首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
AttentionAE: Autoencoder for Anomaly Detection in Attributed Networks 关注ae:基于自编码器的属性网络异常检测
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00089
Kenan Qin, Yihui Zhou, Bo Tian, Rui Wang
Anomaly detection in attributed networks is to find nodes that deviate from the behavior patterns of most nodes, which is widely used in social network false account detection or network intrusion detection and so on. However, most existing methods only focus on one aspect of network either network structure or node attributes, ignoring the interaction between network structure and node attributes. Meanwhile, they regard reconstruction error as node anomaly score, which lacks considering the other factors for computing score. Therefore, in this paper, we propose a method for attributed network anomaly detection based on an autoencoder considering the node attention mechanism and an anomaly score generator. The autoencoder considers not only network structure but also node attributes to obtain a higher-quality embedded representation. Meanwhile, the decoder reconstructs the adjacency matrix and calculates the reconstruction error. The anomaly score generator uses a multi-layer perceptron (MLP) as the basic framework. In addition, in order to better consider the calculation of the node anomaly score by the reconstruction error, we concatenate the reconstruction error, reconstruct the residual direction vector and embedding vector to construct input vector for training MLP. At last, the final output is node anomaly score, and anomaly detection achieved. Experiments on three real-world datasets prove the effectiveness of our method.
属性网络中的异常检测是发现偏离大多数节点行为模式的节点,广泛应用于社交网络虚假账户检测或网络入侵检测等。然而,现有的方法大多只关注网络结构或节点属性的一个方面,忽略了网络结构与节点属性之间的相互作用。同时,将重构误差作为节点异常评分,在计算评分时缺少考虑其他因素。因此,在本文中,我们提出了一种基于自编码器的基于节点注意机制和异常评分生成器的属性网络异常检测方法。自编码器不仅考虑网络结构,还考虑节点属性,以获得更高质量的嵌入表示。同时,解码器对邻接矩阵进行重构并计算重构误差。异常评分生成器采用多层感知器(MLP)作为基本框架。此外,为了更好地考虑重构误差对节点异常评分的计算,我们将重构误差串接起来,重构残差方向向量和嵌入向量,构造用于训练MLP的输入向量。最后输出节点异常评分,实现异常检测。在三个真实数据集上的实验证明了该方法的有效性。
{"title":"AttentionAE: Autoencoder for Anomaly Detection in Attributed Networks","authors":"Kenan Qin, Yihui Zhou, Bo Tian, Rui Wang","doi":"10.1109/NaNA53684.2021.00089","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00089","url":null,"abstract":"Anomaly detection in attributed networks is to find nodes that deviate from the behavior patterns of most nodes, which is widely used in social network false account detection or network intrusion detection and so on. However, most existing methods only focus on one aspect of network either network structure or node attributes, ignoring the interaction between network structure and node attributes. Meanwhile, they regard reconstruction error as node anomaly score, which lacks considering the other factors for computing score. Therefore, in this paper, we propose a method for attributed network anomaly detection based on an autoencoder considering the node attention mechanism and an anomaly score generator. The autoencoder considers not only network structure but also node attributes to obtain a higher-quality embedded representation. Meanwhile, the decoder reconstructs the adjacency matrix and calculates the reconstruction error. The anomaly score generator uses a multi-layer perceptron (MLP) as the basic framework. In addition, in order to better consider the calculation of the node anomaly score by the reconstruction error, we concatenate the reconstruction error, reconstruct the residual direction vector and embedding vector to construct input vector for training MLP. At last, the final output is node anomaly score, and anomaly detection achieved. Experiments on three real-world datasets prove the effectiveness of our method.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123046440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens 你能看,但你不能拍:屏幕上视频的智能内容保护方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00078
Zhihao Xu, Kezhang Lin, Zhiwei Zhang, Wangzhe Xu, K. Liu, Bin Wang, Xinghui Zhu, Jiadong Chen
Nowadays, with the development of digital image, video, and other multimedia visualization techniques, electronic screens are ubiquitous in various scenarios, and these screens provide vivid communication and presentation methods. Unfortunately, at the same time, the security and safety defenders have noticed that it is more and more difficult to prevent people from photographing the contents on the screens, especially when the photographic equipment is undergoing miniaturization and intelligentization, and that promotes the information and privacy leakage inevitably. There are plenty of technical solutions that have been proposed previously, but few of the exiting schemes are feasible for daily and widespread applications because most of them require some additional and customized hardware to be mounted on the screens or audiences. Therefore, in this paper, we propose an intelligent content protection scheme for videos on screens, which is designed to prevent audiences from photographing the entire picture of the screen while having no observable influence for direct observation with naked eyes. Furthermore, our experiments demonstrate that, for the 1080P and 60 fps videos on ordinary LCD screens, our scheme outperforms the existing schemes in terms of occlusion rate, effective distance and so on.
