首页 > 最新文献

2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)最新文献

英文 中文
Few-Shot Ontology Alignment Model with Attribute Attentions 具有属性关注的少镜头本体对齐模型
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-90
Jingyu Sun, Susumu Takeuchi, I. Yamasaki
Nowadays, explosive growth of ontologies are used for managing data in various domains. They usually own different vocabularies and structures following different fashions. Ontology alignment finding semantic correspondences between elements of these ontologies can effectively facilitate the data communication and novel application creation in many practical scenarios. However, we noticed that, the traditional parametric ontology mapping methods still depend on individualistic abilities for setting proper parameters for mapping. When trying to utilize artificial neural networks for the automatic ontology mapping, the training data are found insufficient in most of the cases. This paper analyzes these problems, and proposes a few-shot ontology alignment model, which can automatically learn how to map two ontologies from only a few training links between their element pairs. The proposed model applies the Siamese neural network in computer vision on ontology alignment and designs an attention detection network learning the attention weights for different ontology attributes. A few experiments that conducted on the anatomy ontology alignment show that our model achieves good performance (94.3% of F-measure) with 200 training alignments without traditional parametric setting.
如今,用于管理各个领域数据的本体呈爆炸式增长。他们通常拥有不同的词汇和结构,遵循不同的时尚。本体对齐发现这些本体元素之间的语义对应关系可以有效地促进数据通信和在许多实际场景中创建新的应用程序。然而,我们注意到,传统的参数本体映射方法仍然依赖于个体的能力来设置适当的映射参数。在尝试利用人工神经网络进行本体自动映射时,往往发现训练数据不足。本文对这些问题进行了分析,提出了一种少量本体对齐模型,该模型可以通过元素对之间的少量训练链接自动学习如何映射两个本体。该模型将计算机视觉中的Siamese神经网络应用于本体对齐,并设计了一个关注检测网络,学习不同本体属性的关注权值。对解剖本体对齐进行的实验表明,在没有传统参数设置的情况下,我们的模型在200个训练对齐中获得了良好的性能(F-measure的94.3%)。
{"title":"Few-Shot Ontology Alignment Model with Attribute Attentions","authors":"Jingyu Sun, Susumu Takeuchi, I. Yamasaki","doi":"10.1109/COMPSAC48688.2020.00-90","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-90","url":null,"abstract":"Nowadays, explosive growth of ontologies are used for managing data in various domains. They usually own different vocabularies and structures following different fashions. Ontology alignment finding semantic correspondences between elements of these ontologies can effectively facilitate the data communication and novel application creation in many practical scenarios. However, we noticed that, the traditional parametric ontology mapping methods still depend on individualistic abilities for setting proper parameters for mapping. When trying to utilize artificial neural networks for the automatic ontology mapping, the training data are found insufficient in most of the cases. This paper analyzes these problems, and proposes a few-shot ontology alignment model, which can automatically learn how to map two ontologies from only a few training links between their element pairs. The proposed model applies the Siamese neural network in computer vision on ontology alignment and designs an attention detection network learning the attention weights for different ontology attributes. A few experiments that conducted on the anatomy ontology alignment show that our model achieves good performance (94.3% of F-measure) with 200 training alignments without traditional parametric setting.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116736427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Change of Users in SNS by Two Dimensional CNN 基于二维CNN的SNS用户变化检测
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.0-159
H. Matsushita, R. Uda
In this paper, we proposed a method for detecting hacked accounts in SNS without predetermined features since trend of topics and slang expressions always change and hackers can make messages which are matched with the predetermined features. There are some researches in which a hacked account or impersonation in SNS is detected. However, they have problems that predetermined features were used in their method or evaluation procedure was not appropriate. On the other hand, in our method, a feature named 'category' is automatically extracted among recent tweets by machine learning. We evaluated the categories with 1,000 test accounts. As a result, 74.4% of the test accounts can be detected with the rate up to 96.0% when they are hacked and only one new message is posted. Moreover, 73.4% of the test accounts can be detected with the rate up to 99.2% by one new posted message. Furthermore, other hacked accounts can also be detected with the same rate when several messages are sequentially posted.
