首页 > 最新文献

Computer Journal最新文献

英文 中文
The Orbits of Folded Crossed Cubes 折叠交叉立方体的轨道
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-11 DOI: 10.1093/comjnl/bxad096
Jia-Jie Liu
Abstract Two vertices $u$ and $v$ in a graph $G=(V,E)$ are in the same orbit if there exists an automorphism $phi $ of $G$ such that $phi (u)=v$. The orbit number of a graph $G$, denoted by $Orb(G)$, is the smallest number of orbits, which form a partition of $V(G)$, in $G$. All vertex-transitive graphs $G$ are with $Orb(G)=1$. Since the $n$-dimensional hypercube, denoted by $Q_{n}$, is vertex-transitive, it follows that $Orb(Q_{n})=1$ for $ngeq 1$. Pai, Chang, and Yang proved that the $n$-dimensional folded crossed cube, denoted by $FCQ_{n}$, is vertex-transitive if and only if $nin {1,2,4}$, namely $Orb(FCQ_{1})=Orb(FCQ_{2})=Orb(FCQ_{4})=1$. In this paper, we prove that $Orb(FCQ_{n})=2^{lceil frac{n}{2}rceil -2}$ if $ngeq 6$ is even and $Orb(FCQ_{n}) = 2^{lceil frac{n}{2}rceil -1}$ if $ngeq 3$ is odd.
摘要图$G=(V,E)$中的两个顶点$u$和$v$在同一轨道上,如果$G$存在自同构$phi $,使得$phi (u)=v$。图$G$的轨道数,用$Orb(G)$表示,是在$G$中形成$V(G)$分区的最小轨道数。所有顶点传递图$G$都使用$Orb(G)=1$。由于$n$维超立方体(用$Q_{n}$表示)是顶点可传递的,因此$Orb(Q_{n})=1$表示$ngeq 1$。Pai、Chang和Yang证明了$n$维折叠交叉立方体(表示为$FCQ_{n}$)顶点可传递当且仅当$nin {1,2,4}$即$Orb(FCQ_{1})=Orb(FCQ_{2})=Orb(FCQ_{4})=1$。本文证明了$Orb(FCQ_{n})=2^{lceil frac{n}{2}rceil -2}$如果$ngeq 6$是偶数,$Orb(FCQ_{n}) = 2^{lceil frac{n}{2}rceil -1}$如果$ngeq 3$是奇数。
{"title":"The Orbits of Folded Crossed Cubes","authors":"Jia-Jie Liu","doi":"10.1093/comjnl/bxad096","DOIUrl":"https://doi.org/10.1093/comjnl/bxad096","url":null,"abstract":"Abstract Two vertices $u$ and $v$ in a graph $G=(V,E)$ are in the same orbit if there exists an automorphism $phi $ of $G$ such that $phi (u)=v$. The orbit number of a graph $G$, denoted by $Orb(G)$, is the smallest number of orbits, which form a partition of $V(G)$, in $G$. All vertex-transitive graphs $G$ are with $Orb(G)=1$. Since the $n$-dimensional hypercube, denoted by $Q_{n}$, is vertex-transitive, it follows that $Orb(Q_{n})=1$ for $ngeq 1$. Pai, Chang, and Yang proved that the $n$-dimensional folded crossed cube, denoted by $FCQ_{n}$, is vertex-transitive if and only if $nin {1,2,4}$, namely $Orb(FCQ_{1})=Orb(FCQ_{2})=Orb(FCQ_{4})=1$. In this paper, we prove that $Orb(FCQ_{n})=2^{lceil frac{n}{2}rceil -2}$ if $ngeq 6$ is even and $Orb(FCQ_{n}) = 2^{lceil frac{n}{2}rceil -1}$ if $ngeq 3$ is odd.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136213845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Air Monitoring System For Pollution Prediction: A Predictive Healthcare Perspective 用于污染预测的智能空气监测系统:预测性医疗保健的视角
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-08 DOI: 10.1093/comjnl/bxad099
Veerawali Behal, Ramandeep Singh
Abstract The extensive potential of Internet of Things (IoT) technology has enabled the widespread real-time perception and analysis of health conditions. Furthermore, the integration of IoT in the healthcare industry has resulted in the development of intelligent applications, including smartphone-based healthcare, wellness-aware recommendations and smart medical systems. Building upon these technological advancements, this research puts forth an enhanced framework designed for the real-time monitoring, detection and prediction of health vulnerabilities arising from air pollution. Specifically, a four-layered model is presented to categorize health-impacting particles associated with air pollution into distinct classes based on probabilistic parameters of Health Adversity (HA). Subsequently, the HA parameters are extracted and temporally analyzed using FogBus, a fog computing platform, to identify vulnerabilities in individual health. To facilitate accurate prediction, an assessment of the Air Impact on Health is conducted using a Differential Evolution-Recurrent Neural Network. Moreover, the temporal analysis of health vulnerability employs the Self-Organized Mapping technique for visualization. The proposed model’s validity is evaluated using a challenging dataset comprising nearly 60 212 data instances obtained from the online University of California, Irvine repository. Performance enhancement is assessed by comparing the proposed model with state-of-the-art decision-making techniques, considering statistical parameters such as temporal effectiveness, coefficient of determination, accuracy, specificity, sensitivity, reliability and stability.
