首页 > 最新文献

Computer Supported Cooperative Work-The Journal of Collaborative Computing最新文献

英文 中文
Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based Attack 基于动态n图的攻击提高文本对抗示例的质量
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152569
Xiaojiao Xie, Pengwei Zhan
Natural language models have been widely used for their impressive performance in various tasks, while their poor robustness also puts critical applications at high risk. These models are vulnerable to adversarial examples, which contain imperceptible noise that leads the model to wrong predictions. To ensure such malicious examples are imperceptible to humans, various word-level attack methods have been proposed. Previous works on word-level attacks attempt to generate adversarial examples by substituting words in sentences. They utilize different candidate substitution selection methods and substitution strategies to improve attack effectiveness and the quality of generated examples. However, previous works are all unigram-based attack methods, which ignore the connection between words. The unigram nature of these methods downgrades fluency, increases grammatical errors, and biases the semantics of adversarial examples, making adversarial examples easier to be detected by humans. In this paper, to improve the quality of textual adversarial examples and makes the adversarial example more imperceptible to human, we propose a black-box word-level attack method called Dynamic N-Gram Based Attack (DyGram). DyGram tokenizes the entire sentence into multiple n-gram units, rather than individual words as in previous works, and substitutes words in a sentence in descending order of n-gram unit importance. Extensive experiments demonstrate that DyGram achieves higher attack success rates than previous attack methods and improves the quality of generated adversarial examples in terms of the number of perturbed words, perplexity, grammatical correctness, and semantic similarity.
自然语言模型因其在各种任务中的出色表现而被广泛使用,但其较差的鲁棒性也使关键应用面临高风险。这些模型很容易受到敌对例子的影响,这些例子包含难以察觉的噪音,导致模型做出错误的预测。为了确保这些恶意示例不被人类察觉,人们提出了各种词级攻击方法。先前关于词级攻击的工作试图通过替换句子中的单词来生成对抗性示例。他们利用不同的候选替代选择方法和替代策略来提高攻击效率和生成示例的质量。然而,以往的研究都是基于unig拉姆的攻击方法,忽略了单词之间的联系。这些方法的单格性质降低了流利性,增加了语法错误,并使对抗性示例的语义产生偏差,使对抗性示例更容易被人类检测到。为了提高文本对抗性示例的质量,使对抗性示例更不易被人类感知,本文提出了一种黑箱词级攻击方法——基于动态N-Gram的攻击(DyGram)。DyGram将整个句子标记为多个n-gram单位,而不是像以前的作品那样将单个单词标记为n-gram单位,并按照n-gram单位重要性的降序替换句子中的单词。大量的实验表明,DyGram比以前的攻击方法获得了更高的攻击成功率,并且在扰动词的数量、困惑度、语法正确性和语义相似度方面提高了生成的对抗示例的质量。
{"title":"Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based Attack","authors":"Xiaojiao Xie, Pengwei Zhan","doi":"10.1109/CSCWD57460.2023.10152569","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152569","url":null,"abstract":"Natural language models have been widely used for their impressive performance in various tasks, while their poor robustness also puts critical applications at high risk. These models are vulnerable to adversarial examples, which contain imperceptible noise that leads the model to wrong predictions. To ensure such malicious examples are imperceptible to humans, various word-level attack methods have been proposed. Previous works on word-level attacks attempt to generate adversarial examples by substituting words in sentences. They utilize different candidate substitution selection methods and substitution strategies to improve attack effectiveness and the quality of generated examples. However, previous works are all unigram-based attack methods, which ignore the connection between words. The unigram nature of these methods downgrades fluency, increases grammatical errors, and biases the semantics of adversarial examples, making adversarial examples easier to be detected by humans. In this paper, to improve the quality of textual adversarial examples and makes the adversarial example more imperceptible to human, we propose a black-box word-level attack method called Dynamic N-Gram Based Attack (DyGram). DyGram tokenizes the entire sentence into multiple n-gram units, rather than individual words as in previous works, and substitutes words in a sentence in descending order of n-gram unit importance. Extensive experiments demonstrate that DyGram achieves higher attack success rates than previous attack methods and improves the quality of generated adversarial examples in terms of the number of perturbed words, perplexity, grammatical correctness, and semantic similarity.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"53 1","pages":"594-599"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81156230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS and Fuzzy Logic Based Communication Handover Strategy in 5G Cellular Internet of Vehicles 基于QoS和模糊逻辑的5G蜂窝车联网通信切换策略