如今,随着数字图像、视频等多媒体可视化技术的发展,电子屏幕在各种场景中无处不在,这些屏幕提供了生动的交流和呈现方式。不幸的是,与此同时,安防和安全捍卫者已经注意到,防止人们对屏幕上的内容进行拍摄越来越困难,特别是在摄影设备正在经历小型化和智能化的情况下,这不可避免地促进了信息和隐私的泄露。以前已经提出了许多技术解决方案,但现有的方案很少适用于日常和广泛的应用程序,因为大多数方案都需要在屏幕或观众上安装一些额外的定制硬件。因此,在本文中,我们提出了一种针对屏幕视频的智能内容保护方案,该方案旨在防止观众拍摄屏幕的整个画面,同时对肉眼直接观察没有明显的影响。此外,我们的实验表明,对于普通LCD屏幕上的1080P和60fps视频,我们的方案在遮挡率、有效距离等方面优于现有方案。
{"title":"You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens","authors":"Zhihao Xu, Kezhang Lin, Zhiwei Zhang, Wangzhe Xu, K. Liu, Bin Wang, Xinghui Zhu, Jiadong Chen","doi":"10.1109/NaNA53684.2021.00078","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00078","url":null,"abstract":"Nowadays, with the development of digital image, video, and other multimedia visualization techniques, electronic screens are ubiquitous in various scenarios, and these screens provide vivid communication and presentation methods. Unfortunately, at the same time, the security and safety defenders have noticed that it is more and more difficult to prevent people from photographing the contents on the screens, especially when the photographic equipment is undergoing miniaturization and intelligentization, and that promotes the information and privacy leakage inevitably. There are plenty of technical solutions that have been proposed previously, but few of the exiting schemes are feasible for daily and widespread applications because most of them require some additional and customized hardware to be mounted on the screens or audiences. Therefore, in this paper, we propose an intelligent content protection scheme for videos on screens, which is designed to prevent audiences from photographing the entire picture of the screen while having no observable influence for direct observation with naked eyes. Furthermore, our experiments demonstrate that, for the 1080P and 60 fps videos on ordinary LCD screens, our scheme outperforms the existing schemes in terms of occlusion rate, effective distance and so on.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115986952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UAV Deployment with Flexible Height Under SINR Constraint SINR约束下柔性高度无人机部署
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00085
Ke Zhao, Limei Peng
This paper proposes using UAVs as auxiliary flying relays between IoT access points (APs) and terrestrial base stations/satellites. Specifically, we consider the 3D deployment of multiple UAVs above a given area of APs, aiming at providing efficient services to the APs while optimizing the overall performance of UAVs. In particular, we aim to minimize the number of required UAV flights when serving the APs within a demanded time, which is constrained by the total available power of UAVs, and maximize the total number of successfully served APs. For this, we propose an integer linear programming (ILP) model that can achieve the above goals by adjusting the UAV hovering heights in the appropriately selected coordinates. The proposed ILP model is evaluated when considering interference among the multiple UAVs and compared with the schemes based on fixed heights. The numerical results show that the proposed ILP model can automatically adjust the flying height of UAVs to reduce the flights when complying with the constraints of the signal-to-interference-noise ratio (SINR) threshold and the number of APs to be served.
