning (RL). Moreover, we train the agent by interacting with the physical network environment and take action according to the state of physical node to find the optimal physical resource allocation strategy of the VNF scaling. In addition, the state space, action space and the reward function are defined as available resource, migration or scaling decision and the reciprocal of total cost respectively. Extensive simulation results demonstrate that the proposed algorithm outperforms the comparison algorithm in terms of reducing the delay and increasing the ratio of successful scaling request.
网络功能虚拟化(NFV)技术广泛应用于5G网络的网络切片和广域网的流量处理。然而,随着虚拟网络功能(VNF)生命周期中业务需求的不断增加,如何灵活部署VNF成为最大限度地利用有限的物理网络资源容量,同时满足NFV场景下服务质量(QoS)要求的关键问题。本文针对VNF是否可按需扩展以及如何按需扩展的问题,将该问题表述为以业务功能链(SFC)的时延和能耗最小为优化目标的非凸线性数学优化模型。具体来说,我们提出了一种基于强化学习(RL)的VNF灵活部署方案。此外,我们通过与物理网络环境的交互来训练agent,并根据物理节点的状态采取行动,找到VNF扩展的最优物理资源分配策略。将状态空间、行动空间和奖励函数分别定义为可用资源、迁移或缩放决策和总成本的倒数。大量的仿真结果表明,该算法在降低延迟和提高缩放请求成功率方面优于比较算法。
{"title":"A Flexible Deployment Scheme for Virtual Network Function Based on Reinforcement Learning","authors":"J. Yao, Meijuan Chen","doi":"10.1109/ICCC51575.2020.9344881","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344881","url":null,"abstract":"Network function virtualization (NFV) technology is widely used in network slicing in 5G networks and traffic processing in wide area network. However, with the increasing of service requests during the life cycle of a virtual network function (VNF), how to flexibly deploy the VNF becomes a key problem to make maximum use of the limited capacity of the physical network resources, and meanwhile satisfy the requirements of quality of service (QoS) in NFV scenario. In this paper, aiming to solve whether and how to scale VNF on demand, we formulated this problem as a non-convex linear mathematical optimization model where the optimization goal is to minimize the delay and energy consumption of the service function chain (SFC). Specifically, we propose a VNF flexible deployment scheme based on Reinforcement Learning (RL). Moreover, we train the agent by interacting with the physical network environment and take action according to the state of physical node to find the optimal physical resource allocation strategy of the VNF scaling. In addition, the state space, action space and the reward function are defined as available resource, migration or scaling decision and the reciprocal of total cost respectively. Extensive simulation results demonstrate that the proposed algorithm outperforms the comparison algorithm in terms of reducing the delay and increasing the ratio of successful scaling request.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121145063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence Security Issues and Responses 人工智能安全问题与应对
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9345035
Haobo Zhao, Liquan Chen
As a current disruptive and transformative technology, artificial intelligence is constantly infiltrating all aspects of production and life. However, with the in-depth development and application of artificial intelligence, the security challenges it faces have become more and more prominent. In the real world, attacks against intelligent systems such as the Internet of Things, smart homes, and driverless cars are constantly appearing, and incidents of artificial intelligence being used in cyber-attacks and cybercrimes frequently occur. This article aims to discuss artificial intelligence security issues and propose some countermeasures.
人工智能作为当下一项颠覆性、变革性的技术,正在不断渗透到生产生活的方方面面。然而,随着人工智能的深入发展和应用,其面临的安全挑战也越来越突出。在现实世界中,针对物联网、智能家居、无人驾驶汽车等智能系统的攻击层出不穷,人工智能被用于网络攻击和网络犯罪的事件频频发生。本文旨在探讨人工智能安全问题,并提出一些对策。
{"title":"Artificial Intelligence Security Issues and Responses","authors":"Haobo Zhao, Liquan Chen","doi":"10.1109/ICCC51575.2020.9345035","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9345035","url":null,"abstract":"As a current disruptive and transformative technology, artificial intelligence is constantly infiltrating all aspects of production and life. However, with the in-depth development and application of artificial intelligence, the security challenges it faces have become more and more prominent. In the real world, attacks against intelligent systems such as the Internet of Things, smart homes, and driverless cars are constantly appearing, and incidents of artificial intelligence being used in cyber-attacks and cybercrimes frequently occur. This article aims to discuss artificial intelligence security issues and propose some countermeasures.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116666620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node Location and Route Optimization of a Two-layer Underground Logistics Network 双层地下物流网络节点定位与路径优化
Pub Date : 2020-12-11 DOI: 10.1109/ICCC51575.2020.9344930
Xia Liu, Nan Li
With increasing logistics demand and congested surface traffic, underground logistics transportation system has gradually become a forward-looking research and trend. Based on regional center location and logistics demand of logistics parks and regions in an area, this paper builds an underground two-layer logistics system model. Considering constraints such as daily freight volume and service radius of each logistics node, the daily total cost of underground logistics system is minimized. Logistics nodes are selected by K-means and branch and bound method, and network routes are optimized by shortest path method and genetic algorithm. Based on the example data, the node composition, node location and connection route between nodes of the underground logistics network are given.
随着物流需求的增加和地面交通的拥堵,地下物流运输系统逐渐成为一种前瞻性的研究和趋势。基于区域中心位置和区域内物流园区及区域的物流需求,构建地下两层物流系统模型。考虑各物流节点日货运量、服务半径等约束,使地下物流系统日总成本最小化。采用k -均值法和分支定界法选择物流节点,采用最短路径法和遗传算法优化网络路径。根据实例数据,给出了地下物流网络的节点组成、节点位置和节点间的连接路线。
{"title":"Node Location and Route Optimization of a Two-layer Underground Logistics Network","authors":"Xia Liu, Nan Li","doi":"10.1109/ICCC51575.2020.9344930","DOIUrl":"https://doi.org/10.1109/ICCC51575.2020.9344930","url":null,"abstract":"With increasing logistics demand and congested surface traffic, underground logistics transportation system has gradually become a forward-looking research and trend. Based on regional center location and logistics demand of logistics parks and regions in an area, this paper builds an underground two-layer logistics system model. Considering constraints such as daily freight volume and service radius of each logistics node, the daily total cost of underground logistics system is minimized. Logistics nodes are selected by K-means and branch and bound method, and network routes are optimized by shortest path method and genetic algorithm. Based on the example data, the node composition, node location and connection route between nodes of the underground logistics network are given.","PeriodicalId":386048,"journal":{"name":"2020 IEEE 6th International Conference on Computer and Communications (ICCC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124936640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE 6th International Conference on Computer and Communications (ICCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1