首页 > 最新文献

Computer Supported Cooperative Work-The Journal of Collaborative Computing最新文献

英文 中文
Multi-Source Domain Transfer Learning on Epilepsy Diagnosis 多源领域迁移学习在癫痫诊断中的应用
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152684
Aimei Dong, Zhiyun Qi, Yi Zhai, Guohua Lv
Epilepsy is a neurological disease that occurs in all ages and seriously threatens physical and mental health. There are two problems in the present study. One is the limitation of the amount of publicly available medical data. And the other is that the distributions of the data are different but correlated. Conventional machine learning methods are not applicable. But transfer learning method has shown promising performance in solving both problems. In this paper, a multi-source domain transfer learning method called MDTL for epilepsy diagnosis is proposed. In order to fully exploit the specific features and common features of the dataset, we propose a domain specific feature extractor and a common feature extractor. For enhancing data, we transform the signals into time-frequency diagrams to rotate and crop. The three types of electrocardiogram (ECG) time-frequency diagram are put to train model, and the model is transferred to electroencephalogram (EEG) time-frequency diagrams. The results confirm that MDTL is effective in epilepsy diagnosis.
癫痫是一种发生在所有年龄段的神经系统疾病,严重威胁身心健康。目前的研究存在两个问题。一个是公共医疗数据的数量有限。另一个是数据的分布是不同的,但是相关的。传统的机器学习方法不适用。而迁移学习方法在解决这两个问题上都表现出了良好的效果。本文提出了一种用于癫痫诊断的多源领域迁移学习方法MDTL。为了充分利用数据集的特定特征和公共特征,我们提出了一个领域特定特征提取器和一个公共特征提取器。为了增强数据,我们将信号转换成时频图进行旋转和裁剪。将三种类型的心电图时频图输入训练模型,并将训练模型转换为脑电图时频图。结果证实MDTL对癫痫的诊断是有效的。
{"title":"Multi-Source Domain Transfer Learning on Epilepsy Diagnosis","authors":"Aimei Dong, Zhiyun Qi, Yi Zhai, Guohua Lv","doi":"10.1109/CSCWD57460.2023.10152684","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152684","url":null,"abstract":"Epilepsy is a neurological disease that occurs in all ages and seriously threatens physical and mental health. There are two problems in the present study. One is the limitation of the amount of publicly available medical data. And the other is that the distributions of the data are different but correlated. Conventional machine learning methods are not applicable. But transfer learning method has shown promising performance in solving both problems. In this paper, a multi-source domain transfer learning method called MDTL for epilepsy diagnosis is proposed. In order to fully exploit the specific features and common features of the dataset, we propose a domain specific feature extractor and a common feature extractor. For enhancing data, we transform the signals into time-frequency diagrams to rotate and crop. The three types of electrocardiogram (ECG) time-frequency diagram are put to train model, and the model is transferred to electroencephalogram (EEG) time-frequency diagrams. The results confirm that MDTL is effective in epilepsy diagnosis.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"11 1","pages":"83-88"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74834007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Protection Based on Packet Filtering for Home Internet-of-Things 基于包过滤的家庭物联网隐私保护
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152725
Beibei Cheng, Yiming Zhu, Yuxuan Chen, Xiaodan Gu, Kai Dong
The development of home internet of things (H-IoT) devices brings convenience but poses significant privacy and security risks. Existing research minimizes data uploaded to the cloud but fails to process data locally, resulting in a trade-off between privacy and functionality. In this paper, we propose a privacy-preserving method that identifies and processes sensitive data sent from H-IoT devices at the edge side, ensuring functionality while preserving privacy. Our method applies different identification strategies to packets with different features, making it applicable to most H-IoT devices and scenarios. We validate our approach through experiments on a prototype system that monitors multiple cameras, demonstrating its effectiveness in preserving privacy while maintaining functionality.