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152793
Bo Li, Zisu Na, Rongrong Qian, Hongwei Ding
How to ensure the reliability of mixed communication between vehicle to vehicle and vehicle to road, and how to ensure seamless handover during communication in the Internet of Vehicles, is a research hotspot in 5G cellular Internet of Vehicles. This paper proposes a 5G cellular Internet of Vehicles communication handover strategy model for V2V (Vehicle to Vehicle) and V2I (Vehicle to Infrastructure) scenarios, which combines fuzzy logic and user satisfaction for obtaining quality of service, and can make intelligent decisions on handover trigger timing and handover targets based on various parameters in the wireless network, so that the vehicle can handover to the best service target in the process of vehicle terminal handover. The experimental study shows that the proposed method outperforms other common methods in terms of handover metrics such as handover trigger rate, handover times and quality of service compared to existing studies.
如何保证车与车、车与路混合通信的可靠性,保证车联网通信过程中的无缝切换,是5G蜂窝车联网的研究热点。针对V2V (Vehicle to Vehicle)和V2I (Vehicle to Infrastructure)场景,提出了一种5G蜂窝车联网通信切换策略模型,该模型将模糊逻辑和用户满意度相结合以获取服务质量,根据无线网络中的各种参数对切换触发时间和切换目标进行智能决策,使车辆在车载终端切换过程中能够切换到最佳服务目标。实验研究表明,该方法在切换触发率、切换次数和服务质量等切换指标上均优于其他常用方法。
{"title":"QoS and Fuzzy Logic Based Communication Handover Strategy in 5G Cellular Internet of Vehicles","authors":"Bo Li, Zisu Na, Rongrong Qian, Hongwei Ding","doi":"10.1109/CSCWD57460.2023.10152793","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152793","url":null,"abstract":"How to ensure the reliability of mixed communication between vehicle to vehicle and vehicle to road, and how to ensure seamless handover during communication in the Internet of Vehicles, is a research hotspot in 5G cellular Internet of Vehicles. This paper proposes a 5G cellular Internet of Vehicles communication handover strategy model for V2V (Vehicle to Vehicle) and V2I (Vehicle to Infrastructure) scenarios, which combines fuzzy logic and user satisfaction for obtaining quality of service, and can make intelligent decisions on handover trigger timing and handover targets based on various parameters in the wireless network, so that the vehicle can handover to the best service target in the process of vehicle terminal handover. The experimental study shows that the proposed method outperforms other common methods in terms of handover metrics such as handover trigger rate, handover times and quality of service compared to existing studies.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"1 1","pages":"1458-1463"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85417101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Subdomain Uncertainty-Guided Kriging Method with Subset Simulation for Reliability Estimation 基于子集仿真的子域不确定性引导Kriging可靠性估计方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152591
Dapeng Wang, H. Qiu, L. Gao
Direct Monte Carlo Simulation for reliability estimation of rare failure event is challenged by the complicated performance function evaluations and large candidate sample pool. To address these challenges, a subdomain uncertainty- guided Kriging method with subset simulation is proposed. With a concise uncertainty assessment function, efficient subdomain uncertainty-guided sampling strategy is first developed to refine the Kriging model that is used to replace real performance function approximately. Moreover, the number of candidate samples required by subset simulation is also significantly reduced. By sequentially exploiting within the candidate sample pools generated in the first intermediate failure event and other intermediate failure events, an accurate Kriging model can be constructed subsequently. The ingenious method of coupling Kriging and subset simulation can greatly improve the efficiency of reliability estimation. Finally, three classical examples are investigated as benchmark to explore the performance of the proposed method. The comparison results demonstrate the good capability and applicability of the proposed method.
