首页 > 最新文献

Computer Supported Cooperative Work-The Journal of Collaborative Computing最新文献

英文 中文
Dirty page prediction by machine learning methods based on temporal and spatial locality 基于时空局部性的机器学习脏页面预测方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152768
Yahui Lu, Yuping Jiang
The memory dirty page prediction technology can effectively predict whether a memory page will be modified (dirty) at the next moment, and is widely used in virtual machine migration, container migration and other fields. In this paper, we propose a machine-learning based method for memory dirty page prediction. The method exploits the temporal and spatial locality principle of memory changes, collects dirty records of pages over a period of time, and uses supervised learning methods for training and predicting the dirty page. We also discuss the influence of data contradiction and data repetition in memory page dataset. The experiments with different memory change frequency dataset show that compared with the traditional time series methods, our machine-learning based method has better performance.
内存脏页预测技术可以有效地预测某一内存页在下一时刻是否会被修改(脏),广泛应用于虚拟机迁移、容器迁移等领域。本文提出了一种基于机器学习的内存脏页预测方法。该方法利用记忆变化的时空局部性原理,收集一段时间内页面的脏记录,并使用监督学习方法对脏页面进行训练和预测。我们还讨论了数据矛盾和数据重复对内存页面数据集的影响。在不同记忆变化频率数据集上的实验表明,与传统的时间序列方法相比,基于机器学习的方法具有更好的性能。
{"title":"Dirty page prediction by machine learning methods based on temporal and spatial locality","authors":"Yahui Lu, Yuping Jiang","doi":"10.1109/CSCWD57460.2023.10152768","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152768","url":null,"abstract":"The memory dirty page prediction technology can effectively predict whether a memory page will be modified (dirty) at the next moment, and is widely used in virtual machine migration, container migration and other fields. In this paper, we propose a machine-learning based method for memory dirty page prediction. The method exploits the temporal and spatial locality principle of memory changes, collects dirty records of pages over a period of time, and uses supervised learning methods for training and predicting the dirty page. We also discuss the influence of data contradiction and data repetition in memory page dataset. The experiments with different memory change frequency dataset show that compared with the traditional time series methods, our machine-learning based method has better performance.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"21 1","pages":"89-94"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73906136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Convolutional Network with Long Time Memory for Skeleton-based Action Recognition 基于骨架的动作识别的长时间记忆图卷积网络
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152568
Yanpeng Qi, Chen Pang, Yiliang Liu, Hong Liu, Lei Lyu
Skeleton-based action recognition task has been widely studied in recent years. Currently, the most popular researches use graph convolutional network (GCN) to solve this task by modeling human joints data as spatio-temporal graph. However, a large number of long-term temporal motion relationships cannot be effectively captured by GCN. Thus, recurrent neural network (RNN) is introduced to solve this defect. In this work, we propose a model namely graph convolutional network with long time memory (GCN-LTM). Specifically, there are two task streams in our proposed model: GCN stream and RNN stream, respectively. The GCN stream aims to capture the spatial motion relationships as well as the RNN stream focuses on extracting the long-term temporal patterns. In addition, we introduce the contrastive learning strategy to better facilitate feature learning between these two streams. The multiple ablation experiments have verified the feasibility of our proposed model. Numerous experiments show that the proposed model is superior to the current state-of-the-art method under two large-scale datasets including NTU-RGBD and NTU-RGBD-120.