本文建议使用无人机作为物联网接入点(ap)和地面基站/卫星之间的辅助飞行中继。具体而言,我们考虑在给定ap区域上方部署多架无人机,旨在为ap提供高效的服务,同时优化无人机的整体性能。我们的目标是在无人机总可用功率的约束下,在一定的服务时间内,使服务ap所需的无人机飞行次数最少,并使成功服务ap的总数最大化。为此,我们提出了一个整数线性规划(ILP)模型,该模型可以通过在适当选择的坐标上调整无人机的悬停高度来实现上述目标。在考虑多无人机干扰的情况下,对所提出的ILP模型进行了评估,并与基于固定高度的方案进行了比较。仿真结果表明,在满足信噪比(SINR)阈值和服务ap数约束的情况下,所提出的ILP模型能够自动调整无人机的飞行高度以减少飞行次数。
{"title":"UAV Deployment with Flexible Height Under SINR Constraint","authors":"Ke Zhao, Limei Peng","doi":"10.1109/NaNA53684.2021.00085","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00085","url":null,"abstract":"This paper proposes using UAVs as auxiliary flying relays between IoT access points (APs) and terrestrial base stations/satellites. Specifically, we consider the 3D deployment of multiple UAVs above a given area of APs, aiming at providing efficient services to the APs while optimizing the overall performance of UAVs. In particular, we aim to minimize the number of required UAV flights when serving the APs within a demanded time, which is constrained by the total available power of UAVs, and maximize the total number of successfully served APs. For this, we propose an integer linear programming (ILP) model that can achieve the above goals by adjusting the UAV hovering heights in the appropriately selected coordinates. The proposed ILP model is evaluated when considering interference among the multiple UAVs and compared with the schemes based on fixed heights. The numerical results show that the proposed ILP model can automatically adjust the flying height of UAVs to reduce the flights when complying with the constraints of the signal-to-interference-noise ratio (SINR) threshold and the number of APs to be served.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117300450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Random verifiable multi-server searchable encryption scheme 随机可验证的多服务器可搜索加密方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00023
Yu He, Youliang Tian, Huanliang Xu
In order to solve the problem of difficult verification of query results in searchable encryption, we used the idea of Shamir-secret sharing, combined with game theory, to construct a randomly verifiable multi-cloud server searchable encryption scheme to achieve the correctness of the query results in the cloud storage environment verify. Firstly, we using the Shamir-secret sharing technology, the encrypted data is stored on each independent server to construct a multi-cloud server model to realize the secure distributed storage and efficient query of data. Secondly, combined with game theory, a game tree of query server and verification server is constructed to ensure honesty while being efficient, and solve the problem of difficulty in returning search results to verify under the multi-cloud server model. Finally, security analysis and experimental analysis show that this solution effectively protects data privacy while significantly reducing retrieval time.
为了解决查询结果在可搜索加密中难以验证的问题,我们采用Shamir-secret共享的思想,结合博弈论,构建了一个随机可验证的多云服务器可搜索加密方案,实现了查询结果在云存储环境下的正确性验证。首先,我们采用Shamir-secret共享技术,将加密后的数据存储在各个独立的服务器上,构建多云服务器模型,实现数据的安全分布式存储和高效查询。其次,结合博弈论,构建查询服务器和验证服务器的博弈树,在保证诚信的同时保证效率,解决多云服务器模型下搜索结果难以返回验证的问题。最后,安全性分析和实验分析表明,该方案在有效保护数据隐私的同时,显著减少了检索时间。
{"title":"Random verifiable multi-server searchable encryption scheme","authors":"Yu He, Youliang Tian, Huanliang Xu","doi":"10.1109/NaNA53684.2021.00023","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00023","url":null,"abstract":"In order to solve the problem of difficult verification of query results in searchable encryption, we used the idea of Shamir-secret sharing, combined with game theory, to construct a randomly verifiable multi-cloud server searchable encryption scheme to achieve the correctness of the query results in the cloud storage environment verify. Firstly, we using the Shamir-secret sharing technology, the encrypted data is stored on each independent server to construct a multi-cloud server model to realize the secure distributed storage and efficient query of data. Secondly, combined with game theory, a game tree of query server and verification server is constructed to ensure honesty while being efficient, and solve the problem of difficulty in returning search results to verify under the multi-cloud server model. Finally, security analysis and experimental analysis show that this solution effectively protects data privacy while significantly reducing retrieval time.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network application vulnerability detection based on fuzzing technology 基于模糊测试技术的网络应用漏洞检测
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00067
Chen Chong, Zou Ping
In recent years, the vulnerabilities of network applications have frequently appeared, which has made the mining of vulnerabilities more and more concerned in recent years, because once the vulnerabilities caused by network applications are exploited, they will cause high-level security problems and have a big impact. AFL (American Fuzzy Lop) is a mutation-based fuzzing technology, and it is also one of the most popular and effective fuzzing tools. It has good performance and performance in mining vulnerabilities. Aiming at network applications and based on AFL, this paper optimizes the framework’s deficiencies in seed generation and seed selection, and designs and implements a higher-performance vulnerability detection tool. In the aspect of seed generation, the PSO (particle swarm optimization) algorithm is used to modify some related algorithms in the mutation stage of AFL to optimize the operator selection process in this stage. Instead of using the fixed selection algorithm, the current operator environment and the previous operator environment are considered in each operator selection to make a decision. In the aspect of seed selection, we model the number of mutation times needed by the seeds to generate new paths, give priority to the seeds that execute low-frequency paths, and give them higher mutation times, that is, the power of the seeds, so as to improve the utilization efficiency of the seeds and obtain more path coverage.
