首页 > 最新文献

Proceedings of the 7th International Conference on Communication and Information Processing最新文献

英文 中文
Dynamic Path Planning of UAV Based on Pheromone Diffusion Ant Colony Algorithm 基于信息素扩散蚁群算法的无人机动态路径规划
Bin Zhou, Yan Guo, Ning Li, Cuntao Liu
Due to the dynamic uncertainty factors in a complex environment, such as flight conditions, movable obstacles and other sudden threats. It is a challenge to realize the real-time path planning of Unmanned Aerial Vehicles (UAV). In this paper, the method is proposed with a model of the dynamic environment and a method of pheromone diffusion ant colony optimization (PDACO) to solve the real-time path planning of UAV in a dynamic environment. The translational obstacle method and the random obstacle method can efficiently simulate the dynamic environment. PDACO takes advantage of pheromone diffusion characteristics in an ant colony, and diffuses the pheromones to adjacent paths after each iteration, thus expanding the guidance range of pheromones. When the environment changes, the pheromone diffusion method can quickly plan new paths and accelerate the convergence of the algorithm. Simulation results show that the dynamic environment model accords with the actual situation. Compared with four algorithms, PDACO ensures that the UAV can optimize a new path with shorter path length and computing time when environment changes. The proposed method is feasible and effective.
由于动态不确定性因素存在于复杂的环境中,如飞行条件、可移动障碍物等突发威胁。实现无人机的实时路径规划是一个挑战。本文采用动态环境模型和信息素扩散蚁群优化(PDACO)方法解决无人机在动态环境下的实时路径规划问题。平移障碍法和随机障碍法可以有效地模拟动态环境。PDACO利用蚁群中信息素的扩散特性,在每次迭代后将信息素扩散到相邻的路径上,从而扩大了信息素的引导范围。当环境发生变化时,信息素扩散法可以快速规划新的路径,加快算法的收敛速度。仿真结果表明,所建立的动态环境模型符合实际情况。与四种算法相比,PDACO保证了无人机在环境变化时能够以更短的路径长度和计算时间优化出新的路径。该方法是可行和有效的。
{"title":"Dynamic Path Planning of UAV Based on Pheromone Diffusion Ant Colony Algorithm","authors":"Bin Zhou, Yan Guo, Ning Li, Cuntao Liu","doi":"10.1145/3507971.3507975","DOIUrl":"https://doi.org/10.1145/3507971.3507975","url":null,"abstract":"Due to the dynamic uncertainty factors in a complex environment, such as flight conditions, movable obstacles and other sudden threats. It is a challenge to realize the real-time path planning of Unmanned Aerial Vehicles (UAV). In this paper, the method is proposed with a model of the dynamic environment and a method of pheromone diffusion ant colony optimization (PDACO) to solve the real-time path planning of UAV in a dynamic environment. The translational obstacle method and the random obstacle method can efficiently simulate the dynamic environment. PDACO takes advantage of pheromone diffusion characteristics in an ant colony, and diffuses the pheromones to adjacent paths after each iteration, thus expanding the guidance range of pheromones. When the environment changes, the pheromone diffusion method can quickly plan new paths and accelerate the convergence of the algorithm. Simulation results show that the dynamic environment model accords with the actual situation. Compared with four algorithms, PDACO ensures that the UAV can optimize a new path with shorter path length and computing time when environment changes. The proposed method is feasible and effective.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Access Control Design Based on User Role Type in Telemedicine System Using Ethereum Blockchain 基于用户角色类型的以太坊区块链远程医疗系统访问控制设计
Muhammad Hamzah, Diyanatul Husna, Fransiskus Astha Ekadiyanto, K. Purnama, Afif Nurul Hidayati, Mauridhi Hery Purnomo, Supeno Mardi Susiki Nugroho, Reza Fuad Rachmadi, I. Nurtanio, Anak Agung Ratna
To fulfill health as basic human needs, health care services technology is always improved but also must maintain security and privacy of the data due to huge amount of data is created and distributed. Telemedicine with telecommunication technology offers convenience and cheaper cost, but still is vulnerable to cyber attacks, making it a threat for patients’ data's privacy. One approach that can be used to secure the data is applying access control to the data. Immutable blockchain can helps to enforce access control so it cannot be violated. We propose a system which implements Ethereum for the blockchain and React web application for the interface of the system. Data management and the access control are provided through Ethereum smart contracts, and the access control requires different role-based permission to upload and access the patients’ data. The system works successfully with average time taken to verify the role is 1.8033 seconds per session. The privacy of the patients’ data is ensured because only the patients that are allowed to keep the ID of their own data.
