首页 > 最新文献

Tsinghua Science and Technology最新文献

英文 中文
CCDive: A Deep Dive into Code Clone Detection Using Local Sequence Alignment CCDive:深入研究使用本地序列比对的代码克隆检测
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010075
Yasir Glani;Luo Ping;Syed Asad Shah;Lin Ke
The rapid evolution of software development has accentuated the deficiencies of prevailing code clone detection techniques. As modern applications become more complex, traditional cloning tools often struggle to detect general and large-gap clones that undergo regular modification. Such challenges pose threats to software integrity, emphasizing the critical need for improved code cloning techniques. Observing the prevailing gap, we propose an innovative code clone dive (CCDive) code cloning technique, which is designed to detect an extensive range of clones, from direct clones to the often challenging large-gap clones, thoroughly covering different categories, such as very strongly Type-III, strongly Type-III, and moderate Type-III clones. In CCDive, the fusion of a level-by-level abstraction and an innovative similarity matching algorithm ensures the recognition of clones even when nearly half the original code in the chunk has been modified. Furthermore, by integrating the Smith-Waterman local sequence alignment, the capability of CCDive to spot exact code transformation locations can be enhanced. In a comprehensive evaluation, CCDive was compared with well-known code cloning techniques. The efficacy of CCDive was measured using precision, recall, F1-score, accuracy, and efficiency. CCDive consistently surpassed other techniques in the precision, recall, F1-score, and accuracy metrics for both file-based and function-based clone detection. The robust performance of CCDive emphasizes its effectiveness, reliability, accuracy, and efficiency, making it well-suited for practical applications in the real world.
软件开发的快速发展凸显了现有代码克隆检测技术的不足。随着现代应用程序变得越来越复杂,传统的克隆工具往往难以检测经过定期修改的一般克隆和大间隙克隆。这些挑战对软件的完整性构成威胁,强调了改进代码克隆技术的迫切需要。观察到普遍存在的差距,我们提出了一种创新的代码克隆潜水(CCDive)代码克隆技术,该技术旨在检测范围广泛的克隆,从直接克隆到具有挑战性的大间隙克隆,彻底覆盖不同的类别,如非常强iii型,强iii型和中等iii型克隆。在CCDive中,逐级抽象和创新的相似性匹配算法的融合确保了即使在块中近一半的原始代码被修改时也能识别克隆。此外,通过集成Smith-Waterman局部序列比对,可以增强CCDive识别准确代码转换位置的能力。在综合评价中,将CCDive与知名的代码克隆技术进行了比较。CCDive的疗效通过精密度、召回率、f1评分、准确度和效率来衡量。CCDive在基于文件和基于功能的克隆检测的精密度、召回率、f1分数和准确度指标上始终优于其他技术。CCDive的强大性能强调了其有效性、可靠性、准确性和效率,使其非常适合现实世界中的实际应用。
{"title":"CCDive: A Deep Dive into Code Clone Detection Using Local Sequence Alignment","authors":"Yasir Glani;Luo Ping;Syed Asad Shah;Lin Ke","doi":"10.26599/TST.2024.9010075","DOIUrl":"https://doi.org/10.26599/TST.2024.9010075","url":null,"abstract":"The rapid evolution of software development has accentuated the deficiencies of prevailing code clone detection techniques. As modern applications become more complex, traditional cloning tools often struggle to detect general and large-gap clones that undergo regular modification. Such challenges pose threats to software integrity, emphasizing the critical need for improved code cloning techniques. Observing the prevailing gap, we propose an innovative code clone dive (CCDive) code cloning technique, which is designed to detect an extensive range of clones, from direct clones to the often challenging large-gap clones, thoroughly covering different categories, such as very strongly Type-III, strongly Type-III, and moderate Type-III clones. In CCDive, the fusion of a level-by-level abstraction and an innovative similarity matching algorithm ensures the recognition of clones even when nearly half the original code in the chunk has been modified. Furthermore, by integrating the Smith-Waterman local sequence alignment, the capability of CCDive to spot exact code transformation locations can be enhanced. In a comprehensive evaluation, CCDive was compared with well-known code cloning techniques. The efficacy of CCDive was measured using precision, recall, F1-score, accuracy, and efficiency. CCDive consistently surpassed other techniques in the precision, recall, F1-score, and accuracy metrics for both file-based and function-based clone detection. The robust performance of CCDive emphasizes its effectiveness, reliability, accuracy, and efficiency, making it well-suited for practical applications in the real world.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1435-1456"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908670","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Causality-Based Contrastive Incremental Learning Framework for Domain Generalization 基于因果关系的领域泛化对比增量学习框架
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010072
Xin Wang;Qingjie Zhao;Lei Wang;Wangwang Liu