家庭物联网(H-IoT)设备的发展带来了便利,但也带来了重大的隐私和安全风险。现有的研究尽量减少上传到云端的数据,但无法在本地处理数据,导致隐私和功能之间的权衡。在本文中,我们提出了一种隐私保护方法,该方法可以识别和处理从边缘端H-IoT设备发送的敏感数据,在保护隐私的同时确保功能。我们的方法对不同特征的数据包采用不同的识别策略,使其适用于大多数H-IoT设备和场景。我们通过在一个监控多个摄像头的原型系统上进行实验来验证我们的方法,证明了它在保持功能的同时保护隐私的有效性。
{"title":"Privacy Protection Based on Packet Filtering for Home Internet-of-Things","authors":"Beibei Cheng, Yiming Zhu, Yuxuan Chen, Xiaodan Gu, Kai Dong","doi":"10.1109/CSCWD57460.2023.10152725","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152725","url":null,"abstract":"The development of home internet of things (H-IoT) devices brings convenience but poses significant privacy and security risks. Existing research minimizes data uploaded to the cloud but fails to process data locally, resulting in a trade-off between privacy and functionality. In this paper, we propose a privacy-preserving method that identifies and processes sensitive data sent from H-IoT devices at the edge side, ensuring functionality while preserving privacy. Our method applies different identification strategies to packets with different features, making it applicable to most H-IoT devices and scenarios. We validate our approach through experiments on a prototype system that monitors multiple cameras, demonstrating its effectiveness in preserving privacy while maintaining functionality.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"16 1","pages":"1214-1219"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75553588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy 一种基于差分隐私保护的在线深度学习算法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152847
Jun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu
Deep Reinforcement Learning (DRL) combines the perceptual capabilities of deep learning with the decision-making capabilities of Reinforcement Learning RL, which can achieve enhanced decision-making. However, the environmental state data contains the privacy of the users. There exists consequently a potential risk of environmental state information being leaked during RL training. Some data desensitization and anonymization technologies are currently being used to protect data privacy. There may still be a risk of privacy disclosure with these desensitization techniques. Meanwhile, policymakers need the environmental state to make decisions, which will cause the disclosure of raw environmental data. To address the privacy issues in DRL, we propose a differential privacy-based online DRL algorithm. The algorithm will add Gaussian noise to the gradients of the deep network according to the privacy budget. More important, we prove tighter bounds for the privacy budget. Furthermore, we train an autocoder to protect the raw environmental state data. In this work, we prove the privacy budget formulation for differential privacy-based online deep RL. Experiments show that the proposed algorithm can improve privacy protection while still having relatively excellent decisionmaking performance.
深度强化学习(Deep Reinforcement Learning, DRL)将深度学习的感知能力与强化学习RL的决策能力相结合,可以实现增强决策。但是,环境状态数据包含用户的隐私。因此,在RL训练过程中存在着环境状态信息泄露的潜在风险。目前正在使用一些数据脱敏和匿名化技术来保护数据隐私。这些脱敏技术可能仍然存在隐私泄露的风险。同时,决策者需要环境状态来进行决策,这将导致原始环境数据的公开。为了解决DRL中的隐私问题,我们提出了一种基于差分隐私的在线DRL算法。该算法将根据隐私预算在深度网络的梯度中加入高斯噪声。更重要的是,我们证明了对隐私预算的更严格限制。此外,我们还训练了一个自动编码器来保护原始环境状态数据。在这项工作中,我们证明了基于差分隐私的在线深度学习的隐私预算公式。实验表明,该算法在提高隐私保护性能的同时,仍具有较好的决策性能。
{"title":"A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy","authors":"Jun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu","doi":"10.1109/CSCWD57460.2023.10152847","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152847","url":null,"abstract":"Deep Reinforcement Learning (DRL) combines the perceptual capabilities of deep learning with the decision-making capabilities of Reinforcement Learning RL, which can achieve enhanced decision-making. However, the environmental state data contains the privacy of the users. There exists consequently a potential risk of environmental state information being leaked during RL training. Some data desensitization and anonymization technologies are currently being used to protect data privacy. There may still be a risk of privacy disclosure with these desensitization techniques. Meanwhile, policymakers need the environmental state to make decisions, which will cause the disclosure of raw environmental data. To address the privacy issues in DRL, we propose a differential privacy-based online DRL algorithm. The algorithm will add Gaussian noise to the gradients of the deep network according to the privacy budget. More important, we prove tighter bounds for the privacy budget. Furthermore, we train an autocoder to protect the raw environmental state data. In this work, we prove the privacy budget formulation for differential privacy-based online deep RL. Experiments show that the proposed algorithm can improve privacy protection while still having relatively excellent decisionmaking performance.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"29 1","pages":"559-564"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81634318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Model Pruning without Additional Computation and Structure Requirements 无需额外计算和结构要求的神经网络模型修剪
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152777
Yin Xie, Yigui Luo, Haihong She, Zhaohong Xiang
In past work, deep learning researchers always designed hyperparameters such as model structure and learning rate first and then used the training set to train the weights in this model. While unrestricted model structure design leads to massive neuron redundancy in neural network models. By pruning these redundant neurons, not only can the storage be compressed effectively, but also the operation can be accelerated. In this paper, we propose a method to utilize the training set to prune the model structure during training: 1) train the initialized model and bring it to basic convergence; 2) feed the entire training set into the model and calculate the activations of neurons in each layer; 3) calculate the threshold for neuron pruning in each layer according to the pruning ratio, delete neurons whose activation value is lower than the threshold, and correspondingly delete the weights of the upper and lower layers; 4) further train the pruned model so that it eventually converges. This method of deleting redundant neurons not only greatly deletes the parameters in the model but also achieves model acceleration. We applied this method to some mainstream neural network models: VGGNet and ResNet, and achieved good results.
