首页 > 最新文献

Computer Supported Cooperative Work-The Journal of Collaborative Computing最新文献

英文 中文
Who Gets in the Way of Parallelism? Analysis and Optimization of the Parallel Processing Bottleneck of SDN Flow Rules in ONOS 谁阻碍了并行?ONOS下SDN流规则并行处理瓶颈分析与优化
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152559
Zixuan Ma, Yuqi Zhang, Ruibang You, Chen Li
Software-Defined Networking (SDN) decouples the data plane from the control plane, enabling centralized control and open programmability of the network. OpenFlow flow rules are the key carrier for the SDN application to configure and manage the data plane through the control plane, and the processing efficiency of flow rules of the SDN controller in the control plane is critical as it will directly impact the instantaneity of configuring and managing the data plane. Currently, the controller increases the processing efficiency of flow rules by means of multi-threaded parallel processing. However, in the experiments of the widely used SDN controller ONOS, we found a new bottleneck in the parallel processing of flow rules that causes the performance gains from parallelism to be offset. Therefore, in this paper, we locate the bottleneck and analyze its causes through source code analysis and timestamp tests, propose a parallel event queue to resolve the bottleneck, and implement it in ONOS. Experiments show that our improved ONOS effectively resolves the bottleneck problem and achieves an average 3.57x improvement in the processing efficiency of flow rules compared to the original ONOS.
软件定义网络(SDN)将数据平面与控制平面解耦,实现了网络的集中控制和开放可编程性。OpenFlow流规则是SDN应用通过控制平面对数据平面进行配置和管理的关键载体,SDN控制器在控制平面对流规则的处理效率至关重要,直接影响到配置和管理数据平面的实时性。目前,该控制器通过多线程并行处理的方式提高了流规则的处理效率。然而,在广泛使用的SDN控制器ONOS的实验中,我们发现了流规则并行处理的新瓶颈,导致并行性带来的性能收益被抵消。因此,本文通过源代码分析和时间戳测试,定位瓶颈并分析瓶颈产生的原因,提出并行事件队列解决瓶颈,并在ONOS中实现。实验表明,改进后的ONOS有效地解决了瓶颈问题,流规则处理效率比原ONOS平均提高了3.57倍。
{"title":"Who Gets in the Way of Parallelism? Analysis and Optimization of the Parallel Processing Bottleneck of SDN Flow Rules in ONOS","authors":"Zixuan Ma, Yuqi Zhang, Ruibang You, Chen Li","doi":"10.1109/CSCWD57460.2023.10152559","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152559","url":null,"abstract":"Software-Defined Networking (SDN) decouples the data plane from the control plane, enabling centralized control and open programmability of the network. OpenFlow flow rules are the key carrier for the SDN application to configure and manage the data plane through the control plane, and the processing efficiency of flow rules of the SDN controller in the control plane is critical as it will directly impact the instantaneity of configuring and managing the data plane. Currently, the controller increases the processing efficiency of flow rules by means of multi-threaded parallel processing. However, in the experiments of the widely used SDN controller ONOS, we found a new bottleneck in the parallel processing of flow rules that causes the performance gains from parallelism to be offset. Therefore, in this paper, we locate the bottleneck and analyze its causes through source code analysis and timestamp tests, propose a parallel event queue to resolve the bottleneck, and implement it in ONOS. Experiments show that our improved ONOS effectively resolves the bottleneck problem and achieves an average 3.57x improvement in the processing efficiency of flow rules compared to the original ONOS.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"15 1","pages":"1808-1813"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88035385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix Transformation DLMT:基于矩阵变换的隐私保护外包深度学习
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152834
Dongdong Zhao, Ying Chen, Jianwen Xiang, Huanhuan Li
In recent years, deep learning has been applied in a wide variety of domains and gains outstanding success. In order to achieve high accuracy, a large amount of training data and high-performance hardware are necessary for deep learning. In real-world applications, many deep learning developers usually rent cloud GPU servers to train or deploy their models. Since training data may contain sensitive information, training models on cloud servers will cause severe privacy leakage problem. To solve this problem, we propose a privacy-preserving deep learning model based on matrix transformation. Specifically, we transform original data by adding or multiplying a random matrix. The obtained data is significantly different from the origin and it is hard to recover original data, so it can protect the privacy in original data. Experimental results demonstrate that the models trained with processed data can achieve high accuracy.
