首页 > 最新文献

Computer Supported Cooperative Work-The Journal of Collaborative Computing最新文献

英文 中文
A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy 一种基于差分隐私保护的在线深度学习算法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152847
Jun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu
Deep Reinforcement Learning (DRL) combines the perceptual capabilities of deep learning with the decision-making capabilities of Reinforcement Learning RL, which can achieve enhanced decision-making. However, the environmental state data contains the privacy of the users. There exists consequently a potential risk of environmental state information being leaked during RL training. Some data desensitization and anonymization technologies are currently being used to protect data privacy. There may still be a risk of privacy disclosure with these desensitization techniques. Meanwhile, policymakers need the environmental state to make decisions, which will cause the disclosure of raw environmental data. To address the privacy issues in DRL, we propose a differential privacy-based online DRL algorithm. The algorithm will add Gaussian noise to the gradients of the deep network according to the privacy budget. More important, we prove tighter bounds for the privacy budget. Furthermore, we train an autocoder to protect the raw environmental state data. In this work, we prove the privacy budget formulation for differential privacy-based online deep RL. Experiments show that the proposed algorithm can improve privacy protection while still having relatively excellent decisionmaking performance.
深度强化学习(Deep Reinforcement Learning, DRL)将深度学习的感知能力与强化学习RL的决策能力相结合,可以实现增强决策。但是,环境状态数据包含用户的隐私。因此,在RL训练过程中存在着环境状态信息泄露的潜在风险。目前正在使用一些数据脱敏和匿名化技术来保护数据隐私。这些脱敏技术可能仍然存在隐私泄露的风险。同时,决策者需要环境状态来进行决策,这将导致原始环境数据的公开。为了解决DRL中的隐私问题,我们提出了一种基于差分隐私的在线DRL算法。该算法将根据隐私预算在深度网络的梯度中加入高斯噪声。更重要的是,我们证明了对隐私预算的更严格限制。此外,我们还训练了一个自动编码器来保护原始环境状态数据。在这项工作中,我们证明了基于差分隐私的在线深度学习的隐私预算公式。实验表明,该算法在提高隐私保护性能的同时,仍具有较好的决策性能。
{"title":"A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy","authors":"Jun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu","doi":"10.1109/CSCWD57460.2023.10152847","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152847","url":null,"abstract":"Deep Reinforcement Learning (DRL) combines the perceptual capabilities of deep learning with the decision-making capabilities of Reinforcement Learning RL, which can achieve enhanced decision-making. However, the environmental state data contains the privacy of the users. There exists consequently a potential risk of environmental state information being leaked during RL training. Some data desensitization and anonymization technologies are currently being used to protect data privacy. There may still be a risk of privacy disclosure with these desensitization techniques. Meanwhile, policymakers need the environmental state to make decisions, which will cause the disclosure of raw environmental data. To address the privacy issues in DRL, we propose a differential privacy-based online DRL algorithm. The algorithm will add Gaussian noise to the gradients of the deep network according to the privacy budget. More important, we prove tighter bounds for the privacy budget. Furthermore, we train an autocoder to protect the raw environmental state data. In this work, we prove the privacy budget formulation for differential privacy-based online deep RL. Experiments show that the proposed algorithm can improve privacy protection while still having relatively excellent decisionmaking performance.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"29 1","pages":"559-564"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81634318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning 基于多智能体深度强化学习的协同边缘缓存方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152789
Xiang Cao, Ningjiang Chen, Xuemei Yuan, Yifei Liu
With the support of 5G technology, mobile edge computing has made the application of industrial IoT and power IoT more and more extensive. By deploying a certain number of edge servers at the edge of the network, network service delay may significantly reduce. For the IoT scenario where the content demand is unpredictable, there are multiple distributed cloud servers and the distributed cloud servers do not communicate directly, a feasible way to improve the network service quality is to dynamically optimize the storage of edge servers and formulate targeted caching strategies. This paper proposes an edge caching approach based on multi-agent deep deterministic policy gradient named MADDPG-C, which regards distributed cloud servers and edge servers as different types of agents and maximizes the efficiency of edge caching in cooperation and competition. Simulation experiments show that the proposed MADDPG-C can further improve the hit rate of the edge cache and reduce the waiting delay of terminal devices.