在本文中,我们提出了一种检测SNS中没有预定特征的被黑账户的方法,因为话题趋势和俚语表达总是在变化,黑客可以制作与预定特征相匹配的消息。也有一些研究发现了SNS上的账户被黑客攻击或冒充的情况。然而,他们的问题是预先确定的特征在他们的方法或评价程序中使用是不合适的。另一方面,在我们的方法中,一个名为“类别”的特征是通过机器学习从最近的推文中自动提取出来的。我们用1000个测试账户评估了这些类别。结果,74.4%的测试账户在被黑客攻击时,只发布一条新消息,可被发现的比率高达96.0%。此外,73.4%的测试账户可以通过一条新发布的消息被检测到,检测率高达99.2%。此外,当连续发布几条消息时,其他被黑客攻击的账户也可以以相同的速度被检测到。
{"title":"Detection of Change of Users in SNS by Two Dimensional CNN","authors":"H. Matsushita, R. Uda","doi":"10.1109/COMPSAC48688.2020.0-159","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.0-159","url":null,"abstract":"In this paper, we proposed a method for detecting hacked accounts in SNS without predetermined features since trend of topics and slang expressions always change and hackers can make messages which are matched with the predetermined features. There are some researches in which a hacked account or impersonation in SNS is detected. However, they have problems that predetermined features were used in their method or evaluation procedure was not appropriate. On the other hand, in our method, a feature named 'category' is automatically extracted among recent tweets by machine learning. We evaluated the categories with 1,000 test accounts. As a result, 74.4% of the test accounts can be detected with the rate up to 96.0% when they are hacked and only one new message is posted. Moreover, 73.4% of the test accounts can be detected with the rate up to 99.2% by one new posted message. Furthermore, other hacked accounts can also be detected with the same rate when several messages are sequentially posted.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116030767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus 基于长短期记忆的车载控制器局域网总线入侵检测系统
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00011
Md. Delwar Hossain, Hiroyuki Inoue, H. Ochiai, Doudou Fall, Y. Kadobayashi
The Controller Area Network (CAN) bus system works inside connected cars as a central system for communication between electronic control units (ECUs). Despite its central importance, the CAN does not support an authentication mechanism, i.e., CAN messages are broadcast without basic security features. As a result, it is easy for attackers to launch attacks at the CAN bus network system. Attackers can compromise the CAN bus system in several ways: denial of service, fuzzing, spoofing, etc. It is imperative to devise methodologies to protect modern cars against the aforementioned attacks. In this paper, we propose a Long Short-Term Memory (LSTM)-based Intrusion Detection System (IDS) to detect and mitigate the CAN bus network attacks. We first inject attacks at the CAN bus system in a car that we have at our disposal to generate the attack dataset, which we use to test and train our model. Our results demonstrate that our classifier is efficient in detecting the CAN attacks. We achieved a detection accuracy of 99.9949%.
控制器区域网络(CAN)总线系统作为电子控制单元(ecu)之间通信的中央系统,在联网汽车内部工作。尽管它的核心重要性,CAN不支持认证机制,即,CAN消息广播没有基本的安全特性。因此,攻击者很容易对CAN总线网络系统进行攻击。攻击者可以通过几种方式破坏can总线系统:拒绝服务、模糊测试、欺骗等。必须设计出保护现代汽车免受上述攻击的方法。本文提出了一种基于LSTM的入侵检测系统(IDS)来检测和缓解CAN总线网络的攻击。我们首先向汽车的CAN总线系统注入攻击,以生成攻击数据集,我们用它来测试和训练我们的模型。结果表明,该分类器在检测CAN攻击方面是有效的。我们实现了99.9949%的检测准确率。
{"title":"Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus","authors":"Md. Delwar Hossain, Hiroyuki Inoue, H. Ochiai, Doudou Fall, Y. Kadobayashi","doi":"10.1109/COMPSAC48688.2020.00011","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00011","url":null,"abstract":"The Controller Area Network (CAN) bus system works inside connected cars as a central system for communication between electronic control units (ECUs). Despite its central importance, the CAN does not support an authentication mechanism, i.e., CAN messages are broadcast without basic security features. As a result, it is easy for attackers to launch attacks at the CAN bus network system. Attackers can compromise the CAN bus system in several ways: denial of service, fuzzing, spoofing, etc. It is imperative to devise methodologies to protect modern cars against the aforementioned attacks. In this paper, we propose a Long Short-Term Memory (LSTM)-based Intrusion Detection System (IDS) to detect and mitigate the CAN bus network attacks. We first inject attacks at the CAN bus system in a car that we have at our disposal to generate the attack dataset, which we use to test and train our model. Our results demonstrate that our classifier is efficient in detecting the CAN attacks. We achieved a detection accuracy of 99.9949%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"194 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Novel Tax Evasion Detection Framework via Fused Transaction Network Representation 基于融合交易网络表示的新型逃税检测框架
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00039
Yingchao Wu, Bo Dong, Q. Zheng, Rongzhe Wei, Zhiwen Wang, Xuanya Li
