首页 > 最新文献

ACM Transactions on Internet Technology最新文献

英文 中文
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English VoiceTalk:混合普通话、台语和英语的多媒体物联网应用
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-18 DOI: https://dl.acm.org/doi/10.1145/3543854
Yi-Bing Lin, Yuan-Fu Liao, Sin-Horng Chen, Shaw-Hwa Hwang, Yih-Ru Wang

The voice-based Internet of Multimedia Things (IoMT) is the combination of IoT interfaces and protocols with associated voice-related information, which enables advanced applications based on human-to-device interactions. An example is Automatic Speech Recognition (ASR) for live captioning and voice translation. Three major issues of ASR for IoMT are IoT development cost, speech recognition accuracy, and execution time complexity. For the first issue, most non-voice IoT applications are upgraded with the ASR feature through hard coding, which are error prone. For the second issue, recognition accuracy must be improved for ASR. For the third issue, many multimedia IoT services are real-time applications and, therefore, the ASR delay must be short.

This article elaborates on the above issues based on an IoT platform called VoiceTalk. We built the largest Taiwanese spoken corpus to train VoiceTalk ASR (VT-ASR) and show how the VT-ASR mechanism can be transparently integrated with existing IoT applications. We consider two performance measures for VoiceTalk: speech recognition accuracy and VT-ASR delay. For the acoustic tests of PAL-Labs, VT-ASR's accuracy is 96.47%, while Google's accuracy is 94.28%. We are the first to develop an analytic model to investigate the probability that the VT-ASR delay for the first speaker is complete before the second speaker starts talking. From the measurements and analytic modeling, we show that the VT-ASR delay is short enough to result in a very good user experience. Our solution has won several important government and commercial TV contracts in Taiwan. VT-ASR has demonstrated better Taiwanese Mandarin speech recognition accuracy than famous commercial products (including Google and Iflytek) in Formosa Speech Recognition Challenge 2018 (FSR-2018) and was the best among all participating ASR systems for Taiwanese recognition accuracy in FSR-2020.

基于语音的多媒体物联网(IoMT)是物联网接口和协议与相关语音相关信息的结合,它使基于人与设备交互的高级应用成为可能。一个例子是用于实时字幕和语音翻译的自动语音识别(ASR)。物联网ASR的三个主要问题是物联网开发成本、语音识别准确性和执行时间复杂性。对于第一个问题,大多数非语音物联网应用都是通过硬编码升级ASR功能的,这很容易出错。对于第二个问题,必须提高ASR的识别精度。对于第三个问题,许多多媒体物联网服务是实时应用,因此ASR延迟必须短。本文基于一个名为VoiceTalk的物联网平台详细阐述了上述问题。我们建立了最大的台湾口语语料库来训练VoiceTalk ASR (VT-ASR),并展示了VT-ASR机制如何与现有的物联网应用透明地集成。我们考虑了VoiceTalk的两个性能指标:语音识别精度和VT-ASR延迟。对于PAL-Labs的声学测试,VT-ASR的准确率为96.47%,而Google的准确率为94.28%。我们首先开发了一个分析模型来研究第一个说话者的VT-ASR延迟在第二个说话者开始说话之前完成的概率。从测量和分析建模中,我们表明VT-ASR延迟足够短,可以产生非常好的用户体验。我们的解决方案在台湾赢得了几个重要的政府和商业电视合同。在2018台塑语音识别挑战赛(FSR-2018)中,VT-ASR的台湾普通话识别准确率优于知名商用产品(包括Google和科大讯飞),在FSR-2020中,VT-ASR在所有参赛的ASR系统中台湾识别准确率最高。
{"title":"VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English","authors":"Yi-Bing Lin, Yuan-Fu Liao, Sin-Horng Chen, Shaw-Hwa Hwang, Yih-Ru Wang","doi":"https://dl.acm.org/doi/10.1145/3543854","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3543854","url":null,"abstract":"<p>The voice-based Internet of Multimedia Things (IoMT) is the combination of IoT interfaces and protocols with associated voice-related information, which enables advanced applications based on human-to-device interactions. An example is Automatic Speech Recognition (ASR) for live captioning and voice translation. Three major issues of ASR for IoMT are IoT development cost, speech recognition accuracy, and execution time complexity. For the first issue, most non-voice IoT applications are upgraded with the ASR feature through hard coding, which are error prone. For the second issue, recognition accuracy must be improved for ASR. For the third issue, many multimedia IoT services are real-time applications and, therefore, the ASR delay must be short.</p><p>This article elaborates on the above issues based on an IoT platform called VoiceTalk. We built the largest Taiwanese spoken corpus to train <b>VoiceTalk ASR (VT-ASR)</b> and show how the VT-ASR mechanism can be transparently integrated with existing IoT applications. We consider two performance measures for VoiceTalk: speech recognition accuracy and VT-ASR delay. For the acoustic tests of PAL-Labs, VT-ASR's accuracy is 96.47%, while Google's accuracy is 94.28%. We are the first to develop an analytic model to investigate the probability that the VT-ASR delay for the first speaker is complete before the second speaker starts talking. From the measurements and analytic modeling, we show that the VT-ASR delay is short enough to result in a very good user experience. Our solution has won several important government and commercial TV contracts in Taiwan. VT-ASR has demonstrated better Taiwanese Mandarin speech recognition accuracy than famous commercial products (including Google and Iflytek) in Formosa Speech Recognition Challenge 2018 (FSR-2018) and was the best among all participating ASR systems for Taiwanese recognition accuracy in FSR-2020.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding MWPoW+:区块链分片中分片内共识的强共识协议
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-18 DOI: https://dl.acm.org/doi/10.1145/3584020
Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder

Blockchain sharding splits a blockchain into several shards where consensus is reached at the shard level rather than over the entire blockchain. It improves transaction throughput and reduces the computational resources required of individual nodes. But a derivation of trustworthy consensus within a shard becomes an issue as the longest chain based mechanisms used in conventional blockchains can no longer be used. Instead, a vote-based consensus mechanism must be employed. However, existing vote-based Byzantine fault tolerance consensus protocols do not offer sufficient security guarantees for sharded blockchains. First, when used to support consensus where only one block is allowed at a time (binary consensus), these protocols are susceptible to progress-hindering attacks (i.e., unable to reach a consensus). Second, when used to support a stronger type of consensus where multiple concurrent blocks are allowed (strong consensus), their tolerance of adversary nodes is low. This article proposes a new consensus protocol to address all these issues. We call the new protocol MWPoW+, as its basic framework is based on the existing Multiple Winners Proof of Work (MWPoW) protocol but includes new mechanisms to address the issues mentioned previously. MWPoW+ is a vote-based protocol for strong consensus, asynchronous in consensus derivation but synchronous in communication. We prove that it can tolerate up to f < n/2 adversary nodes in a n-node system as if using a binary consensus protocol and does not suffer from progress-hindering attacks.

区块链分片将区块链分成几个分片,在分片级别上达成共识,而不是在整个区块链上达成共识。它提高了事务吞吐量,减少了单个节点所需的计算资源。但是,由于传统区块链中使用的基于最长链的机制无法再使用,分片内可信共识的派生成为一个问题。相反,必须采用基于投票的共识机制。然而,现有的基于投票的拜占庭容错共识协议并不能为分片区块链提供足够的安全保证。首先,当用于支持一次只允许一个区块的共识(二进制共识)时,这些协议容易受到阻碍进展的攻击(即无法达成共识)。其次,当用于支持允许多个并发块的更强共识类型(强共识)时,它们对对手节点的容忍度很低。本文提出了一个新的共识协议来解决所有这些问题。我们称新协议为MWPoW+,因为它的基本框架是基于现有的多赢家工作量证明(MWPoW)协议,但包含了解决前面提到的问题的新机制。MWPoW+是一种基于投票的强共识协议,在共识派生上是异步的,但在通信上是同步的。我们证明了它可以容忍高达f <N节点系统中的N /2个对手节点,就像使用二进制共识协议一样,不会遭受阻碍进展的攻击。
{"title":"MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding","authors":"Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder","doi":"https://dl.acm.org/doi/10.1145/3584020","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3584020","url":null,"abstract":"<p>Blockchain sharding splits a blockchain into several shards where consensus is reached at the shard level rather than over the entire blockchain. It improves transaction throughput and reduces the computational resources required of individual nodes. But a derivation of trustworthy consensus within a shard becomes an issue as the longest chain based mechanisms used in conventional blockchains can no longer be used. Instead, a vote-based consensus mechanism must be employed. However, existing vote-based Byzantine fault tolerance consensus protocols do not offer sufficient security guarantees for sharded blockchains. First, when used to support consensus where only one block is allowed at a time (binary consensus), these protocols are susceptible to progress-hindering attacks (i.e., unable to reach a consensus). Second, when used to support a stronger type of consensus where multiple concurrent blocks are allowed (strong consensus), their tolerance of adversary nodes is low. This article proposes a new consensus protocol to address all these issues. We call the new protocol <i>MWPoW</i>+, as its basic framework is based on the existing Multiple Winners Proof of Work (MWPoW) protocol but includes new mechanisms to address the issues mentioned previously. MWPoW+ is a vote-based protocol for strong consensus, asynchronous in consensus derivation but synchronous in communication. We prove that it can tolerate up to <i>f</i> &lt; <i>n</i>/2 adversary nodes in a n-node system as if using a binary consensus protocol and does not suffer from progress-hindering attacks.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks 基于BERT和以姿态为中心的图注意网络的姿态级讽刺检测
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-18 DOI: https://dl.acm.org/doi/10.1145/3533430
Yazhou Zhang, Dan Ma, Prayag Tiwari, Chen Zhang, Mehedi Masud, Mohammad Shorfuzzaman, Dawei Song

Computational Linguistics (CL) associated with the Internet of Multimedia Things (IoMT)-enabled multimedia computing applications brings several research challenges, such as real-time speech understanding, deep fake video detection, emotion recognition, home automation, and so on. Due to the emergence of machine translation, CL solutions have increased tremendously for different natural language processing (NLP) applications. Nowadays, NLP-enabled IoMT is essential for its success. Sarcasm detection, a recently emerging artificial intelligence (AI) and NLP task, aims at discovering sarcastic, ironic, and metaphoric information implied in texts that are generated in the IoMT. It has drawn much attention from the AI and IoMT research community. The advance of sarcasm detection and NLP techniques will provide a cost-effective, intelligent way to work together with machine devices and high-level human-to-device interactions. However, existing sarcasm detection approaches neglect the hidden stance behind texts, thus insufficient to exploit the full potential of the task. Indeed, the stance, i.e., whether the author of a text is in favor of, against, or neutral toward the proposition or target talked in the text, largely determines the text’s actual sarcasm orientation. To fill the gap, in this research, we propose a new task: stance-level sarcasm detection (SLSD), where the goal is to uncover the author’s latent stance and based on it to identify the sarcasm polarity expressed in the text. We then propose an integral framework, which consists of Bidirectional Encoder Representations from Transformers (BERT) and a novel stance-centered graph attention networks (SCGAT). Specifically, BERT is used to capture the sentence representation, and SCGAT is designed to capture the stance information on specific target. Extensive experiments are conducted on a Chinese sarcasm sentiment dataset we created and the SemEval-2018 Task 3 English sarcasm dataset. The experimental results prove the effectiveness of the SCGAT framework over state-of-the-art baselines by a large margin.