Learning domain-invariant feature representations is critical to alleviate the distribution differences between training and testing domains. The existing mainstream domain generalization approaches primarily pursue to align the across-domain distributions to extract the transferable feature representations. However, these representations may be insufficient and unstable. Moreover, these networks may also undergo catastrophic forgetting because the previous learned knowledge is replaced by the new learned knowledge. To cope with these issues, we propose a novel causality-based contrastive incremental learning model for domain generalization, which mainly includes three components: (1) intra-domain causal factorization, (2) inter-domain Mahalanobis similarity metric, and (3) contrastive knowledge distillation. The model extracts intra and inter domain-invariant knowledge to improve model generalization. Specifically, we first introduce a causal factori-zation to extract intra-domain invariant knowledge. Then, we design a Mahalanobis similarity metric to extract common inter-domain invariant knowledge. Finally, we propose a contrastive knowledge distillation with exponential moving average to distill model parameters in a smooth way to preserve the previous learned knowledge and mitigate model forgetting. Extensive experiments on several domain generalization benchmarks prove that our model achieves the state-of-the-art results, which sufficiently show the effectiveness of our model.
学习域不变特征表示对于缓解训练域和测试域之间的分布差异至关重要。现有的主流领域泛化方法主要是通过对齐跨领域分布来提取可转移的特征表示。然而,这些陈述可能是不充分和不稳定的。此外,这些网络也可能发生灾难性的遗忘,因为以前学到的知识被新的知识所取代。为了解决这些问题,我们提出了一种新的基于因果关系的领域泛化对比增量学习模型,该模型主要包括三个部分:(1)领域内因果分解,(2)领域间Mahalanobis相似性度量和(3)对比知识蒸馏。该模型提取域内和域间不变知识,提高模型的泛化能力。具体而言,我们首先引入因果分解来提取域内不变知识。然后,我们设计了一个Mahalanobis相似度度量来提取共同的域间不变知识。最后,我们提出了一种与指数移动平均相比较的知识蒸馏方法,以平滑的方式提取模型参数,以保留先前学习的知识并减轻模型遗忘。在多个领域泛化基准上的大量实验证明,我们的模型达到了最先进的结果,充分显示了我们模型的有效性。
{"title":"Causality-Based Contrastive Incremental Learning Framework for Domain Generalization","authors":"Xin Wang;Qingjie Zhao;Lei Wang;Wangwang Liu","doi":"10.26599/TST.2024.9010072","DOIUrl":"https://doi.org/10.26599/TST.2024.9010072","url":null,"abstract":"Learning domain-invariant feature representations is critical to alleviate the distribution differences between training and testing domains. The existing mainstream domain generalization approaches primarily pursue to align the across-domain distributions to extract the transferable feature representations. However, these representations may be insufficient and unstable. Moreover, these networks may also undergo catastrophic forgetting because the previous learned knowledge is replaced by the new learned knowledge. To cope with these issues, we propose a novel causality-based contrastive incremental learning model for domain generalization, which mainly includes three components: (1) intra-domain causal factorization, (2) inter-domain Mahalanobis similarity metric, and (3) contrastive knowledge distillation. The model extracts intra and inter domain-invariant knowledge to improve model generalization. Specifically, we first introduce a causal factori-zation to extract intra-domain invariant knowledge. Then, we design a Mahalanobis similarity metric to extract common inter-domain invariant knowledge. Finally, we propose a contrastive knowledge distillation with exponential moving average to distill model parameters in a smooth way to preserve the previous learned knowledge and mitigate model forgetting. Extensive experiments on several domain generalization benchmarks prove that our model achieves the state-of-the-art results, which sufficiently show the effectiveness of our model.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1636-1647"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908663","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRESP: Cost-Aware Recommendation-Oriented Edge Service Provision CRESP:以成本为导向的边缘服务提供
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010151
Li Huang;Bo Li;Lu Zhao
In the 5G environment, the edge computing paradigm enables service providers to deploy their service instances on distributed edge servers to serve nearby end users with extremely low latency. This boosts the emergence of modern applications, like AR/VR, online gaming, and autonomous vehicles. Existing approaches find service provision strategies under the assumption that all the user requirements are known. However, this assumption may not be true in practice and thus the effectiveness of existing approaches could be undermined. Inspired by the great success of recommender systems in various fields, we can mine users' interests in new services based on their similarities in terms of current service usage. Then, new service instances can be provisioned accordingly to better fulfil users' requirements. We formulate the problem studied in this paper as a Cost-aware Recommendation-oriented Edge Service Provision (CRESP) problem. Then, we formally model the CRESP problem as a Constrained Optimization Problem (COP). Next, we propose CRESP-O to find optimal solutions to small-scale CRESP problems. Besides, to solve large-scale CRESP problems efficiently, we propose an approximation approach named CRESP-A, which has a theoretical performance guarantee. Finally, we experimentally evaluate the performance of both CRESP-O and CRESP-A against several state-of-the-art approaches on a public testbed.