Tax evasion usually refers to the false declaration of taxpayers to reduce their tax obligations; this type of behavior leads to the loss of taxes and damage to the fair principle of taxation. Tax evasion detection plays a crucial role in reducing tax revenue loss. Currently, efficient auditing methods mainly include traditional data-mining-oriented methods, which cannot be well adapted to the increasingly complicated transaction relationships between taxpayers. Driven by this requirement, recent studies have been conducted by establishing a transaction network and applying the graphical pattern matching algorithm for tax evasion identification. However, such methods rely on expert experience to extract the tax evasion chart pattern, which is time-consuming and labor-intensive. More importantly, taxpayers' basic attributes are not considered and the dual identity of the taxpayer in the transaction network is not well retained. To address this issue, we have proposed a novel tax evasion detection framework via fused transaction network representation (TED-TNR), to detecting tax evasion based on fused transaction network representation, which jointly embeds transaction network topological information and basic taxpayer attributes into low-dimensional vector space, and considers the dual identity of the taxpayer in the transaction network. Finally, we conducted experimental tests on real-world tax data, revealing the superiority of our method, compared with state-of-the-art models.
逃税通常是指纳税人为减少纳税义务而进行虚假申报;这种行为导致税收损失,损害税收公平原则。偷税漏税侦查是减少税收损失的重要手段。目前,高效的审计方法主要是传统的面向数据挖掘的审计方法,这些方法已经不能很好地适应日益复杂的纳税人之间的交易关系。在这一需求的推动下,最近的研究通过建立交易网络并应用图形模式匹配算法进行逃税识别。但是,这种方法依赖于专家经验来提取偷税漏税图模式,费时费力。更重要的是,没有考虑纳税人的基本属性,没有很好地保留纳税人在交易网络中的双重身份。为了解决这一问题,我们提出了一种新的基于融合交易网络表示的偷税漏税检测框架(泰德- tnr),该框架将交易网络拓扑信息和纳税人基本属性共同嵌入到低维向量空间中,并考虑纳税人在交易网络中的双重身份。最后,我们对现实世界的税收数据进行了实验测试,与最先进的模型相比,揭示了我们的方法的优越性。
{"title":"A Novel Tax Evasion Detection Framework via Fused Transaction Network Representation","authors":"Yingchao Wu, Bo Dong, Q. Zheng, Rongzhe Wei, Zhiwen Wang, Xuanya Li","doi":"10.1109/COMPSAC48688.2020.00039","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00039","url":null,"abstract":"Tax evasion usually refers to the false declaration of taxpayers to reduce their tax obligations; this type of behavior leads to the loss of taxes and damage to the fair principle of taxation. Tax evasion detection plays a crucial role in reducing tax revenue loss. Currently, efficient auditing methods mainly include traditional data-mining-oriented methods, which cannot be well adapted to the increasingly complicated transaction relationships between taxpayers. Driven by this requirement, recent studies have been conducted by establishing a transaction network and applying the graphical pattern matching algorithm for tax evasion identification. However, such methods rely on expert experience to extract the tax evasion chart pattern, which is time-consuming and labor-intensive. More importantly, taxpayers' basic attributes are not considered and the dual identity of the taxpayer in the transaction network is not well retained. To address this issue, we have proposed a novel tax evasion detection framework via fused transaction network representation (TED-TNR), to detecting tax evasion based on fused transaction network representation, which jointly embeds transaction network topological information and basic taxpayer attributes into low-dimensional vector space, and considers the dual identity of the taxpayer in the transaction network. Finally, we conducted experimental tests on real-world tax data, revealing the superiority of our method, compared with state-of-the-art models.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deep Learning for Hardware-Constrained Driverless Cars 硬件受限的无人驾驶汽车的深度学习
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00013
B. K. Sreedhar, Nagarajan Shunmugam
The field of self-driving cars is a fast-growing one, and numerous companies and organizations are working at the forefront of this technology. One of the major requirements for self-driving cars is the necessity of expensive hardware to run complex models. This project aims to identify a suitable deep learning model under hardware constraints. We obtain the results of a supervised model trained with data from a human driver and compare it to a reinforcement learning-based approach. Both models will be trained and tested on devices with low-end hardware, and their results visualized with the help of a driving simulator. The objective is to demonstrate that even a simple model with enough data augmentation can perform specific tasks and does not require much investment in time and money. We also aim to introduce portability to deep learning models by trying to deploy the model in a mobile device and show that it can work as a standalone module.