在以往的工作中,深度学习研究者总是先设计模型结构、学习率等超参数,然后用训练集来训练模型中的权值。而不受限制的模型结构设计导致神经网络模型中存在大量的神经元冗余。通过对这些冗余神经元进行修剪,不仅可以有效地压缩存储空间,而且可以加快运算速度。本文提出了一种利用训练集对训练过程中的模型结构进行修剪的方法:1)对初始化模型进行训练,使其基本收敛;2)将整个训练集输入到模型中,计算每层神经元的激活;3)根据剪枝比计算每层神经元剪枝的阈值,删除激活值低于阈值的神经元,并相应删除上下两层的权值;4)进一步训练修剪后的模型,使其最终收敛。这种删除冗余神经元的方法不仅大大删除了模型中的参数,而且实现了模型的加速。我们将该方法应用于一些主流神经网络模型:VGGNet和ResNet,并取得了良好的效果。
{"title":"Neural Network Model Pruning without Additional Computation and Structure Requirements","authors":"Yin Xie, Yigui Luo, Haihong She, Zhaohong Xiang","doi":"10.1109/CSCWD57460.2023.10152777","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152777","url":null,"abstract":"In past work, deep learning researchers always designed hyperparameters such as model structure and learning rate first and then used the training set to train the weights in this model. While unrestricted model structure design leads to massive neuron redundancy in neural network models. By pruning these redundant neurons, not only can the storage be compressed effectively, but also the operation can be accelerated. In this paper, we propose a method to utilize the training set to prune the model structure during training: 1) train the initialized model and bring it to basic convergence; 2) feed the entire training set into the model and calculate the activations of neurons in each layer; 3) calculate the threshold for neuron pruning in each layer according to the pruning ratio, delete neurons whose activation value is lower than the threshold, and correspondingly delete the weights of the upper and lower layers; 4) further train the pruned model so that it eventually converges. This method of deleting redundant neurons not only greatly deletes the parameters in the model but also achieves model acceleration. We applied this method to some mainstream neural network models: VGGNet and ResNet, and achieved good results.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"17 1","pages":"1734-1740"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89679863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning 基于多智能体深度强化学习的协同边缘缓存方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152789
Xiang Cao, Ningjiang Chen, Xuemei Yuan, Yifei Liu
With the support of 5G technology, mobile edge computing has made the application of industrial IoT and power IoT more and more extensive. By deploying a certain number of edge servers at the edge of the network, network service delay may significantly reduce. For the IoT scenario where the content demand is unpredictable, there are multiple distributed cloud servers and the distributed cloud servers do not communicate directly, a feasible way to improve the network service quality is to dynamically optimize the storage of edge servers and formulate targeted caching strategies. This paper proposes an edge caching approach based on multi-agent deep deterministic policy gradient named MADDPG-C, which regards distributed cloud servers and edge servers as different types of agents and maximizes the efficiency of edge caching in cooperation and competition. Simulation experiments show that the proposed MADDPG-C can further improve the hit rate of the edge cache and reduce the waiting delay of terminal devices.