计算语言学(CL)与多媒体物联网(IoMT)相关的多媒体计算应用带来了一些研究挑战,如实时语音理解、深度假视频检测、情感识别、家庭自动化等。由于机器翻译的出现,CL解决方案在不同的自然语言处理(NLP)应用程序中得到了极大的发展。如今,支持nlp的IoMT对其成功至关重要。讽刺检测是一项新兴的人工智能(AI)和NLP任务,旨在发现IoMT生成的文本中隐含的讽刺、讽刺和隐喻信息。它引起了人工智能和物联网研究界的广泛关注。讽刺检测和NLP技术的进步将提供一种具有成本效益的智能方式,与机器设备和高水平的人机交互一起工作。然而,现有的讽刺检测方法忽略了文本背后隐藏的立场,不足以充分挖掘任务的潜力。事实上,立场,即文章作者对文章中所谈论的命题或对象是赞成、反对还是中立,在很大程度上决定了文章的实际讽刺取向。为了填补这一空白,在本研究中,我们提出了一个新的任务:立场级讽刺检测(SLSD),其目标是揭示作者的潜在立场,并在此基础上识别文本中表达的讽刺极性。然后,我们提出了一个完整的框架,该框架由来自变形金刚的双向编码器表示(BERT)和一个新的以姿态为中心的图注意网络(SCGAT)组成。其中,BERT用于捕获句子表示,SCGAT用于捕获特定目标的立场信息。在我们创建的中文讽刺情绪数据集和SemEval-2018 Task 3英语讽刺数据集上进行了广泛的实验。实验结果证明了SCGAT框架在最先进的基线上的有效性。
{"title":"Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks","authors":"Yazhou Zhang, Dan Ma, Prayag Tiwari, Chen Zhang, Mehedi Masud, Mohammad Shorfuzzaman, Dawei Song","doi":"https://dl.acm.org/doi/10.1145/3533430","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3533430","url":null,"abstract":"<p>Computational Linguistics (CL) associated with the Internet of Multimedia Things (IoMT)-enabled multimedia computing applications brings several research challenges, such as real-time speech understanding, deep fake video detection, emotion recognition, home automation, and so on. Due to the emergence of machine translation, CL solutions have increased tremendously for different natural language processing (NLP) applications. Nowadays, NLP-enabled IoMT is essential for its success. Sarcasm detection, a recently emerging artificial intelligence (AI) and NLP task, aims at discovering sarcastic, ironic, and metaphoric information implied in texts that are generated in the IoMT. It has drawn much attention from the AI and IoMT research community. The advance of sarcasm detection and NLP techniques will provide a cost-effective, intelligent way to work together with machine devices and high-level human-to-device interactions. However, existing sarcasm detection approaches neglect the hidden stance behind texts, thus insufficient to exploit the full potential of the task. Indeed, the stance, i.e., whether the author of a text is in favor of, against, or neutral toward the proposition or target talked in the text, largely determines the text’s actual sarcasm orientation. To fill the gap, in this research, we propose a new task: stance-level sarcasm detection (SLSD), where the goal is to uncover the author’s latent stance and based on it to identify the sarcasm polarity expressed in the text. We then propose an integral framework, which consists of Bidirectional Encoder Representations from Transformers (BERT) and a novel stance-centered graph attention networks (SCGAT). Specifically, BERT is used to capture the sentence representation, and SCGAT is designed to capture the stance information on specific target. Extensive experiments are conducted on a Chinese sarcasm sentiment dataset we created and the SemEval-2018 Task 3 English sarcasm dataset. The experimental results prove the effectiveness of the SCGAT framework over state-of-the-art baselines by a large margin.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Deep Learning Models to Detect Fake News about COVID-19 使用深度学习模型检测关于COVID-19的假新闻
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-18 DOI: https://dl.acm.org/doi/10.1145/3533431
Mu-Yen Chen, Yi-Wei Lai, Jiunn-Woei Lian

The proliferation of mobile networked devices has made it easier and faster than ever for people to obtain and share information. However, this occasionally results in the propagation of erroneous information, which may be difficult to distinguish from the truth. The widespread diffusion of such information can result in irrational and poor decision making on potentially important issues. In 2020, this coincided with the global outbreak of Coronavirus Disease (COVID-19), a highly contagious and deadly virus. The proliferation of misinformation about COVID-19 on social media has already been identified as an “infodemic” by the World Health Organization (WHO), posing significant challenges for global governments seeking to manage the pandemic. This has driven an urgent need for methods to automatically detect and identify such misinformation. The research uses multiple deep learning model frameworks to detect misinformation in Chinese and English, and compare them based on different text feature selections. The model learns the textual characteristics of each type of true and misinformation for subsequent true/false prediction. The long and short-term memory (LSTM) model, the gated recurrent unit (GRU) model, and the bidirectional long and short-term memory (BiLSTM) model were selected for fake news detection. BiLSTM produces the best detection result, with detection accuracy reaching 94% for short-sentence English texts, and 99% for long-sentence English texts, while the accuracy for Chinese texts was 82%.