为了满足健康作为人类的基本需求,医疗保健服务技术不断进步,但由于大量数据的创建和分布,必须保持数据的安全性和隐私性。采用电信技术的远程医疗提供了方便和更便宜的成本,但仍然容易受到网络攻击,对患者的数据隐私构成威胁。可用于保护数据的一种方法是对数据应用访问控制。不可变区块链可以帮助实施访问控制,使其不会被违反。我们提出了一个系统,实现以太坊为区块链和React web应用程序为系统的接口。数据管理和访问控制通过以太坊智能合约提供,访问控制需要基于不同角色的权限来上传和访问患者的数据。系统工作成功,每个会话验证角色的平均时间为1.8033秒。患者数据的隐私性得到了保证,因为只有允许保留自己数据ID的患者。
{"title":"Access Control Design Based on User Role Type in Telemedicine System Using Ethereum Blockchain","authors":"Muhammad Hamzah, Diyanatul Husna, Fransiskus Astha Ekadiyanto, K. Purnama, Afif Nurul Hidayati, Mauridhi Hery Purnomo, Supeno Mardi Susiki Nugroho, Reza Fuad Rachmadi, I. Nurtanio, Anak Agung Ratna","doi":"10.1145/3507971.3507991","DOIUrl":"https://doi.org/10.1145/3507971.3507991","url":null,"abstract":"To fulfill health as basic human needs, health care services technology is always improved but also must maintain security and privacy of the data due to huge amount of data is created and distributed. Telemedicine with telecommunication technology offers convenience and cheaper cost, but still is vulnerable to cyber attacks, making it a threat for patients’ data's privacy. One approach that can be used to secure the data is applying access control to the data. Immutable blockchain can helps to enforce access control so it cannot be violated. We propose a system which implements Ethereum for the blockchain and React web application for the interface of the system. Data management and the access control are provided through Ethereum smart contracts, and the access control requires different role-based permission to upload and access the patients’ data. The system works successfully with average time taken to verify the role is 1.8033 seconds per session. The privacy of the patients’ data is ensured because only the patients that are allowed to keep the ID of their own data.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"46 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114021162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Morse Signal Noise Reduction Methods 莫尔斯信号降噪方法分析
Yiran Wang, Xiangdong You, Cuiling Tang
This article applies several common speech noise reduction methods to Morse signal noise reduction, and compares and analyzes these several noise reduction methods. The paper introduces the Morse signal and the necessity of noise reduction and the principles, processes, advantages and disadvantages of different noise reduction methods such as band-pass filtering, spectral subtraction and other traditional methods, and noise reduction based on U-Net image segmentation. The effects of noise reduction methods are analyzed by the comparison of time-domain diagram and frequency-domain diagram of the same Morse signal before and after noise reduction. Finally, it is concluded that the noise reduction based on U-Net image segmentation has a better effect.