在5G环境中,边缘计算范式使服务提供商能够将其服务实例部署在分布式边缘服务器上,以极低的延迟为附近的最终用户提供服务。这推动了AR/VR、在线游戏和自动驾驶汽车等现代应用的出现。现有方法在假设所有用户需求都已知的情况下寻找服务提供策略。然而,这一假设在实践中可能并不正确,因此现有办法的有效性可能受到损害。受推荐系统在各个领域取得巨大成功的启发,我们可以根据用户在当前服务使用方面的相似性来挖掘用户对新服务的兴趣。然后,可以相应地提供新的服务实例,以更好地满足用户的需求。我们将本文研究的问题描述为一个成本意识的推荐导向边缘服务提供(CRESP)问题。然后,我们将CRESP问题正式建模为约束优化问题(COP)。接下来,我们提出了CRESP- o来寻找小规模CRESP问题的最优解。此外,为了有效地解决大规模的CRESP问题,我们提出了一种具有理论性能保证的近似方法——CRESP- a。最后,我们在公共测试平台上对几种最先进的方法对CRESP-O和CRESP-A的性能进行了实验评估。
{"title":"CRESP: Cost-Aware Recommendation-Oriented Edge Service Provision","authors":"Li Huang;Bo Li;Lu Zhao","doi":"10.26599/TST.2024.9010151","DOIUrl":"https://doi.org/10.26599/TST.2024.9010151","url":null,"abstract":"In the 5G environment, the edge computing paradigm enables service providers to deploy their service instances on distributed edge servers to serve nearby end users with extremely low latency. This boosts the emergence of modern applications, like AR/VR, online gaming, and autonomous vehicles. Existing approaches find service provision strategies under the assumption that all the user requirements are known. However, this assumption may not be true in practice and thus the effectiveness of existing approaches could be undermined. Inspired by the great success of recommender systems in various fields, we can mine users' interests in new services based on their similarities in terms of current service usage. Then, new service instances can be provisioned accordingly to better fulfil users' requirements. We formulate the problem studied in this paper as a Cost-aware Recommendation-oriented Edge Service Provision (CRESP) problem. Then, we formally model the CRESP problem as a Constrained Optimization Problem (COP). Next, we propose CRESP-O to find optimal solutions to small-scale CRESP problems. Besides, to solve large-scale CRESP problems efficiently, we propose an approximation approach named CRESP-A, which has a theoretical performance guarantee. Finally, we experimentally evaluate the performance of both CRESP-O and CRESP-A against several state-of-the-art approaches on a public testbed.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1865-1884"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908596","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143535438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy Policy Text Compliance Reasoning Framework with Large Language Models for Healthcare Services 医疗保健服务的隐私策略文本遵从性推理框架与大型语言模型
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010089
Jintao Chen;Fan Wang;Shengye Pang;Mingshuai Chen;Meng Xi;Tiancheng Zhao;Jianwei Yin
The advancement of artificial intelligence-generated content drives the diversification of healthcare services, resulting in increased private information collection by healthcare service providers. Therefore, compliance with privacy regulations has increasingly become a paramount concern for both regulatory authorities and consumers. Privacy policies are crucial for consumers to understand how their personal information is collected, stored, and processed. In this work, we propose a privacy policy text compliance reasoning framework called FACTOR, which harnesses the power of large language models (LLMs). Since the General Data Protection Regulation (GDPR) has broad applicability, this work selects Article 13 of the GDPR as regulation requirements. FACTOR segments the privacy policy text using a sliding window strategy and employs LLM-based text entailment to assess compliance for each segment. The framework then applies a rule-based ensemble approach to aggregate the entailment results for all regulation requirements from the GDPR. Our experiments on a synthetic corpus of 388 privacy policies demonstrate the effectiveness of FACTOR. Additionally, we analyze 100 randomly selected websites offering healthcare services, revealing that nine of them lack a privacy policy altogether, while 29 have privacy policy texts that fail to meet the regulation requirements.