近年来,深度学习在各个领域得到了广泛的应用,并取得了显著的成功。为了达到较高的准确率,深度学习需要大量的训练数据和高性能的硬件。在实际应用中,许多深度学习开发人员通常租用云GPU服务器来训练或部署他们的模型。由于训练数据可能包含敏感信息,云服务器上的训练模型会造成严重的隐私泄露问题。为了解决这一问题,我们提出了一种基于矩阵变换的隐私保护深度学习模型。具体来说,我们通过添加或乘以一个随机矩阵来变换原始数据。获取的数据与原始数据有明显的差异,难以恢复原始数据,因此可以保护原始数据中的隐私。实验结果表明,用处理后的数据训练的模型可以达到较高的准确率。
{"title":"DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix Transformation","authors":"Dongdong Zhao, Ying Chen, Jianwen Xiang, Huanhuan Li","doi":"10.1109/CSCWD57460.2023.10152834","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152834","url":null,"abstract":"In recent years, deep learning has been applied in a wide variety of domains and gains outstanding success. In order to achieve high accuracy, a large amount of training data and high-performance hardware are necessary for deep learning. In real-world applications, many deep learning developers usually rent cloud GPU servers to train or deploy their models. Since training data may contain sensitive information, training models on cloud servers will cause severe privacy leakage problem. To solve this problem, we propose a privacy-preserving deep learning model based on matrix transformation. Specifically, we transform original data by adding or multiplying a random matrix. The obtained data is significantly different from the origin and it is hard to recover original data, so it can protect the privacy in original data. Experimental results demonstrate that the models trained with processed data can achieve high accuracy.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"60 1","pages":"1384-1389"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88122798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Copyright Authentication Method Balancing Watermark Robustness and Data Distortion 一种平衡水印鲁棒性和数据失真的版权认证方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152729
Chundong Wang, Yue Li
Database watermarking plays an irreplaceable role in copyright authentication and data integrity protection, but the robustness of the watermark and the resulting data distortion are a pair of contradictory objects that cannot be ignored. To solve this problem, a reversible database watermarking method, named IGADEW, is proposed to balance the relationship between them. The biggest difference from previous research is that IGADEW synthesizes the optimization objects and obtain various parameters through genetic algorithm (GA). Second, the fitness function considers the weights of robustness and distortion, aiming to find the optimal balance between the two. IGADEW uses the Hash-based Message Authentication Code (HMAC) algorithm to encrypt the experimental parameters and uses the primary key hash algorithm for data grouping, both to ensure robustness. And the data distortion is limited with the help of threshold constraints. Finally, experiments using the UCI dataset demonstrate the effectiveness of IGADEW. Experimental results show that, compared with existing methods, IGADEW is more robust against common attacks, with lower data distortion.
数据库水印在版权认证和数据完整性保护方面具有不可替代的作用,但水印的鲁棒性和由此产生的数据失真是一对不可忽视的矛盾对象。为了解决这一问题,提出了一种可逆的数据库水印方法IGADEW来平衡两者之间的关系。与以往研究最大的不同之处是,IGADEW通过遗传算法(genetic algorithm, GA)综合优化对象并获取各种参数。其次,适应度函数考虑鲁棒性和失真的权重,旨在找到两者之间的最优平衡点。IGADEW采用基于哈希的消息验证码(HMAC)算法对实验参数进行加密,采用主密钥哈希算法对数据分组,保证了鲁棒性。并且利用阈值约束限制了数据失真。最后,基于UCI数据集的实验验证了IGADEW的有效性。实验结果表明,与现有方法相比,IGADEW对常见攻击具有更强的鲁棒性,并且具有更低的数据失真。
{"title":"A Copyright Authentication Method Balancing Watermark Robustness and Data Distortion","authors":"Chundong Wang, Yue Li","doi":"10.1109/CSCWD57460.2023.10152729","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152729","url":null,"abstract":"Database watermarking plays an irreplaceable role in copyright authentication and data integrity protection, but the robustness of the watermark and the resulting data distortion are a pair of contradictory objects that cannot be ignored. To solve this problem, a reversible database watermarking method, named IGADEW, is proposed to balance the relationship between them. The biggest difference from previous research is that IGADEW synthesizes the optimization objects and obtain various parameters through genetic algorithm (GA). Second, the fitness function considers the weights of robustness and distortion, aiming to find the optimal balance between the two. IGADEW uses the Hash-based Message Authentication Code (HMAC) algorithm to encrypt the experimental parameters and uses the primary key hash algorithm for data grouping, both to ensure robustness. And the data distortion is limited with the help of threshold constraints. Finally, experiments using the UCI dataset demonstrate the effectiveness of IGADEW. Experimental results show that, compared with existing methods, IGADEW is more robust against common attacks, with lower data distortion.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"44 1","pages":"1178-1183"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85230039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RS-TTS: A Novel Joint Entity and Relation Extraction Model RS-TTS:一种新的联合实体和关系抽取模型