自动驾驶汽车是一个快速发展的领域,许多公司和组织都在这项技术的前沿工作。自动驾驶汽车的主要要求之一是需要昂贵的硬件来运行复杂的模型。本项目旨在确定在硬件约束下合适的深度学习模型。我们获得了用人类驾驶员数据训练的监督模型的结果,并将其与基于强化学习的方法进行了比较。这两款车型都将在低端硬件设备上进行训练和测试,并在驾驶模拟器的帮助下将测试结果可视化。我们的目标是证明,即使是具有足够数据增强的简单模型也可以执行特定的任务,并且不需要太多的时间和金钱投资。我们还旨在通过尝试在移动设备中部署模型来引入深度学习模型的可移植性,并表明它可以作为独立模块工作。
{"title":"Deep Learning for Hardware-Constrained Driverless Cars","authors":"B. K. Sreedhar, Nagarajan Shunmugam","doi":"10.1109/COMPSAC48688.2020.00013","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00013","url":null,"abstract":"The field of self-driving cars is a fast-growing one, and numerous companies and organizations are working at the forefront of this technology. One of the major requirements for self-driving cars is the necessity of expensive hardware to run complex models. This project aims to identify a suitable deep learning model under hardware constraints. We obtain the results of a supervised model trained with data from a human driver and compare it to a reinforcement learning-based approach. Both models will be trained and tested on devices with low-end hardware, and their results visualized with the help of a driving simulator. The objective is to demonstrate that even a simple model with enough data augmentation can perform specific tasks and does not require much investment in time and money. We also aim to introduce portability to deep learning models by trying to deploy the model in a mobile device and show that it can work as a standalone module.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of Size and History Length on Energetic Community Load Forecasting: A Case Study 规模和历史长度对能量群落负荷预测的影响:一个案例研究
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-61
M. Tits, Benjamin Bernaud, Amel Achour, Maher Badri, L. Guedria
Recently, most European distribution systems (DS) are overwhelmed by the coupled growth of decentralized production and residential appliance volatility. To cope with this issue, new solutions are emerging, such as local energy storage and energetic community management. The latter aims for the collective self-consumption maximization of the locally-produced energy through optimal planning of flexible appliances, to reduce DS maintenance costs and energy loss. The quality of short-term load forecasting is key in this process. However, it depends on various factors, foremost including the characteristics of the concerned energetic community. In this paper, we propose a methodology and a use case, based on randomized sampling for the simulation of virtual energetic communities (VEC). From the numerous simulated VEC, statistical analysis allows to assess the impact of the VEC characteristics (such as size, resident type and availability of historical data) on its predictability. From a 2-year dataset of 52 households recorded in a Belgian city, we quantify the impacts of these characteristics, and show that for this specific case study, a trade-off for efficient forecasting can be reached for a community of about 10-30 households and 2-12 months of history length.