物联网(IoT)技术的广泛潜力使健康状况的广泛实时感知和分析成为可能。此外,物联网在医疗保健行业的整合导致了智能应用的发展,包括基于智能手机的医疗保健、健康感知建议和智能医疗系统。在这些技术进步的基础上,本研究提出了一个增强的框架,旨在实时监测、检测和预测空气污染引起的健康脆弱性。具体而言,提出了一个基于健康逆境(HA)概率参数的四层模型,将与空气污染相关的影响健康的颗粒分为不同的类别。随后,使用雾计算平台FogBus提取HA参数并进行临时分析,以识别个人健康中的漏洞。为了便于准确预测,使用差分进化-递归神经网络对空气对健康的影响进行评估。此外,健康脆弱性的时间分析采用自组织映射技术进行可视化。使用一个具有挑战性的数据集来评估所提出模型的有效性,该数据集包括从加州大学欧文分校在线存储库获得的近60212个数据实例。通过将所提出的模型与最先进的决策技术进行比较,考虑诸如时间有效性、决定系数、准确性、特异性、敏感性、可靠性和稳定性等统计参数,评估性能增强。
{"title":"An Intelligent Air Monitoring System For Pollution Prediction: A Predictive Healthcare Perspective","authors":"Veerawali Behal, Ramandeep Singh","doi":"10.1093/comjnl/bxad099","DOIUrl":"https://doi.org/10.1093/comjnl/bxad099","url":null,"abstract":"Abstract The extensive potential of Internet of Things (IoT) technology has enabled the widespread real-time perception and analysis of health conditions. Furthermore, the integration of IoT in the healthcare industry has resulted in the development of intelligent applications, including smartphone-based healthcare, wellness-aware recommendations and smart medical systems. Building upon these technological advancements, this research puts forth an enhanced framework designed for the real-time monitoring, detection and prediction of health vulnerabilities arising from air pollution. Specifically, a four-layered model is presented to categorize health-impacting particles associated with air pollution into distinct classes based on probabilistic parameters of Health Adversity (HA). Subsequently, the HA parameters are extracted and temporally analyzed using FogBus, a fog computing platform, to identify vulnerabilities in individual health. To facilitate accurate prediction, an assessment of the Air Impact on Health is conducted using a Differential Evolution-Recurrent Neural Network. Moreover, the temporal analysis of health vulnerability employs the Self-Organized Mapping technique for visualization. The proposed model’s validity is evaluated using a challenging dataset comprising nearly 60 212 data instances obtained from the online University of California, Irvine repository. Performance enhancement is assessed by comparing the proposed model with state-of-the-art decision-making techniques, considering statistical parameters such as temporal effectiveness, coefficient of determination, accuracy, specificity, sensitivity, reliability and stability.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135251174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying and Ranking Influential Spreaders in Complex Networks by Localized Decreasing Gravity Model 基于局域递减引力模型的复杂网络中影响力传播者识别与排序
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-05 DOI: 10.1093/comjnl/bxad097
Nan Xiang, Xiao Tang, Huiling Liu, Xiaoxia Ma
Abstract Identifying crucial nodes in complex networks is paid more attention in recent years. Some classical methods, such as degree centrality, betweenness centrality and closeness centrality, have their advantages and disadvantages. Recently, the gravity model is applied to describe the relationship of nodes in a complex network. However, the interaction force in gravity model follows the square law of distance, which is inconsistent with the actual situation. Most people are generally affected by those who are surrounding them, which means that local influence should be emphasized. To address this issue, we propose an indexing method called localized decreasing gravity centrality by maximizing the local influence of a node. In the proposed measure, the mass and radius of gravity model are redefined, which can represent the spreading ability of the node. In addition, a decreasing weight is added to strengthen the local influence of a node. To evaluate the performance of the proposed method, we utilize four different types of networks, including interaction networks, economic networks, collaboration networks and animal social networks. Also, two different infectious disease models, susceptible-infectious-recovered (SIR) and susceptible-exposed-low risk-high risk-recovered (SELHR), are utilized to examine the spreading ability of influential nodes.