移动网络设备的激增使得人们获取和分享信息比以往任何时候都更容易、更快捷。然而,这偶尔会导致错误信息的传播,这可能很难与事实区分开来。这种信息的广泛传播可能导致在潜在重要问题上做出不合理和糟糕的决策。2020年,全球爆发了冠状病毒病(COVID-19),这是一种高度传染性和致命的病毒。世界卫生组织(世卫组织)已经将社交媒体上关于COVID-19的错误信息的扩散确定为“信息流行病”,这给寻求管理大流行的全球政府带来了重大挑战。这促使人们迫切需要自动检测和识别此类错误信息的方法。该研究使用多个深度学习模型框架来检测中文和英文的错误信息,并基于不同的文本特征选择对它们进行比较。该模型学习每一种真假信息的文本特征,用于后续的真假预测。采用长短期记忆(LSTM)模型、门控循环单元(GRU)模型和双向长短期记忆(BiLSTM)模型进行假新闻检测。BiLSTM的检测效果最好,短句英语文本的检测准确率达到94%,长句英语文本的检测准确率达到99%,中文文本的检测准确率为82%。
{"title":"Using Deep Learning Models to Detect Fake News about COVID-19","authors":"Mu-Yen Chen, Yi-Wei Lai, Jiunn-Woei Lian","doi":"https://dl.acm.org/doi/10.1145/3533431","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3533431","url":null,"abstract":"<p>The proliferation of mobile networked devices has made it easier and faster than ever for people to obtain and share information. However, this occasionally results in the propagation of erroneous information, which may be difficult to distinguish from the truth. The widespread diffusion of such information can result in irrational and poor decision making on potentially important issues. In 2020, this coincided with the global outbreak of <b>Coronavirus Disease (COVID-19)</b>, a highly contagious and deadly virus. The proliferation of misinformation about COVID-19 on social media has already been identified as an “infodemic” by the <b>World Health Organization (WHO)</b>, posing significant challenges for global governments seeking to manage the pandemic. This has driven an urgent need for methods to automatically detect and identify such misinformation. The research uses multiple deep learning model frameworks to detect misinformation in Chinese and English, and <b>compare them based on different text feature selection</b>s. The model learns the textual characteristics of each type of true and misinformation for subsequent true/false prediction. The <b>long and short-term memory (LSTM)</b> model, the <b>gated recurrent unit (GRU)</b> model, and the <b>bidirectional long and short-term memory (BiLSTM)</b> model were selected for fake news detection. BiLSTM produces the best detection result, <b>with detection accuracy reaching 94% for short-sentence English texts, and 99% for long-sentence English texts, while the accuracy for Chinese texts was 82%</b>.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Potential of Cyber Manufacturing Systems in the Digital Age 探索数字时代网络制造系统的潜力
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-08 DOI: 10.1145/3596602
Usman Ahmed, Jerry Chun‐wei Lin, Gautam Srivastava
Cyber-manufacturing Systems (CMS) have been growing in popularity. Transitioning from conventional manufacturing to an innovative paradigm that emphasizes innovation, automation, better customer service, and intelligent systems. A new manufacturing model can improve efficiency and productivity, and provide better customer service and response times. In addition, it may revolutionize the way products are produced, from design to completion. Thus, it is likely that this new manufacturing model will become increasingly popular shortly. By building new technologies on top of existing CMS, these systems ensure that data exchange and integration between decentralized systems are reliable and secure. Recently published case studies from industry and the literature support this claim. There are still some challenges to overcome, such as ensuring data reliability, but these can be overcome with further research and development. In summary, the use of CMS can revolutionize the manufacturing industry. This paper comprehensively analyses these systems and their potential applications and implications. The article gives an overview of the field and then explores the various aspects of CMS in greater detail. A taxonomy of the most common and current approaches to cyber-manufacturing systems is presented, including networked cyber-manufacturing systems, distributed cyber-manufacturing systems, cloud-based cyber-manufacturing systems, and cyber-physical systems (CPS). Furthermore, the paper identifies several popular open-source software and datasets and discusses how these resources can reduce barriers to CMS research. In addition, the paper identifies several important issues and research opportunities associated with CMS, including better integration between hardware and software, improved security and privacy protocols, communication protocols, and improved data management systems. The paper provides a comprehensive overview of current technology and valuable insights into the potential impact of the technology on society and industry.
网络制造系统(CMS)越来越受欢迎。从传统制造业向强调创新、自动化、更好的客户服务和智能系统的创新范式过渡。新的制造模式可以提高效率和生产力,并提供更好的客户服务和响应时间。此外,它可能会彻底改变产品的生产方式,从设计到完成。因此,这种新的制造模式很可能很快就会变得越来越流行。通过在现有CMS之上构建新技术,这些系统确保分散系统之间的数据交换和集成是可靠和安全的。最近发表的工业案例研究和文献支持了这一说法。仍有一些挑战需要克服,例如确保数据可靠性,但这些挑战可以通过进一步的研发来克服。总之,CMS的使用可以彻底改变制造业。本文全面分析了这些系统及其潜在的应用和意义。本文对该领域进行了概述,然后更详细地探讨了CMS的各个方面。介绍了网络制造系统最常见和最新方法的分类,包括网络化网络制造系统、分布式网络制造系统,基于云的网络制造系统和网络物理系统(CPS)。此外,本文确定了几种流行的开源软件和数据集,并讨论了这些资源如何减少CMS研究的障碍。此外,本文还确定了与CMS相关的几个重要问题和研究机会,包括更好地集成硬件和软件、改进的安全和隐私协议、通信协议以及改进的数据管理系统。本文全面概述了当前的技术,并对该技术对社会和行业的潜在影响提供了有价值的见解。
{"title":"Exploring the Potential of Cyber Manufacturing Systems in the Digital Age","authors":"Usman Ahmed, Jerry Chun‐wei Lin, Gautam Srivastava","doi":"10.1145/3596602","DOIUrl":"https://doi.org/10.1145/3596602","url":null,"abstract":"Cyber-manufacturing Systems (CMS) have been growing in popularity. Transitioning from conventional manufacturing to an innovative paradigm that emphasizes innovation, automation, better customer service, and intelligent systems. A new manufacturing model can improve efficiency and productivity, and provide better customer service and response times. In addition, it may revolutionize the way products are produced, from design to completion. Thus, it is likely that this new manufacturing model will become increasingly popular shortly. By building new technologies on top of existing CMS, these systems ensure that data exchange and integration between decentralized systems are reliable and secure. Recently published case studies from industry and the literature support this claim. There are still some challenges to overcome, such as ensuring data reliability, but these can be overcome with further research and development. In summary, the use of CMS can revolutionize the manufacturing industry. This paper comprehensively analyses these systems and their potential applications and implications. The article gives an overview of the field and then explores the various aspects of CMS in greater detail. A taxonomy of the most common and current approaches to cyber-manufacturing systems is presented, including networked cyber-manufacturing systems, distributed cyber-manufacturing systems, cloud-based cyber-manufacturing systems, and cyber-physical systems (CPS). Furthermore, the paper identifies several popular open-source software and datasets and discusses how these resources can reduce barriers to CMS research. In addition, the paper identifies several important issues and research opportunities associated with CMS, including better integration between hardware and software, improved security and privacy protocols, communication protocols, and improved data management systems. The paper provides a comprehensive overview of current technology and valuable insights into the potential impact of the technology on society and industry.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44081378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Potential of Cyber Manufacturing Systems in the Digital Age 探索数字时代网络制造系统的潜力
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-08 DOI: https://dl.acm.org/doi/10.1145/3596602
Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava

Cyber-manufacturing Systems (CMS) have been growing in popularity. Transitioning from conventional manufacturing to an innovative paradigm that emphasizes innovation, automation, better customer service, and intelligent systems. A new manufacturing model can improve efficiency and productivity, and provide better customer service and response times. In addition, it may revolutionize the way products are produced, from design to completion. Thus, it is likely that this new manufacturing model will become increasingly popular shortly. By building new technologies on top of existing CMS, these systems ensure that data exchange and integration between decentralized systems are reliable and secure. Recently published case studies from industry and the literature support this claim. There are still some challenges to overcome, such as ensuring data reliability, but these can be overcome with further research and development. In summary, the use of CMS can revolutionize the manufacturing industry. This paper comprehensively analyses these systems and their potential applications and implications. The article gives an overview of the field and then explores the various aspects of CMS in greater detail. A taxonomy of the most common and current approaches to cyber-manufacturing systems is presented, including networked cyber-manufacturing systems, distributed cyber-manufacturing systems, cloud-based cyber-manufacturing systems, and cyber-physical systems (CPS). Furthermore, the paper identifies several popular open-source software and datasets and discusses how these resources can reduce barriers to CMS research. In addition, the paper identifies several important issues and research opportunities associated with CMS, including better integration between hardware and software, improved security and privacy protocols, communication protocols, and improved data management systems. The paper provides a comprehensive overview of current technology and valuable insights into the potential impact of the technology on society and industry.