最近,大多数欧洲配电系统(DS)被分散生产和家用电器波动的耦合增长所淹没。为了应对这一问题,新的解决方案正在出现,例如本地能源存储和充满活力的社区管理。后者的目标是通过柔性设备的优化规划,实现本地生产能源的集体自我消费最大化,以减少DS的维护成本和能源损失。在此过程中,短期负荷预测的质量是关键。然而,它取决于各种因素,最重要的是包括有关的有活力的社区的特点。本文提出了一种基于随机抽样的虚拟能量群落(VEC)模拟方法和用例。从众多模拟VEC中,统计分析可以评估VEC特征(如规模、居民类型和历史数据的可用性)对其可预测性的影响。从比利时一个城市记录的52个家庭的2年数据集中,我们量化了这些特征的影响,并表明对于这个特定的案例研究,可以对大约10-30个家庭和2-12个月的历史长度的社区进行有效预测。
{"title":"Impacts of Size and History Length on Energetic Community Load Forecasting: A Case Study","authors":"M. Tits, Benjamin Bernaud, Amel Achour, Maher Badri, L. Guedria","doi":"10.1109/COMPSAC48688.2020.00-61","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-61","url":null,"abstract":"Recently, most European distribution systems (DS) are overwhelmed by the coupled growth of decentralized production and residential appliance volatility. To cope with this issue, new solutions are emerging, such as local energy storage and energetic community management. The latter aims for the collective self-consumption maximization of the locally-produced energy through optimal planning of flexible appliances, to reduce DS maintenance costs and energy loss. The quality of short-term load forecasting is key in this process. However, it depends on various factors, foremost including the characteristics of the concerned energetic community. In this paper, we propose a methodology and a use case, based on randomized sampling for the simulation of virtual energetic communities (VEC). From the numerous simulated VEC, statistical analysis allows to assess the impact of the VEC characteristics (such as size, resident type and availability of historical data) on its predictability. From a 2-year dataset of 52 households recorded in a Belgian city, we quantify the impacts of these characteristics, and show that for this specific case study, a trade-off for efficient forecasting can be reached for a community of about 10-30 households and 2-12 months of history length.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transtracer: Socket-Based Tracing of Network Dependencies Among Processes in Distributed Applications Transtracer:基于套接字的分布式应用程序进程之间的网络依赖跟踪
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-92
Yuuki Tsubouchi, Masahiro Furukawa, Ryosuke Matsumoto
Distributed applications in web services have become increasingly complex in response to various user demands. Consequently, system administrators have difficulty understanding inter-process dependencies in distributed applications. When parts of the system are changed or augmented, they cannot identify the area of influence by the change, which might engender a more damaging outage than expected. Therefore, they must trace dependencies automatically among unknown processes. An earlier method discovered the dependency by detecting the transport connection using the Linux packet filter on the hosts at ends of the network connection. However, the extra delay to the application traffic increases because of the additional processing inherent in the packet processing in the Linux kernel. As described herein, we propose an architecture of monitoring network sockets, which are endpoints of TCP connections, to trace the dependency. As long as applications use the TCP protocol stack in the Linux kernel, the dependencies are discovered by our architecture. Therefore, monitoring processing only reads the connection information from network sockets. The processing is independent of the application communication. Therefore, the monitoring does not affect the network delay of the applications. Our experiments confirmed that our architecture reduced the delay overhead by 13–20 % and the resource load by 43.5 % compared to earlier reported methods.
为了响应各种用户需求,web服务中的分布式应用程序变得越来越复杂。因此,系统管理员很难理解分布式应用程序中的进程间依赖关系。当系统的某些部分被更改或扩展时,他们无法识别受更改影响的区域,这可能会导致比预期更具破坏性的中断。因此,它们必须自动跟踪未知进程之间的依赖关系。早期的一种方法是通过在网络连接末端的主机上使用Linux包过滤器检测传输连接来发现依赖关系。但是,由于Linux内核中数据包处理中固有的额外处理,应用程序流量的额外延迟会增加。如本文所述,我们提出了一种监控网络套接字(TCP连接的端点)的体系结构,以跟踪依赖关系。只要应用程序使用Linux内核中的TCP协议栈,我们的体系结构就会发现依赖关系。因此,监控处理只从网络套接字读取连接信息。处理独立于应用程序通信。因此,监控不会影响应用程序的网络延迟。我们的实验证实,与之前报道的方法相比,我们的架构减少了13 - 20%的延迟开销和43.5%的资源负载。
{"title":"Transtracer: Socket-Based Tracing of Network Dependencies Among Processes in Distributed Applications","authors":"Yuuki Tsubouchi, Masahiro Furukawa, Ryosuke Matsumoto","doi":"10.1109/COMPSAC48688.2020.00-92","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-92","url":null,"abstract":"Distributed applications in web services have become increasingly complex in response to various user demands. Consequently, system administrators have difficulty understanding inter-process dependencies in distributed applications. When parts of the system are changed or augmented, they cannot identify the area of influence by the change, which might engender a more damaging outage than expected. Therefore, they must trace dependencies automatically among unknown processes. An earlier method discovered the dependency by detecting the transport connection using the Linux packet filter on the hosts at ends of the network connection. However, the