本文将几种常见的语音降噪方法应用于莫尔斯信号降噪,并对这几种降噪方法进行了比较和分析。本文介绍了莫尔斯信号和降噪的必要性,以及不同降噪方法的原理、过程、优缺点,如带通滤波、谱减等传统方法,以及基于U-Net图像分割的降噪方法。通过对比降噪前后同一摩尔斯信号的时域图和频域图,分析了不同降噪方法的降噪效果。最后,得出基于U-Net图像分割的降噪效果较好的结论。
{"title":"Analysis of Morse Signal Noise Reduction Methods","authors":"Yiran Wang, Xiangdong You, Cuiling Tang","doi":"10.1145/3507971.3508003","DOIUrl":"https://doi.org/10.1145/3507971.3508003","url":null,"abstract":"This article applies several common speech noise reduction methods to Morse signal noise reduction, and compares and analyzes these several noise reduction methods. The paper introduces the Morse signal and the necessity of noise reduction and the principles, processes, advantages and disadvantages of different noise reduction methods such as band-pass filtering, spectral subtraction and other traditional methods, and noise reduction based on U-Net image segmentation. The effects of noise reduction methods are analyzed by the comparison of time-domain diagram and frequency-domain diagram of the same Morse signal before and after noise reduction. Finally, it is concluded that the noise reduction based on U-Net image segmentation has a better effect.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Satellite Wide Area Network Construction and Performance Simulation Based on Quantum Repeater 基于量子中继器的量子卫星广域网构建及性能仿真
Kaijie Han, Min Nie, Guang Yang, J. Wang, Ting Gao, Feng Tian, Jingqi Li
∗In order to improve the communication performance during longdistance transmission of quantum states, this paper establishes a quantum relay model between the sender and the receiver to achieve long-distance communication. Specifically, we propose a quantum state entanglement purification process based on fishing strategy by analyzing the model of quantum repeater and then build a wide area network architecture on this basis. Finally, numerical simulation results represent that the bit error rate of quantum information transmission decreases with the fidelity of entanglement purification increases and the throughput rate increases with the probability of successful entanglement purification increases. Therefore, the use of quantum repeater can effectively improve the transmission performance of quantum states as well as provide a theoretical basis for future practical secure quantum wide area network communication.
为了提高量子态长距离传输时的通信性能,本文在发送端和接收端之间建立了量子中继模型,实现了量子态的长距离通信。具体而言,通过分析量子中继器的模型,提出了一种基于钓鱼策略的量子态纠缠净化过程,并在此基础上构建了广域网架构。最后,数值模拟结果表明,量子信息传输的误码率随着纠缠净化保真度的提高而降低,吞吐量随着纠缠净化成功概率的增加而增加。因此,使用量子中继器可以有效地提高量子态的传输性能,也为未来实用的安全量子广域网通信提供了理论基础。
{"title":"Quantum Satellite Wide Area Network Construction and Performance Simulation Based on Quantum Repeater","authors":"Kaijie Han, Min Nie, Guang Yang, J. Wang, Ting Gao, Feng Tian, Jingqi Li","doi":"10.1145/3507971.3507998","DOIUrl":"https://doi.org/10.1145/3507971.3507998","url":null,"abstract":"∗In order to improve the communication performance during longdistance transmission of quantum states, this paper establishes a quantum relay model between the sender and the receiver to achieve long-distance communication. Specifically, we propose a quantum state entanglement purification process based on fishing strategy by analyzing the model of quantum repeater and then build a wide area network architecture on this basis. Finally, numerical simulation results represent that the bit error rate of quantum information transmission decreases with the fidelity of entanglement purification increases and the throughput rate increases with the probability of successful entanglement purification increases. Therefore, the use of quantum repeater can effectively improve the transmission performance of quantum states as well as provide a theoretical basis for future practical secure quantum wide area network communication.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117196986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compressing Embedding Table via Multi-dimensional Quantization Encoding for Sequential Recommender Model 基于多维量化编码的序列推荐模型嵌入表压缩
Feng Wang, Miaomiao Dai, Xudong Li, Liquan Pan
Sequential recommender models have become a research hotspot in the field of current recommender systems due to its excellent ability to describe users’ dynamic preferences. Sequential recommender models based on deep learning have achieved state-of-the-art results. However, with the increasing number of users and items, the traditional item embedding table may consume a huge amount of memory so that the model may be more difficult to deploy to resource-limited devices. In this paper, we propose a multi-dimensional quantization encoding(MDQE) method to resolve this issue. MDQE mainly consists of two compression techniques. We first divide items into several groups according to the interaction frequency of items and assign different dimensions to each group to construct multi-dimensional group-wise embedding tables. Then, we use mapping matrices to transform the multi-dimensional group-wise embedding tables into quantized codebooks for further compressing. The experiments on three real-world datasets demonstrate that the proposed MDQE can achieve up to 13.86x compression ratio with negligible accuracy loss during inference.
