首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Experimental Demonstration of End-to-End Service Orchestration Architecture based on Northbound API 基于北向API的端到端服务编排体系结构实验演示
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00046
Yanxia Tan, Yong Zhang, Yanlei Zheng, Yacheng Liu, Guangquan Wang, Yuefeng Ji
End-to-end interoperability between different vendors is fundamental for network operators to take advantage of all features of SDN. However, the chimney deployment of operator network cannot efficiently support the end-to-end service distribution and centralized maintenance requirements. Therefore, it is important to realize end-to-end service provisioning and agile opening for operators. This paper first introduces the proposed end-to-end orchestration architecture based on cloud-network collaboration. And then we briefly introduce the corresponding microservice architecture and the northbound interface of OTN network and IP network controller. Meanwhile, this paper demonstrates and validates the provisioning of constrained connectivity end-to-end services in multi-domain and multivendor SDOTN networks based on Extended ACTN Interface Model. The demonstration results show that access OTN equipment can decoupled with Metropolitan area network (MAN) OTN equipment, and it can realizes the low-cost and fast access of private line service on the orchestration system.
不同供应商之间的端到端互操作性是网络运营商充分利用SDN所有特性的基础。然而,运营商网络的烟囱式部署无法有效支持端到端业务分布和集中维护需求。因此,为运营商实现端到端业务发放和敏捷开放显得尤为重要。本文首先介绍了基于云-网络协同的端到端业务流程架构。然后简要介绍了相应的微服务架构以及OTN网络和IP网络控制器的北向接口。同时,对基于扩展ACTN接口模型的多域多厂商SDOTN网络中受限连接端到端业务的提供进行了论证和验证。演示结果表明,接入OTN设备能够与城域网(MAN) OTN设备解耦,能够在业务流程系统上实现低成本、快速接入专线业务。
{"title":"Experimental Demonstration of End-to-End Service Orchestration Architecture based on Northbound API","authors":"Yanxia Tan, Yong Zhang, Yanlei Zheng, Yacheng Liu, Guangquan Wang, Yuefeng Ji","doi":"10.1109/NaNA53684.2021.00046","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00046","url":null,"abstract":"End-to-end interoperability between different vendors is fundamental for network operators to take advantage of all features of SDN. However, the chimney deployment of operator network cannot efficiently support the end-to-end service distribution and centralized maintenance requirements. Therefore, it is important to realize end-to-end service provisioning and agile opening for operators. This paper first introduces the proposed end-to-end orchestration architecture based on cloud-network collaboration. And then we briefly introduce the corresponding microservice architecture and the northbound interface of OTN network and IP network controller. Meanwhile, this paper demonstrates and validates the provisioning of constrained connectivity end-to-end services in multi-domain and multivendor SDOTN networks based on Extended ACTN Interface Model. The demonstration results show that access OTN equipment can decoupled with Metropolitan area network (MAN) OTN equipment, and it can realizes the low-cost and fast access of private line service on the orchestration system.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125637020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Construction Using Overlapping Histogram under Local Differential Privacy 局部差分隐私下基于重叠直方图的网络构建
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00088
Cuicui Niu, Zhengzhi Pan, Wuchao Shi, Hai Liu
Network construction is beneficial to extract global structural information from vector data. However, node-link information is easy to bring the problem of privacy leakage in network construction. Thus, we provided node-link preserving in network construction via overlapping histogram under local differential privacy. First, we present the general model of network construction using overlapping histogram under local differential privacy. Second, we present algorithm of random perturbation-linking in network construction via overlapping histogram to preserve node-link. Finally, our theoretical and experimental results show that the proposed scheme can achieve the tradeoff between node-link protection and network utility. The proposed scheme provides a basic method against node-link leakage in network construction via overlapping histogram.