由于性能函数评估复杂,候选样本池大,直接蒙特卡罗仿真对罕见故障事件的可靠性估计提出了挑战。为了解决这些问题,提出了一种子域不确定性引导的Kriging方法。首先利用简洁的不确定性评估函数,提出了高效的子域不确定性引导采样策略,对Kriging模型进行了改进,近似替代了实际性能函数。此外,子集模拟所需的候选样本数量也显著减少。通过在第一个中间故障事件和其他中间故障事件产生的候选样本池中依次挖掘,可以构建准确的Kriging模型。巧妙地将Kriging和子集仿真相结合,大大提高了可靠性估计的效率。最后,以三个经典实例为基准,探讨了该方法的性能。对比结果表明,该方法具有良好的性能和适用性。
{"title":"A Subdomain Uncertainty-Guided Kriging Method with Subset Simulation for Reliability Estimation","authors":"Dapeng Wang, H. Qiu, L. Gao","doi":"10.1109/CSCWD57460.2023.10152591","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152591","url":null,"abstract":"Direct Monte Carlo Simulation for reliability estimation of rare failure event is challenged by the complicated performance function evaluations and large candidate sample pool. To address these challenges, a subdomain uncertainty- guided Kriging method with subset simulation is proposed. With a concise uncertainty assessment function, efficient subdomain uncertainty-guided sampling strategy is first developed to refine the Kriging model that is used to replace real performance function approximately. Moreover, the number of candidate samples required by subset simulation is also significantly reduced. By sequentially exploiting within the candidate sample pools generated in the first intermediate failure event and other intermediate failure events, an accurate Kriging model can be constructed subsequently. The ingenious method of coupling Kriging and subset simulation can greatly improve the efficiency of reliability estimation. Finally, three classical examples are investigated as benchmark to explore the performance of the proposed method. The comparison results demonstrate the good capability and applicability of the proposed method.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"20 1","pages":"1526-1531"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85501965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things in Power Systems: A Bibliometric Analysis 电力系统中的物联网:文献计量学分析
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152802
Yanhao Feng, Xiaojie Lin, Zitao Yu
The Internet of Things (IoT) has gained lots of attention in the past decade and has shown huge potential in the integration of power systems to build a smart grid architecture and to achieve a paradigm transformation. This paper first proposed a typical architecture of IoT in power systems. To reveal the research status, literature development, cooperative relationship, hotspots of techniques, and the research trend, a bibliometric analysis from 1196 papers in the WoS database was done. Finally, several research trends were concluded based on the bibliometric analysis. This paper, for the first time, provided a systematic review of the hotspots in the field of IoT in power systems for more than a decade. Additionally, this paper provided a clear understanding of the history and outlook of the development of the IoT in power systems.