基于骨骼的动作识别任务近年来得到了广泛的研究。目前,最流行的研究是利用图卷积网络(GCN)将人体关节数据建模为时空图来解决这一问题。然而,GCN不能有效地捕获大量的长时间运动关系。因此,递归神经网络(RNN)的引入解决了这一缺陷。在这项工作中,我们提出了一个模型,即具有长时间记忆的图卷积网络(GCN-LTM)。具体来说,我们提出的模型中有两个任务流:GCN流和RNN流。GCN流的目标是捕捉空间运动关系,而RNN流的重点是提取长期时间模式。此外,我们还引入了对比学习策略,以更好地促进这两个流之间的特征学习。多次烧蚀实验验证了该模型的可行性。大量实验表明,在NTU-RGBD和NTU-RGBD-120两个大规模数据集下,该模型优于目前最先进的方法。
{"title":"Graph Convolutional Network with Long Time Memory for Skeleton-based Action Recognition","authors":"Yanpeng Qi, Chen Pang, Yiliang Liu, Hong Liu, Lei Lyu","doi":"10.1109/CSCWD57460.2023.10152568","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152568","url":null,"abstract":"Skeleton-based action recognition task has been widely studied in recent years. Currently, the most popular researches use graph convolutional network (GCN) to solve this task by modeling human joints data as spatio-temporal graph. However, a large number of long-term temporal motion relationships cannot be effectively captured by GCN. Thus, recurrent neural network (RNN) is introduced to solve this defect. In this work, we propose a model namely graph convolutional network with long time memory (GCN-LTM). Specifically, there are two task streams in our proposed model: GCN stream and RNN stream, respectively. The GCN stream aims to capture the spatial motion relationships as well as the RNN stream focuses on extracting the long-term temporal patterns. In addition, we introduce the contrastive learning strategy to better facilitate feature learning between these two streams. The multiple ablation experiments have verified the feasibility of our proposed model. Numerous experiments show that the proposed model is superior to the current state-of-the-art method under two large-scale datasets including NTU-RGBD and NTU-RGBD-120.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"57 1","pages":"843-848"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77407709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reinforcement Learning-driven Iterated Greedy Algorithm for Traveling Salesman Problem 旅行商问题的强化学习驱动迭代贪心算法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152696
Xi Song, Mingyang Li, Weidong Xie, Yuanyuan Mao
This paper investigates a traveling salesman problem (TSP), which has important applications in real-world scenarios. A reinforcement learning-driven iterated greedy algorithm (RLIGA) is presented to address the TSP. A population initialization method based on the famous FRB2 heuristic is proposed to generate an initial population with high quality. To enhance the effectiveness of the RLIGA, the local search method and the destruction-construction mechanisms are designed for the city sequence. A generation method of sub-population based on current population sequence information is proposed to generate sub-population. An acceptance criterion is proposed to determine whether the offspring are adopted into the population. A re-destruction and re-construction method is proposed to avoid the proposed algorithm falling into local optimum. Lastly, the RLIGA is tested on the TSPLIB benchmark instances. The experimental results show that RLIGA is an effective algorithm to address the problem.
本文研究了旅行商问题(TSP),该问题在现实世界中具有重要的应用。提出了一种强化学习驱动的迭代贪婪算法(RLIGA)来解决TSP问题。为了生成高质量的初始种群,提出了一种基于著名的FRB2启发式算法的种群初始化方法。为了提高RLIGA算法的有效性,设计了城市序列的局部搜索方法和破坏-重建机制。提出了一种基于当前种群序列信息的子种群生成方法。提出了一个接受标准来确定后代是否被种群收养。为了避免算法陷入局部最优,提出了一种重新破坏和重建的方法。最后,在TSPLIB基准测试实例上对RLIGA进行了测试。实验结果表明,RLIGA算法是解决这一问题的有效算法。
{"title":"A Reinforcement Learning-driven Iterated Greedy Algorithm for Traveling Salesman Problem","authors":"Xi Song, Mingyang Li, Weidong Xie, Yuanyuan Mao","doi":"10.1109/CSCWD57460.2023.10152696","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152696","url":null,"abstract":"This paper investigates a traveling salesman problem (TSP), which has important applications in real-world scenarios. A reinforcement learning-driven iterated greedy algorithm (RLIGA) is presented to address the TSP. A population initialization method based on the famous FRB2 heuristic is proposed to generate an initial population with high quality. To enhance the effectiveness of the RLIGA, the local search method and the destruction-construction mechanisms are designed for the city sequence. A generation method of sub-population based on current population sequence information is proposed to generate sub-population. An acceptance criterion is proposed to determine whether the offspring are adopted into the population. A re-destruction and re-construction method is proposed to avoid the proposed algorithm falling into local optimum. Lastly, the RLIGA is tested on the TSPLIB benchmark instances. The experimental results show that RLIGA is an effective algorithm to address the problem.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"1 1","pages":"1342-1347"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77226511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Author Research Relatedness through Crowdsourcing: A Replication Study on MTurk 通过众包调查作者研究相关性:MTurk的复制研究
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152707
António Correia, Dennis Paulino, H. Paredes, D. Guimaraes, D. Schneider, Benjamim Fonseca