序贯推荐模型由于具有良好的描述用户动态偏好的能力,成为当前推荐系统领域的研究热点。基于深度学习的顺序推荐模型已经取得了最先进的结果。然而,随着用户和项目数量的增加,传统的项目嵌入表可能会消耗大量的内存,使得模型更难以部署到资源有限的设备上。本文提出了一种多维量化编码(MDQE)方法来解决这个问题。MDQE主要包括两种压缩技术。我们首先根据项目的交互频率将项目分成若干组,并为每组分配不同的维度,构建多维分组嵌入表。然后,我们使用映射矩阵将多维分组嵌入表转换为量化码本,以便进一步压缩。在三个真实数据集上的实验表明,所提出的MDQE可以实现高达13.86倍的压缩比,并且在推理过程中精度损失可以忽略不计。
{"title":"Compressing Embedding Table via Multi-dimensional Quantization Encoding for Sequential Recommender Model","authors":"Feng Wang, Miaomiao Dai, Xudong Li, Liquan Pan","doi":"10.1145/3507971.3508010","DOIUrl":"https://doi.org/10.1145/3507971.3508010","url":null,"abstract":"Sequential recommender models have become a research hotspot in the field of current recommender systems due to its excellent ability to describe users’ dynamic preferences. Sequential recommender models based on deep learning have achieved state-of-the-art results. However, with the increasing number of users and items, the traditional item embedding table may consume a huge amount of memory so that the model may be more difficult to deploy to resource-limited devices. In this paper, we propose a multi-dimensional quantization encoding(MDQE) method to resolve this issue. MDQE mainly consists of two compression techniques. We first divide items into several groups according to the interaction frequency of items and assign different dimensions to each group to construct multi-dimensional group-wise embedding tables. Then, we use mapping matrices to transform the multi-dimensional group-wise embedding tables into quantized codebooks for further compressing. The experiments on three real-world datasets demonstrate that the proposed MDQE can achieve up to 13.86x compression ratio with negligible accuracy loss during inference.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115263097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MOAFL: Potential Seed Selection with Multi-Objective Particle Swarm Optimization MOAFL:基于多目标粒子群优化的潜在种子选择
Jinman Jiang, Rui Ma, Xiajing Wang, Jinyuan He, Donghai Tian, Jiating Li
Fuzzing has become one of the most widely used technology for discovering software vulnerabilities thanks to its effectiveness. However, even the state-of-the-art fuzzers are not very efficient at identifying promising seeds. Coverage-guided fuzzers like American Fuzzy Lop (AFL) usually employ single criterion to evaluate the quality of seeds that may pass up potential seeds. To overcome this problem, we design a potential seed selection scheme, called MOAFL. The key idea is to measure seed potential utilizing multiple objectives and prioritize promising seeds that are more likely to generate interesting seeds via mutation. More specifically, MOAFL leverages lightweight swarm intelligence techniques like Multi-Objective Particle Swarm Optimization (MOPSO) to handle multi-criteria seed selection, which allows MOAFL to choose promising seeds effectively. We implement this scheme based on AFL and our evaluations on LAVA-M dataset and 7 popular real-world programs demonstrate that MOAFL significantly increases the code coverage over AFL.