物联网(IoT)在过去的十年中受到了广泛的关注,在电力系统集成中显示出巨大的潜力,可以构建智能电网架构,实现范式转变。本文首先提出了一种典型的电力系统物联网架构。为了揭示该领域的研究现状、文献发展、合作关系、技术热点和研究趋势,对WoS数据库中1196篇论文进行了文献计量分析。最后,在文献计量分析的基础上,提出了今后的研究方向。本文首次对十多年来电力系统物联网领域的热点进行了系统综述。此外,本文还对电力系统物联网的发展历史和前景进行了清晰的了解。
{"title":"Internet of Things in Power Systems: A Bibliometric Analysis","authors":"Yanhao Feng, Xiaojie Lin, Zitao Yu","doi":"10.1109/CSCWD57460.2023.10152802","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152802","url":null,"abstract":"The Internet of Things (IoT) has gained lots of attention in the past decade and has shown huge potential in the integration of power systems to build a smart grid architecture and to achieve a paradigm transformation. This paper first proposed a typical architecture of IoT in power systems. To reveal the research status, literature development, cooperative relationship, hotspots of techniques, and the research trend, a bibliometric analysis from 1196 papers in the WoS database was done. Finally, several research trends were concluded based on the bibliometric analysis. This paper, for the first time, provided a systematic review of the hotspots in the field of IoT in power systems for more than a decade. Additionally, this paper provided a clear understanding of the history and outlook of the development of the IoT in power systems.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"26 1","pages":"1427-1432"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84605425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic accident location study based on AD-DBSCAN Algorithm with Adaptive Parameters 基于自适应参数AD-DBSCAN算法的交通事故定位研究
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152613
Xijun Zhang, Jin Su, Hong Zhang, Xianli Zhang, Xuanbing Chen, Yong Cui
Aiming at the shortcomings of the traditional Density-Based Spatial Clustering of Applications with Noise -DBSCAN algorithm such as insignificant clustering effect and the choice of parameter combinations. This paper proposes an AD-DBSCAN algorithm with adaptive parameters, which makes the algorithm more difficult in the selection of the parameters. By establishing a DBSCAN algorithm model to adapt to finding the optimal distance threshold and the minimum number of neighbor points, the clustering is more accurate, and the noise point identified in the data is more accurate. Through the observation of the calculation model of the Calinski-Harabasz index, the evaluation index of the clustering algorithm, the selection of the optimal best distance threshold and the minimum number of neighborhood points, the accuracy of noise point recognition is improved by 5 times in the clustering algorithm, and the Calinski-Harabasz index improved by about 39.84%. The applicability of the algorithm in clustering the locations of urban road traffic accidents is verified.
针对传统的基于密度的空间聚类应用噪声-DBSCAN算法存在聚类效果不显著、参数组合选择不合理等缺点。本文提出了一种具有自适应参数的AD-DBSCAN算法,这使得该算法在参数的选择上更加困难。通过建立适应于寻找最优距离阈值和最小邻居点数的DBSCAN算法模型,提高了聚类精度,同时也提高了数据中识别噪声点的准确性。通过对Calinski-Harabasz指数、聚类算法的评价指标、最优距离阈值和最小邻域点数的选择计算模型的观察,聚类算法对噪声点识别的准确率提高了5倍,Calinski-Harabasz指数提高了约39.84%。验证了该算法在城市道路交通事故位置聚类中的适用性。
{"title":"Traffic accident location study based on AD-DBSCAN Algorithm with Adaptive Parameters","authors":"Xijun Zhang, Jin Su, Hong Zhang, Xianli Zhang, Xuanbing Chen, Yong Cui","doi":"10.1109/CSCWD57460.2023.10152613","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152613","url":null,"abstract":"Aiming at the shortcomings of the traditional Density-Based Spatial Clustering of Applications with Noise -DBSCAN algorithm such as insignificant clustering effect and the choice of parameter combinations. This paper proposes an AD-DBSCAN algorithm with adaptive parameters, which makes the algorithm more difficult in the selection of the parameters. By establishing a DBSCAN algorithm model to adapt to finding the optimal distance threshold and the minimum number of neighbor points, the clustering is more accurate, and the noise point identified in the data is more accurate. Through the observation of the calculation model of the Calinski-Harabasz index, the evaluation index of the clustering algorithm, the selection of the optimal best distance threshold and the minimum number of neighborhood points, the accuracy of noise point recognition is improved by 5 times in the clustering algorithm, and the Calinski-Harabasz index improved by about 39.84%. The applicability of the algorithm in clustering the locations of urban road traffic accidents is verified.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"32 1","pages":"1160-1165"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84688528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The trip to WiFi indoor localization across a decade — A systematic review 十年来WiFi室内定位之旅——系统回顾
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152700
Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong
With the rapid advancement of smartphones and other mobile devices, an ever-increasing desire for wireless indoor localization has emerged. This technology is capable of determining the position of a user or device in an indoor setting and facilitating an array of captivating applications. Due to the low cost and wide availability of WiFi, WiFi-based indoor localization has received considerable attention and has become a prominent research focus in recent times. We have distilled that an ideal WiFi-based indoor localization system is anticipated to meet three criteria: high-accuracy, pervasiveness, and easy-deployment. Nevertheless, it is not a trivial task to satisfy all three criteria simultaneously. This document scrutinizes the key issues, basic models, and current methods for WiFi indoor localization with the objective of highlighting the underlying principles and challenges. Finally, this manuscript pinpoints the prospective research paths for WiFi indoor localization.