人工智能生成内容的进步推动了医疗保健服务的多样化,导致医疗保健服务提供商收集的私人信息增加。因此,遵守隐私法规日益成为监管机构和消费者最关心的问题。隐私政策对于消费者了解他们的个人信息是如何被收集、存储和处理的至关重要。在这项工作中,我们提出了一个名为FACTOR的隐私策略文本遵从性推理框架,它利用了大型语言模型(llm)的功能。由于《通用数据保护条例》(GDPR)具有广泛的适用性,本文选择GDPR第13条作为监管要求。FACTOR使用滑动窗口策略对隐私策略文本进行分段,并使用基于llm的文本蕴意来评估每个分段的遵从性。然后,该框架应用基于规则的集成方法来聚合来自GDPR的所有监管要求的隐含结果。我们在388个隐私策略的合成语料库上的实验证明了FACTOR的有效性。此外,我们随机选取了100家提供医疗保健服务的网站进行分析,发现其中9家完全没有隐私政策,29家的隐私政策文本不符合监管要求。
{"title":"A Privacy Policy Text Compliance Reasoning Framework with Large Language Models for Healthcare Services","authors":"Jintao Chen;Fan Wang;Shengye Pang;Mingshuai Chen;Meng Xi;Tiancheng Zhao;Jianwei Yin","doi":"10.26599/TST.2024.9010089","DOIUrl":"https://doi.org/10.26599/TST.2024.9010089","url":null,"abstract":"The advancement of artificial intelligence-generated content drives the diversification of healthcare services, resulting in increased private information collection by healthcare service providers. Therefore, compliance with privacy regulations has increasingly become a paramount concern for both regulatory authorities and consumers. Privacy policies are crucial for consumers to understand how their personal information is collected, stored, and processed. In this work, we propose a privacy policy text compliance reasoning framework called FACTOR, which harnesses the power of large language models (LLMs). Since the General Data Protection Regulation (GDPR) has broad applicability, this work selects Article 13 of the GDPR as regulation requirements. FACTOR segments the privacy policy text using a sliding window strategy and employs LLM-based text entailment to assess compliance for each segment. The framework then applies a rule-based ensemble approach to aggregate the entailment results for all regulation requirements from the GDPR. Our experiments on a synthetic corpus of 388 privacy policies demonstrate the effectiveness of FACTOR. Additionally, we analyze 100 randomly selected websites offering healthcare services, revealing that nine of them lack a privacy policy altogether, while 29 have privacy policy texts that fail to meet the regulation requirements.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1831-1845"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908666","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143535484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lasserre SDP Rounding Approximation Algorithm for Max Directed 3-Section 最大有向3截面的Lasserre SDP舍入逼近算法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010214
Guangfeng Li;Jian Sun;Donglei Du;Xiaoyan Zhang
We consider the Max Directed 3-Section problem, which is closely connected to other well-known graph partition problems, such as Max Cut and Max Bisection. Given an arc-weighted directed graph, the goal of the Max Directed 3-Section problem is to partition the vertex set into three disjoint subsets with equal size, while maximizing the total weight of arcs crossing different vertex subsets. By combining the Lasserre hierarchy with the random hyperplane rounding strategy, we propose a polynomial-time algorithm with approximation ratio of 0.489.