摘要复杂网络中关键节点的识别问题近年来受到越来越多的关注。一些经典的方法,如度中心性、中间中心性和接近中心性,各有优缺点。近年来,重力模型被用于描述复杂网络中节点之间的关系。然而,重力模型中的相互作用力遵循距离平方定律,与实际情况不一致。大多数人通常会受到周围人的影响,这意味着应该强调当地的影响。为了解决这个问题,我们提出了一种通过最大化节点的局部影响来降低局部重力中心性的索引方法。在该方法中,重新定义了重力模型的质量和半径,以表示节点的扩散能力。此外,还增加了一个递减权值,以增强节点的局部影响。为了评估该方法的性能,我们使用了四种不同类型的网络,包括交互网络、经济网络、协作网络和动物社会网络。此外,两种不同的传染病模型,易感-感染-恢复(SIR)和易感-暴露-低风险-高风险-恢复(SELHR),被用来检查影响节点的传播能力。
{"title":"Identifying and Ranking Influential Spreaders in Complex Networks by Localized Decreasing Gravity Model","authors":"Nan Xiang, Xiao Tang, Huiling Liu, Xiaoxia Ma","doi":"10.1093/comjnl/bxad097","DOIUrl":"https://doi.org/10.1093/comjnl/bxad097","url":null,"abstract":"Abstract Identifying crucial nodes in complex networks is paid more attention in recent years. Some classical methods, such as degree centrality, betweenness centrality and closeness centrality, have their advantages and disadvantages. Recently, the gravity model is applied to describe the relationship of nodes in a complex network. However, the interaction force in gravity model follows the square law of distance, which is inconsistent with the actual situation. Most people are generally affected by those who are surrounding them, which means that local influence should be emphasized. To address this issue, we propose an indexing method called localized decreasing gravity centrality by maximizing the local influence of a node. In the proposed measure, the mass and radius of gravity model are redefined, which can represent the spreading ability of the node. In addition, a decreasing weight is added to strengthen the local influence of a node. To evaluate the performance of the proposed method, we utilize four different types of networks, including interaction networks, economic networks, collaboration networks and animal social networks. Also, two different infectious disease models, susceptible-infectious-recovered (SIR) and susceptible-exposed-low risk-high risk-recovered (SELHR), are utilized to examine the spreading ability of influential nodes.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135482953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gathering Over Heterogeneous Meeting Nodes 异构会议节点聚集
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-05 DOI: 10.1093/comjnl/bxad101
Abhinav Chakraborty, Subhash Bhagat, Krishnendu Mukhopadhyaya
Abstract We consider two finite and disjoint sets of homogeneous robots deployed at the nodes of an infinite grid graph. The grid graph also comprises two finite and disjoint sets of prefixed meeting nodes located over the nodes of the grid. The objective of our study is to design a distributed algorithm that gathers all the robots belonging to the first team at one of the meeting nodes belonging to the first type, and all the robots in the second team must gather at one of the meeting nodes belonging to the second type. The robots can distinguish between the two types of meeting nodes. However, a robot cannot identify its team members. This paper assumes the strongest adversarial model, namely the asynchronous scheduler. We have characterized all the initial configurations for which the gathering problem is unsolvable. For the remaining initial configurations, the paper proposes a distributed gathering algorithm. Assuming the robots are capable of global-weak multiplicity detection, the proposed algorithm solves the problem within a finite time period. The algorithm runs in $Theta (dn)$ moves and $O(dn)$ epochs, where $d$ is the diameter of the minimum enclosing rectangle of all the robots and meeting nodes in the initial configuration, and $n$ is the total number of robots in the system.