随着智能手机和其他移动设备的快速发展,人们对室内无线定位的需求日益增长。该技术能够在室内环境中确定用户或设备的位置,并促进一系列迷人的应用。由于WiFi的低成本和广泛可用性,基于WiFi的室内定位受到了广泛的关注,成为近年来的一个突出的研究热点。我们总结出一个理想的基于wifi的室内定位系统应该满足三个标准:高精度、普及性和易于部署。然而,同时满足这三个标准并非易事。本文对WiFi室内定位的关键问题、基本模型和现有方法进行了详细分析,重点阐述了其中的基本原理和面临的挑战。最后,本文明确了WiFi室内定位的未来研究路径。
{"title":"The trip to WiFi indoor localization across a decade — A systematic review","authors":"Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong","doi":"10.1109/CSCWD57460.2023.10152700","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152700","url":null,"abstract":"With the rapid advancement of smartphones and other mobile devices, an ever-increasing desire for wireless indoor localization has emerged. This technology is capable of determining the position of a user or device in an indoor setting and facilitating an array of captivating applications. Due to the low cost and wide availability of WiFi, WiFi-based indoor localization has received considerable attention and has become a prominent research focus in recent times. We have distilled that an ideal WiFi-based indoor localization system is anticipated to meet three criteria: high-accuracy, pervasiveness, and easy-deployment. Nevertheless, it is not a trivial task to satisfy all three criteria simultaneously. This document scrutinizes the key issues, basic models, and current methods for WiFi indoor localization with the objective of highlighting the underlying principles and challenges. Finally, this manuscript pinpoints the prospective research paths for WiFi indoor localization.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"R-27 1","pages":"642-647"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84747513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale Convolutional Feature Approximation for Defocus Blur Detection 散焦模糊检测的多尺度卷积特征逼近
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152667
Rui Huang, Huan Lu, Yan Xing, Wei Fan
Deep learning technology has promoted the performance of defocus blur detection. However, blur detectors suffer from background clutter, scale ambiguity and blurred boundaries of the defocus blur regions. To conquer these issues, previous methods propose to use multi-scale image patches or images for blur detection, which costs much computation time. In this paper, we propose a deep neural network that takes a single-scale image as input to generate robust defocus blur detection. Specifically, we first extract multi-scale convolutional features by a feature extraction network. And then we resize the convolutional features of each layer by a fixed ratio to approximate convolutional features that extracted from a resized image with the same ratio. By approximation, it not only generates features extracted from a scaled image but also reduces the computation of feature extraction from multi-scale images. We concatenate the features extracted from the original image with the approximated features at the corresponding layers by convolutional layers to increase the blur distinguish ability. We gradually fuse the convolutional features from top-to-bottom by Conv-LSTMs to refine the blur predictions. We compare our method with nine state-of-the-art defocus blur detectors on two defocus blur detection benchmark datasets. Experiment results demonstrate the effectiveness of our proposed defocus blur detector.