extra delay to the application traffic increases because of the additional processing inherent in the packet processing in the Linux kernel. As described herein, we propose an architecture of monitoring network sockets, which are endpoints of TCP connections, to trace the dependency. As long as applications use the TCP protocol stack in the Linux kernel, the dependencies are discovered by our architecture. Therefore, monitoring processing only reads the connection information from network sockets. The processing is independent of the application communication. Therefore, the monitoring does not affect the network delay of the applications. Our experiments confirmed that our architecture reduced the delay overhead by 13–20 % and the resource load by 43.5 % compared to earlier reported methods.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Differentially Private Generation of Social Networks via Exponential Random Graph Models 基于指数随机图模型的社交网络差分私密生成
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-11
Fang Liu, E. Eugenio, Ick-Hoon Jin, C. Bowen
Many social networks contain sensitive relational information. One approach to protect the sensitive relational information while offering flexibility for social network research and analysis is to release synthetic social networks at a pre-specified privacy risk level, given the original observed network. We propose the DP-ERGM procedure that synthesizes networks that satisfy the differential privacy (DP) via the exponential random graph model (EGRM). We apply DP-ERGM to a college student friendship network and compare its original network information preservation in the generated private networks with two other approaches: differentially private DyadWise Randomized Response (DWRR) and Sanitization of the Conditional probability of Edge given Attribute classes (SCEA). The results suggest that DP-EGRM preserves the original information significantly better than DWRR and SCEA in both network statistics and inferences from ERGMs and latent space models. In addition, DP-ERGM satisfies the node DP, a stronger notion of privacy than the edge DP that DWRR and SCEA satisfy.
许多社交网络包含敏感的关系信息。在为社交网络研究和分析提供灵活性的同时,保护敏感关系信息的一种方法是在给定原始观察网络的情况下,以预先指定的隐私风险级别发布合成社交网络。本文提出了一种基于指数随机图模型(EGRM)的DP- ergm算法,该算法综合了满足差分隐私(DP)的网络。我们将DP-ERGM应用于一个大学生友谊网络,并将其在生成的私有网络中的原始网络信息保存与另外两种方法进行了比较:差分私有DyadWise随机响应(DWRR)和边缘给定属性类的条件概率处理(SCEA)。结果表明,DP-EGRM在网络统计和基于ergm和潜在空间模型的推断上都比DWRR和SCEA更好地保留了原始信息。此外,DP- ergm满足节点DP,比DWRR和SCEA满足的边缘DP具有更强的隐私概念。
{"title":"Differentially Private Generation of Social Networks via Exponential Random Graph Models","authors":"Fang Liu, E. Eugenio, Ick-Hoon Jin, C. Bowen","doi":"10.1109/COMPSAC48688.2020.00-11","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-11","url":null,"abstract":"Many social networks contain sensitive relational information. One approach to protect the sensitive relational information while offering flexibility for social network research and analysis is to release synthetic social networks at a pre-specified privacy risk level, given the original observed network. We propose the DP-ERGM procedure that synthesizes networks that satisfy the differential privacy (DP) via the exponential random graph model (EGRM). We apply DP-ERGM to a college student friendship network and compare its original network information preservation in the generated private networks with two other approaches: differentially private DyadWise Randomized Response (DWRR) and Sanitization of the Conditional probability of Edge given Attribute classes (SCEA). The results suggest that DP-EGRM preserves the original information significantly better than DWRR and SCEA in both network statistics and inferences from ERGMs and latent space models. In addition, DP-ERGM satisfies the node DP, a stronger notion of privacy than the edge DP that DWRR and SCEA satisfy.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124133924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bat Algorithm Method for Automatic Determination of Color and Contrast of Modified Digital Images 修改后数字图像颜色和对比度自动确定的Bat算法
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.00-94
A. Gálvez, A. Iglesias, E. Osaba, J. Ser
This paper presents a new artificial intelligence-based method to address the following problem: given an initial digital image (source image), and a modification of the image (mod image) obtained from the source through a color map and visual attributes assumed to be unknown, determine suitable values for color map and contrast such that, when applied to the mod image, a similar image to the source is obtained. This problem has several applications in the fields of image restoration and cleaning. Our approach is based on the application of a powerful swarm intelligence method called bat algorithm. The method is tested on an illustrative example of the digital image of a famous oil painting. The experimental results show that the method performs very well, with a similarity error rate between the source and the reconstructed images of only 8.37%.