摘要考虑两组有限且不相交的同构机器人分布在一个无限网格图的节点上。网格图还包括位于网格节点上的两个有限且不相交的前缀会议节点集。我们的研究目标是设计一种分布式算法,将第一个团队的所有机器人聚集在第一类会议节点之一,而第二个团队的所有机器人必须聚集在第二类会议节点之一。机器人可以区分两种类型的会面节点。然而,机器人无法识别其团队成员。本文假设最强对抗模型,即异步调度。我们描述了集合问题无法解决的所有初始配置。对于剩余的初始配置,本文提出了一种分布式采集算法。假设机器人具有全局弱多重性检测能力,该算法在有限时间内解决了问题。算法以$Theta (dn)$ moves和$O(dn)$ epochs的形式运行,其中$d$是初始配置中所有机器人和会议节点的最小封闭矩形的直径,$n$是系统中机器人的总数。
{"title":"Gathering Over Heterogeneous Meeting Nodes","authors":"Abhinav Chakraborty, Subhash Bhagat, Krishnendu Mukhopadhyaya","doi":"10.1093/comjnl/bxad101","DOIUrl":"https://doi.org/10.1093/comjnl/bxad101","url":null,"abstract":"Abstract We consider two finite and disjoint sets of homogeneous robots deployed at the nodes of an infinite grid graph. The grid graph also comprises two finite and disjoint sets of prefixed meeting nodes located over the nodes of the grid. The objective of our study is to design a distributed algorithm that gathers all the robots belonging to the first team at one of the meeting nodes belonging to the first type, and all the robots in the second team must gather at one of the meeting nodes belonging to the second type. The robots can distinguish between the two types of meeting nodes. However, a robot cannot identify its team members. This paper assumes the strongest adversarial model, namely the asynchronous scheduler. We have characterized all the initial configurations for which the gathering problem is unsolvable. For the remaining initial configurations, the paper proposes a distributed gathering algorithm. Assuming the robots are capable of global-weak multiplicity detection, the proposed algorithm solves the problem within a finite time period. The algorithm runs in $Theta (dn)$ moves and $O(dn)$ epochs, where $d$ is the diameter of the minimum enclosing rectangle of all the robots and meeting nodes in the initial configuration, and $n$ is the total number of robots in the system.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135546176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Backdoor Attack Against Neural Networks 神经网络稀疏后门攻击
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-05 DOI: 10.1093/comjnl/bxad100
Nan Zhong, Zhenxing Qian, Xinpeng Zhang
Abstract Recent studies show that neural networks are vulnerable to backdoor attacks, in which compromised networks behave normally for clean inputs but make mistakes when a pre-defined trigger appears. Although prior studies have designed various invisible triggers to avoid causing visual anomalies, they cannot evade some trigger detectors. In this paper, we consider the stealthiness of backdoor attacks from input space and feature representation space. We propose a novel backdoor attack named sparse backdoor attack, and investigate the minimum required trigger to induce the well-trained networks to make incorrect results. A U-net-based generator is employed to create triggers for each clean image. Considering the stealthiness of the trigger, we restrict the elements of the trigger between −1 and 1. In the aspect of the feature representation domain, we adopt an entanglement cost function to minimize the gap between feature representations of benign and malicious inputs. The inseparability of benign and malicious feature representations contributes to the stealthiness of our attack against various model diagnosis-based defences. We validate the effectiveness and generalization of our method by conducting extensive experiments on multiple datasets and networks.
最近的研究表明,神经网络容易受到后门攻击,在这种攻击中,受损的网络在干净的输入下表现正常,但当预定义的触发器出现时就会出错。虽然以前的研究设计了各种不可见的触发器来避免造成视觉异常,但它们无法逃避一些触发探测器。本文从输入空间和特征表示空间两方面考虑后门攻击的隐蔽性。我们提出了一种新的后门攻击,称为稀疏后门攻击,并研究了诱导训练良好的网络产生错误结果所需的最小触发条件。使用基于u -net的生成器为每个干净图像创建触发器。考虑到触发器的隐蔽性,我们将触发器的元素限制在−1和1之间。在特征表示域方面,我们采用了纠缠代价函数来最小化良性和恶意输入的特征表示之间的差距。良性和恶意特征表示的不可分离性有助于我们对各种基于模型诊断的防御的攻击的隐蔽性。我们通过在多个数据集和网络上进行广泛的实验来验证我们方法的有效性和泛化性。
{"title":"Sparse Backdoor Attack Against Neural Networks","authors":"Nan Zhong, Zhenxing Qian, Xinpeng Zhang","doi":"10.1093/comjnl/bxad100","DOIUrl":"https://doi.org/10.1093/comjnl/bxad100","url":null,"abstract":"Abstract Recent studies show that neural networks are vulnerable to backdoor attacks, in which compromised networks behave normally for clean inputs but make mistakes when a pre-defined trigger appears. Although prior studies have designed various invisible triggers to avoid causing visual anomalies, they cannot evade some trigger detectors. In this paper, we consider the stealthiness of backdoor attacks from input space and feature representation space. We propose a novel backdoor attack named sparse backdoor attack, and investigate the minimum required trigger to induce the well-trained networks to make incorrect results. A U-net-based generator is employed to create triggers for each clean image. Considering the stealthiness of the trigger, we restrict the elements of the trigger between −1 and 1. In the aspect of the feature representation domain, we adopt an entanglement cost function to minimize the gap between feature representations of benign and malicious inputs. The inseparability of benign and malicious feature representations contributes to the stealthiness of our attack against various model diagnosis-based defences. We validate the effectiveness and generalization of our method by conducting extensive experiments on multiple datasets and networks.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135482952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning 非平衡数据集学习的空间划分自适应加权合成少数派过采样技术
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-10-05 DOI: 10.1093/comjnl/bxad098
Qiang Zhang, Junjiang He, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li
Abstract The problem of data imbalance is common in reality, which greatly affects the performance of classifiers. Most of the solutions are to balance the data set by generating new minority class samples, which are faced with the problems of selecting the appropriate area for generating samples, fuzzy classification boundary and uneven distribution of samples. To solve these problems, we propose a novel oversampling algorithm named space partitioning adaptive weighted synthetic minority oversampling technique (SPAW-SMOTE). We first divide the data space into boundary space and non-boundary space based on spatial partitioning techniques. The number of samples to be generated is assigned to different spaces by the designed adaptive weighting algorithm, which is used to solve the problems of uneven distribution of samples and easy to blur the classification boundary. Finally, we also endeavor to develop a new generation algorithm to reduce the probability of overlapping samples generated when synthesizing new samples and to ensure the diversity of new samples. Experimental results on 18 real-world data sets show that the average performance (G-mean, F1-measure and Area Under Curve) of SPAW-SMOTE is significantly better than other existing oversampling techniques.