Determining the relatedness of publications by detecting similarities and connections between researchers and their outputs can help science stakeholders worldwide to find areas of common interest and potential collaboration. To this end, many studies have tried to explore authorship attribution and research similarity detection through the use of automatic approaches. Nonetheless, inferring author research relatedness from imperfect data containing errors and multiple references to the same entities is a long-standing challenge. In a previous study, we conducted an experiment where a homogeneous crowd of volunteers contributed to a set of author name disambiguation tasks. The results demonstrated an overall accuracy higher than 75% and we also found important effects tied to the confidence level indicated by participants in correct answers. However, this study left many open questions regarding the comparative accuracy of a large heterogeneous crowd with monetary rewards involved. This paper seeks to address some of these unanswered questions by repeating the experiment with a crowd of 140 online paid workers recruited via MTurk’s microtask crowdsourcing platform. Our replication study shows high accuracy for name disambiguation tasks based on authorship-level information and content features. These findings can be of greater informative value since they also explore hints of crowd behavior activity in terms of time duration and mean proportion of clicks per worker with implications for interface and interaction design.
通过检测研究人员及其产出之间的相似性和联系来确定出版物的相关性,可以帮助全世界的科学利益相关者找到共同感兴趣的领域和潜在的合作。为此,许多研究试图通过使用自动方法来探索作者归属和研究相似度检测。尽管如此,从包含错误和对同一实体的多次引用的不完整数据中推断作者研究的相关性是一个长期的挑战。在之前的一项研究中,我们进行了一项实验,让一群同质的志愿者参与一组作者姓名消歧任务。结果表明,总体准确率高于75%,我们还发现,参与者对正确答案的信心水平也有重要影响。然而,这项研究留下了许多悬而未决的问题,涉及到金钱奖励的大量异质人群的相对准确性。本文试图通过MTurk的微任务众包平台招募的140名在线付费员工来重复这个实验,以解决其中一些悬而未决的问题。我们的复制研究表明,基于作者级别信息和内容特征的名称消歧任务具有很高的准确性。这些发现可能具有更大的信息价值,因为它们还从持续时间和每个工作人员的平均点击比例方面探索了人群行为活动的线索,这对界面和交互设计有影响。
{"title":"Investigating Author Research Relatedness through Crowdsourcing: A Replication Study on MTurk","authors":"António Correia, Dennis Paulino, H. Paredes, D. Guimaraes, D. Schneider, Benjamim Fonseca","doi":"10.1109/CSCWD57460.2023.10152707","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152707","url":null,"abstract":"Determining the relatedness of publications by detecting similarities and connections between researchers and their outputs can help science stakeholders worldwide to find areas of common interest and potential collaboration. To this end, many studies have tried to explore authorship attribution and research similarity detection through the use of automatic approaches. Nonetheless, inferring author research relatedness from imperfect data containing errors and multiple references to the same entities is a long-standing challenge. In a previous study, we conducted an experiment where a homogeneous crowd of volunteers contributed to a set of author name disambiguation tasks. The results demonstrated an overall accuracy higher than 75% and we also found important effects tied to the confidence level indicated by participants in correct answers. However, this study left many open questions regarding the comparative accuracy of a large heterogeneous crowd with monetary rewards involved. This paper seeks to address some of these unanswered questions by repeating the experiment with a crowd of 140 online paid workers recruited via MTurk’s microtask crowdsourcing platform. Our replication study shows high accuracy for name disambiguation tasks based on authorship-level information and content features. These findings can be of greater informative value since they also explore hints of crowd behavior activity in terms of time duration and mean proportion of clicks per worker with implications for interface and interaction design.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"26 3","pages":"77-82"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72394065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Graph Neural Network with Self-Expressive Attention for Community Detection 基于自表达注意的无监督图神经网络社区检测
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152715
Xu Sun, Weiyu Zhang, Xinchao Guo, Wenpeng Lu
Community detection is an important task in graph analysis, and it is of great significance in reality. Recently, unsupervised learning has been widely used in community detection tasks. However, only a few community detection models combine unsupervised learning with graph neural networks (GNNs). To this end, in this paper, we combine GNNs with unsupervised learning to propose a new model, Unsupervised graph neural network with Self-expressive attention for Community detection (USCom). We first use the graph attention encoder to generate node embeddings. Then we apply the self-expressive principle to optimize the node embeddings to make them more suitable for community detection tasks. Finally, we utilize a four-layer perceptron for community detection. The experimental results show that the model proposed in this paper outperforms the comparison baselines on community detection tasks.