深度学习技术提高了散焦模糊检测的性能。然而,模糊检测器存在背景杂波、尺度模糊和离焦模糊区域边界模糊等问题。为了克服这些问题,以前的方法提出使用多尺度图像补丁或图像进行模糊检测,这需要耗费大量的计算时间。在本文中,我们提出了一种以单尺度图像为输入的深度神经网络来产生鲁棒的离焦模糊检测。具体来说,我们首先通过特征提取网络提取多尺度卷积特征。然后我们将每一层的卷积特征按固定的比例调整,以近似从调整后的图像中提取的相同比例的卷积特征。通过逼近,不仅可以生成从缩放图像中提取的特征,而且可以减少多尺度图像特征提取的计算量。我们通过卷积层将原始图像中提取的特征与相应层的近似特征连接起来,以提高模糊识别能力。我们通过卷积lstm从上到下逐步融合卷积特征,以改进模糊预测。在两个离焦模糊检测基准数据集上,我们将我们的方法与九个最先进的离焦模糊检测器进行了比较。实验结果证明了所提出的离焦模糊检测器的有效性。
{"title":"Multi-scale Convolutional Feature Approximation for Defocus Blur Detection","authors":"Rui Huang, Huan Lu, Yan Xing, Wei Fan","doi":"10.1109/CSCWD57460.2023.10152667","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152667","url":null,"abstract":"Deep learning technology has promoted the performance of defocus blur detection. However, blur detectors suffer from background clutter, scale ambiguity and blurred boundaries of the defocus blur regions. To conquer these issues, previous methods propose to use multi-scale image patches or images for blur detection, which costs much computation time. In this paper, we propose a deep neural network that takes a single-scale image as input to generate robust defocus blur detection. Specifically, we first extract multi-scale convolutional features by a feature extraction network. And then we resize the convolutional features of each layer by a fixed ratio to approximate convolutional features that extracted from a resized image with the same ratio. By approximation, it not only generates features extracted from a scaled image but also reduces the computation of feature extraction from multi-scale images. We concatenate the features extracted from the original image with the approximated features at the corresponding layers by convolutional layers to increase the blur distinguish ability. We gradually fuse the convolutional features from top-to-bottom by Conv-LSTMs to refine the blur predictions. We compare our method with nine state-of-the-art defocus blur detectors on two defocus blur detection benchmark datasets. Experiment results demonstrate the effectiveness of our proposed defocus blur detector.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"156 1","pages":"1172-1177"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79876407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Social Relations with Graph-Based and Global Attention 用基于图和全局关注的方法理解社会关系
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152575
Hanqing Li, Niannian Chen
Social relations, as the basic relationships in our daily life, are a phenomenon unique to human society that shows how people interact in society. Social relations understanding is to infer the existing social relationships between individuals in a given scenario, which is crucial for us to analyze social behavior. Existing research methods are usually limited to extracting features of characters and related entities, which limits the scope of attention and may miss important clues such as interactions between characters. In this paper, we propose a global attention mechanism that adaptively grasps scenes, objects, and human interactions for reasoning about social relationships. We propose an end-to-end global attention network, which consists of three modules, namely, a convolutional attention module, a graph inference module, and an attentional inference module. The visual and location information is first extracted by the convolutional attention module as the feature information of the person pairs, then it is made to process the relationships between character nodes on the graph inference network, and finally, the attention is fully utilized to classify the social relationships. Extensive experiments on the PISC and PIPA datasets show that our proposed method outperforms the state-of-the-art methods in terms of accuracy.