网络制造系统(CMS)越来越受欢迎。从传统制造业向强调创新、自动化、更好的客户服务和智能系统的创新模式过渡。一种新的制造模式可以提高效率和生产力,并提供更好的客户服务和响应时间。此外,它可能会彻底改变产品的生产方式,从设计到完成。因此,这种新的制造模式很可能很快就会变得越来越流行。通过在现有CMS之上构建新技术,这些系统确保分散系统之间的数据交换和集成是可靠和安全的。最近发表的行业案例研究和文献支持这一说法。还有一些挑战需要克服,比如确保数据的可靠性,但这些都可以通过进一步的研究和开发来克服。总之,CMS的使用可以彻底改变制造业。本文全面分析了这些系统及其潜在的应用和意义。本文概述了该领域,然后更详细地探讨了CMS的各个方面。介绍了网络制造系统最常见和当前方法的分类,包括网络化网络制造系统、分布式网络制造系统、基于云的网络制造系统和网络物理系统(CPS)。此外,本文确定了几个流行的开源软件和数据集,并讨论了这些资源如何减少CMS研究的障碍。此外,本文还指出了与CMS相关的几个重要问题和研究机会,包括硬件和软件之间更好的集成,改进的安全和隐私协议,通信协议以及改进的数据管理系统。本文全面概述了当前的技术,并对技术对社会和工业的潜在影响提供了有价值的见解。
{"title":"Exploring the Potential of Cyber Manufacturing Systems in the Digital Age","authors":"Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava","doi":"https://dl.acm.org/doi/10.1145/3596602","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3596602","url":null,"abstract":"<p>Cyber-manufacturing Systems (CMS) have been growing in popularity. Transitioning from conventional manufacturing to an innovative paradigm that emphasizes innovation, automation, better customer service, and intelligent systems. A new manufacturing model can improve efficiency and productivity, and provide better customer service and response times. In addition, it may revolutionize the way products are produced, from design to completion. Thus, it is likely that this new manufacturing model will become increasingly popular shortly. By building new technologies on top of existing CMS, these systems ensure that data exchange and integration between decentralized systems are reliable and secure. Recently published case studies from industry and the literature support this claim. There are still some challenges to overcome, such as ensuring data reliability, but these can be overcome with further research and development. In summary, the use of CMS can revolutionize the manufacturing industry. This paper comprehensively analyses these systems and their potential applications and implications. The article gives an overview of the field and then explores the various aspects of CMS in greater detail. A taxonomy of the most common and current approaches to cyber-manufacturing systems is presented, including networked cyber-manufacturing systems, distributed cyber-manufacturing systems, cloud-based cyber-manufacturing systems, and cyber-physical systems (CPS). Furthermore, the paper identifies several popular open-source software and datasets and discusses how these resources can reduce barriers to CMS research. In addition, the paper identifies several important issues and research opportunities associated with CMS, including better integration between hardware and software, improved security and privacy protocols, communication protocols, and improved data management systems. The paper provides a comprehensive overview of current technology and valuable insights into the potential impact of the technology on society and industry.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis i-DarkVec:用于暗网流量分析的增量嵌入
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-03 DOI: 10.1145/3595378
L. Gioacchini, L. Vassio, M. Mellia, I. Drago, Z. B. Houidi, Dario Rossi
Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic reaching a darknet results from the actions of internet scanners, botnets, and possibly misconfigured hosts. Such peculiar nature of the darknet traffic makes darknets a valuable instrument to discover malicious online activities, e.g., identifying coordinated actions performed by bots or scanners. However, the massive amount of packets and sources that darknets observe makes it hard to extract meaningful insights, calling for scalable tools to automatically identify and group sources that share similar behaviour. We here present i-DarkVec, a methodology to learn meaningful representations of Darknet traffic. i-DarkVec leverages Natural Language Processing techniques (e.g., Word2Vec) to capture the co-occurrence patterns that emerge when scanners or bots launch coordinated actions. As in NLP problems, the embeddings learned with i-DarkVec enable several new machine learning tasks on the darknet traffic, such as identifying clusters of senders engaged in similar activities. We extensively test i-DarkVec and explore its design space in a case study using real darknets. We show that with a proper definition of services, the learned embeddings can be used to (i) solve the classification problem to associate unknown sources’ IP addresses to the correct classes of coordinated actors and (ii) automatically identify clusters of previously unknown sources performing similar attacks and scans, easing the security analyst’s job. i-DarkVec leverages a novel incremental embedding learning approach that is scalable and robust to traffic changes, making it applicable to dynamic and large-scale scenarios.
暗网是监听到达没有服务的IP地址的流量的探测器。到达暗网的流量是由互联网扫描仪、僵尸网络以及可能配置错误的主机的操作造成的。暗网流量的这种特殊性质使暗网成为发现恶意在线活动的宝贵工具,例如识别机器人或扫描仪执行的协调行动。然而,暗网观察到的大量数据包和来源使得很难提取有意义的见解,需要可扩展的工具来自动识别和分组具有类似行为的来源。我们在这里介绍i-DarkVec,这是一种学习暗网流量有意义表示的方法。i-DarkVec利用自然语言处理技术(例如Word2Verc)来捕捉扫描仪或机器人启动协调动作时出现的共现模式。与NLP问题一样,使用i-DarkVec学习的嵌入能够在暗网流量上执行一些新的机器学习任务,例如识别参与类似活动的发送者集群。我们对i-DarkVec进行了广泛的测试,并在一个使用真实暗网的案例研究中探索了它的设计空间。我们表明,通过对服务的正确定义,学习到的嵌入可以用于(i)解决分类问题,将未知来源的IP地址与正确的协调参与者类别相关联,以及(ii)自动识别执行类似攻击和扫描的先前未知来源的集群,从而简化安全分析师的工作。i-DarkVec利用了一种新颖的增量嵌入学习方法,该方法可扩展且对流量变化具有鲁棒性,适用于动态和大规模场景。
{"title":"i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis","authors":"L. Gioacchini, L. Vassio, M. Mellia, I. Drago, Z. B. Houidi, Dario Rossi","doi":"10.1145/3595378","DOIUrl":"https://doi.org/10.1145/3595378","url":null,"abstract":"Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic reaching a darknet results from the actions of internet scanners, botnets, and possibly misconfigured hosts. Such peculiar nature of the darknet traffic makes darknets a valuable instrument to discover malicious online activities, e.g., identifying coordinated actions performed by bots or scanners. However, the massive amount of packets and sources that darknets observe makes it hard to extract meaningful insights, calling for scalable tools to automatically identify and group sources that share similar behaviour. We here present i-DarkVec, a methodology to learn meaningful representations of Darknet traffic. i-DarkVec leverages Natural Language Processing techniques (e.g., Word2Vec) to capture the co-occurrence patterns that emerge when scanners or bots launch coordinated actions. As in NLP problems, the embeddings learned with i-DarkVec enable several new machine learning tasks on the darknet traffic, such as identifying clusters of senders engaged in similar activities. We extensively test i-DarkVec and explore its design space in a case study using real darknets. We show that with a proper definition of services, the learned embeddings can be used to (i) solve the classification problem to associate unknown sources’ IP addresses to the correct classes of coordinated actors and (ii) automatically identify clusters of previously unknown sources performing similar attacks and scans, easing the security analyst’s job. i-DarkVec leverages a novel incremental embedding learning approach that is scalable and robust to traffic changes, making it applicable to dynamic and large-scale scenarios.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49505233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis i-DarkVec:暗网流量分析的增量嵌入
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-03 DOI: https://dl.acm.org/doi/10.1145/3595378
Luca Gioacchini, Luca Vassio, Marco Mellia, Idilio Drago, Zied Ben Houidi

Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic reaching a darknet results from the actions of internet scanners, botnets and possibly misconfigured hosts. Such peculiar nature of the darknet traffic makes darknets a valuable instrument to discover malicious online activities, e.g., identifying coordinated actions performed by bots or scanners. However, the massive amount of packets and sources that darknets observe makes it hard to extract meaningful insights, calling for scalable tools to automatically identify and group sources that share similar behaviour.