在5G技术的支持下,移动边缘计算使得工业物联网和电力物联网的应用越来越广泛。通过在网络边缘部署一定数量的边缘服务器,可以显著降低网络业务延迟。对于内容需求不可预测的物联网场景,存在多个分布式云服务器,且分布式云服务器之间不直接通信,动态优化边缘服务器的存储,制定有针对性的缓存策略是提高网络服务质量的可行方法。本文提出了一种基于多智能体深度确定性策略梯度的边缘缓存方法madpg - c,该方法将分布式云服务器和边缘服务器视为不同类型的智能体,在合作和竞争中最大化边缘缓存的效率。仿真实验表明,所提出的madpg - c可以进一步提高边缘缓存的命中率,减少终端设备的等待延迟。
{"title":"A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning","authors":"Xiang Cao, Ningjiang Chen, Xuemei Yuan, Yifei Liu","doi":"10.1109/CSCWD57460.2023.10152789","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152789","url":null,"abstract":"With the support of 5G technology, mobile edge computing has made the application of industrial IoT and power IoT more and more extensive. By deploying a certain number of edge servers at the edge of the network, network service delay may significantly reduce. For the IoT scenario where the content demand is unpredictable, there are multiple distributed cloud servers and the distributed cloud servers do not communicate directly, a feasible way to improve the network service quality is to dynamically optimize the storage of edge servers and formulate targeted caching strategies. This paper proposes an edge caching approach based on multi-agent deep deterministic policy gradient named MADDPG-C, which regards distributed cloud servers and edge servers as different types of agents and maximizes the efficiency of edge caching in cooperation and competition. Simulation experiments show that the proposed MADDPG-C can further improve the hit rate of the edge cache and reduce the waiting delay of terminal devices.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"41 7","pages":"1772-1777"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72471002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks 一种自适应IP跳变防御移动目标的网络攻击方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152746
Fengyuan Shi, Zhou-yu Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao
In a static network, attackers can easily launch network attacks on target hosts which have long-term constant IP addresses. In order to defend against attackers effectively, many defense approaches use IP hopping to dynamically transform IP configuration. However, these approaches usually focus on one type of network attacks, scanning attacks or Denial of Service (DoS) attacks, and cannot sense network situations. This paper proposes AHIP, an adaptive IP hopping method for moving target defense (MTD) to defend against different network attacks. We use a trained lightweight one-dimensional convolutional neural network (1D-CNN) detector to judge whether there are no attacks, scanning attacks or DoS attacks in the network, which can adaptively trigger corresponding IP hopping strategy. We use specific hardware and software to create the software defined network (SDN) environment for experiments. The experiments prove that AHIP performs better to thwart network attacks and has lower system overhead.