网络构造有利于从矢量数据中提取全局结构信息。然而,节点链路信息在网络建设中容易带来隐私泄露问题。因此,我们在局部差分隐私下通过重叠直方图提供了网络构建中的节点-链路保留。首先,我们提出了局部差分隐私下使用重叠直方图构建网络的一般模型。其次,提出了利用重叠直方图构建网络的随机扰动连接算法,以保持节点连接。最后,理论和实验结果表明,该方案可以实现节点链路保护和网络效用之间的平衡。该方案通过重叠直方图提供了一种防止网络构建中节点链路泄漏的基本方法。
{"title":"Network Construction Using Overlapping Histogram under Local Differential Privacy","authors":"Cuicui Niu, Zhengzhi Pan, Wuchao Shi, Hai Liu","doi":"10.1109/NaNA53684.2021.00088","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00088","url":null,"abstract":"Network construction is beneficial to extract global structural information from vector data. However, node-link information is easy to bring the problem of privacy leakage in network construction. Thus, we provided node-link preserving in network construction via overlapping histogram under local differential privacy. First, we present the general model of network construction using overlapping histogram under local differential privacy. Second, we present algorithm of random perturbation-linking in network construction via overlapping histogram to preserve node-link. Finally, our theoretical and experimental results show that the proposed scheme can achieve the tradeoff between node-link protection and network utility. The proposed scheme provides a basic method against node-link leakage in network construction via overlapping histogram.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept Drift CD-SR:连续概念漂移的实时异常检测框架
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00040
Zhongyi Ding, Shujie Yang, Zhaoyang Liu, Tengchao Ma, Zichen Feng, Mingze Wang
System administrators need to monitor various metrics (network traffic, NTP offset, etc.) of their internal services in real-time as a way to determine whether anomalies occur in the system. Traditional Spectral Residual (SR) anomaly detection methods do not take into account the interference of certain human factors (e.g., changes in personal preferences) in certain scenarios, i.e., concept drift. In these scenarios, the accuracy of anomaly detection is bound to be affected. In order to guarantee the availability and stability of network services, we propose an intelligent and pervasive anomaly detection strategy, CD-SR. First, we use the traditional SR model and the SVM method to train the time series that have not drifted to determine the threshold value. Then, to solve the problem of the pervasiveness of application scenarios, we use a drift detection model to find the time series where concept drift occurs. Finally, the sequence where the concept drift occurs is imported into the drift adaptation model to complete the replacement of the old and new concepts, the data is processed in real-time, and the replaced data is detected again in the detection model for anomalies. In the experimental stage, we obtained several data metrics using the cloud platform system built by Openstack, and by comparing several mainstream anomaly detection algorithms, our method obtained superior results.
系统管理员需要实时监控其内部服务的各种指标(网络流量、NTP偏移量等),以确定系统中是否发生异常。传统的光谱残差(Spectral Residual, SR)异常检测方法没有考虑到某些人为因素(如个人偏好的变化)在某些场景下的干扰,即概念漂移。在这种情况下,异常检测的准确性必然会受到影响。为了保证网络服务的可用性和稳定性,我们提出了一种智能、普适的异常检测策略CD-SR。首先,我们使用传统的SR模型和SVM方法对未漂移的时间序列进行训练,确定阈值。然后,为了解决应用场景的普遍性问题,我们使用漂移检测模型来寻找发生概念漂移的时间序列。最后,将发生概念漂移的序列导入漂移自适应模型中,完成新旧概念的替换,对数据进行实时处理,替换后的数据在异常检测模型中再次检测。在实验阶段,我们利用Openstack搭建的云平台系统获得了多个数据指标,通过对比几种主流的异常检测算法,我们的方法获得了较好的结果。
{"title":"CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept Drift","authors":"Zhongyi Ding, Shujie Yang, Zhaoyang Liu, Tengchao Ma, Zichen Feng, Mingze Wang","doi":"10.1109/NaNA53684.2021.00040","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00040","url":null,"abstract":"System administrators need to monitor various metrics (network traffic, NTP offset, etc.) of their internal services in real-time as a way to determine whether anomalies occur in the system. Traditional Spectral Residual (SR) anomaly detection methods do not take into account the interference of certain human factors (e.g., changes in personal preferences) in certain scenarios, i.e., concept drift. In these scenarios, the accuracy of anomaly detection is bound to be affected. In order to guarantee the availability and stability of network services, we propose an intelligent and pervasive anomaly detection strategy, CD-SR. First, we use the traditional SR model and the SVM method to train the time series that have not drifted to determine the threshold value. Then, to solve the problem of the pervasiveness of application scenarios, we use a drift detection model to find the time series where concept drift occurs. Finally, the sequence where the concept drift occurs is imported into the drift adaptation model to complete the replacement of the old and new concepts, the data is processed in real-time, and the replaced data is detected again in the detection model for anomalies. In the experimental stage, we obtained several data metrics using the cloud platform system built by Openstack, and by comparing several mainstream anomaly detection algorithms, our method obtained superior results.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125079718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge Computing 基于边缘计算的人工智能与工业自动化课程研究综述
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00045
Mingbo Pan, Weibin Su, Yikai Wang
In the background of edge computing becoming an important technology of China’s new infrastructure construction, it is necessary for colleges and universities to set up a new professional curriculum system for edge computing. It is construction and learning from the refinement of artificial intelligence which is easier to industrialize. Through the interdisciplinary integration and optimization construction of the curriculum, this course system is suitable for universities. According to developed course content, design the teaching schedule, and then, based on this scheme, we will cultivate edge computing research and application-oriented talents, and support the transformation and upgrading of industrial automation to intelligent.