摘要数据不平衡问题在现实中很常见,极大地影响了分类器的性能。大多数解决方案是通过生成新的少数类样本来平衡数据集,这些方法面临着选择合适的生成样本区域、分类边界模糊以及样本分布不均匀等问题。为了解决这些问题,我们提出了一种新的过采样算法——空间划分自适应加权合成少数派过采样技术(spawn - smote)。首先基于空间划分技术将数据空间划分为边界空间和非边界空间。通过设计的自适应加权算法将待生成的样本数量分配到不同的空间,解决了样本分布不均匀和容易模糊分类边界的问题。最后,我们还努力开发一种新的生成算法,以减少合成新样本时产生重叠样本的概率,并保证新样本的多样性。在18个真实数据集上的实验结果表明,spawo - smote的平均性能(G-mean、F1-measure和曲线下面积)明显优于现有的其他过采样技术。
{"title":"SPAW-SMOTE: Space Partitioning Adaptive Weighted Synthetic Minority Oversampling Technique For Imbalanced Data Set Learning","authors":"Qiang Zhang, Junjiang He, Tao Li, Xiaolong Lan, Wenbo Fang, Yihong Li","doi":"10.1093/comjnl/bxad098","DOIUrl":"https://doi.org/10.1093/comjnl/bxad098","url":null,"abstract":"Abstract The problem of data imbalance is common in reality, which greatly affects the performance of classifiers. Most of the solutions are to balance the data set by generating new minority class samples, which are faced with the problems of selecting the appropriate area for generating samples, fuzzy classification boundary and uneven distribution of samples. To solve these problems, we propose a novel oversampling algorithm named space partitioning adaptive weighted synthetic minority oversampling technique (SPAW-SMOTE). We first divide the data space into boundary space and non-boundary space based on spatial partitioning techniques. The number of samples to be generated is assigned to different spaces by the designed adaptive weighting algorithm, which is used to solve the problems of uneven distribution of samples and easy to blur the classification boundary. Finally, we also endeavor to develop a new generation algorithm to reduce the probability of overlapping samples generated when synthesizing new samples and to ensure the diversity of new samples. Experimental results on 18 real-world data sets show that the average performance (G-mean, F1-measure and Area Under Curve) of SPAW-SMOTE is significantly better than other existing oversampling techniques.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135484277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics 基于格的同态加密保护智能电表数据分析
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-27 DOI: 10.1093/comjnl/bxad093
Ali Marandi, Pedro Geraldo M R Alves, Diego F Aranha, Rune Hylsberg Jacobsen
Abstract Privacy-preserving smart meter data collection and analysis are critical for optimizing smart grid environments without compromising privacy. Using homomorphic encryption techniques, smart meters can encrypt collected data to ensure confidentiality, and other untrusted nodes can further compute over the encrypted data without having to recover the underlying plaintext. As an illustrative example, this approach can be useful to compute the monthly electricity consumption without violating consumer privacy by collecting fine-granular data through small increments of time. Toward that end, we propose an architecture for privacy-preserving smart meter data collection, aggregation and analysis based on lattice-based homomorphic encryption. Furthermore, we compare the proposed method with the Paillier and Boneh–Goh–Nissim (BGN) cryptosystems, which are popular alternatives for homomorphic encryption in smart grids. We consider different services with different requirements in terms of multiplicative depth, e.g. billing, variance and nonlinear support vector machine classification. Accordingly, we measure and show the practical overhead of using the proposed homomorphic encryption method in terms of communication traffic (ciphertext size) and latency. Our results show that lattice-based homomorphic encryption is more efficient than Paillier and BGN for both multiplication and addition operations while offering more flexibility in terms of the computation that can be evaluated homomorphically.