模糊测试由于其有效性而成为应用最广泛的软件漏洞发现技术之一。然而,即使是最先进的测毛器,在识别有希望的种子方面也不是很有效。美国的Fuzzy Lop (AFL)等覆盖度导向的模糊器通常采用单一的标准来评估种子的质量,这可能会导致潜在种子的流失。为了克服这个问题,我们设计了一个潜在的种子选择方案,称为MOAFL。关键思想是利用多个目标来衡量种子潜力,并优先考虑更有可能通过突变产生有趣种子的有前途的种子。更具体地说,MOAFL利用轻量级群体智能技术,如多目标粒子群优化(MOPSO)来处理多标准种子选择,使MOAFL能够有效地选择有前途的种子。我们基于AFL实现了该方案,并对LAVA-M数据集和7个流行的现实世界程序进行了评估,结果表明MOAFL比AFL显著提高了代码覆盖率。
{"title":"MOAFL: Potential Seed Selection with Multi-Objective Particle Swarm Optimization","authors":"Jinman Jiang, Rui Ma, Xiajing Wang, Jinyuan He, Donghai Tian, Jiating Li","doi":"10.1145/3507971.3507977","DOIUrl":"https://doi.org/10.1145/3507971.3507977","url":null,"abstract":"Fuzzing has become one of the most widely used technology for discovering software vulnerabilities thanks to its effectiveness. However, even the state-of-the-art fuzzers are not very efficient at identifying promising seeds. Coverage-guided fuzzers like American Fuzzy Lop (AFL) usually employ single criterion to evaluate the quality of seeds that may pass up potential seeds. To overcome this problem, we design a potential seed selection scheme, called MOAFL. The key idea is to measure seed potential utilizing multiple objectives and prioritize promising seeds that are more likely to generate interesting seeds via mutation. More specifically, MOAFL leverages lightweight swarm intelligence techniques like Multi-Objective Particle Swarm Optimization (MOPSO) to handle multi-criteria seed selection, which allows MOAFL to choose promising seeds effectively. We implement this scheme based on AFL and our evaluations on LAVA-M dataset and 7 popular real-world programs demonstrate that MOAFL significantly increases the code coverage over AFL.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116252882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of cross-system identity authentication system suitable for new-type electric power system 适用于新型电力系统的跨系统身份认证系统设计
Meng Xu, Feng Zhai, Longhao Liu, Xiaobing Liang
In order to solve the flexibility boundary security access problem of new-type electric power system, this paper has designed a cross-system identity authentication system which can help power grid and systems both on the generation side and demand side to build a foundation of trust for further data sharing. This system can realize a variety of cryptograph-based unified identity authentication such as PKI-based, IBC-based, blockchain-based identity authentication, etc. This system is also designed to meet high concurrency requirements of identity authentication. In order to verify the fucntion of the CSIA system, this paper has also make the system workflow simulated. The test results showed that the system can provide a cross-system identity authentication service effectively for systems and devices based on different identity authentication technology.
为了解决新型电力系统的柔性边界安全访问问题,本文设计了一种跨系统身份认证系统,可以帮助电网以及发电侧和需求侧的系统为进一步的数据共享建立信任基础。本系统可以实现基于pki、基于ibc、基于区块链等多种基于密码学的统一身份认证。该系统还可以满足身份认证的高并发性要求。为了验证CSIA系统的功能,本文还对系统的工作流程进行了仿真。测试结果表明,该系统能够有效地为基于不同身份认证技术的系统和设备提供跨系统的身份认证服务。
{"title":"Design of cross-system identity authentication system suitable for new-type electric power system","authors":"Meng Xu, Feng Zhai, Longhao Liu, Xiaobing Liang","doi":"10.1145/3507971.3507992","DOIUrl":"https://doi.org/10.1145/3507971.3507992","url":null,"abstract":"In order to solve the flexibility boundary security access problem of new-type electric power system, this paper has designed a cross-system identity authentication system which can help power grid and systems both on the generation side and demand side to build a foundation of trust for further data sharing. This system can realize a variety of cryptograph-based unified identity authentication such as PKI-based, IBC-based, blockchain-based identity authentication, etc. This system is also designed to meet high concurrency requirements of identity authentication. In order to verify the fucntion of the CSIA system, this paper has also make the system workflow simulated. The test results showed that the system can provide a cross-system identity authentication service effectively for systems and devices based on different identity authentication technology.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127346068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Robustness Optimization Method for Internet of Things Using Graph Neural Networks 基于图神经网络的物联网鲁棒性智能优化方法
Yabin Peng, Caixia Liu, Shuxin Liu, Kai Wang
The limited resources and complex application environment of Internet of Things (IoT) devices, making them vulnerable to cyberattacks and natural disasters. Thus, how to improve the robustness of the IoT topology becomes a critical issue. Existing research on the robustness of IoT topology mostly uses heuristic algorithms, and the high computational cost cannot meet the needs of topology optimization in low-latency IoT scenarios. To solve this problem, this paper proposes an intelligent robustness optimization method for IoT using graph neural networks (TRO-GNN). The method first uses the graph neural network to extract the evolution characteristics from the initial IoT topology to the highly robust topology from the data set, and then the output of the graph neural network is transformed into an effective predicted topology by using the designed robustness search strategy. The experimental results show that TRO-GNN effectively improve the robustness of scale-free IoT topology against malicious attacks, and the computational cost is low.