We here present i-DarkVec, a methodology to learn meaningful representations of Darknet traffic. i-DarkVec leverages Natural Language Processing techniques (e.g., Word2Vec) to capture the co-occurrence patterns that emerge when scanners or bots launch coordinated actions. As in NLP problems, the embeddings learned with i-DarkVec enable several new machine learning tasks on the darknet traffic, such as identifying clusters of senders engaged in similar activities.

We extensively test i-DarkVec and explore its design space in a case study using real darknets. We show that with a proper definition of services, the learned embeddings can be used to (i) solve the classification problem to associate unknown sources’ IP addresses to the correct classes of coordinated actors, and (ii) automatically identify clusters of previously unknown sources performing similar attacks and scans, easing the security analyst’s job. i-DarkVec leverages a novel incremental embedding learning approach that is scalable and robust to traffic changes, making it applicable to dynamic and large-scale scenarios.

暗网是侦听到达没有主机服务的IP地址的流量的探测器。流量到达暗网的结果是互联网扫描器,僵尸网络和可能配置错误的主机的行动。暗网流量的这种特殊性质使暗网成为发现恶意在线活动的宝贵工具,例如,识别由机器人或扫描仪执行的协调行动。然而,暗网观察到的大量数据包和源使得很难提取有意义的见解,这需要可扩展的工具来自动识别和分组共享相似行为的源。我们在这里提出i-DarkVec,一种学习暗网流量的有意义表示的方法。i-DarkVec利用自然语言处理技术(例如,Word2Vec)来捕捉扫描器或机器人启动协调动作时出现的共现模式。与NLP问题一样,使用i-DarkVec学习的嵌入在暗网流量上启用了几个新的机器学习任务,例如识别从事类似活动的发送者集群。我们广泛测试i-DarkVec和探索其设计空间在一个案例研究中使用真实的黑暗。我们表明,通过适当的服务定义,学习嵌入可以用于(i)解决分类问题,将未知源的IP地址与协调参与者的正确类别相关联,以及(ii)自动识别先前未知源的集群,执行类似的攻击和扫描,从而减轻安全分析师的工作。i-DarkVec利用了一种新颖的增量嵌入学习方法,该方法对流量变化具有可扩展性和鲁棒性,使其适用于动态和大规模的场景。
{"title":"i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis","authors":"Luca Gioacchini, Luca Vassio, Marco Mellia, Idilio Drago, Zied Ben Houidi","doi":"https://dl.acm.org/doi/10.1145/3595378","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3595378","url":null,"abstract":"<p>Darknets are probes listening to traffic reaching IP addresses that host no services. Traffic reaching a darknet results from the actions of internet scanners, botnets and possibly misconfigured hosts. Such peculiar nature of the darknet traffic makes darknets a valuable instrument to discover malicious online activities, e.g., identifying coordinated actions performed by bots or scanners. However, the massive amount of packets and sources that darknets observe makes it hard to extract meaningful insights, calling for scalable tools to automatically identify and group sources that share similar behaviour. </p><p>We here present i-DarkVec, a methodology to learn meaningful representations of Darknet traffic. i-DarkVec leverages Natural Language Processing techniques (e.g., Word2Vec) to capture the co-occurrence patterns that emerge when scanners or bots launch coordinated actions. As in NLP problems, the embeddings learned with i-DarkVec enable several new machine learning tasks on the darknet traffic, such as identifying clusters of senders engaged in similar activities. </p><p>We extensively test i-DarkVec and explore its design space in a case study using real darknets. We show that with a proper definition of <i>services</i>, the learned embeddings can be used to (i) solve the classification problem to associate unknown sources’ IP addresses to the correct classes of coordinated actors, and (ii) automatically identify clusters of previously unknown sources performing similar attacks and scans, easing the security analyst’s job. i-DarkVec leverages a novel incremental embedding learning approach that is scalable and robust to traffic changes, making it applicable to dynamic and large-scale scenarios.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138541989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution 工业网络制造频谱盲反褶积的非配对自监督学习
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-03 DOI: 10.1145/3590963
Lizhen Deng, Guoxia Xu, Jiaqi Pi, Hu Zhu, Xiaokang Zhou
Cyber-Manufacturing combines industrial big data with intelligent analysis to find and understand the intangible problems in decision-making, which requires a systematic method to deal with rich signal data. With the development of spectral detection and photoelectric imaging technology, spectral blind deconvolution has achieved remarkable results. However, spectral processing is limited by one-dimensional signal, and there is no available structural information with few training samples. Moreover, in the majority of practical applications, it is entirely feasible to gather unpaired spectrum dataset for training. This training method of unpaired learning is practical and valuable. Therefore, a two-stage deconvolution scheme combining self supervised learning and feature extraction is proposed in this paper, which generates two complementary paired sets through self supervised learning to extract the final deconvolution network. In addition, a new deconvolution network is designed for feature extraction. The spectrum is pre-trained through spectral feature extraction and noise estimation network to improve the training efficiency and meet the assumed noise characteristics. Experimental results show that this method is effective in dealing with different types of synthetic noise.
Cyber Manufacturing将工业大数据与智能分析相结合,以发现和理解决策中的无形问题,这需要一种系统的方法来处理丰富的信号数据。随着光谱检测和光电成像技术的发展,光谱盲反褶积取得了显著的效果。然而,谱处理受到一维信号的限制,在训练样本很少的情况下没有可用的结构信息。此外,在大多数实际应用中,收集不成对的噪声和干净的频谱是可行的。这种非配对学习的训练方法既实用又有价值。因此,本文提出了一种结合自监督学习和特征提取的两阶段反褶积方案,通过自监督学习生成两个互补的配对集来提取最终的反褶积网络。此外,还设计了一种新的反卷积网络用于特征提取。通过频谱特征提取和噪声估计网络对频谱进行预训练,提高训练效率,满足假设的噪声特性。实验结果表明,该方法在处理不同类型的合成噪声时是有效的。
{"title":"Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution","authors":"Lizhen Deng, Guoxia Xu, Jiaqi Pi, Hu Zhu, Xiaokang Zhou","doi":"10.1145/3590963","DOIUrl":"https://doi.org/10.1145/3590963","url":null,"abstract":"Cyber-Manufacturing combines industrial big data with intelligent analysis to find and understand the intangible problems in decision-making, which requires a systematic method to deal with rich signal data. With the development of spectral detection and photoelectric imaging technology, spectral blind deconvolution has achieved remarkable results. However, spectral processing is limited by one-dimensional signal, and there is no available structural information with few training samples. Moreover, in the majority of practical applications, it is entirely feasible to gather unpaired spectrum dataset for training. This training method of unpaired learning is practical and valuable. Therefore, a two-stage deconvolution scheme combining self supervised learning and feature extraction is proposed in this paper, which generates two complementary paired sets through self supervised learning to extract the final deconvolution network. In addition, a new deconvolution network is designed for feature extraction. The spectrum is pre-trained through spectral feature extraction and noise estimation network to improve the training efficiency and meet the assumed noise characteristics. Experimental results show that this method is effective in dealing with different types of synthetic noise.","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48915509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution 工业网络制造频谱盲反卷积的非配对自监督学习
IF 5.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-05-03 DOI: https://dl.acm.org/doi/10.1145/3590963
Lizhen Deng, Guoxia Xu, Jiaqi Pi, Hu Zhu, Xiaokang Zhou