保护隐私的智能电表数据收集和分析对于在不损害隐私的情况下优化智能电网环境至关重要。使用同态加密技术,智能电表可以加密收集的数据以确保机密性,其他不受信任的节点可以进一步计算加密的数据,而不必恢复底层的明文。作为一个说明性示例,这种方法可以用于计算每月用电量,而不会通过小的时间增量收集细粒度数据,从而侵犯消费者的隐私。为此,我们提出了一种基于格同态加密的隐私保护智能电表数据收集、聚合和分析体系结构。此外,我们将所提出的方法与Paillier和Boneh-Goh-Nissim (BGN)密码系统进行了比较,这两种密码系统是智能电网中常用的同态加密替代方案。我们根据乘法深度考虑不同需求的不同业务,例如计费、方差和非线性支持向量机分类。因此,我们在通信流量(密文大小)和延迟方面测量并展示了使用所提出的同态加密方法的实际开销。我们的结果表明,基于格的同态加密在乘法和加法运算方面比Paillier和BGN更有效,同时在同态计算方面提供了更大的灵活性。
{"title":"Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics","authors":"Ali Marandi, Pedro Geraldo M R Alves, Diego F Aranha, Rune Hylsberg Jacobsen","doi":"10.1093/comjnl/bxad093","DOIUrl":"https://doi.org/10.1093/comjnl/bxad093","url":null,"abstract":"Abstract Privacy-preserving smart meter data collection and analysis are critical for optimizing smart grid environments without compromising privacy. Using homomorphic encryption techniques, smart meters can encrypt collected data to ensure confidentiality, and other untrusted nodes can further compute over the encrypted data without having to recover the underlying plaintext. As an illustrative example, this approach can be useful to compute the monthly electricity consumption without violating consumer privacy by collecting fine-granular data through small increments of time. Toward that end, we propose an architecture for privacy-preserving smart meter data collection, aggregation and analysis based on lattice-based homomorphic encryption. Furthermore, we compare the proposed method with the Paillier and Boneh–Goh–Nissim (BGN) cryptosystems, which are popular alternatives for homomorphic encryption in smart grids. We consider different services with different requirements in terms of multiplicative depth, e.g. billing, variance and nonlinear support vector machine classification. Accordingly, we measure and show the practical overhead of using the proposed homomorphic encryption method in terms of communication traffic (ciphertext size) and latency. Our results show that lattice-based homomorphic encryption is more efficient than Paillier and BGN for both multiplication and addition operations while offering more flexibility in terms of the computation that can be evaluated homomorphically.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135580002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints 具有期望效益和QoE约束的拼车联合双竞价
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-22 DOI: 10.1093/comjnl/bxad092
Jiale Huang, Jigang Wu, Long Chen, Yalan Wu, Yidong Li
Abstract Ridesharing is an effective approach to alleviate traffic congestion. In most existing works, drivers and passengers are assigned prices without considering the constraints of desired benefits. This paper investigates ridesharing by formulating a matching and pricing problem to maximize the total payoff of drivers, with the constraints of desired benefit and quality of experience. An efficient algorithm is proposed to solve the formulated problem based on coalitional double auction. Secondary pricing based strategy and sacrificed minimum bid based strategy are proposed to support the algorithm. This paper also proves that the proposed algorithm can achieve a Nash-stable coalition partition in finite steps, and the proposed two strategies guarantee truthfulness, individually rational and budget balance. Extensive simulation results on the real-world dataset of taxi trajectory in Beijing city show that the proposed algorithm outperforms the existing ones, in terms of average total payoff of drivers while meeting the benefits of passengers.