我们考虑最大有向3截面问题,它与其他众所周知的图划分问题密切相关,如最大切割和最大平分。给定一个弧加权有向图,最大有向3段问题的目标是将顶点集划分为三个大小相等的不相交的子集,同时使穿过不同顶点子集的弧的总权值最大化。将Lasserre层次与随机超平面舍入策略相结合,提出了一种近似比为0.489的多项式时间算法。
{"title":"A Lasserre SDP Rounding Approximation Algorithm for Max Directed 3-Section","authors":"Guangfeng Li;Jian Sun;Donglei Du;Xiaoyan Zhang","doi":"10.26599/TST.2024.9010214","DOIUrl":"https://doi.org/10.26599/TST.2024.9010214","url":null,"abstract":"We consider the Max Directed 3-Section problem, which is closely connected to other well-known graph partition problems, such as Max Cut and Max Bisection. Given an arc-weighted directed graph, the goal of the Max Directed 3-Section problem is to partition the vertex set into three disjoint subsets with equal size, while maximizing the total weight of arcs crossing different vertex subsets. By combining the Lasserre hierarchy with the random hyperplane rounding strategy, we propose a polynomial-time algorithm with approximation ratio of 0.489.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1885-1896"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908669","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143535532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Morality Difference when Programming and Actually Operating Autonomous Machines 编程和实际操作自主机器时的人类道德差异
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010062
Wenfeng Yi;Wenhan Wu;Maoyin Chen;Xiaoping Zheng
Autonomous machines (AMs) are poised to possess human-like moral cognition, yet their morality is often pre-programmed for safety. This raises the question of whether the morality intended by programmers aligns with their actions during actual operation, a crucial consideration for a future society with both humans and AMs. Investigating this, we use a micro-robot swarm in a simulated fire scenario, with 180 participants, including 102 robot programmers, completing moral questionnaires and participating in virtual escape trials. These exercises mirror common societal moral dilemmas. Our comparative analysis reveals a “morality gap” between programming presets and real-time operation, primarily influenced by uncertainty about the future and heightened by external pressures, especially social punishment. This discrepancy suggests that operational morality can diverge from programmed intentions, underlining the need for careful AM design to foster a collaborative and efficient society.
自主机器(AMs)有望拥有类似人类的道德认知,但它们的道德通常是预先设定好的安全程序。这就提出了一个问题,即程序员所期望的道德是否与他们在实际操作中的行为一致,这是未来人类和人工智能共同存在的社会的一个关键考虑因素。为此,我们在模拟火灾场景中使用微型机器人群,180名参与者,包括102名机器人程序员,完成道德问卷并参加虚拟逃跑试验。这些练习反映了常见的社会道德困境。我们的对比分析揭示了编程预设和实时操作之间的“道德鸿沟”,主要受未来不确定性的影响,并受到外部压力(尤其是社会惩罚)的加剧。这种差异表明,操作道德可能偏离程序化的意图,强调需要仔细设计AM,以培养一个协作和高效的社会。
{"title":"Human Morality Difference when Programming and Actually Operating Autonomous Machines","authors":"Wenfeng Yi;Wenhan Wu;Maoyin Chen;Xiaoping Zheng","doi":"10.26599/TST.2024.9010062","DOIUrl":"https://doi.org/10.26599/TST.2024.9010062","url":null,"abstract":"Autonomous machines (AMs) are poised to possess human-like moral cognition, yet their morality is often pre-programmed for safety. This raises the question of whether the morality intended by programmers aligns with their actions during actual operation, a crucial consideration for a future society with both humans and AMs. Investigating this, we use a micro-robot swarm in a simulated fire scenario, with 180 participants, including 102 robot programmers, completing moral questionnaires and participating in virtual escape trials. These exercises mirror common societal moral dilemmas. Our comparative analysis reveals a “morality gap” between programming presets and real-time operation, primarily influenced by uncertainty about the future and heightened by external pressures, especially social punishment. This discrepancy suggests that operational morality can diverge from programmed intentions, underlining the need for careful AM design to foster a collaborative and efficient society.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1648-1658"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908660","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Challenges in Internet of Vehicles (IoV) for ITS: A Survey 面向ITS的车联网(IoV)安全挑战研究
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010083
Edris Khezri;Hiwa Hassanzadeh;Rebaz Othman Yahya;Mahdi Mir
Due to their diverse applications, including safety, welfare, and improving traffic efficiency, inter-vehicle ad-hoc networks have been extensively studied. Globally, road congestion, accidents, fuel consumption, and environmental pollution caused by the large number of vehicles have become serious problems that have caused a lot of human and financial losses. Intelligent transportation systems (ITS) have introduced VANETs in order to overcome these problems. In vehicular ad hoc networks (VANETs), vehicles equipped with wireless interfaces can communicate with other vehicles and with fixed roadside equipment via mobile ad hoc networks (MANETs). Messages are transmitted over open wireless channels in VANETs. Malicious nodes target these networks to protect them from various attacks, such as interference, eavesdropping, spoofing, denial of service, Sybil, black holes, worm holes, gray holes, etc. Security of VANETs is therefore one of the most significant issues. Security issues, attacks, attackers, and secure routing protocols in VANETs are discussed in this article, as well as available solutions to solve security issues.