在5G技术的支持下,移动边缘计算使得工业物联网和电力物联网的应用越来越广泛。通过在网络边缘部署一定数量的边缘服务器,可以显著降低网络业务延迟。对于内容需求不可预测的物联网场景,存在多个分布式云服务器,且分布式云服务器之间不直接通信,动态优化边缘服务器的存储,制定有针对性的缓存策略是提高网络服务质量的可行方法。本文提出了一种基于多智能体深度确定性策略梯度的边缘缓存方法madpg - c,该方法将分布式云服务器和边缘服务器视为不同类型的智能体,在合作和竞争中最大化边缘缓存的效率。仿真实验表明,所提出的madpg - c可以进一步提高边缘缓存的命中率,减少终端设备的等待延迟。
{"title":"A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning","authors":"Xiang Cao, Ningjiang Chen, Xuemei Yuan, Yifei Liu","doi":"10.1109/CSCWD57460.2023.10152789","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152789","url":null,"abstract":"With the support of 5G technology, mobile edge computing has made the application of industrial IoT and power IoT more and more extensive. By deploying a certain number of edge servers at the edge of the network, network service delay may significantly reduce. For the IoT scenario where the content demand is unpredictable, there are multiple distributed cloud servers and the distributed cloud servers do not communicate directly, a feasible way to improve the network service quality is to dynamically optimize the storage of edge servers and formulate targeted caching strategies. This paper proposes an edge caching approach based on multi-agent deep deterministic policy gradient named MADDPG-C, which regards distributed cloud servers and edge servers as different types of agents and maximizes the efficiency of edge caching in cooperation and competition. Simulation experiments show that the proposed MADDPG-C can further improve the hit rate of the edge cache and reduce the waiting delay of terminal devices.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"41 7","pages":"1772-1777"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72471002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks 一种自适应IP跳变防御移动目标的网络攻击方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152746
Fengyuan Shi, Zhou-yu Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao
In a static network, attackers can easily launch network attacks on target hosts which have long-term constant IP addresses. In order to defend against attackers effectively, many defense approaches use IP hopping to dynamically transform IP configuration. However, these approaches usually focus on one type of network attacks, scanning attacks or Denial of Service (DoS) attacks, and cannot sense network situations. This paper proposes AHIP, an adaptive IP hopping method for moving target defense (MTD) to defend against different network attacks. We use a trained lightweight one-dimensional convolutional neural network (1D-CNN) detector to judge whether there are no attacks, scanning attacks or DoS attacks in the network, which can adaptively trigger corresponding IP hopping strategy. We use specific hardware and software to create the software defined network (SDN) environment for experiments. The experiments prove that AHIP performs better to thwart network attacks and has lower system overhead.
在静态网络中,攻击者很容易对IP地址长期不变的目标主机发起网络攻击。为了有效防御攻击者,许多防御方法都采用IP跳变的方式动态转换IP配置。然而,这些方法通常只针对一种类型的网络攻击,即扫描攻击或拒绝服务攻击,无法感知网络状况。提出了一种用于移动目标防御(MTD)的自适应IP跳变方法AHIP,以防御不同类型的网络攻击。我们使用训练好的轻量级一维卷积神经网络(1D-CNN)检测器来判断网络中是否存在攻击、扫描攻击或DoS攻击,并自适应触发相应的IP跳变策略。我们使用特定的硬件和软件来创建软件定义网络(SDN)环境进行实验。实验证明,AHIP具有较好的抵御网络攻击的性能,并且具有较低的系统开销。
{"title":"AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks","authors":"Fengyuan Shi, Zhou-yu Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao","doi":"10.1109/CSCWD57460.2023.10152746","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152746","url":null,"abstract":"In a static network, attackers can easily launch network attacks on target hosts which have long-term constant IP addresses. In order to defend against attackers effectively, many defense approaches use IP hopping to dynamically transform IP configuration. However, these approaches usually focus on one type of network attacks, scanning attacks or Denial of Service (DoS) attacks, and cannot sense network situations. This paper proposes AHIP, an adaptive IP hopping method for moving target defense (MTD) to defend against different network attacks. We use a trained lightweight one-dimensional convolutional neural network (1D-CNN) detector to judge whether there are no attacks, scanning attacks or DoS attacks in the network, which can adaptively trigger corresponding IP hopping strategy. We use specific hardware and software to create the software defined network (SDN) environment for experiments. The experiments prove that AHIP performs better to thwart network attacks and has lower system overhead.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"53 1","pages":"1300-1305"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76483630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning 基于元学习的异构图少射恶意域检测
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152708
Yi Gao, Fangfang Yuan, Cong Cao, Majing Su, Dakui Wang, Yanbing Liu
The Domain Name System (DNS), one of the essential basic services on the Internet, is often abused by attackers to launch various cyber attacks, such as phishing and spamming. Researchers have proposed many machine learning-based and deep learning-based methods to detect malicious domains. However, these methods rely on a large-scale dataset with labeled samples for model training. The fact is that the labeled domain samples are limited in the real-world DNS dataset. In this paper, we propose a few-shot malicious domain detection model named MetaDom, which employs a meta-learning algorithm for model optimization. Specifically, We first model the DNS scenario as a heterogeneous graph to capture richer information by analysing the complex relations among domains, IP addresses and clients. Then, we learn the domain representations with a heterogeneous graph neural network on the DNS HG. Finally, considering that only few labeled data are available in the real-world DNS scenario, a meta-learning algorithm with knowledge distillation is introduced to optimize the model. Extensive experiments on the real DNS dataset show that MetaDom outperforms other state-of-the-art methods.