物联网设备资源有限,应用环境复杂,容易受到网络攻击和自然灾害的影响。因此,如何提高物联网拓扑的鲁棒性成为一个关键问题。现有的物联网拓扑鲁棒性研究多采用启发式算法,计算成本高,无法满足低时延物联网场景下拓扑优化的需求。为了解决这一问题,本文提出了一种基于图神经网络(TRO-GNN)的物联网鲁棒性智能优化方法。该方法首先利用图神经网络从数据集中提取物联网初始拓扑到高度鲁棒拓扑的演化特征,然后利用设计的鲁棒搜索策略将图神经网络的输出转化为有效的预测拓扑。实验结果表明,TRO-GNN有效提高了无标度物联网拓扑对恶意攻击的鲁棒性,且计算成本低。
{"title":"An Intelligent Robustness Optimization Method for Internet of Things Using Graph Neural Networks","authors":"Yabin Peng, Caixia Liu, Shuxin Liu, Kai Wang","doi":"10.1145/3507971.3508000","DOIUrl":"https://doi.org/10.1145/3507971.3508000","url":null,"abstract":"The limited resources and complex application environment of Internet of Things (IoT) devices, making them vulnerable to cyberattacks and natural disasters. Thus, how to improve the robustness of the IoT topology becomes a critical issue. Existing research on the robustness of IoT topology mostly uses heuristic algorithms, and the high computational cost cannot meet the needs of topology optimization in low-latency IoT scenarios. To solve this problem, this paper proposes an intelligent robustness optimization method for IoT using graph neural networks (TRO-GNN). The method first uses the graph neural network to extract the evolution characteristics from the initial IoT topology to the highly robust topology from the data set, and then the output of the graph neural network is transformed into an effective predicted topology by using the designed robustness search strategy. The experimental results show that TRO-GNN effectively improve the robustness of scale-free IoT topology against malicious attacks, and the computational cost is low.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115050274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
3D Trajectory Design of UAV Based on Deep Reinforcement Learning in Time-varying Scenes 时变场景下基于深度强化学习的无人机三维轨迹设计
Qingya Li, Li Guo, Chao Dong, Xidong Mu
A joint framework is proposed for the 3D trajectory design of an unmanned aerial vehicle (UAV) as an flying base station under the time-varying scenarios of users’ mobility and communication request probability changes. The problem of 3D trajectory design is formulated for maximizing the throughput during a UAV’s flying period while satisfying the rate requirement of all ground users (GUEs). Specifically, we consider that GUEs change their positions and communication request probabilities at each time slot; the UAV needs to predict these changes so that it can design its 3D trajectory in advance to achieve the optimization target. In an effort to solve this pertinent problem, an echo state network (ESN) based prediction algorithm is first proposed for predicting the positions and communication request probabilities of GUEs. Based on these predictions, a Deep Reinforcement Learning (DRL) method is then invoked for finding the optimal deployment locations of UAV in each time slots. The proposed method 1) uses ESN based predictions to represent a part of DRL agent’s state; 2) designs the action and reward for DRL agent to learn the environment and its dynamics; 3) makes optimal strategy under the guidance of a double deep Q network (DDQN). The simulation results show that the UAV can dynamically adjust its trajectory to adapt to time-varying scenarios through our proposed algorithm and throughput gains of about 10.68% are achieved.