在静态网络中,攻击者很容易对IP地址长期不变的目标主机发起网络攻击。为了有效防御攻击者,许多防御方法都采用IP跳变的方式动态转换IP配置。然而,这些方法通常只针对一种类型的网络攻击,即扫描攻击或拒绝服务攻击,无法感知网络状况。提出了一种用于移动目标防御(MTD)的自适应IP跳变方法AHIP,以防御不同类型的网络攻击。我们使用训练好的轻量级一维卷积神经网络(1D-CNN)检测器来判断网络中是否存在攻击、扫描攻击或DoS攻击,并自适应触发相应的IP跳变策略。我们使用特定的硬件和软件来创建软件定义网络(SDN)环境进行实验。实验证明,AHIP具有较好的抵御网络攻击的性能,并且具有较低的系统开销。
{"title":"AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks","authors":"Fengyuan Shi, Zhou-yu Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao","doi":"10.1109/CSCWD57460.2023.10152746","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152746","url":null,"abstract":"In a static network, attackers can easily launch network attacks on target hosts which have long-term constant IP addresses. In order to defend against attackers effectively, many defense approaches use IP hopping to dynamically transform IP configuration. However, these approaches usually focus on one type of network attacks, scanning attacks or Denial of Service (DoS) attacks, and cannot sense network situations. This paper proposes AHIP, an adaptive IP hopping method for moving target defense (MTD) to defend against different network attacks. We use a trained lightweight one-dimensional convolutional neural network (1D-CNN) detector to judge whether there are no attacks, scanning attacks or DoS attacks in the network, which can adaptively trigger corresponding IP hopping strategy. We use specific hardware and software to create the software defined network (SDN) environment for experiments. The experiments prove that AHIP performs better to thwart network attacks and has lower system overhead.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"53 1","pages":"1300-1305"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76483630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning 基于元学习的异构图少射恶意域检测
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152708
Yi Gao, Fangfang Yuan, Cong Cao, Majing Su, Dakui Wang, Yanbing Liu
The Domain Name System (DNS), one of the essential basic services on the Internet, is often abused by attackers to launch various cyber attacks, such as phishing and spamming. Researchers have proposed many machine learning-based and deep learning-based methods to detect malicious domains. However, these methods rely on a large-scale dataset with labeled samples for model training. The fact is that the labeled domain samples are limited in the real-world DNS dataset. In this paper, we propose a few-shot malicious domain detection model named MetaDom, which employs a meta-learning algorithm for model optimization. Specifically, We first model the DNS scenario as a heterogeneous graph to capture richer information by analysing the complex relations among domains, IP addresses and clients. Then, we learn the domain representations with a heterogeneous graph neural network on the DNS HG. Finally, considering that only few labeled data are available in the real-world DNS scenario, a meta-learning algorithm with knowledge distillation is introduced to optimize the model. Extensive experiments on the real DNS dataset show that MetaDom outperforms other state-of-the-art methods.
域名系统(DNS)是互联网上必不可少的基本服务之一,经常被攻击者滥用,进行各种网络攻击,例如网络钓鱼和垃圾邮件。研究人员提出了许多基于机器学习和深度学习的方法来检测恶意域。然而,这些方法依赖于带有标记样本的大规模数据集进行模型训练。事实上,标记的域样本在真实的DNS数据集中是有限的。本文提出了一种基于元学习算法的少射恶意域检测模型MetaDom,该模型采用元学习算法对模型进行优化。具体来说,我们首先将DNS场景建模为异构图,通过分析域、IP地址和客户端之间的复杂关系来获取更丰富的信息。然后,利用异构图神经网络在DNS HG上学习域表示。最后,考虑到实际DNS场景中可用的标记数据很少,引入了知识蒸馏的元学习算法对模型进行优化。在真实DNS数据集上进行的大量实验表明,MetaDom优于其他最先进的方法。
{"title":"Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning","authors":"Yi Gao, Fangfang Yuan, Cong Cao, Majing Su, Dakui Wang, Yanbing Liu","doi":"10.1109/CSCWD57460.2023.10152708","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152708","url":null,"abstract":"The Domain Name System (DNS), one of the essential basic services on the Internet, is often abused by attackers to launch various cyber attacks, such as phishing and spamming. Researchers have proposed many machine learning-based and deep learning-based methods to detect malicious domains. However, these methods rely on a large-scale dataset with labeled samples for model training. The fact is that the labeled domain samples are limited in the real-world DNS dataset. In this paper, we propose a few-shot malicious domain detection model named MetaDom, which employs a meta-learning algorithm for model optimization. Specifically, We first model the DNS scenario as a heterogeneous graph to capture richer information by analysing the complex relations among domains, IP addresses and clients. Then, we learn the domain representations with a heterogeneous graph neural network on the DNS HG. Finally, considering that only few labeled data are available in the real-world DNS scenario, a meta-learning algorithm with knowledge distillation is introduced to optimize the model. Extensive experiments on the real DNS dataset show that MetaDom outperforms other state-of-the-art methods.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"62 1","pages":"727-732"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76791528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative Greedy Selection Hyper-heuristic with Linear Population Size Reduction 线性种群缩减的迭代贪心选择超启发式算法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152792