社区检测是图分析中的一项重要任务,在现实中具有重要意义。近年来,无监督学习被广泛应用于社区检测任务中。然而,只有少数社区检测模型将无监督学习与图神经网络(gnn)相结合。为此,本文将gnn与无监督学习相结合,提出了一种新的模型——具有自我表达注意的无监督图神经网络用于社区检测(USCom)。我们首先使用图注意编码器生成节点嵌入。然后应用自表达原理对节点嵌入进行优化,使其更适合社区检测任务。最后,我们利用四层感知器进行社区检测。实验结果表明,本文提出的模型在社区检测任务上优于比较基线。
{"title":"Unsupervised Graph Neural Network with Self-Expressive Attention for Community Detection","authors":"Xu Sun, Weiyu Zhang, Xinchao Guo, Wenpeng Lu","doi":"10.1109/CSCWD57460.2023.10152715","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152715","url":null,"abstract":"Community detection is an important task in graph analysis, and it is of great significance in reality. Recently, unsupervised learning has been widely used in community detection tasks. However, only a few community detection models combine unsupervised learning with graph neural networks (GNNs). To this end, in this paper, we combine GNNs with unsupervised learning to propose a new model, Unsupervised graph neural network with Self-expressive attention for Community detection (USCom). We first use the graph attention encoder to generate node embeddings. Then we apply the self-expressive principle to optimize the node embeddings to make them more suitable for community detection tasks. Finally, we utilize a four-layer perceptron for community detection. The experimental results show that the model proposed in this paper outperforms the comparison baselines on community detection tasks.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"31 1","pages":"1890-1895"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85233561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simplified-Xception: A New Way to Speed Up Malicious Code Classification 简化异常:一种加速恶意代码分类的新方法
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152755
Xinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu
Traditional malicious code detection methods require a lot of manpower and resources, which makes the research of malicious code very difficult. The selection of malicious code features mainly relies on the subjective analysis and selection of experts, which has a large impact on the detection effect of the model. In this paper, malicious codes are converted into greyscale images as model inputs, and features are automatically extracted using a deep-learning model. An improved convolutional neural network model based on Xception (Simplified Xception) is proposed for malicious code family classification. The model reduces the number of modules in the original model and adds a depth-separable convolutional layer with a step size of 2 to enhance the generated grey-scale images. The model is compared with CNN models, ResNet50, and improved models related to Inception. The experimental results show that the accuracy of SimplifiedXception is 98%, which is better than other related models. Compared to the Xception model, the accuracy of the Simplified-Xception model was improved by 1.3% and the number of parameters was reduced by half.