社会关系作为我们日常生活中的基本关系,是人类社会特有的一种表现人们在社会中如何互动的现象。社会关系理解是指在给定情境中推断个体之间存在的社会关系,这对我们分析社会行为至关重要。现有的研究方法通常局限于提取人物和相关实体的特征,这限制了关注的范围,可能会遗漏人物之间的相互作用等重要线索。在本文中,我们提出了一种全局注意机制,该机制可以自适应地掌握场景、对象和人类互动,从而对社会关系进行推理。我们提出了一个端到端的全局注意力网络,该网络由三个模块组成,即卷积注意力模块、图推理模块和注意力推理模块。首先通过卷积注意力模块提取视觉和位置信息作为人物对的特征信息,然后在图推理网络上对人物节点之间的关系进行处理,最后充分利用注意力对社会关系进行分类。在PISC和PIPA数据集上进行的大量实验表明,我们提出的方法在准确性方面优于最先进的方法。
{"title":"Understanding Social Relations with Graph-Based and Global Attention","authors":"Hanqing Li, Niannian Chen","doi":"10.1109/CSCWD57460.2023.10152575","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152575","url":null,"abstract":"Social relations, as the basic relationships in our daily life, are a phenomenon unique to human society that shows how people interact in society. Social relations understanding is to infer the existing social relationships between individuals in a given scenario, which is crucial for us to analyze social behavior. Existing research methods are usually limited to extracting features of characters and related entities, which limits the scope of attention and may miss important clues such as interactions between characters. In this paper, we propose a global attention mechanism that adaptively grasps scenes, objects, and human interactions for reasoning about social relationships. We propose an end-to-end global attention network, which consists of three modules, namely, a convolutional attention module, a graph inference module, and an attentional inference module. The visual and location information is first extracted by the convolutional attention module as the feature information of the person pairs, then it is made to process the relationships between character nodes on the graph inference network, and finally, the attention is fully utilized to classify the social relationships. Extensive experiments on the PISC and PIPA datasets show that our proposed method outperforms the state-of-the-art methods in terms of accuracy.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"1 1","pages":"41-46"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80530826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covertness Analysis of Snowflake Proxy Request 雪花代理请求的隐蔽性分析
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152736
Yibo Xie, Gaopeng Gou, G. Xiong, Zhuguo Li, Mingxin Cui
Snowflake is a special proxy system against IP-based network blocking. As its IP addresses refresh frequently, faster than IP blacklist’s update, users can exploit it to access blocked websites. To block snowflake, existing methods focus on detecting snowflake proxies. But they are susceptible to various factors, for example, proxy’s location and version. In the paper, we propose a new manner to block snowflake. We observe that to adapt fast IP changes, users need to request latest proxies from proxy database before using snowflake. Thus, adversaries can block snowflake by detecting proxy request instead of proxy itself. To verify our method, we analyse covertness of snowflake proxy requests, that has been protected by imitating normal web requests. After comparing with typical web requests, we find the imitation is vulnerable in packet size, direction, time and network speed, such as, the latency time is higher than normal obviously. Using the four vulnerabilities, we train machine learning algorithm to detect snowflake proxy requests in reality. Experimental results demonstrate that proxy request can be detected accurately across different versions at the beginning of connection. In conclusion, our work paves a new way to block snowflake.
雪花是一个特殊的代理系统,针对基于ip的网络阻塞。由于其IP地址更新频繁,比IP黑名单的更新速度快,用户可以利用它访问被屏蔽的网站。为了阻止雪花,现有的方法主要是检测雪花代理。但它们容易受到各种因素的影响,例如代理的位置和版本。本文提出了一种新的雪花遮挡方法。我们观察到,为了适应快速的IP变化,用户在使用snowflake之前需要从代理数据库中请求最新的代理。因此,攻击者可以通过检测代理请求而不是代理本身来阻止雪花。为了验证我们的方法,我们分析了雪花代理请求的隐蔽性,该请求通过模仿正常的web请求来保护。通过与典型的web请求进行比较,我们发现模仿在数据包大小、方向、时间和网络速度等方面存在漏洞,延迟时间明显高于正常请求。利用这四个漏洞,我们训练机器学习算法在现实中检测雪花代理请求。实验结果表明,在连接开始时可以准确地检测到不同版本的代理请求。总之,我们的工作为雪花的阻挡开辟了一条新的途径。