域名系统(DNS)是互联网上必不可少的基本服务之一,经常被攻击者滥用,进行各种网络攻击,例如网络钓鱼和垃圾邮件。研究人员提出了许多基于机器学习和深度学习的方法来检测恶意域。然而,这些方法依赖于带有标记样本的大规模数据集进行模型训练。事实上,标记的域样本在真实的DNS数据集中是有限的。本文提出了一种基于元学习算法的少射恶意域检测模型MetaDom,该模型采用元学习算法对模型进行优化。具体来说,我们首先将DNS场景建模为异构图,通过分析域、IP地址和客户端之间的复杂关系来获取更丰富的信息。然后,利用异构图神经网络在DNS HG上学习域表示。最后,考虑到实际DNS场景中可用的标记数据很少,引入了知识蒸馏的元学习算法对模型进行优化。在真实DNS数据集上进行的大量实验表明,MetaDom优于其他最先进的方法。
{"title":"Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning","authors":"Yi Gao, Fangfang Yuan, Cong Cao, Majing Su, Dakui Wang, Yanbing Liu","doi":"10.1109/CSCWD57460.2023.10152708","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152708","url":null,"abstract":"The Domain Name System (DNS), one of the essential basic services on the Internet, is often abused by attackers to launch various cyber attacks, such as phishing and spamming. Researchers have proposed many machine learning-based and deep learning-based methods to detect malicious domains. However, these methods rely on a large-scale dataset with labeled samples for model training. The fact is that the labeled domain samples are limited in the real-world DNS dataset. In this paper, we propose a few-shot malicious domain detection model named MetaDom, which employs a meta-learning algorithm for model optimization. Specifically, We first model the DNS scenario as a heterogeneous graph to capture richer information by analysing the complex relations among domains, IP addresses and clients. Then, we learn the domain representations with a heterogeneous graph neural network on the DNS HG. Finally, considering that only few labeled data are available in the real-world DNS scenario, a meta-learning algorithm with knowledge distillation is introduced to optimize the model. Extensive experiments on the real DNS dataset show that MetaDom outperforms other state-of-the-art methods.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"62 1","pages":"727-732"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76791528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative Greedy Selection Hyper-heuristic with Linear Population Size Reduction 线性种群缩减的迭代贪心选择超启发式算法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152792
Fuqing Zhao, Yuebao Liu, Tianpeng Xu
Selecting appropriate algorithms for specific problems has become a significant challenge with the remarkable growth of heuristics and meta-heuristics. To address this challenge, an iterative greedy selection hyper-heuristic algorithm with linear population size reduction (LIGSHH) was proposed in this paper. Using an iterative greedy strategy to choose the high level of exploration, this heuristic selects the Low-Level Heuristics (LLHs) that best suit the current problem. Nine LLHs are specifically designed for continuous optimization problems. Additionally, the exploration and exploitation capabilities of the LIGSHH are balanced by reducing the population size linearly at different stages of the problem. The proposed LIGSHH algorithm and comparison algorithms are tested on the CEC2017 benchmark test suite, and the experimental results show that the LIGSHH algorithm outperforms other comparison algorithms.