在边缘计算成为中国新基础设施建设重要技术的背景下,高校有必要建立新的边缘计算专业课程体系。是对人工智能的建构和提炼,更容易产业化。通过跨学科的整合和课程的优化建设,使该课程体系适合高校。根据制定的课程内容,设计教学时间表,并以此方案为基础,培养边缘计算研究型和应用型人才,支持工业自动化向智能化转型升级。
{"title":"Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge Computing","authors":"Mingbo Pan, Weibin Su, Yikai Wang","doi":"10.1109/NaNA53684.2021.00045","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00045","url":null,"abstract":"In the background of edge computing becoming an important technology of China’s new infrastructure construction, it is necessary for colleges and universities to set up a new professional curriculum system for edge computing. It is construction and learning from the refinement of artificial intelligence which is easier to industrialize. Through the interdisciplinary integration and optimization construction of the curriculum, this course system is suitable for universities. According to developed course content, design the teaching schedule, and then, based on this scheme, we will cultivate edge computing research and application-oriented talents, and support the transformation and upgrading of industrial automation to intelligent.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSI 基于统计CSI的波束空间HAP-MIMO系统波束选择算法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00016
Shiyi Zou, Ling-ge Jiang, Pingping Ji, Chen He, Di He, Guorong Zhang
In this letter, a beam selection algorithm is put forward for beamspace high altitude platform massive multiple-input multiple-output (HAP-MIMO) systems. Specifically, the algorithm is subject to the maximization of match degree between the beams and users, which is constructed by exploiting statistical channel state information (CSI). The beam selection is partitioned into two parts. In the first part, we obtain a reduced-dimensional dominant beam set consisting of each user’s most preferred beams according to the match degree. In the second part, we formulate the selection of optimal beams from the dominant beam set as an assignment problem that can be solved by Kuhn-Munkres algorithm. Numerical results demonstrate the performance enhancement of the proposed algorithm with respect to energy efficiency.
针对波束空间高空平台大规模多输入多输出(HAP-MIMO)系统,提出了一种波束选择算法。具体而言,该算法以波束与用户匹配度最大化为目标,利用统计信道状态信息(CSI)构建波束与用户匹配度。梁的选择分为两部分。在第一部分中,我们根据匹配度得到由每个用户最喜欢的光束组成的降维优势光束集。在第二部分中,我们将从优势波束集中选择最优波束的问题表述为一个可以用Kuhn-Munkres算法求解的分配问题。数值结果表明,该算法在能效方面得到了提高。
{"title":"Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSI","authors":"Shiyi Zou, Ling-ge Jiang, Pingping Ji, Chen He, Di He, Guorong Zhang","doi":"10.1109/NaNA53684.2021.00016","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00016","url":null,"abstract":"In this letter, a beam selection algorithm is put forward for beamspace high altitude platform massive multiple-input multiple-output (HAP-MIMO) systems. Specifically, the algorithm is subject to the maximization of match degree between the beams and users, which is constructed by exploiting statistical channel state information (CSI). The beam selection is partitioned into two parts. In the first part, we obtain a reduced-dimensional dominant beam set consisting of each user’s most preferred beams according to the match degree. In the second part, we formulate the selection of optimal beams from the dominant beam set as an assignment problem that can be solved by Kuhn-Munkres algorithm. Numerical results demonstrate the performance enhancement of the proposed algorithm with respect to energy efficiency.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1443 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127443524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Trade-off Between Privacy and Utility in Local Differential Privacy 局部差分隐私中隐私与效用的权衡
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00071
Mengqian Li, Youliang Tian, Junpeng Zhang, Dandan Fan, Dongmei Zhao
In statistical queries work, such as frequency estimation, the untrusted data collector could as an honest-but-curious (HbC) or malicious adversary to learn true values. Local differential privacy(LDP) protocols have been applied against the untrusted third party in data collecting. Nevertheless, excessive noise of LDP will reduce data utility, thus affecting the results of statistical queries. Therefore, it is significant to research the trade-off between privacy and utility. In this paper, we first measure the privacy loss by observing the maximum posterior confidence of the adversary (data collector). Then, through theoretical analysis and comparison we obtain the most suitable utility measure that is Wasserstein distance. Based on these, we introduce an originality framework for privacy-utility tradeoff framework, finding that this system conforms to the Pareto optimality state and formalizing a payoff function to find optimal equilibrium point under Pareto efficiency. Finally, we illustrate the efficacy of our system model by the Adult dataset from the UCI machine learning repository.