近年来,网络应用的漏洞频繁出现,使得漏洞的挖掘近年来越来越受到关注,因为网络应用造成的漏洞一旦被利用,将会造成高层次的安全问题,影响很大。AFL (American Fuzzy Lop)是一种基于突变的模糊技术,也是目前最流行、最有效的模糊测试工具之一。它具有良好的性能和漏洞挖掘性能。本文针对网络应用,基于AFL,优化框架在种子生成和种子选择方面的不足,设计并实现了一个性能更高的漏洞检测工具。在种子生成方面,利用粒子群优化(PSO)算法对AFL突变阶段的相关算法进行修改,优化该阶段的算子选择过程。而不是使用固定的选择算法,在每次算子选择中考虑当前算子环境和以前的算子环境来做出决策。在种子选择方面,我们对种子产生新路径所需的突变次数进行建模,优先考虑执行低频路径的种子,并赋予其更高的突变次数,即种子的功率,从而提高种子的利用效率,获得更大的路径覆盖率。
{"title":"Network application vulnerability detection based on fuzzing technology","authors":"Chen Chong, Zou Ping","doi":"10.1109/NaNA53684.2021.00067","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00067","url":null,"abstract":"In recent years, the vulnerabilities of network applications have frequently appeared, which has made the mining of vulnerabilities more and more concerned in recent years, because once the vulnerabilities caused by network applications are exploited, they will cause high-level security problems and have a big impact. AFL (American Fuzzy Lop) is a mutation-based fuzzing technology, and it is also one of the most popular and effective fuzzing tools. It has good performance and performance in mining vulnerabilities. Aiming at network applications and based on AFL, this paper optimizes the framework’s deficiencies in seed generation and seed selection, and designs and implements a higher-performance vulnerability detection tool. In the aspect of seed generation, the PSO (particle swarm optimization) algorithm is used to modify some related algorithms in the mutation stage of AFL to optimize the operator selection process in this stage. Instead of using the fixed selection algorithm, the current operator environment and the previous operator environment are considered in each operator selection to make a decision. In the aspect of seed selection, we model the number of mutation times needed by the seeds to generate new paths, give priority to the seeds that execute low-frequency paths, and give them higher mutation times, that is, the power of the seeds, so as to improve the utilization efficiency of the seeds and obtain more path coverage.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-domain Feature Extraction for Human Activity Recognition Using Wearable Sensors 基于可穿戴传感器的人体活动识别多域特征提取
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00051
Aiguo Wang, Yue Meng, Jinjun Liu, Shenghui Zhao, Guilin Chen
The extraction and use of features from the raw sensor data plays an extremely crucial role in determining the recognition performance of an activity recognizer. Existing studies aim to train an accurate prediction model by extracting different features, however, few of them systematically investigate the power of features from different domains when they are used separately or jointly. To this end, we conduct a comparative study on multi-domain feature extraction for human activity recognition. Specifically, we first extract features from the time-, frequency-, and wavelet-domains, and then use different combinations of the three domain features to build activity recognizers. Finally, comparative experiments are performed on two activity recognition datasets and four classification models are used to avoid selection bias. Results indicate the superiority of using time-domain or frequency-domain features over wavelet features in terms of prediction performance and also show that the simultaneous use of multi-domain features generally generalizes better across datasets and classifiers, indicating that they, to a certain extent, contain complementary feature information.