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152749
Jialu Zhang, Xingguo Jiang, Yan Sun, Hong Luo
Joint extraction of entity and relation is a basic task in the field of natural language processing. Existing methods have achieved good result, but there are still some limitations, such as span-based extraction cannot solve overlapping problems well, and redundant relation calculation leads to many invalid operations. To solve these problems, we propose a novel RelationSpecific Triple Tagging and Scoring Model (RS-TTS) for the joint extraction of entity and relation. Specifically, the model is composed of three parts: we use a relation judgment module to predict all potential relations to prevent computational redundancy; then a boundary smoothing mechanism is introduced to the entity pair extraction, which reallocates the probability of the ground truth entity to its surrounding tokens, thus preventing the model from being overconfident; finally, an efficient tagging and scoring strategy is used to decode entity. Extensive experiments show that our model performs better than the state-of-the-art baseline on the public benchmark dataset. F1-scores on the four datasets are improved, especially on WebNLG and WebNLG∗, which are improved by 1.7 and 1.1 respectively.
实体和关系的联合抽取是自然语言处理领域的一项基本任务。现有方法取得了较好的效果,但仍存在一些局限性,如基于跨度的提取不能很好地解决重叠问题,冗余的关系计算导致许多无效操作。为了解决这些问题,我们提出了一种新的关系特定三重标记和评分模型(RS-TTS),用于实体和关系的联合抽取。具体来说,该模型由三部分组成:我们使用关系判断模块来预测所有潜在的关系,以防止计算冗余;然后在实体对提取中引入边界平滑机制,将真实实体的概率重新分配给其周围的令牌,从而防止模型过于自信;最后,采用有效的标注和评分策略对实体进行解码。大量的实验表明,我们的模型在公共基准数据集上的性能优于最先进的基线。四个数据集的f1分数均有提高,尤其是WebNLG和WebNLG *,分别提高了1.7和1.1。
{"title":"RS-TTS: A Novel Joint Entity and Relation Extraction Model","authors":"Jialu Zhang, Xingguo Jiang, Yan Sun, Hong Luo","doi":"10.1109/CSCWD57460.2023.10152749","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152749","url":null,"abstract":"Joint extraction of entity and relation is a basic task in the field of natural language processing. Existing methods have achieved good result, but there are still some limitations, such as span-based extraction cannot solve overlapping problems well, and redundant relation calculation leads to many invalid operations. To solve these problems, we propose a novel RelationSpecific Triple Tagging and Scoring Model (RS-TTS) for the joint extraction of entity and relation. Specifically, the model is composed of three parts: we use a relation judgment module to predict all potential relations to prevent computational redundancy; then a boundary smoothing mechanism is introduced to the entity pair extraction, which reallocates the probability of the ground truth entity to its surrounding tokens, thus preventing the model from being overconfident; finally, an efficient tagging and scoring strategy is used to decode entity. Extensive experiments show that our model performs better than the state-of-the-art baseline on the public benchmark dataset. F1-scores on the four datasets are improved, especially on WebNLG and WebNLG∗, which are improved by 1.7 and 1.1 respectively.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"33 1","pages":"71-76"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85081939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Multi-view Knowledge Graph Embedding Model Considering Structure and Semantics 一种考虑结构和语义的多视图知识图嵌入模型
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152719
Jia Peng, Neng Gao, Yifei Zhang, Min Li
The essence of knowledge representation learning is to embed the knowledge graph into a low-dimensional vector space to make knowledge computable and deductible. Semantic indiscriminate knowledge representation models usually focus more on the scalability on real world knowledge graphs. They assume that the vector representations of entities and relations are consistent in any semantic environment. Semantic discriminate knowledge representation models focus more on precision. They assume that the vector representations should depend on the specific semantic environment. However, both the two kinds only consider knowledge embedding in semantic space, ignoring the rich features of network structure contained between triplet entities. The MulSS model proposed in this paper is a joint embedding learning method across network structure space and semantic space. By synchronizing the Deepwalk network representation learning method into the semantic indiscriminate model TransE, MulSS achieves better performance than TransE and some semantic discriminate knowledge representation models on triplet classification task. This shows that it is of great significance to extend knowledge representation learning from the single semantic space to the network structure and semantic joint space.