在统计查询工作中,例如频率估计,不受信任的数据收集器可以作为诚实但好奇(HbC)或恶意对手来学习真实值。在数据收集过程中,采用LDP (Local differential privacy)协议来对抗不可信的第三方。然而,过多的LDP噪声会降低数据的效用,从而影响统计查询的结果。因此,研究隐私与效用之间的权衡具有重要意义。在本文中,我们首先通过观察对手(数据收集器)的最大后验置信度来度量隐私损失。然后,通过理论分析和比较,得出了最合适的效用度量,即沃瑟斯坦距离。在此基础上,我们引入了隐私-效用权衡框架的独创性框架,发现该系统符合帕累托最优状态,并形式化了一个支付函数来寻找帕累托效率下的最优平衡点。最后,我们通过UCI机器学习存储库中的成人数据集来说明我们的系统模型的有效性。
{"title":"The Trade-off Between Privacy and Utility in Local Differential Privacy","authors":"Mengqian Li, Youliang Tian, Junpeng Zhang, Dandan Fan, Dongmei Zhao","doi":"10.1109/NaNA53684.2021.00071","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00071","url":null,"abstract":"In statistical queries work, such as frequency estimation, the untrusted data collector could as an honest-but-curious (HbC) or malicious adversary to learn true values. Local differential privacy(LDP) protocols have been applied against the untrusted third party in data collecting. Nevertheless, excessive noise of LDP will reduce data utility, thus affecting the results of statistical queries. Therefore, it is significant to research the trade-off between privacy and utility. In this paper, we first measure the privacy loss by observing the maximum posterior confidence of the adversary (data collector). Then, through theoretical analysis and comparison we obtain the most suitable utility measure that is Wasserstein distance. Based on these, we introduce an originality framework for privacy-utility tradeoff framework, finding that this system conforms to the Pareto optimality state and formalizing a payoff function to find optimal equilibrium point under Pareto efficiency. Finally, we illustrate the efficacy of our system model by the Adult dataset from the UCI machine learning repository.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121349315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy Harvesting 基于能量收集的多信道认知无线网络频谱利用率改进
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00009
Wendi Sun, Xiaoying Liu, Kechen Zheng, Yang Xu, Jia Liu
Motivated by the dilemma in the multi-channel spectrum sensing by the multi-antenna user, this paper focuses on the scheme of spectrum sensing and energy harvesting to coordinate the time scheduling and energy management in the cognitive radio networks (CRNs), where a secondary transmitter (ST) exploits spectrum holes to transmit data through multichannel. To improve spectrum utilization efficiency, we investigate how the ST selects channels for sensing based on the residual energy, and adjusts the time scheduling of energy harvesting and data transmission with respect to the sensing results. To address this problem, we propose an adaptive scheme concerning spectrum sensing, channel selection, energy harvesting, and data transmission (SCED) for the ST. Moreover, we formulate the optimization of spectrum utilization efficiency as a Markov decision process (MDP) problem, which is challenging due to the system space and action space. Furthermore, we solve the MDP problem by a proposed value iteration algorithm. Numerical results show that the spectrum utilization efficiency under the SCED scheme is better than that under other schemes.