Cyber-Manufacturing combines industrial big data with intelligent analysis to find and understand the intangible problems in decision-making, which requires a systematic method to deal with rich signal data. With the development of spectral detection and photoelectric imaging technology, spectral blind deconvolution has achieved remarkable results. However, spectral processing is limited by one-dimensional signal, there is no available structural information with little training samples. Moreover, in most practical applications, it is feasible to collect unpaired noise and clean spectrum. This training method of unpaired learning is practical and valuable. Therefore, a two-stage deconvolution scheme combining self supervised learning and feature extraction is proposed in this paper, which generates two complementary paired sets through self supervised learning to extract the final deconvolution network. In addition, a new deconvolution network is designed for feature extraction. The spectrum is pre-trained through spectral feature extraction and noise estimation network to improve the training efficiency and meet the assumed noise characteristics. Experimental results show that this method is effective in dealing with different types of synthetic noise.

Cyber-Manufacturing将工业大数据与智能分析相结合,发现和理解决策中的无形问题,这需要一种系统的方法来处理丰富的信号数据。随着光谱探测和光电成像技术的发展,光谱盲反褶积取得了显著的效果。然而,光谱处理受一维信号的限制,训练样本少,没有可用的结构信息。此外,在大多数实际应用中,采集不成对噪声和干净频谱是可行的。这种非配对学习的训练方法具有实用性和价值。因此,本文提出了一种结合自监督学习和特征提取的两阶段反褶积方案,通过自监督学习生成两个互补的配对集,提取最终的反褶积网络。此外,设计了一种新的反卷积网络用于特征提取。通过谱特征提取和噪声估计网络对谱进行预训练,提高训练效率,满足假设的噪声特征。实验结果表明,该方法可以有效地处理不同类型的合成噪声。
{"title":"Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution","authors":"Lizhen Deng, Guoxia Xu, Jiaqi Pi, Hu Zhu, Xiaokang Zhou","doi":"https://dl.acm.org/doi/10.1145/3590963","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3590963","url":null,"abstract":"<p>Cyber-Manufacturing combines industrial big data with intelligent analysis to find and understand the intangible problems in decision-making, which requires a systematic method to deal with rich signal data. With the development of spectral detection and photoelectric imaging technology, spectral blind deconvolution has achieved remarkable results. However, spectral processing is limited by one-dimensional signal, there is no available structural information with little training samples. Moreover, in most practical applications, it is feasible to collect unpaired noise and clean spectrum. This training method of unpaired learning is practical and valuable. Therefore, a two-stage deconvolution scheme combining self supervised learning and feature extraction is proposed in this paper, which generates two complementary paired sets through self supervised learning to extract the final deconvolution network. In addition, a new deconvolution network is designed for feature extraction. The spectrum is pre-trained through spectral feature extraction and noise estimation network to improve the training efficiency and meet the assumed noise characteristics. Experimental results show that this method is effective in dealing with different types of synthetic noise.</p>","PeriodicalId":50911,"journal":{"name":"ACM Transactions on Internet Technology","volume":null,"pages":null},"PeriodicalIF":5.3,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138533472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1