知识表示学习的本质是将知识图嵌入到低维向量空间中,使知识可计算、可演绎。语义不加区分的知识表示模型通常更关注现实世界知识图的可扩展性。它们假定实体和关系的向量表示在任何语义环境中都是一致的。语义区分知识表示模型更注重准确性。他们假设向量表示应该依赖于特定的语义环境。然而,这两种方法都只考虑了语义空间中的知识嵌入,而忽略了三元实体之间包含的网络结构的丰富特征。本文提出的MulSS模型是一种跨网络结构空间和语义空间的联合嵌入学习方法。通过将Deepwalk网络表示学习方法同步到语义不区分模型TransE中,MulSS在三元组分类任务上取得了比TransE和一些语义区分知识表示模型更好的性能。这表明将知识表示学习从单一的语义空间扩展到网络结构和语义连接空间具有重要意义。
{"title":"A Multi-view Knowledge Graph Embedding Model Considering Structure and Semantics","authors":"Jia Peng, Neng Gao, Yifei Zhang, Min Li","doi":"10.1109/CSCWD57460.2023.10152719","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152719","url":null,"abstract":"The essence of knowledge representation learning is to embed the knowledge graph into a low-dimensional vector space to make knowledge computable and deductible. Semantic indiscriminate knowledge representation models usually focus more on the scalability on real world knowledge graphs. They assume that the vector representations of entities and relations are consistent in any semantic environment. Semantic discriminate knowledge representation models focus more on precision. They assume that the vector representations should depend on the specific semantic environment. However, both the two kinds only consider knowledge embedding in semantic space, ignoring the rich features of network structure contained between triplet entities. The MulSS model proposed in this paper is a joint embedding learning method across network structure space and semantic space. By synchronizing the Deepwalk network representation learning method into the semantic indiscriminate model TransE, MulSS achieves better performance than TransE and some semantic discriminate knowledge representation models on triplet classification task. This shows that it is of great significance to extend knowledge representation learning from the single semantic space to the network structure and semantic joint space.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"29 1","pages":"1532-1537"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83511477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSCWD 2023 Cover Page CSCWD 2023封面
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/cscwd57460.2023.10151997
{"title":"CSCWD 2023 Cover Page","authors":"","doi":"10.1109/cscwd57460.2023.10151997","DOIUrl":"https://doi.org/10.1109/cscwd57460.2023.10151997","url":null,"abstract":"","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"218 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83631724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AD-AC Opportunistic Routing Algorithm Based on Context Information of Nodes in Opportunistic Networks 基于机会网络中节点上下文信息的AD-AC机会路由算法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152610
Yuqi Wang, Gaofeng Zhang, Yanhe Fu, Gang Xu, Fengqi Wei, Kun Yan
Opportunistic networks are mobile self-organizing networks that use the encounter opportunities brought by node movement to achieve communication. However, existing opportunistic routing algorithms rarely consider node context information and cache management at the same time, which leads to network congestion and high energy consumption problems in opportunistic networks. To solve the above problems, this paper defines the node historical activity degree and encounter duration based on the context information of nodes, and designs the AD-AC (historical Activity degree and encounter Duration of nodes-Acknowledgment deletion mechanism) opportunistic routing algorithm based on the context information of nodes by incorporating ACK (Acknowledgment) deletion mechanism. The simulation results indicate that AD-AC can substantially improve the message delivery rate while reducing the network overhead as well as the average hop count of messages.