由于其在安全、福利和提高交通效率等方面的广泛应用,车辆间自组织网络得到了广泛的研究。在全球范围内,大量车辆造成的道路拥堵、事故、燃料消耗和环境污染已经成为严重的问题,造成了大量的人员和经济损失。为了克服这些问题,智能交通系统(ITS)引入了VANETs。在车辆自组织网络(vanet)中,配备无线接口的车辆可以通过移动自组织网络(manet)与其他车辆和固定的路边设备进行通信。消息在vanet中通过开放的无线信道传输。恶意节点以这些网络为目标,保护它们免受各种攻击,如干扰、窃听、欺骗、拒绝服务、Sybil、黑洞、蠕虫洞、灰洞等。因此,VANETs的安全性是最重要的问题之一。本文讨论了vanet中的安全问题、攻击、攻击者和安全路由协议,以及解决安全问题的可用解决方案。
{"title":"Security Challenges in Internet of Vehicles (IoV) for ITS: A Survey","authors":"Edris Khezri;Hiwa Hassanzadeh;Rebaz Othman Yahya;Mahdi Mir","doi":"10.26599/TST.2024.9010083","DOIUrl":"https://doi.org/10.26599/TST.2024.9010083","url":null,"abstract":"Due to their diverse applications, including safety, welfare, and improving traffic efficiency, inter-vehicle ad-hoc networks have been extensively studied. Globally, road congestion, accidents, fuel consumption, and environmental pollution caused by the large number of vehicles have become serious problems that have caused a lot of human and financial losses. Intelligent transportation systems (ITS) have introduced VANETs in order to overcome these problems. In vehicular ad hoc networks (VANETs), vehicles equipped with wireless interfaces can communicate with other vehicles and with fixed roadside equipment via mobile ad hoc networks (MANETs). Messages are transmitted over open wireless channels in VANETs. Malicious nodes target these networks to protect them from various attacks, such as interference, eavesdropping, spoofing, denial of service, Sybil, black holes, worm holes, gray holes, etc. Security of VANETs is therefore one of the most significant issues. Security issues, attacks, attackers, and secure routing protocols in VANETs are discussed in this article, as well as available solutions to solve security issues.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1700-1723"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908658","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing 基于位置敏感哈希的信任感知混合协同推荐
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010096
Dejuan Li;James A. Esquivel
This paper introduces a novel trust-aware hybrid recommendation framework that combines Locality-Sensitive Hashing (LSH) with the trust information in social networks, aiming to provide efficient and effective recommendations. Unlike traditional recommender systems which often overlook the critical influence of user trust, our proposed approach infuses trust metrics to better approximate user preferences. The LSH, with its intrinsic advantage in handling high-dimensional data and computational efficiency, is applied to expedite the process of finding similar items or users. We innovatively adapt LSH to form trust-aware buckets, encapsulating both trust and similarity information. These enhancements mitigate the sparsity and scalability issues usually found in existing recommender systems. Experimental results on a real-world dataset confirm the superiority of our approach in terms of recommendation quality and computational performance. The paper further discusses potential applications and future directions of the trust-aware hybrid recommendation with LSH.
该文提出了一种新的信任感知混合推荐框架,该框架将位置敏感哈希(LSH)与社交网络中的信任信息相结合,旨在提供高效的推荐。不同于传统的推荐系统往往忽略了用户信任的关键影响,我们提出的方法注入信任指标来更好地近似用户偏好。LSH在处理高维数据和计算效率方面具有固有优势,可用于加快查找类似项目或用户的过程。我们创新地采用LSH来形成信任感知桶,封装信任和相似信息。这些增强减轻了现有推荐系统中常见的稀疏性和可伸缩性问题。在真实数据集上的实验结果证实了我们的方法在推荐质量和计算性能方面的优越性。本文进一步讨论了基于LSH的信任感知混合推荐的潜在应用和未来发展方向。
{"title":"Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing","authors":"Dejuan Li;James A. Esquivel","doi":"10.26599/TST.2023.9010096","DOIUrl":"https://doi.org/10.26599/TST.2023.9010096","url":null,"abstract":"This paper introduces a novel trust-aware hybrid recommendation framework that combines Locality-Sensitive Hashing (LSH) with the trust information in social networks, aiming to provide efficient and effective recommendations. Unlike traditional recommender systems which often overlook the critical influence of user trust, our proposed approach infuses trust metrics to better approximate user preferences. The LSH, with its intrinsic advantage in handling high-dimensional data and computational efficiency, is applied to expedite the process of finding similar items or users. We innovatively adapt LSH to form trust-aware buckets, encapsulating both trust and similarity information. These enhancements mitigate the sparsity and scalability issues usually found in existing recommender systems. Experimental results on a real-world dataset confirm the superiority of our approach in terms of recommendation quality and computational performance. The paper further discusses potential applications and future directions of the trust-aware hybrid recommendation with LSH.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1421-1434"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908673","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Medical Report via Joint Probability Graph Reasoning 联合概率图推理生成医疗报告