从原始传感器数据中提取和使用特征对活动识别器的识别性能起着至关重要的作用。现有的研究旨在通过提取不同的特征来训练准确的预测模型,但很少有研究系统地研究不同领域的特征在单独或联合使用时的作用。为此,我们对多域特征提取用于人体活动识别进行了比较研究。具体来说,我们首先从时间域、频率域和小波域提取特征,然后使用三个域特征的不同组合来构建活动识别器。最后,在两个活动识别数据集上进行了对比实验,并使用了四种分类模型来避免选择偏差。结果表明,使用时域或频域特征在预测性能上优于小波特征,同时使用多域特征在数据集和分类器之间的泛化效果更好,这表明它们在一定程度上包含互补的特征信息。
{"title":"Multi-domain Feature Extraction for Human Activity Recognition Using Wearable Sensors","authors":"Aiguo Wang, Yue Meng, Jinjun Liu, Shenghui Zhao, Guilin Chen","doi":"10.1109/NaNA53684.2021.00051","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00051","url":null,"abstract":"The extraction and use of features from the raw sensor data plays an extremely crucial role in determining the recognition performance of an activity recognizer. Existing studies aim to train an accurate prediction model by extracting different features, however, few of them systematically investigate the power of features from different domains when they are used separately or jointly. To this end, we conduct a comparative study on multi-domain feature extraction for human activity recognition. Specifically, we first extract features from the time-, frequency-, and wavelet-domains, and then use different combinations of the three domain features to build activity recognizers. Finally, comparative experiments are performed on two activity recognition datasets and four classification models are used to avoid selection bias. Results indicate the superiority of using time-domain or frequency-domain features over wavelet features in terms of prediction performance and also show that the simultaneous use of multi-domain features generally generalizes better across datasets and classifiers, indicating that they, to a certain extent, contain complementary feature information.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122098996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of Simulation Teaching Mode for Intelligent Information Network Course 智能信息网络课程模拟教学模式探索
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00076
Yue He, Hui Li, Yiming Li, Qiang Wu, Yuefeng Ji, Rentao Gu, Shaobin Fan
With the rapid development of information technology, the society’s demand for information technology talents has become particularly high; how colleges and universities devote themselves to cultivating professional information technology talents is an important direction at present. However, the teacher’s evaluation method stays at the exam-oriented education. In the university education, in order to help students with basic professional knowledge to learn more professional knowledge and skills, and to help teachers understand the characteristics of students more objectively, this article discusses how to improve the existing teaching environment and simulation teaching mode. A simulation teaching platform for the “Intelligent Information Network” course is designed with multiple modules for complex network construction. Through the online network simulation teaching platform and the feedback obtained from the platform’s use, different students’ different problems can be found objectively, and the combination of theory and engineering, the combination of new and old knowledge, and the simplicity of complex software can be realized.
随着信息技术的飞速发展,社会对信息技术人才的需求变得特别高;高校如何致力于培养专业信息技术人才是当前的一个重要方向。然而,教师的评价方法仍停留在应试教育。在大学教育中,为了帮助具备基础专业知识的学生学习更多的专业知识和技能,也为了帮助教师更客观地了解学生的特点,本文探讨了如何改进现有的教学环境和模拟教学模式。设计了“智能信息网络”课程模拟教学平台,针对复杂网络结构设计了多个模块。通过在线网络仿真教学平台以及平台使用过程中获得的反馈,可以客观发现不同学生的不同问题,实现理论与工程的结合、新知识与旧知识的结合、复杂软件的简化。
{"title":"Exploration of Simulation Teaching Mode for Intelligent Information Network Course","authors":"Yue He, Hui Li, Yiming Li, Qiang Wu, Yuefeng Ji, Rentao Gu, Shaobin Fan","doi":"10.1109/NaNA53684.2021.00076","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00076","url":null,"abstract":"With the rapid development of information technology, the society’s demand for information technology talents has become particularly high; how colleges and universities devote themselves to cultivating professional information technology talents is an important direction at present. However, the teacher’s evaluation method stays at the exam-oriented education. In the university education, in order to help students with basic professional knowledge to learn more professional knowledge and skills, and to help teachers understand the characteristics of students more objectively, this article discusses how to improve the existing teaching environment and simulation teaching mode. A simulation teaching platform for the “Intelligent Information Network” course is designed with multiple modules for complex network construction. Through the online network simulation teaching platform and the feedback obtained from the platform’s use, different students’ different problems can be found objectively, and the combination of theory and engineering, the combination of new and old knowledge, and the simplicity of complex software can be realized.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123244878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety 基于注意力的CNN-CATBOOST驾驶安全风险预测模型
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00095
Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu
Risk prediction is one of the most important tasks in assistant and automatic driving. In recent years, by the help of VANET and various sensors in the cars, the status of cars and roads can be collected in real time and used for data-driven based driving risk prediction. However, it is challenging to predict the driving risk due to the complex relationship between multiple environment factors like location, weather, time etc. Thus, a deep learning model ConvCatb was proposed in this paper, which improves the attention mechanism to the traditional Convolutional Neural Networks, and combines the CatBoost algorithm to predict the current driving safety. The main idea is to emphasize the combination relationship between driving environment features through Non-local attention mechanism, and then use CatBoost to replace the softmax of CNN for classification. Finally, the experiment results show that the ConvCatb achieved superiorities in accuracy and F1-score, compared with existing schemes.