随着启发式和元启发式的显著发展,为特定问题选择合适的算法已成为一个重大挑战。为了解决这一问题,本文提出了一种线性种群大小缩减的迭代贪心选择超启发式算法(LIGSHH)。该启发式算法采用迭代贪心策略选择高层次的探索,选择最适合当前问题的低层次启发式(LLHs)。9个llh是专门为连续优化问题设计的。此外,在问题的不同阶段,通过线性减少种群规模来平衡LIGSHH的探索和开发能力。提出的LIGSHH算法和比较算法在CEC2017基准测试套件上进行了测试,实验结果表明,LIGSHH算法优于其他比较算法。
{"title":"Iterative Greedy Selection Hyper-heuristic with Linear Population Size Reduction","authors":"Fuqing Zhao, Yuebao Liu, Tianpeng Xu","doi":"10.1109/CSCWD57460.2023.10152792","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152792","url":null,"abstract":"Selecting appropriate algorithms for specific problems has become a significant challenge with the remarkable growth of heuristics and meta-heuristics. To address this challenge, an iterative greedy selection hyper-heuristic algorithm with linear population size reduction (LIGSHH) was proposed in this paper. Using an iterative greedy strategy to choose the high level of exploration, this heuristic selects the Low-Level Heuristics (LLHs) that best suit the current problem. Nine LLHs are specifically designed for continuous optimization problems. Additionally, the exploration and exploitation capabilities of the LIGSHH are balanced by reducing the population size linearly at different stages of the problem. The proposed LIGSHH algorithm and comparison algorithms are tested on the CEC2017 benchmark test suite, and the experimental results show that the LIGSHH algorithm outperforms other comparison algorithms.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"151 1","pages":"751-755"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79549566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote 2 : Promoting the diversity of digital technologies 主题演讲2:促进数字技术的多样性
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/cscwd57460.2023.10152801
{"title":"Keynote 2 : Promoting the diversity of digital technologies","authors":"","doi":"10.1109/cscwd57460.2023.10152801","DOIUrl":"https://doi.org/10.1109/cscwd57460.2023.10152801","url":null,"abstract":"","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"174 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79664019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing 多跳拼车的两阶段车辆对调度
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152680
Xiaobo Wei, Peng Li, Weiyi Huang, Zhiyuan Liu, Qin Liu
Ridesharing benefits the economy and the environment. In multi-hop ridesharing, passengers are permitted to switch vehicles within a single trip, extending the flexibility of conventional ridesharing. Nonetheless, vehicle dispatch is a difficult issue in multi-hop ridesharing. We subdivide the vehicle dispatching problem into the vehicle pairing problem and the request selection problem within a vehicle pair. To address these subproblems, we propose a two-stage framework for vehicle pair dispatching. In the initial stage, we model the vehicle pairing problem as a maximum vehicle-vehicle matching problem in a general graph, which differs from the conventional vehicle-request matching problem in a bipartite graph. The vehicle pairing algorithm is proposed to efficiently solve the vehicle pairing problem. In the second stage, we model the request selection problem as a multidimensional knapsack problem (d-KP) and propose an LP-relaxation request selection algorithm with an approximation ratio 1/5. Experiments conducted on a real-world dataset demonstrate the economic benefit of our proposed two-stage framework.
拼车有利于经济和环境。在多跳共乘中,乘客可以在一次行程中切换车辆,扩大了传统共乘的灵活性。然而,在多跳拼车中,车辆调度是一个难题。我们将车辆调度问题细分为车辆配对问题和车辆对内的请求选择问题。为了解决这些子问题,我们提出了一个两阶段的车辆对调度框架。在初始阶段,我们将车辆配对问题建模为一般图中的最大车辆-车辆匹配问题,这与传统的二部图中的车辆-请求匹配问题不同。为了有效地解决车辆配对问题,提出了车辆配对算法。在第二阶段,我们将请求选择问题建模为一个多维背包问题(d-KP),并提出一种近似比为1/5的lp -松弛请求选择算法。在真实数据集上进行的实验证明了我们提出的两阶段框架的经济效益。
{"title":"Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing","authors":"Xiaobo Wei, Peng Li, Weiyi Huang, Zhiyuan Liu, Qin Liu","doi":"10.1109/CSCWD57460.2023.10152680","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152680","url":null,"abstract":"Ridesharing benefits the economy and the environment. In multi-hop ridesharing, passengers are permitted to switch vehicles within a single trip, extending the flexibility of conventional ridesharing. Nonetheless, vehicle dispatch is a difficult issue in multi-hop ridesharing. We subdivide the vehicle dispatching problem into the vehicle pairing problem and the request selection problem within a vehicle pair. To address these subproblems, we propose a two-stage framework for vehicle pair dispatching. In the initial stage, we model the vehicle pairing problem as a maximum vehicle-vehicle matching problem in a general graph, which differs from the conventional vehicle-request matching problem in a bipartite graph. The vehicle pairing algorithm is proposed to efficiently solve the vehicle pairing problem. In the second stage, we model the request selection problem as a multidimensional knapsack problem (d-KP) and propose an LP-relaxation request selection algorithm with an approximation ratio 1/5. Experiments conducted on a real-world dataset demonstrate the economic benefit of our proposed two-stage framework.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"67 1","pages":"255-260"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80437028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Supported Cooperative Work-The Journal of Collaborative Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1