Fuqing Zhao, Yuebao Liu, Tianpeng Xu
Selecting appropriate algorithms for specific problems has become a significant challenge with the remarkable growth of heuristics and meta-heuristics. To address this challenge, an iterative greedy selection hyper-heuristic algorithm with linear population size reduction (LIGSHH) was proposed in this paper. Using an iterative greedy strategy to choose the high level of exploration, this heuristic selects the Low-Level Heuristics (LLHs) that best suit the current problem. Nine LLHs are specifically designed for continuous optimization problems. Additionally, the exploration and exploitation capabilities of the LIGSHH are balanced by reducing the population size linearly at different stages of the problem. The proposed LIGSHH algorithm and comparison algorithms are tested on the CEC2017 benchmark test suite, and the experimental results show that the LIGSHH algorithm outperforms other comparison algorithms.
随着启发式和元启发式的显著发展,为特定问题选择合适的算法已成为一个重大挑战。为了解决这一问题,本文提出了一种线性种群大小缩减的迭代贪心选择超启发式算法(LIGSHH)。该启发式算法采用迭代贪心策略选择高层次的探索,选择最适合当前问题的低层次启发式(LLHs)。9个llh是专门为连续优化问题设计的。此外,在问题的不同阶段,通过线性减少种群规模来平衡LIGSHH的探索和开发能力。提出的LIGSHH算法和比较算法在CEC2017基准测试套件上进行了测试,实验结果表明,LIGSHH算法优于其他比较算法。
{"title":"Iterative Greedy Selection Hyper-heuristic with Linear Population Size Reduction","authors":"Fuqing Zhao, Yuebao Liu, Tianpeng Xu","doi":"10.1109/CSCWD57460.2023.10152792","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152792","url":null,"abstract":"Selecting appropriate algorithms for specific problems has become a significant challenge with the remarkable growth of heuristics and meta-heuristics. To address this challenge, an iterative greedy selection hyper-heuristic algorithm with linear population size reduction (LIGSHH) was proposed in this paper. Using an iterative greedy strategy to choose the high level of exploration, this heuristic selects the Low-Level Heuristics (LLHs) that best suit the current problem. Nine LLHs are specifically designed for continuous optimization problems. Additionally, the exploration and exploitation capabilities of the LIGSHH are balanced by reducing the population size linearly at different stages of the problem. The proposed LIGSHH algorithm and comparison algorithms are tested on the CEC2017 benchmark test suite, and the experimental results show that the LIGSHH algorithm outperforms other comparison algorithms.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"151 1","pages":"751-755"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79549566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote 2 : Promoting the diversity of digital technologies 主题演讲2:促进数字技术的多样性
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/cscwd57460.2023.10152801
{"title":"Keynote 2 : Promoting the diversity of digital technologies","authors":"","doi":"10.1109/cscwd57460.2023.10152801","DOIUrl":"https://doi.org/10.1109/cscwd57460.2023.10152801","url":null,"abstract":"","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"174 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79664019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing 多跳拼车的两阶段车辆对调度
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152680
Xiaobo Wei, Peng Li, Weiyi Huang, Zhiyuan Liu, Qin Liu
Ridesharing benefits the economy and the environment. In multi-hop ridesharing, passengers are permitted to switch vehicles within a single trip, extending the flexibility of conventional ridesharing. Nonetheless, vehicle dispatch is a difficult issue in multi-hop ridesharing. We subdivide the vehicle dispatching problem into the vehicle pairing problem and the request selection problem within a vehicle pair. To address these subproblems, we propose a two-stage framework for vehicle pair dispatching. In the initial stage, we model the vehicle pairing problem as a maximum vehicle-vehicle matching problem in a general graph, which differs from the conventional vehicle-request matching problem in a bipartite graph. The vehicle pairing algorithm is proposed to efficiently solve the vehicle pairing problem. In the second stage, we model the request selection problem as a multidimensional knapsack problem (d-KP) and propose an LP-relaxation request selection algorithm with an approximation ratio 1/5. Experiments conducted on a real-world dataset demonstrate the economic benefit of our proposed two-stage framework.