风险预测是辅助驾驶和自动驾驶中最重要的任务之一。近年来,借助VANET和车内的各种传感器,可以实时收集汽车和道路的状态,并用于基于数据驱动的驾驶风险预测。然而,由于地点、天气、时间等多种环境因素之间的复杂关系,对驾驶风险的预测具有一定的挑战性。为此,本文提出了一种深度学习模型ConvCatb,该模型改进了传统卷积神经网络的注意机制,并结合CatBoost算法对当前驾驶安全进行预测。主要思路是通过非局部注意机制强调驾驶环境特征之间的组合关系,然后使用CatBoost代替CNN的softmax进行分类。最后,实验结果表明,与现有方案相比,该方案在准确率和f1分数方面具有优势。
{"title":"ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety","authors":"Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu","doi":"10.1109/NaNA53684.2021.00095","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00095","url":null,"abstract":"Risk prediction is one of the most important tasks in assistant and automatic driving. In recent years, by the help of VANET and various sensors in the cars, the status of cars and roads can be collected in real time and used for data-driven based driving risk prediction. However, it is challenging to predict the driving risk due to the complex relationship between multiple environment factors like location, weather, time etc. Thus, a deep learning model ConvCatb was proposed in this paper, which improves the attention mechanism to the traditional Convolutional Neural Networks, and combines the CatBoost algorithm to predict the current driving safety. The main idea is to emphasize the combination relationship between driving environment features through Non-local attention mechanism, and then use CatBoost to replace the softmax of CNN for classification. Finally, the experiment results show that the ConvCatb achieved superiorities in accuracy and F1-score, compared with existing schemes.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126260225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Proposal of Large Scale Network Route Optimization Technique Based on Genetic Algorithm 一种基于遗传算法的大规模网络路由优化技术
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00053
Yusuke Noda, B. P. Gautam
Routing optimization is an essential computational mechanism for Internet service providers seeking to optimize network performance and traffic delivery. In order to address the problems of routing optimization, various types of routing optimization algorithms are reported till date. Genetic algorithm (GA) is one of the most popular meta-heuristic combinatorial optimization algorithms, which has been widely used for various optimization problems including network route optimization. In this study, we demonstrated how to find an optimized network path between designated source and destination in a given network with 95 nodes and 200 links using the GA. Our result shows that the GA with the lower mutation probability for reducing the wasteful search space is a comprehensive approach in this study in terms of computational challenges and routing optimization. Our investigation concludes that the GA is an efficient and alternative method of finding an optimal route so as to achieve the desired network performance and to reduce congestion control.