本文提出了一种基于人工智能的新方法来解决以下问题:给定初始数字图像(源图像),并通过假设未知的颜色映射和视觉属性对源图像(模图像)进行修改,确定合适的颜色映射和对比度值,以便在应用于模图像时获得与源图像相似的图像。该问题在图像恢复和图像清洗等领域有着广泛的应用。我们的方法是基于一种强大的群体智能方法的应用,称为bat算法。以一幅著名油画的数字图像为例,对该方法进行了验证。实验结果表明,该方法具有良好的性能,源图像与重建图像的相似错误率仅为8.37%。
{"title":"Bat Algorithm Method for Automatic Determination of Color and Contrast of Modified Digital Images","authors":"A. Gálvez, A. Iglesias, E. Osaba, J. Ser","doi":"10.1109/COMPSAC48688.2020.00-94","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.00-94","url":null,"abstract":"This paper presents a new artificial intelligence-based method to address the following problem: given an initial digital image (source image), and a modification of the image (mod image) obtained from the source through a color map and visual attributes assumed to be unknown, determine suitable values for color map and contrast such that, when applied to the mod image, a similar image to the source is obtained. This problem has several applications in the fields of image restoration and cleaning. Our approach is based on the application of a powerful swarm intelligence method called bat algorithm. The method is tested on an illustrative example of the digital image of a famous oil painting. The experimental results show that the method performs very well, with a similarity error rate between the source and the reconstructed images of only 8.37%.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Algorithms Construction of Hyper-Heuristic for Test Case Prioritization 一种用于测试用例优先排序的超启发式混合算法构建
Pub Date : 2020-07-01 DOI: 10.1109/COMPSAC48688.2020.000-2
Zheng Li, Yanzhao Xi, Ruilian Zhao
By scheduling algorithms in the low-level algorithm library, the hyper-heuristic algorithm can help to effectively select an appropriate method to deal with hard computational search problems. The hyper-heuristic algorithm usually includes a high-level scheduling layer and a low-level algorithm layer. The high-level strategy layer selects the algorithm for the next scheduling by evaluating the execution effect of the different algorithms in the low-level layer, while the low-level layer includes a variety of different heuristic algorithms which called algorithm library. The concrete hyper-heuristic framework for multi-objective test case prioritization was presented where the 18 multi-objective algorithms were formed in the low-level library. It has been gradually realized that a hybrid algorithm by combining single objective algorithm and multi-objective optimization algorithm is better than the individual. This paper explores the influence of the construction pattern of algorithm library for the hyper-heuristic algorithm by constructing the fusion pattern of different types of algorithms.
超启发式算法通过对底层算法库中的算法进行调度,可以有效地选择合适的方法来处理难计算搜索问题。超启发式算法通常包括高级调度层和低级算法层。高级策略层通过评估低级层中不同算法的执行效果来选择下一次调度的算法,而低级层则包含各种不同的启发式算法,称为算法库。给出了多目标测试用例优先排序的具体超启发式框架,在底层库中形成了18种多目标算法。人们逐渐认识到,单目标算法和多目标优化算法相结合的混合算法优于单个算法。本文通过构建不同类型算法的融合模式,探讨算法库构建模式对超启发式算法的影响。
{"title":"A Hybrid Algorithms Construction of Hyper-Heuristic for Test Case Prioritization","authors":"Zheng Li, Yanzhao Xi, Ruilian Zhao","doi":"10.1109/COMPSAC48688.2020.000-2","DOIUrl":"https://doi.org/10.1109/COMPSAC48688.2020.000-2","url":null,"abstract":"By scheduling algorithms in the low-level algorithm library, the hyper-heuristic algorithm can help to effectively select an appropriate method to deal with hard computational search problems. The hyper-heuristic algorithm usually includes a high-level scheduling layer and a low-level algorithm layer. The high-level strategy layer selects the algorithm for the next scheduling by evaluating the execution effect of the different algorithms in the low-level layer, while the low-level layer includes a variety of different heuristic algorithms which called algorithm library. The concrete hyper-heuristic framework for multi-objective test case prioritization was presented where the 18 multi-objective algorithms were formed in the low-level library. It has been gradually realized that a hybrid algorithm by combining single objective algorithm and multi-objective optimization algorithm is better than the individual. This paper explores the influence of the construction pattern of algorithm library for the hyper-heuristic algorithm by constructing the fusion pattern of different types of algorithms.","PeriodicalId":430098,"journal":{"name":"2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1