拼车有利于经济和环境。在多跳共乘中,乘客可以在一次行程中切换车辆,扩大了传统共乘的灵活性。然而,在多跳拼车中,车辆调度是一个难题。我们将车辆调度问题细分为车辆配对问题和车辆对内的请求选择问题。为了解决这些子问题,我们提出了一个两阶段的车辆对调度框架。在初始阶段,我们将车辆配对问题建模为一般图中的最大车辆-车辆匹配问题,这与传统的二部图中的车辆-请求匹配问题不同。为了有效地解决车辆配对问题,提出了车辆配对算法。在第二阶段,我们将请求选择问题建模为一个多维背包问题(d-KP),并提出一种近似比为1/5的lp -松弛请求选择算法。在真实数据集上进行的实验证明了我们提出的两阶段框架的经济效益。
{"title":"Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing","authors":"Xiaobo Wei, Peng Li, Weiyi Huang, Zhiyuan Liu, Qin Liu","doi":"10.1109/CSCWD57460.2023.10152680","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152680","url":null,"abstract":"Ridesharing benefits the economy and the environment. In multi-hop ridesharing, passengers are permitted to switch vehicles within a single trip, extending the flexibility of conventional ridesharing. Nonetheless, vehicle dispatch is a difficult issue in multi-hop ridesharing. We subdivide the vehicle dispatching problem into the vehicle pairing problem and the request selection problem within a vehicle pair. To address these subproblems, we propose a two-stage framework for vehicle pair dispatching. In the initial stage, we model the vehicle pairing problem as a maximum vehicle-vehicle matching problem in a general graph, which differs from the conventional vehicle-request matching problem in a bipartite graph. The vehicle pairing algorithm is proposed to efficiently solve the vehicle pairing problem. In the second stage, we model the request selection problem as a multidimensional knapsack problem (d-KP) and propose an LP-relaxation request selection algorithm with an approximation ratio 1/5. Experiments conducted on a real-world dataset demonstrate the economic benefit of our proposed two-stage framework.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"67 1","pages":"255-260"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80437028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bi-objective Optimization for UAV Swarm-enabled Relay Communications via Collaborative Beamforming 协同波束成形无人机群中继通信双目标优化
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152645
Chuang Zhang, Geng Sun, Jiahui Li, Xiaoya Zheng
Unmanned aerial vehicles (UAVs) as the aerial relay become a highly desired scheme to assist terrestrial network. In this work, we intend to utilize the UAV swarm to assist the communication between the base station (BS) equipped with the planar array antenna (PAA) and the IoT devices by collaborative beamforming (CB). Specifically, we formulate an average achievable rate and energy bi-objective optimization problem (AREBOP) to improve the average achievable rate of IoT terminal devices and energy consumption of UAV swarm by jointly optimize the excitation current weights of BS and UAVs, the position of UAVs and user association order of IoT terminal devices. Moreover, the formulated AREBOP is proved to be NP-hard. Thus, we proposed an multi-objective grasshopper algorithm with specific initialization (MOGOASI) to solve this problem. Simulation results show the effectiveness of MOGOASI and illustrate that the performance of MOGOASI is superior compared to some benchmarks.