机会网络是利用节点运动带来的相遇机会实现交流的移动自组织网络。然而,现有的机会路由算法很少同时考虑节点上下文信息和缓存管理,从而导致机会网络中的网络拥塞和高能耗问题。针对上述问题,本文根据节点的上下文信息定义节点的历史活动度和相遇持续时间,并结合ACK(确认)删除机制,设计基于节点的上下文信息的AD-AC(节点的历史活动度和相遇持续时间)机会路由算法。仿真结果表明,在降低网络开销和消息平均跳数的同时,AD-AC可以显著提高消息的投递率。
{"title":"AD-AC Opportunistic Routing Algorithm Based on Context Information of Nodes in Opportunistic Networks","authors":"Yuqi Wang, Gaofeng Zhang, Yanhe Fu, Gang Xu, Fengqi Wei, Kun Yan","doi":"10.1109/CSCWD57460.2023.10152610","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152610","url":null,"abstract":"Opportunistic networks are mobile self-organizing networks that use the encounter opportunities brought by node movement to achieve communication. However, existing opportunistic routing algorithms rarely consider node context information and cache management at the same time, which leads to network congestion and high energy consumption problems in opportunistic networks. To solve the above problems, this paper defines the node historical activity degree and encounter duration based on the context information of nodes, and designs the AD-AC (historical Activity degree and encounter Duration of nodes-Acknowledgment deletion mechanism) opportunistic routing algorithm based on the context information of nodes by incorporating ACK (Acknowledgment) deletion mechanism. The simulation results indicate that AD-AC can substantially improve the message delivery rate while reducing the network overhead as well as the average hop count of messages.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"140 1","pages":"831-836"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86141035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QAIC: Quality-assured image crowdsourcing via blockchain and deep learning QAIC:通过区块链和深度学习实现质量保证的图像众包
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152699
Baowei Wang, Yiguo Yuan, Bin Li, Changyu Dai, Y. Wu, Weiqian Zheng
Recently, image crowdsourcing, a new trading mode, has been proposed to bridge the gap between the excess photos generated by intelligent devices and the great demand for images. However, traditional crowdsourcing methods often rely on centralized platforms, which risk data leakage and a single point of failure (SPOF). Moreover, due to the subjectivity of image quality assessment and the complexity of image data structure, image quality is difficult to control for traditional crowdsourcing frameworks without exposing data privacy. In this work, we propose a blockchain-based image crowdsourcing framework named QAIC to address these issues. Within the framework of QAIC, the transaction information is stored using a multichain structure, and the transaction process is implemented using smart contracts. We design an image selection and pricing mechanism for QAIC, where high-quality image sets can be spontaneously selected, and each image can be dynamically priced based on distortion degree and content relevance. Finally, to accurately obtain image quality, we design a dual output neural network model to evaluate the image quality, where a lightweight architecture is adopted, and piecewise outputs are designed to protect image privacy and reduce the on-chain computational cost Extensive analysis and experiments demonstrate that the quality of transaction data and reasonable pricing can be ensured using the QAIC without compromising image privacy.