摘要针对多天线用户多通道频谱感知的困境,研究了认知无线网络(crn)中二次发射机(ST)利用频谱漏洞进行多通道数据传输的频谱感知和能量收集方案,以协调时间调度和能量管理。为了提高频谱利用效率,我们研究了ST如何根据剩余能量选择传感通道,并根据传感结果调整能量收集和数据传输的时间调度。为了解决这一问题,我们提出了一种st的频谱感知、信道选择、能量收集和数据传输(SCED)自适应方案,并将频谱利用效率的优化描述为马尔可夫决策过程(MDP)问题,该问题由于系统空间和动作空间的限制而具有挑战性。在此基础上,提出了一种数值迭代算法来求解MDP问题。数值结果表明,SCED方案下的频谱利用效率优于其他方案。
{"title":"Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy Harvesting","authors":"Wendi Sun, Xiaoying Liu, Kechen Zheng, Yang Xu, Jia Liu","doi":"10.1109/NaNA53684.2021.00009","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00009","url":null,"abstract":"Motivated by the dilemma in the multi-channel spectrum sensing by the multi-antenna user, this paper focuses on the scheme of spectrum sensing and energy harvesting to coordinate the time scheduling and energy management in the cognitive radio networks (CRNs), where a secondary transmitter (ST) exploits spectrum holes to transmit data through multichannel. To improve spectrum utilization efficiency, we investigate how the ST selects channels for sensing based on the residual energy, and adjusts the time scheduling of energy harvesting and data transmission with respect to the sensing results. To address this problem, we propose an adaptive scheme concerning spectrum sensing, channel selection, energy harvesting, and data transmission (SCED) for the ST. Moreover, we formulate the optimization of spectrum utilization efficiency as a Markov decision process (MDP) problem, which is challenging due to the system space and action space. Furthermore, we solve the MDP problem by a proposed value iteration algorithm. Numerical results show that the spectrum utilization efficiency under the SCED scheme is better than that under other schemes.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126667398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Petri net modeling and vulnerability analysis of the Heartbleed 心脏出血的Petri网建模与漏洞分析
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00034
Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu
In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities is generally focused on the characteristics analysis and impact hazard level, and lack of formal modeling and vulnerability analysis methods. In this paper, we model the OpenSSL service’s Heartbleed vulnerability based on Petri net. We build a formal model combined with the source code and system state, analyze the vulnerability of the system running state, and propose an automatic vulnerability repair scheme. Experiments show that this model can carry out fine-grained formal analysis and simulation of the Heartbleed, which is of great significance to explore the system vulnerability modeling method.
近年来,各种网络攻击层出不穷,网络攻击逐渐呈现出保密性更高、危害更大的特点。目前,对系统漏洞的分析一般侧重于特征分析和影响危害等级,缺乏形式化的建模和漏洞分析方法。本文基于Petri网对OpenSSL服务的Heartbleed漏洞进行建模。结合源代码和系统状态建立形式化模型,分析系统运行状态的漏洞,提出漏洞自动修复方案。实验表明,该模型可以对“心脏出血”进行细粒度形式化分析和仿真,对探索系统漏洞建模方法具有重要意义。
{"title":"Petri net modeling and vulnerability analysis of the Heartbleed","authors":"Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu","doi":"10.1109/NaNA53684.2021.00034","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00034","url":null,"abstract":"In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities is generally focused on the characteristics analysis and impact hazard level, and lack of formal modeling and vulnerability analysis methods. In this paper, we model the OpenSSL service’s Heartbleed vulnerability based on Petri net. We build a formal model combined with the source code and system state, analyze the vulnerability of the system running state, and propose an automatic vulnerability repair scheme. Experiments show that this model can carry out fine-grained formal analysis and simulation of the Heartbleed, which is of great significance to explore the system vulnerability modeling method.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Modified K-means User Grouping Design for HAP Massive MIMO Systems 一种改进的HAP大规模MIMO系统K-means用户分组设计
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00057
Guorong Zhang, Ling-ge Jiang, Pingping Ji, Shiyi Zou, Chen He, Di He
In this paper, we propose a new user grouping scheme for the high altitude platform (HAP) massive Multiple-Input Multiple-Output (MIMO) systems based on statistical-eigenmode (SE). It has been proved that SE makes a major contribution to signal power for HAPs. Then, a Fubini-Study distance based modified K-means (FS-MKM) user grouping method is proposed aiming at reducing intra-group interference and improving system performance. The proposed modified K-means algorithm improves the initial points selection of the original K-means algorithm. The Fubini-Study distance is obtained based on the SEs of different users. Simulation results confirm that the proposed user grouping algorithm yields significant performance enhancement.