无人机作为空中中继成为辅助地面网络的一种迫切需要的方案。在这项工作中,我们打算利用无人机群通过协同波束形成(CB)来协助配备平面阵列天线(PAA)的基站(BS)与物联网设备之间的通信。具体而言,我们制定了平均可达率和能量双目标优化问题(AREBOP),通过联合优化BS和无人机的激励电流权重、无人机的位置和物联网终端设备的用户关联顺序,提高物联网终端设备的平均可达率和无人机群的能量消耗。此外,配制的AREBOP被证明是NP-hard。因此,我们提出了一种具有特定初始化的多目标蚱蜢算法(MOGOASI)来解决这一问题。仿真结果表明了MOGOASI的有效性,并表明MOGOASI的性能优于一些基准测试。
{"title":"Bi-objective Optimization for UAV Swarm-enabled Relay Communications via Collaborative Beamforming","authors":"Chuang Zhang, Geng Sun, Jiahui Li, Xiaoya Zheng","doi":"10.1109/CSCWD57460.2023.10152645","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152645","url":null,"abstract":"Unmanned aerial vehicles (UAVs) as the aerial relay become a highly desired scheme to assist terrestrial network. In this work, we intend to utilize the UAV swarm to assist the communication between the base station (BS) equipped with the planar array antenna (PAA) and the IoT devices by collaborative beamforming (CB). Specifically, we formulate an average achievable rate and energy bi-objective optimization problem (AREBOP) to improve the average achievable rate of IoT terminal devices and energy consumption of UAV swarm by jointly optimize the excitation current weights of BS and UAVs, the position of UAVs and user association order of IoT terminal devices. Moreover, the formulated AREBOP is proved to be NP-hard. Thus, we proposed an multi-objective grasshopper algorithm with specific initialization (MOGOASI) to solve this problem. Simulation results show the effectiveness of MOGOASI and illustrate that the performance of MOGOASI is superior compared to some benchmarks.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"111 1","pages":"984-989"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80575002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things 基于轻量级手势的家庭物联网触发动作编程
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152738
Lifu Wang, K. Dong, Xiaodan Gu, Zhen Ling, Ming Yang
IFTTT is one of the most popular Trigger-Action Programming platforms. The rules generated in IFTTT are named IoT Applets. Despite the powerful programming interface provided by IFTTT, establishing an Applet requires technical skills and is not convenient enough for most users. To address this problem, we propose a gesture based programming method to help end users establish and manage IoT Applets in a convenient way. It requires employment of an RGB-D camera, and recognizes users’ pointing rays and hand actions. The obtained information is interpreted to certain devices and device events for Applet management. An experiment involving 20 participants validates the performance of our proposed method.