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010058
Junsan Zhang;Ming Cheng;Xiangyang Li;Xiuxuan Shen;Yuxue Liu;Yao Wan
In medical X-ray images, multiple abnormalities may occur frequently. However, existing report generation methods cannot efficiently extract all abnormal features, resulting in incomplete disease diagnoses when generating diagnostic reports. In real medical scenarios, there are co-occurrence relations among multiple diseases. If such co-occurrence relations are mined and integrated into the feature extraction process, the issue of missing abnormal features may be addressed. Inspired by this observation, we propose a novel method to improve the extraction of abnormal features in images through joint probability graph reasoning. Specifically, to reveal the co-occurrence relations among multiple diseases, we conduct statistical analyses on the dataset, and extract disease relationships into a probability map. Subsequently, we devise a graph reasoning network for conducting correlation-based reasoning over the features of medical images, which can facilitate the acquisition of more abnormal features. Furthermore, we introduce a gating mechanism focused on cross-modal features fusion into the current text generation model. This optimization substantially improves the model's capabilities to learn and fuse information from two distinct modalities-medical images and texts. Experimental results on the IU-X-Ray and MIMIC-CXR datasets demonstrate that our approach outperforms previous state-of-the-art methods, exhibiting the ability to generate higher quality medical image reports.
在医学x线图像中,经常会出现多种异常。然而,现有的报告生成方法不能有效地提取所有异常特征,导致在生成诊断报告时疾病诊断不完整。在真实的医疗场景中,多种疾病之间存在共现关系。如果将这种共现关系挖掘并集成到特征提取过程中,就可以解决缺失异常特征的问题。受此启发,我们提出了一种新的方法,通过联合概率图推理来提高图像中异常特征的提取。具体而言,为了揭示多种疾病之间的共现关系,我们对数据集进行统计分析,并将疾病关系提取成概率图。随后,我们设计了一个图推理网络,对医学图像的特征进行基于相关性的推理,有利于获取更多的异常特征。此外,我们在当前的文本生成模型中引入了一种专注于跨模态特征融合的门控机制。这种优化大大提高了模型从两种不同的模式(医学图像和文本)中学习和融合信息的能力。在IU-X-Ray和MIMIC-CXR数据集上的实验结果表明,我们的方法优于以前最先进的方法,显示出生成更高质量医学图像报告的能力。
{"title":"Generating Medical Report via Joint Probability Graph Reasoning","authors":"Junsan Zhang;Ming Cheng;Xiangyang Li;Xiuxuan Shen;Yuxue Liu;Yao Wan","doi":"10.26599/TST.2024.9010058","DOIUrl":"https://doi.org/10.26599/TST.2024.9010058","url":null,"abstract":"In medical X-ray images, multiple abnormalities may occur frequently. However, existing report generation methods cannot efficiently extract all abnormal features, resulting in incomplete disease diagnoses when generating diagnostic reports. In real medical scenarios, there are co-occurrence relations among multiple diseases. If such co-occurrence relations are mined and integrated into the feature extraction process, the issue of missing abnormal features may be addressed. Inspired by this observation, we propose a novel method to improve the extraction of abnormal features in images through joint probability graph reasoning. Specifically, to reveal the co-occurrence relations among multiple diseases, we conduct statistical analyses on the dataset, and extract disease relationships into a probability map. Subsequently, we devise a graph reasoning network for conducting correlation-based reasoning over the features of medical images, which can facilitate the acquisition of more abnormal features. Furthermore, we introduce a gating mechanism focused on cross-modal features fusion into the current text generation model. This optimization substantially improves the model's capabilities to learn and fuse information from two distinct modalities-medical images and texts. Experimental results on the IU-X-Ray and MIMIC-CXR datasets demonstrate that our approach outperforms previous state-of-the-art methods, exhibiting the ability to generate higher quality medical image reports.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1685-1699"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908661","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-Based Thermal Imaging Analysis to Diagnose Abnormalities in Sports Buildings: Smart Cyber-Physical Monitoring Sensors at the Edge 基于深度学习的热成像分析诊断体育建筑异常:边缘的智能网络物理监测传感器
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010130
Tengfei Fan;Wenmin Lin