传统的恶意代码检测方法需要大量的人力和资源,这使得恶意代码的研究非常困难。恶意代码特征的选择主要依靠专家的主观分析和选择,对模型的检测效果影响较大。本文将恶意代码转换为灰度图像作为模型输入,并使用深度学习模型自动提取特征。提出了一种基于Xception (Simplified Xception)的改进卷积神经网络模型,用于恶意代码族分类。该模型减少了原始模型中的模块数,并增加了一个步长为2的深度可分卷积层来增强生成的灰度图像。将模型与CNN模型、ResNet50模型以及盗梦空间相关的改进模型进行比较。实验结果表明,SimplifiedXception的准确率达到98%,优于其他相关模型。与Xception模型相比,简化后的Xception模型的准确率提高了1.3%,参数数量减少了一半。
{"title":"Simplified-Xception: A New Way to Speed Up Malicious Code Classification","authors":"Xinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu","doi":"10.1109/CSCWD57460.2023.10152755","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152755","url":null,"abstract":"Traditional malicious code detection methods require a lot of manpower and resources, which makes the research of malicious code very difficult. The selection of malicious code features mainly relies on the subjective analysis and selection of experts, which has a large impact on the detection effect of the model. In this paper, malicious codes are converted into greyscale images as model inputs, and features are automatically extracted using a deep-learning model. An improved convolutional neural network model based on Xception (Simplified Xception) is proposed for malicious code family classification. The model reduces the number of modules in the original model and adds a depth-separable convolutional layer with a step size of 2 to enhance the generated grey-scale images. The model is compared with CNN models, ResNet50, and improved models related to Inception. The experimental results show that the accuracy of SimplifiedXception is 98%, which is better than other related models. Compared to the Xception model, the accuracy of the Simplified-Xception model was improved by 1.3% and the number of parameters was reduced by half.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"39 1","pages":"582-587"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85627107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Signature Authentication Scheme with Credit Evaluation Mechanism in VANET VANET中具有信用评估机制的组签名认证方案
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152641
Yanfei Lu, Suzhen Cao, Qizhi He, Zixuan Fang, Junjian Yan, Yi Guo
Aiming at the problems of privacy disclosure and false information provided by malicious vehicles in vehicular ad-hoc network (VANET) communication, this paper proposes a group signature authentication scheme with credit evaluation mechanism combining certificateless public key cryptography and group signature technology. In this scheme, the problem of certificate management and key escrow were solved by using certificateless public key cryptography; secondly, used group signature technology, any member of the group could sign the message anonymously on behalf of the group to protect the private information of the vehicle; finally, a single factor weight evaluation mechanism and a reward and punishment mechanism were introduced to evaluate the reliability of shared information and encourage users to share real information. Based on the computational Diffie-Hellman difficult problem, the scheme is proved to satisfy the security of signature unforgeability under the random oracle model. Compared with the existing schemes, the experimental results show that the scheme reduces the time of vehicle signature by 10.82%~45.95%, and the time of group administrator verification by 4.87%~30.09%, which proves that the scheme is more effective.
针对恶意车辆在车载自组网(VANET)通信中存在的隐私泄露和虚假信息等问题,提出了一种将无证书公钥加密技术与群签名技术相结合的具有信用评估机制的群签名认证方案。该方案采用无证书公钥加密技术解决了证书管理和密钥托管问题;其次,采用群签名技术,群中的任何成员都可以代表群匿名签名,保护了车辆的隐私信息;最后,引入单因素权重评价机制和奖惩机制来评价共享信息的可靠性,鼓励用户共享真实信息。基于计算Diffie-Hellman难题,证明了该方案在随机oracle模型下满足签名不可伪造的安全性。实验结果表明,与现有方案相比,该方案将车辆签名时间缩短了10.82%~45.95%,将组管理员验证时间缩短了4.87%~30.09%,证明了该方案的有效性。
{"title":"Group Signature Authentication Scheme with Credit Evaluation Mechanism in VANET","authors":"Yanfei Lu, Suzhen Cao, Qizhi He, Zixuan Fang, Junjian Yan, Yi Guo","doi":"10.1109/CSCWD57460.2023.10152641","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152641","url":null,"abstract":"Aiming at the problems of privacy disclosure and false information provided by malicious vehicles in vehicular ad-hoc network (VANET) communication, this paper proposes a group signature authentication scheme with credit evaluation mechanism combining certificateless public key cryptography and group signature technology. In this scheme, the problem of certificate management and key escrow were solved by using certificateless public key cryptography; secondly, used group signature technology, any member of the group could sign the message anonymously on behalf of the group to protect the private information of the vehicle; finally, a single factor weight evaluation mechanism and a reward and punishment mechanism were introduced to evaluate the reliability of shared information and encourage users to share real information. Based on the computational Diffie-Hellman difficult problem, the scheme is proved to satisfy the security of signature unforgeability under the random oracle model. Compared with the existing schemes, the experimental results show that the scheme reduces the time of vehicle signature by 10.82%~45.95%, and the time of group administrator verification by 4.87%~30.09%, which proves that the scheme is more effective.