最近,人们提出了一种新的交易模式——图像众包,以弥合智能设备产生的过剩照片与巨大的图像需求之间的差距。然而,传统的众包方法通常依赖于集中式平台,这有数据泄露和单点故障(SPOF)的风险。此外,由于图像质量评估的主观性和图像数据结构的复杂性,传统众包框架在不暴露数据隐私的情况下难以对图像质量进行控制。在这项工作中,我们提出了一个名为QAIC的基于区块链的图像众包框架来解决这些问题。在QAIC框架内,交易信息采用多链结构存储,交易过程采用智能合约实现。我们为QAIC设计了一种图像选择和定价机制,可以自发地选择高质量的图像集,并根据图像失真程度和内容相关性对每张图像进行动态定价。最后,为了准确获取图像质量,我们设计了一个双输出神经网络模型来评估图像质量,该模型采用轻量级架构,并设计分段输出,以保护图像隐私并降低链上计算成本。大量的分析和实验表明,使用QAIC可以在不损害图像隐私的情况下保证交易数据的质量和合理的定价。
{"title":"QAIC: Quality-assured image crowdsourcing via blockchain and deep learning","authors":"Baowei Wang, Yiguo Yuan, Bin Li, Changyu Dai, Y. Wu, Weiqian Zheng","doi":"10.1109/CSCWD57460.2023.10152699","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152699","url":null,"abstract":"Recently, image crowdsourcing, a new trading mode, has been proposed to bridge the gap between the excess photos generated by intelligent devices and the great demand for images. However, traditional crowdsourcing methods often rely on centralized platforms, which risk data leakage and a single point of failure (SPOF). Moreover, due to the subjectivity of image quality assessment and the complexity of image data structure, image quality is difficult to control for traditional crowdsourcing frameworks without exposing data privacy. In this work, we propose a blockchain-based image crowdsourcing framework named QAIC to address these issues. Within the framework of QAIC, the transaction information is stored using a multichain structure, and the transaction process is implemented using smart contracts. We design an image selection and pricing mechanism for QAIC, where high-quality image sets can be spontaneously selected, and each image can be dynamically priced based on distortion degree and content relevance. Finally, to accurately obtain image quality, we design a dual output neural network model to evaluate the image quality, where a lightweight architecture is adopted, and piecewise outputs are designed to protect image privacy and reduce the on-chain computational cost Extensive analysis and experiments demonstrate that the quality of transaction data and reasonable pricing can be ensured using the QAIC without compromising image privacy.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"71 1","pages":"648-653"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86407494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stigmergy in Crowdsourcing and Task Fingerprinting: Study on Behavioral Traces of Weather Experts in Interaction Logs 众包中的污名化与任务指纹:交互日志中气象专家行为痕迹的研究
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152765
Dennis Paulino, António Correia, D. Guimaraes, Ramon Chaves, Glaucia Melo, D. Schneider, J. Barroso, H. Paredes
When crowd workers provide their contributions in a shared working environment, they may be influenced by the inputs of other contributors in implicit ways. Stigmergy in crowdsourcing consists of tracking changes in work activities to guide crowd workers based on the digital traces left by other workers. In such scenarios, there is no direct communication between the contributors. Still, the traceable changes they left during their actions act as a mediating element that clearly affects the final work product. From a behavior analysis perspective, the properties recorded in event logs can be of practical value in observing the behavioral traces produced by crowd workers when performing microtasks. This form of task fingerprinting has been explored for over a decade to better understand performance-related data and user navigational behavior in crowdsourcing markets. In line with this, the goal of this paper is to study the feasibility of task fingerprinting alongside the stigmergic effect occurring in a crowdsourcing setting through a user event logger. To this end, a case study was conducted using a real-world scenario of extreme weather phenomena represented on interactive maps. Each user could observe the traces of other crowd members while providing annotations. Twelve experts in weather forecasting were recruited to participate in this study to annotate extreme weather events. The results indicate that it is possible to use task fingerprinting for tracking the stigmergic effect in such activities with gains in terms of implicit coordination. Furthermore, the task fingerprinting allowed to map participants with similar behavioral traces, suggesting an increase in the accuracy of annotation clusters.
当群体工作者在一个共享的工作环境中提供他们的贡献时,他们可能会以隐性的方式受到其他贡献者的影响。众包中的污名化是跟踪工作活动的变化,根据其他工作者留下的数字痕迹来指导众包工作者。在这样的场景中,贡献者之间没有直接的通信。尽管如此,他们在操作过程中留下的可追踪的更改充当了一个中介元素,它明显地影响了最终的工作产品。从行为分析的角度来看,记录在事件日志中的属性对于观察群体工作人员在执行微任务时产生的行为痕迹具有实用价值。这种形式的任务指纹已经被探索了十多年,以便更好地理解众包市场中与性能相关的数据和用户导航行为。与此相一致,本文的目标是研究任务指纹识别的可行性,以及通过用户事件记录器在众包环境中发生的污名效应。为此,使用交互式地图上表示的极端天气现象的真实场景进行了案例研究。每个用户都可以在提供注释的同时观察其他人群成员的踪迹。本研究招募了12位天气预报专家参与,对极端天气事件进行标注。结果表明,可以使用任务指纹来跟踪这些活动中的污名效应,并在内隐协调方面获得收益。此外,任务指纹允许映射具有相似行为痕迹的参与者,这表明注释簇的准确性有所提高。