针对高空平台(HAP)大规模多输入多输出(MIMO)系统,提出了一种基于统计特征模态(SE)的用户分组方案。事实证明,SE对HAPs的信号功率有重要贡献。然后,提出了一种基于Fubini-Study距离的改进K-means (FS-MKM)用户分组方法,以减少组内干扰,提高系统性能。改进的K-means算法改进了原K-means算法的初始点选取。Fubini-Study距离是根据不同用户的SEs得到的。仿真结果验证了所提出的用户分组算法的性能有显著提高。
{"title":"A Modified K-means User Grouping Design for HAP Massive MIMO Systems","authors":"Guorong Zhang, Ling-ge Jiang, Pingping Ji, Shiyi Zou, Chen He, Di He","doi":"10.1109/NaNA53684.2021.00057","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00057","url":null,"abstract":"In this paper, we propose a new user grouping scheme for the high altitude platform (HAP) massive Multiple-Input Multiple-Output (MIMO) systems based on statistical-eigenmode (SE). It has been proved that SE makes a major contribution to signal power for HAPs. Then, a Fubini-Study distance based modified K-means (FS-MKM) user grouping method is proposed aiming at reducing intra-group interference and improving system performance. The proposed modified K-means algorithm improves the initial points selection of the original K-means algorithm. The Fubini-Study distance is obtained based on the SEs of different users. Simulation results confirm that the proposed user grouping algorithm yields significant performance enhancement.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network 基于全卷积Siamese网络的双注意机制目标跟踪算法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00056
Sugang Ma, Zixian Zhang, Lei Zhang, Yanping Chen, Xiaobao Yang, Lei Pu, Z. Hou
In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convolutional Siamese network is proposed to improve the generalization capability of the tracker by ameliorating the robustness of the template characteristics. Firstly, a global context attention module is appended after the backbone network of SiamFC to ameliorate the power of original feature extraction from two dimensions of spatial and channel. Then, a coordinate attention module is introduced to augment the capability of feature extraction in the channel dimension. Finally, the model of the proposed algorithm is trained on the Got-10k dataset. Five related algorithms are tested on the OTB2015 dataset, the results of experiments manifest that our algorithm outperforms the baseline trackers, the success and precision rate of the proposed algorithm are improved by 3.3% and 6.3%. The average tracking speed is 145FPS, which can demand the requirement of real-time tracking.
针对全卷积Siamese网络在复杂场景下跟踪性能不足的问题,提出了一种基于全卷积Siamese网络的双注意机制目标跟踪算法,通过改善模板特征的鲁棒性来提高跟踪器的泛化能力。首先,在SiamFC骨干网基础上增加全局上下文关注模块,从空间和信道两个维度改进原始特征提取能力;然后,引入坐标关注模块,增强通道维度的特征提取能力。最后,在Got-10k数据集上对算法模型进行训练。在OTB2015数据集上对五种相关算法进行了测试,实验结果表明,我们的算法优于基线跟踪器,算法的成功率和准确率分别提高了3.3%和6.3%。平均跟踪速度为145FPS,可以满足实时跟踪的要求。
{"title":"Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network","authors":"Sugang Ma, Zixian Zhang, Lei Zhang, Yanping Chen, Xiaobao Yang, Lei Pu, Z. Hou","doi":"10.1109/NaNA53684.2021.00056","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00056","url":null,"abstract":"In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convolutional Siamese network is proposed to improve the generalization capability of the tracker by ameliorating the robustness of the template characteristics. Firstly, a global context attention module is appended after the backbone network of SiamFC to ameliorate the power of original feature extraction from two dimensions of spatial and channel. Then, a coordinate attention module is introduced to augment the capability of feature extraction in the channel dimension. Finally, the model of the proposed algorithm is trained on the Got-10k dataset. Five related algorithms are tested on the OTB2015 dataset, the results of experiments manifest that our algorithm outperforms the baseline trackers, the success and precision rate of the proposed algorithm are improved by 3.3% and 6.3%. The average tracking speed is 145FPS, which can demand the requirement of real-time tracking.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115009769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1