路由优化是互联网服务提供商寻求优化网络性能和流量传递的基本计算机制。为了解决路由优化问题,迄今为止报道了各种类型的路由优化算法。遗传算法(GA)是目前最流行的元启发式组合优化算法之一,已广泛应用于网络路由优化等各种优化问题。在本研究中,我们演示了如何使用遗传算法在给定的95个节点和200条链路的网络中找到指定源和目的地之间的优化网络路径。我们的研究结果表明,在计算挑战和路由优化方面,具有较低突变概率的遗传算法是本研究中减少浪费的搜索空间的综合方法。我们的研究表明,遗传算法是一种有效的替代方法,可以找到最优路由,从而达到理想的网络性能并减少拥塞控制。
{"title":"A Proposal of Large Scale Network Route Optimization Technique Based on Genetic Algorithm","authors":"Yusuke Noda, B. P. Gautam","doi":"10.1109/NaNA53684.2021.00053","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00053","url":null,"abstract":"Routing optimization is an essential computational mechanism for Internet service providers seeking to optimize network performance and traffic delivery. In order to address the problems of routing optimization, various types of routing optimization algorithms are reported till date. Genetic algorithm (GA) is one of the most popular meta-heuristic combinatorial optimization algorithms, which has been widely used for various optimization problems including network route optimization. In this study, we demonstrated how to find an optimized network path between designated source and destination in a given network with 95 nodes and 200 links using the GA. Our result shows that the GA with the lower mutation probability for reducing the wasteful search space is a comprehensive approach in this study in terms of computational challenges and routing optimization. Our investigation concludes that the GA is an efficient and alternative method of finding an optimal route so as to achieve the desired network performance and to reduce congestion control.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"138 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130892898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving Proximity Detection Framework for Location-Based Services 基于位置服务的隐私保护接近检测框架
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00025
Chen Yang, Zhen Jia, Shundong Li
With the popularization of mobile communication and sensing equipment, as well as the rapid development of location-aware technology and wireless communication technology, LBSs(Location-based services) bring convenience to people’s lives and enable people to arrange activities more efficiently and reasonably. It can provide more flexible LBS proximity detection query, which has attracted widespread attention in recent years. However, the development of proximity detection query still faces many severe challenges including query information privacy. For example, when users want to ensure their location privacy and data security, they can get more secure location-based services. In this article, we propose an efficient and privacy-protecting proximity detection framework based on location services: PD(Proximity Detection). Through PD, users can query the range of arbitrary polygons and obtain accurate LBS results. Specifically, based on homomorphic encryption technology, an efficient PRQ(polygon range query) algorithm is constructed. With the help of PRQ, PD, you can obtain accurate polygon range query results through the encryption request and the services provided by the LAS(LBS Agent Server) and the CS(Cloud Server). In addition, the query privacy of the queryer and the information of the data provider are protected. The correctness proof and performance analysis show that the scheme is safe and feasible. Therefore, our scheme is suitable for many practical applications.
随着移动通信和传感设备的普及,以及位置感知技术和无线通信技术的快速发展,lbs (Location-based services)为人们的生活带来了便利,使人们能够更高效、合理地安排活动。它可以提供更灵活的LBS接近检测查询,近年来受到广泛关注。然而,接近检测查询的发展仍然面临着查询信息隐私等诸多严峻挑战。例如,当用户希望确保自己的位置隐私和数据安全时,他们可以获得更安全的基于位置的服务。在本文中,我们提出了一种高效且保护隐私的基于位置服务的接近检测框架:PD(proximity detection)。通过PD,用户可以查询任意多边形的范围,获得准确的LBS结果。具体而言,基于同态加密技术,构造了一种高效的多边形范围查询(PRQ)算法。在PRQ、PD的帮助下,通过加密请求和LAS(LBS Agent Server)、CS(Cloud Server)提供的服务,可以获得准确的多边形范围查询结果。此外,还保护了查询者的查询隐私和数据提供者的信息。正确性证明和性能分析表明该方案是安全可行的。因此,我们的方案适合于许多实际应用。
{"title":"Privacy-Preserving Proximity Detection Framework for Location-Based Services","authors":"Chen Yang, Zhen Jia, Shundong Li","doi":"10.1109/NaNA53684.2021.00025","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00025","url":null,"abstract":"With the popularization of mobile communication and sensing equipment, as well as the rapid development of location-aware technology and wireless communication technology, LBSs(Location-based services) bring convenience to people’s lives and enable people to arrange activities more efficiently and reasonably. It can provide more flexible LBS proximity detection query, which has attracted widespread attention in recent years. However, the development of proximity detection query still faces many severe challenges including query information privacy. For example, when users want to ensure their location privacy and data security, they can get more secure location-based services. In this article, we propose an efficient and privacy-protecting proximity detection framework based on location services: PD(Proximity Detection). Through PD, users can query the range of arbitrary polygons and obtain accurate LBS results. Specifically, based on homomorphic encryption technology, an efficient PRQ(polygon range query) algorithm is constructed. With the help of PRQ, PD, you can obtain accurate polygon range query results through the encryption request and the services provided by the LAS(LBS Agent Server) and the CS(Cloud Server). In addition, the query privacy of the queryer and the information of the data provider are protected. The correctness proof and performance analysis show that the scheme is safe and feasible. Therefore, our scheme is suitable for many practical applications.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134083552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1