A joint green-edge computing idea is now realized in practice with the help of intelligent infrastructure for modern sport venues, based on Internet of Things (IoT) platforms and Cyber-Physical Systems (CPS). To monitor their sports actions, athletes need smart environments. Using edge-enabled low-cost and low-power sensors, such as infrared monitoring systems that analyze thermal information, this environment should alert to possible physical damages. Early recognition of sports injuries and joint injuries can usually prevent athletes from pain and missing exercise. One of the most efficient methods for identifying pain and movement problems is to monitor the energy emitted by lower limb injuries. By analyzing thermal images of the lower body parts, this research attempts to automatically identify sports injuries. The thermal image is first isolated from the region of interest. Convolutional structures are applied to identify lesions using a newly developed and optimized method. The performance of the classifier is performed with the possibility of deep learning by pruning the features, to reduce the computational complexity and improve the accuracy, and a model has been developed based on the classification of sports injuries in binary mode (i.e., whether the lesions are present or not) and multiclass mode (i.e., the severity of sports injuries) resulted in optimal results. Thermal images show the different states of joints, including lesions caused by various sports in the lower limbs. This model could provide the ability of solving uncertainty of answers, repeatability, and convergence towards minimum error. As compared to conventional feature extraction and classification approaches, the outputs are more acceptable. By taking advantage of the K-fold cross-validation method, the average error of the proposed method to detect the severity of damage is less than 2.22%.
以物联网(IoT)平台和网络物理系统(CPS)为基础,借助现代体育场馆的智能基础设施,实现了联合绿色边缘计算的理念。为了监控他们的运动,运动员需要智能环境。使用边缘启用的低成本和低功耗传感器,例如分析热信息的红外监测系统,该环境应该对可能的物理损坏发出警报。早期识别运动损伤和关节损伤通常可以防止运动员疼痛和错过运动。识别疼痛和运动问题的最有效方法之一是监测下肢损伤所释放的能量。本研究试图通过分析下半身的热图像,自动识别运动损伤。首先将热图像与感兴趣的区域分离。使用一种新开发和优化的方法,将卷积结构应用于病灶识别。该分类器的性能通过对特征进行修剪来实现深度学习的可能性,以降低计算复杂度和提高准确性,并基于二元模式(即是否存在病变)和多类模式(即运动损伤的严重程度)对运动损伤进行分类,从而获得最佳结果。热图像显示关节的不同状态,包括下肢各种运动引起的病变。该模型具有求解不确定性、可重复性和收敛性等特点。与传统的特征提取和分类方法相比,该方法的输出更容易被接受。利用K-fold交叉验证方法,该方法检测损伤严重程度的平均误差小于2.22%。
{"title":"Deep Learning-Based Thermal Imaging Analysis to Diagnose Abnormalities in Sports Buildings: Smart Cyber-Physical Monitoring Sensors at the Edge","authors":"Tengfei Fan;Wenmin Lin","doi":"10.26599/TST.2023.9010130","DOIUrl":"https://doi.org/10.26599/TST.2023.9010130","url":null,"abstract":"A joint green-edge computing idea is now realized in practice with the help of intelligent infrastructure for modern sport venues, based on Internet of Things (IoT) platforms and Cyber-Physical Systems (CPS). To monitor their sports actions, athletes need smart environments. Using edge-enabled low-cost and low-power sensors, such as infrared monitoring systems that analyze thermal information, this environment should alert to possible physical damages. Early recognition of sports injuries and joint injuries can usually prevent athletes from pain and missing exercise. One of the most efficient methods for identifying pain and movement problems is to monitor the energy emitted by lower limb injuries. By analyzing thermal images of the lower body parts, this research attempts to automatically identify sports injuries. The thermal image is first isolated from the region of interest. Convolutional structures are applied to identify lesions using a newly developed and optimized method. The performance of the classifier is performed with the possibility of deep learning by pruning the features, to reduce the computational complexity and improve the accuracy, and a model has been developed based on the classification of sports injuries in binary mode (i.e., whether the lesions are present or not) and multiclass mode (i.e., the severity of sports injuries) resulted in optimal results. Thermal images show the different states of joints, including lesions caused by various sports in the lower limbs. This model could provide the ability of solving uncertainty of answers, repeatability, and convergence towards minimum error. As compared to conventional feature extraction and classification approaches, the outputs are more acceptable. By taking advantage of the K-fold cross-validation method, the average error of the proposed method to detect the severity of damage is less than 2.22%.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1457-1473"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908671","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tsinghua Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1