IFTTT是最流行的触发操作编程平台之一。在IFTTT中生成的规则被命名为IoT applet。尽管IFTTT提供了强大的编程接口,但建立Applet需要技术技能,而且对大多数用户来说不够方便。为了解决这个问题,我们提出了一种基于手势的编程方法,以帮助最终用户以方便的方式建立和管理物联网小程序。它需要使用RGB-D摄像头,并识别用户的指向光线和手部动作。获得的信息被解释为某些设备和设备事件,用于Applet管理。一个涉及20名参与者的实验验证了我们提出的方法的性能。
{"title":"Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things","authors":"Lifu Wang, K. Dong, Xiaodan Gu, Zhen Ling, Ming Yang","doi":"10.1109/CSCWD57460.2023.10152738","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152738","url":null,"abstract":"IFTTT is one of the most popular Trigger-Action Programming platforms. The rules generated in IFTTT are named IoT Applets. Despite the powerful programming interface provided by IFTTT, establishing an Applet requires technical skills and is not convenient enough for most users. To address this problem, we propose a gesture based programming method to help end users establish and manage IoT Applets in a convenient way. It requires employment of an RGB-D camera, and recognizes users’ pointing rays and hand actions. The obtained information is interpreted to certain devices and device events for Applet management. An experiment involving 20 participants validates the performance of our proposed method.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"57 1","pages":"959-964"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80865892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerate Multi-view Inference with End-edge Collaborative Computing 利用端缘协同计算加速多视图推理
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152842
Wangbing Cheng, MinFeng Zhang, Fang Dong, Shucun Fu
Multi-view inference can utilize visual information from several views like a human being and significantly improve accuracy in some scenes, but it inevitably incurs more computing overhead than traditional DNN inference. To meet the requirement of low latency in typical scenarios, we consider utilizing model partition technique of edge computing to speed up multi-view inference, and design a multi-view end-edge co-inference execution framework (MV-IEF) which can make use of both end and edge resources for multi-view inference tasks. However, when employing the framework simply, the efficiency of multi-view inference will be constrained by network dynamics and heterogeneity of devices corresponding to multiple views. To break this constraint, we establish an optimization model based on the framework to minimize the multi-view inference time and solve it on the basis of game theory. And meanwhile, we propose a joint optimization algorithm for multi-view resource allocation and model partition (MV-JRAMP), which can make remarkable decisions of resource allocation and model partiton according to network status and computing capabilities of devices. Finally, we build a prototype and evaluate the performance of MV-JRAMP. Experiments show that MV-JRAMP can accelerate multi-view inference by up to 3.71×.
多视图推理可以像人类一样利用来自多个视图的视觉信息,并在某些场景中显着提高准确性,但它不可避免地会比传统的深度神经网络推理产生更多的计算开销。为了满足典型场景下低时延的要求,我们考虑利用边缘计算的模型划分技术来加速多视图推理,并设计了一个多视图端-边缘协同推理执行框架(MV-IEF),该框架可以同时利用端-边缘资源执行多视图推理任务。然而,当简单使用该框架时,多视图推理的效率将受到网络动态和多视图对应设备的异构性的限制。为了打破这一约束,我们建立了一个基于框架的优化模型,以最小化多视图推理时间,并基于博弈论进行求解。同时,我们提出了一种多视图资源分配和模型划分联合优化算法(MV-JRAMP),该算法能够根据设备的网络状态和计算能力做出较好的资源分配和模型划分决策。最后,建立了MV-JRAMP的原型,并对其性能进行了评估。实验表明,MV-JRAMP可将多视图推理速度提高3.71倍。
{"title":"Accelerate Multi-view Inference with End-edge Collaborative Computing","authors":"Wangbing Cheng, MinFeng Zhang, Fang Dong, Shucun Fu","doi":"10.1109/CSCWD57460.2023.10152842","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152842","url":null,"abstract":"Multi-view inference can utilize visual information from several views like a human being and significantly improve accuracy in some scenes, but it inevitably incurs more computing overhead than traditional DNN inference. To meet the requirement of low latency in typical scenarios, we consider utilizing model partition technique of edge computing to speed up multi-view inference, and design a multi-view end-edge co-inference execution framework (MV-IEF) which can make use of both end and edge resources for multi-view inference tasks. However, when employing the framework simply, the efficiency of multi-view inference will be constrained by network dynamics and heterogeneity of devices corresponding to multiple views. To break this constraint, we establish an optimization model based on the framework to minimize the multi-view inference time and solve it on the basis of game theory. And meanwhile, we propose a joint optimization algorithm for multi-view resource allocation and model partition (MV-JRAMP), which can make remarkable decisions of resource allocation and model partiton according to network status and computing capabilities of devices. Finally, we build a prototype and evaluate the performance of MV-JRAMP. Experiments show that MV-JRAMP can accelerate multi-view inference by up to 3.71×.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"42 1","pages":"1625-1631"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80875422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Supported Cooperative Work-The Journal of Collaborative Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1