摘要拼车是缓解交通拥堵的有效途径。在大多数现有的工作中,司机和乘客在没有考虑期望收益约束的情况下被分配价格。本文在期望收益和体验质量约束下,通过构造一个匹配和定价问题来研究拼车问题,以最大化驾驶员的总收益。提出了一种有效的基于联合双拍卖的公式化问题求解算法。提出了基于二次定价策略和基于牺牲最小出价策略来支持该算法。本文还证明了所提出的算法可以在有限步内实现纳什稳定的联盟划分,并且所提出的两种策略保证了真实性、个体理性和预算平衡。在北京市出租车轨迹真实数据集上的大量仿真结果表明,本文提出的算法在满足乘客利益的同时,在司机的平均总收益方面优于现有算法。
{"title":"Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints","authors":"Jiale Huang, Jigang Wu, Long Chen, Yalan Wu, Yidong Li","doi":"10.1093/comjnl/bxad092","DOIUrl":"https://doi.org/10.1093/comjnl/bxad092","url":null,"abstract":"Abstract Ridesharing is an effective approach to alleviate traffic congestion. In most existing works, drivers and passengers are assigned prices without considering the constraints of desired benefits. This paper investigates ridesharing by formulating a matching and pricing problem to maximize the total payoff of drivers, with the constraints of desired benefit and quality of experience. An efficient algorithm is proposed to solve the formulated problem based on coalitional double auction. Secondary pricing based strategy and sacrificed minimum bid based strategy are proposed to support the algorithm. This paper also proves that the proposed algorithm can achieve a Nash-stable coalition partition in finite steps, and the proposed two strategies guarantee truthfulness, individually rational and budget balance. Extensive simulation results on the real-world dataset of taxi trajectory in Beijing city show that the proposed algorithm outperforms the existing ones, in terms of average total payoff of drivers while meeting the benefits of passengers.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136061450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations 基于新型二森林对偶变换的两族自相似网络子树枚举
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-22 DOI: 10.1093/comjnl/bxad090
Daoqiang Sun, Hongbo Liu, Yu Yang, Long Li, Heng Zhang, Asfand Fahad
Abstract As a structural topological index, the number of subtrees has great significance for the analysis and design of hybrid locally reliable networks. In this paper, with generating function and introducing a novel two-forest dual transformation technique, we solve the subtree enumerating problems of two representatives of the self-similar networks, such as the hierarchical lattice and $(u,v)$-flower networks. Moreover, by means of the circle weight transfer technique, two linear time algorithms of computing the subtree generation functions of these two families of networks are also proposed. The subtree density of two special cases for these self-similar networks is briefly discussed as an application.
子树数作为一种结构拓扑指标,对混合局部可靠网络的分析和设计具有重要意义。本文通过生成函数和引入一种新的二森林对偶变换技术,解决了层次格和$(u,v)$-花两种自相似网络的子树枚举问题。此外,利用圆权传递技术,提出了计算这两类网络子树生成函数的两种线性时间算法。作为一种应用,简要讨论了这类自相似网络的两种特殊情况的子树密度。
{"title":"Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations","authors":"Daoqiang Sun, Hongbo Liu, Yu Yang, Long Li, Heng Zhang, Asfand Fahad","doi":"10.1093/comjnl/bxad090","DOIUrl":"https://doi.org/10.1093/comjnl/bxad090","url":null,"abstract":"Abstract As a structural topological index, the number of subtrees has great significance for the analysis and design of hybrid locally reliable networks. In this paper, with generating function and introducing a novel two-forest dual transformation technique, we solve the subtree enumerating problems of two representatives of the self-similar networks, such as the hierarchical lattice and $(u,v)$-flower networks. Moreover, by means of the circle weight transfer technique, two linear time algorithms of computing the subtree generation functions of these two families of networks are also proposed. The subtree density of two special cases for these self-similar networks is briefly discussed as an application.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136061452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors 智能手机传感器的熵供给能力评价
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-20 DOI: 10.1093/comjnl/bxad081
Dinghua Zhang, Shihao Wu, Yang Li, Quan Pan
Abstract Random numbers are very important for the security of computer system. However, generating qualified random numbers is difficult because we cannot always successfully introduce dedicated random number hardware into computer system. Although most operating systems provide random number generation capabilities, the effective entropy supply is still dependent on the hardware platform including memory and clocks etc. However, obtaining hardware events such as clocks requires system privileges, which is not conducive for entropy estimation at the application layer. In contrast, data related to the sensor hardware can be extracted directly at the application layer. These sensor data contain some randomness and may be used as a noise source. In this way, applications can use these sensors to implement their own proprietary random number generators. Before taking these sensors as the noise source, it is necessary to fully evaluate their entropy supply capability. In this paper, 300 Android smartphones and 30 iOS smartphones are selected as samples and their sensor entropy supply capabilities are comprehensively evaluated. Based on the entropy evaluation results, we give some suggestions on how to generate random numbers using these sensor data. We first design a framework for evaluating the entropy supply capability for smartphone sensors, based on the min-entropy estimation method proposed in NIST SP 800-90B. According to this framework, we simulate stationary and mobile working states for each smartphone, and collect sufficient sensor data as the min-entropy estimation dataset. The min-entropy estimation results show that in the stationary working state, each ACCELEROMETER sensor data collection can obtain at least 1.5 bits of entropy in Android, while each GYROSCOPE sensor data collection can obtain at least 20 bits of entropy in iOS. In the mobile working state, each ACCELEROMETER sensor data collection can obtain at least 1.9 bits of entropy, while each GYROSCOPE sensor data acquisition in iOS system can obtain at least 27 bits of entropy. This means that we can still get a stable entropy output from the sensor even when the smartphone is in stationary working state. Statistical analysis of the data using cross correlation methods suggests it is hard for an attacker to guess or predict the random numbers generated by a smartphone through another smartphone put in the similar external environment.