针对用户机动性和通信请求概率变化的时变场景,提出了一种无人机作为飞行基站的三维轨迹设计联合框架。为了在满足所有地面用户的速率要求的情况下,最大限度地提高无人机在飞行期间的吞吐量,提出了三维轨迹设计问题。具体来说,我们考虑在每个时隙中,移动目标改变其位置和通信请求概率;无人机需要预测这些变化,以便提前设计其三维轨迹以实现优化目标。为了解决这一问题,首次提出了一种基于回声状态网络(ESN)的预测算法,用于预测目标的位置和通信请求概率。基于这些预测,然后调用深度强化学习(DRL)方法来寻找无人机在每个时隙中的最佳部署位置。提出的方法1)使用基于ESN的预测来表示DRL代理状态的一部分;2)设计DRL agent学习环境及其动态的行为和奖励;3)在双深度Q网络(DDQN)的指导下制定最优策略。仿真结果表明,该算法可使无人机动态调整轨迹以适应时变场景,吞吐量增益约为10.68%。
{"title":"3D Trajectory Design of UAV Based on Deep Reinforcement Learning in Time-varying Scenes","authors":"Qingya Li, Li Guo, Chao Dong, Xidong Mu","doi":"10.1145/3507971.3507982","DOIUrl":"https://doi.org/10.1145/3507971.3507982","url":null,"abstract":"A joint framework is proposed for the 3D trajectory design of an unmanned aerial vehicle (UAV) as an flying base station under the time-varying scenarios of users’ mobility and communication request probability changes. The problem of 3D trajectory design is formulated for maximizing the throughput during a UAV’s flying period while satisfying the rate requirement of all ground users (GUEs). Specifically, we consider that GUEs change their positions and communication request probabilities at each time slot; the UAV needs to predict these changes so that it can design its 3D trajectory in advance to achieve the optimization target. In an effort to solve this pertinent problem, an echo state network (ESN) based prediction algorithm is first proposed for predicting the positions and communication request probabilities of GUEs. Based on these predictions, a Deep Reinforcement Learning (DRL) method is then invoked for finding the optimal deployment locations of UAV in each time slots. The proposed method 1) uses ESN based predictions to represent a part of DRL agent’s state; 2) designs the action and reward for DRL agent to learn the environment and its dynamics; 3) makes optimal strategy under the guidance of a double deep Q network (DDQN). The simulation results show that the UAV can dynamically adjust its trajectory to adapt to time-varying scenarios through our proposed algorithm and throughput gains of about 10.68% are achieved.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distant Supervised Relation Extraction with Hierarchical Attention Mechanism 基于层次注意机制的远程监督关系提取
Jianying Liu, Liandong Chen, Rui Shi, J. Xu, AN Liu
Current distant supervised relation extraction algorithms based on Neural Networks mostly use long short-term memory networks and convolutional neural networks, which cannot capture long-distance features of sentences. This paper proposes a distant supervised relation extraction model based on hierarchical attention mechanism, which uses self-attention mechanism to calculate features between words, and sentence-level soft-attention mechanism to extract dimensionality of sentence features. Compared with the previous method, the proposed model can better capture sentence features and improve the effect of sentence relation classification. On the dataset NYT-10, compared with the PCNN_ATT algorithm, the P@100, P@200, and P@300 indicators increase by 4.8%, 4.9% and 2.3%, respectively, and the AUC indicator increases by 1.1%.
目前基于神经网络的远程监督关系提取算法多采用长短期记忆网络和卷积神经网络,无法捕捉句子的远程特征。本文提出了一种基于分层注意机制的远程监督关系提取模型,该模型采用自注意机制计算词间特征,采用句子级软注意机制提取句子特征的维度。与之前的方法相比,该模型能够更好地捕捉句子特征,提高句子关系分类的效果。在数据集NYT-10上,与PCNN_ATT算法相比,P@100、P@200和P@300指标分别提高了4.8%、4.9%和2.3%,AUC指标提高了1.1%。
{"title":"Distant Supervised Relation Extraction with Hierarchical Attention Mechanism","authors":"Jianying Liu, Liandong Chen, Rui Shi, J. Xu, AN Liu","doi":"10.1145/3507971.3507980","DOIUrl":"https://doi.org/10.1145/3507971.3507980","url":null,"abstract":"Current distant supervised relation extraction algorithms based on Neural Networks mostly use long short-term memory networks and convolutional neural networks, which cannot capture long-distance features of sentences. This paper proposes a distant supervised relation extraction model based on hierarchical attention mechanism, which uses self-attention mechanism to calculate features between words, and sentence-level soft-attention mechanism to extract dimensionality of sentence features. Compared with the previous method, the proposed model can better capture sentence features and improve the effect of sentence relation classification. On the dataset NYT-10, compared with the PCNN_ATT algorithm, the P@100, P@200, and P@300 indicators increase by 4.8%, 4.9% and 2.3%, respectively, and the AUC indicator increases by 1.1%.","PeriodicalId":439757,"journal":{"name":"Proceedings of the 7th International Conference on Communication and Information Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 7th International Conference on Communication and Information Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1