{"title":"Stigmergy in Crowdsourcing and Task Fingerprinting: Study on Behavioral Traces of Weather Experts in Interaction Logs","authors":"Dennis Paulino, António Correia, D. Guimaraes, Ramon Chaves, Glaucia Melo, D. Schneider, J. Barroso, H. Paredes","doi":"10.1109/CSCWD57460.2023.10152765","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152765","url":null,"abstract":"When crowd workers provide their contributions in a shared working environment, they may be influenced by the inputs of other contributors in implicit ways. Stigmergy in crowdsourcing consists of tracking changes in work activities to guide crowd workers based on the digital traces left by other workers. In such scenarios, there is no direct communication between the contributors. Still, the traceable changes they left during their actions act as a mediating element that clearly affects the final work product. From a behavior analysis perspective, the properties recorded in event logs can be of practical value in observing the behavioral traces produced by crowd workers when performing microtasks. This form of task fingerprinting has been explored for over a decade to better understand performance-related data and user navigational behavior in crowdsourcing markets. In line with this, the goal of this paper is to study the feasibility of task fingerprinting alongside the stigmergic effect occurring in a crowdsourcing setting through a user event logger. To this end, a case study was conducted using a real-world scenario of extreme weather phenomena represented on interactive maps. Each user could observe the traces of other crowd members while providing annotations. Twelve experts in weather forecasting were recruited to participate in this study to annotate extreme weather events. The results indicate that it is possible to use task fingerprinting for tracking the stigmergic effect in such activities with gains in terms of implicit coordination. Furthermore, the task fingerprinting allowed to map participants with similar behavioral traces, suggesting an increase in the accuracy of annotation clusters.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"117 1","pages":"1293-1299"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86662169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain Phishsifter:一种基于内容和领域相关性的增强的网络钓鱼页面检测方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152819
Yue Ma, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zhiting Ling, Peian Yang
A Phishing website is used to steal users’ private information. The accelerated development of phishing kits has made it convenient to create such websites, which has become a persistent security threat. In this article, we propose a novel method to detect phishing webpages based on the relevance of the webpage content and domain. For phishing webpages whose domain is relevant to the content, we use the target identification method to identify the target brand. We use two components, the website logo and domain, to identify phishing sites, which increases the accuracy of identification. For irrelevant websites, we use a feature-based approach to distinguish phishing webpages. The experiment shows that the accuracy of target identification is 97.21%, while the false positive rate is 1.47%. The accuracy of the feature-based method is 98.32%. The proposed scheme can meet the needs of practical applications and provide an interpretation of the classification results.
网络钓鱼网站用来窃取用户的私人信息。网络钓鱼工具的加速发展使得创建这样的网站变得方便,这已经成为一个持续的安全威胁。本文提出了一种基于网页内容和域名相关性的网络钓鱼网页检测方法。对于域名与内容相关的网络钓鱼网页,我们使用目标识别方法来识别目标品牌。我们采用网站标识和域名两个组成部分来识别钓鱼网站,提高了识别的准确性。对于不相关的网站,我们使用基于特征的方法来区分网络钓鱼网页。实验表明,目标识别正确率为97.21%,假阳性率为1.47%。基于特征的方法准确率为98.32%。该方案既能满足实际应用的需要,又能对分类结果进行解释。
{"title":"Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain","authors":"Yue Ma, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zhiting Ling, Peian Yang","doi":"10.1109/CSCWD57460.2023.10152819","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152819","url":null,"abstract":"A Phishing website is used to steal users’ private information. The accelerated development of phishing kits has made it convenient to create such websites, which has become a persistent security threat. In this article, we propose a novel method to detect phishing webpages based on the relevance of the webpage content and domain. For phishing webpages whose domain is relevant to the content, we use the target identification method to identify the target brand. We use two components, the website logo and domain, to identify phishing sites, which increases the accuracy of identification. For irrelevant websites, we use a feature-based approach to distinguish phishing webpages. The experiment shows that the accuracy of target identification is 97.21%, while the false positive rate is 1.47%. The accuracy of the feature-based method is 98.32%. The proposed scheme can meet the needs of practical applications and provide an interpretation of the classification results.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"2014 1","pages":"909-916"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86664640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Supported Cooperative Work-The Journal of Collaborative Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1