{"title":"Covertness Analysis of Snowflake Proxy Request","authors":"Yibo Xie, Gaopeng Gou, G. Xiong, Zhuguo Li, Mingxin Cui","doi":"10.1109/CSCWD57460.2023.10152736","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152736","url":null,"abstract":"Snowflake is a special proxy system against IP-based network blocking. As its IP addresses refresh frequently, faster than IP blacklist’s update, users can exploit it to access blocked websites. To block snowflake, existing methods focus on detecting snowflake proxies. But they are susceptible to various factors, for example, proxy’s location and version. In the paper, we propose a new manner to block snowflake. We observe that to adapt fast IP changes, users need to request latest proxies from proxy database before using snowflake. Thus, adversaries can block snowflake by detecting proxy request instead of proxy itself. To verify our method, we analyse covertness of snowflake proxy requests, that has been protected by imitating normal web requests. After comparing with typical web requests, we find the imitation is vulnerable in packet size, direction, time and network speed, such as, the latency time is higher than normal obviously. Using the four vulnerabilities, we train machine learning algorithm to detect snowflake proxy requests in reality. Experimental results demonstrate that proxy request can be detected accurately across different versions at the beginning of connection. In conclusion, our work paves a new way to block snowflake.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"21 1","pages":"1802-1807"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73063725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial and Channel Exchange based on EfficientNet for Detecting Changes of Remote Sensing Images 基于effentnet的遥感图像变化检测空间与信道交换
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152771
Renfang Wang, Zijian Yang, Hong Qiu, X. Liu, Dun Wu
Change detection is an important branch in remote sensing image processing. Deep learning has been widely used in this field. In particular, a wide variety of attention mechanisms have made great achievements. However, some models have become increasingly complex and large, often unfeasible for edge applications. This poses a major obstacle to industrial applications. In this paper, to solve the above challenges, we propose a Lightweight network structure to improve results while taking into account efficiency. Specifically, first, the shallow features are extracted by using the spatial exchange and change exchange of the down-sampling bi-temporal channel of the three-layer EfficientNet backbone network, and then the shallow features are used for low-dimensional skip-connection. After that, a hybrid dual-temporal data module is designed to mix the dual-temporal phase into a single image, then the high-dimensional low-pixel image is restored through the up-sampling. Finally the final change map is generated through the pixel-level classifier. Our method was evaluated on public datasets by evaluation indicators such as OA, IoU, F1, Recall, Precision.
变化检测是遥感图像处理中的一个重要分支。深度学习在这一领域得到了广泛的应用。特别是各种各样的注意机制都取得了很大的成就。然而,一些模型已经变得越来越复杂和庞大,对于边缘应用程序来说往往是不可行的。这是工业应用的主要障碍。在本文中,为了解决上述挑战,我们提出了一种轻量级的网络结构,以提高结果,同时兼顾效率。具体而言,首先利用三层高效网主干网下采样双时间通道的空间交换和变化交换提取浅层特征,然后利用浅层特征进行低维跳接。然后设计混合双时相数据模块,将双时相数据混合成一幅图像,通过上采样恢复高维低像素图像。最后,通过像素级分类器生成最终的变更映射。通过OA、IoU、F1、Recall、Precision等评价指标在公共数据集上对我们的方法进行评价。
{"title":"Spatial and Channel Exchange based on EfficientNet for Detecting Changes of Remote Sensing Images","authors":"Renfang Wang, Zijian Yang, Hong Qiu, X. Liu, Dun Wu","doi":"10.1109/CSCWD57460.2023.10152771","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152771","url":null,"abstract":"Change detection is an important branch in remote sensing image processing. Deep learning has been widely used in this field. In particular, a wide variety of attention mechanisms have made great achievements. However, some models have become increasingly complex and large, often unfeasible for edge applications. This poses a major obstacle to industrial applications. In this paper, to solve the above challenges, we propose a Lightweight network structure to improve results while taking into account efficiency. Specifically, first, the shallow features are extracted by using the spatial exchange and change exchange of the down-sampling bi-temporal channel of the three-layer EfficientNet backbone network, and then the shallow features are used for low-dimensional skip-connection. After that, a hybrid dual-temporal data module is designed to mix the dual-temporal phase into a single image, then the high-dimensional low-pixel image is restored through the up-sampling. Finally the final change map is generated through the pixel-level classifier. Our method was evaluated on public datasets by evaluation indicators such as OA, IoU, F1, Recall, Precision.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"8 1","pages":"1595-1600"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73225305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Supported Cooperative Work-The Journal of Collaborative Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1