摘要随机数对于计算机系统的安全是非常重要的。然而,由于我们不能总是成功地在计算机系统中引入专用的随机数硬件,因此产生合格的随机数是困难的。尽管大多数操作系统都提供随机数生成功能,但有效熵供应仍然依赖于硬件平台,包括内存和时钟等。然而,获取硬件事件(如时钟)需要系统特权,这不利于在应用层进行熵估计。相反,与传感器硬件相关的数据可以直接在应用层提取。这些传感器数据具有一定的随机性,可能被用作噪声源。通过这种方式,应用程序可以使用这些传感器来实现它们自己专有的随机数生成器。在将这些传感器作为噪声源之前,有必要充分评估它们的熵供给能力。本文选取300部Android智能手机和30部iOS智能手机作为样本,对其传感器熵供给能力进行综合评价。根据熵值评价结果,对如何利用这些传感器数据生成随机数提出了一些建议。我们首先基于NIST SP 800-90B中提出的最小熵估计方法,设计了一个评估智能手机传感器熵供应能力的框架。根据该框架,我们模拟了每个智能手机的固定和移动工作状态,并收集了足够的传感器数据作为最小熵估计数据集。最小熵估计结果表明,在静止工作状态下,每次加速度计传感器数据采集在Android中至少可以获得1.5比特的熵,而每次陀螺仪传感器数据采集在iOS中至少可以获得20比特的熵。在移动工作状态下,每次加速度计传感器数据采集可获得至少1.9比特的熵,而在iOS系统中,每次陀螺仪传感器数据采集可获得至少27比特的熵。这意味着即使智能手机处于静止工作状态,我们仍然可以从传感器获得稳定的熵输出。使用相互关联方法对数据进行统计分析表明,攻击者很难猜测或预测智能手机通过放置在类似外部环境中的另一部智能手机产生的随机数。
{"title":"An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors","authors":"Dinghua Zhang, Shihao Wu, Yang Li, Quan Pan","doi":"10.1093/comjnl/bxad081","DOIUrl":"https://doi.org/10.1093/comjnl/bxad081","url":null,"abstract":"Abstract Random numbers are very important for the security of computer system. However, generating qualified random numbers is difficult because we cannot always successfully introduce dedicated random number hardware into computer system. Although most operating systems provide random number generation capabilities, the effective entropy supply is still dependent on the hardware platform including memory and clocks etc. However, obtaining hardware events such as clocks requires system privileges, which is not conducive for entropy estimation at the application layer. In contrast, data related to the sensor hardware can be extracted directly at the application layer. These sensor data contain some randomness and may be used as a noise source. In this way, applications can use these sensors to implement their own proprietary random number generators. Before taking these sensors as the noise source, it is necessary to fully evaluate their entropy supply capability. In this paper, 300 Android smartphones and 30 iOS smartphones are selected as samples and their sensor entropy supply capabilities are comprehensively evaluated. Based on the entropy evaluation results, we give some suggestions on how to generate random numbers using these sensor data. We first design a framework for evaluating the entropy supply capability for smartphone sensors, based on the min-entropy estimation method proposed in NIST SP 800-90B. According to this framework, we simulate stationary and mobile working states for each smartphone, and collect sufficient sensor data as the min-entropy estimation dataset. The min-entropy estimation results show that in the stationary working state, each ACCELEROMETER sensor data collection can obtain at least 1.5 bits of entropy in Android, while each GYROSCOPE sensor data collection can obtain at least 20 bits of entropy in iOS. In the mobile working state, each ACCELEROMETER sensor data collection can obtain at least 1.9 bits of entropy, while each GYROSCOPE sensor data acquisition in iOS system can obtain at least 27 bits of entropy. This means that we can still get a stable entropy output from the sensor even when the smartphone is in stationary working state. Statistical analysis of the data using cross correlation methods suggests it is hard for an attacker to guess or predict the random numbers generated by a smartphone through another smartphone put in the similar external environment.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136375560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1