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"34 1","pages":"1703-1709"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85082052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Constraint-based Recommender System via RDF Knowledge Graphs 基于RDF知识图的约束推荐系统
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152701
Ngoc Luyen Le, Marie-Hélène Abel, Philippe Gouspillou
Knowledge graphs, represented in RDF, are able to model entities and their relations by means of ontologies. The use of knowledge graphs for information modeling has attracted interest in recent years. In recommender systems, items and users can be mapped and integrated into the knowledge graph, which can represent more links and relationships between users and items. Constraint-based recommender systems are based on the idea of explicitly exploiting deep recommendation knowledge through constraints to identify relevant recommendations. When combined with knowledge graphs, a constraint-based recommender system gains several benefits in terms of constraint sets. In this paper, we investigate and propose the construction of a constraint-based recommender system via RDF knowledge graphs applied to the vehicle purchase/sale domain. The results of our experiments show that the proposed approach is able to efficiently identify recommendations in accordance with user preferences.
以RDF表示的知识图能够通过本体对实体及其关系进行建模。近年来,知识图在信息建模中的使用引起了人们的兴趣。在推荐系统中,可以将商品和用户映射并集成到知识图中,知识图可以表示用户和商品之间更多的链接和关系。基于约束的推荐系统是基于通过约束明确地利用深度推荐知识来识别相关推荐的思想。当与知识图相结合时,基于约束的推荐系统在约束集方面获得了一些好处。在本文中,我们研究并提出了一个基于约束的基于RDF知识图的推荐系统的构建,该系统应用于车辆购销领域。实验结果表明,本文提出的方法能够有效地根据用户偏好识别推荐。
{"title":"A Constraint-based Recommender System via RDF Knowledge Graphs","authors":"Ngoc Luyen Le, Marie-Hélène Abel, Philippe Gouspillou","doi":"10.1109/CSCWD57460.2023.10152701","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152701","url":null,"abstract":"Knowledge graphs, represented in RDF, are able to model entities and their relations by means of ontologies. The use of knowledge graphs for information modeling has attracted interest in recent years. In recommender systems, items and users can be mapped and integrated into the knowledge graph, which can represent more links and relationships between users and items. Constraint-based recommender systems are based on the idea of explicitly exploiting deep recommendation knowledge through constraints to identify relevant recommendations. When combined with knowledge graphs, a constraint-based recommender system gains several benefits in terms of constraint sets. In this paper, we investigate and propose the construction of a constraint-based recommender system via RDF knowledge graphs applied to the vehicle purchase/sale domain. The results of our experiments show that the proposed approach is able to efficiently identify recommendations in accordance with user preferences.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"11 1","pages":"849-854"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86085578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Robust Gradient Difference Compression to Federated Learning 鲁棒梯度差分压缩在联邦学习中的应用
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152826
Yueyao Chen, Beilun Wang, Tianyi Ma, Cheng Chen
Nowadays, federated learning has been a prevailing paradigm for large-scale distributed machine learning, which is faced with the problem of communication bottleneck. To solve this problem, recent works usually apply different compression techniques such as sparsification and quantization compressors. However, such approaches are all lossy compression and have two drawbacks. First, they could lead to information loss of the global parameter. Second, compressed parameters carrying less information would be more likely to be attacked by malicious workers than full parameters, leading to a Byzantine failure of the model. In this paper, to avoid information loss, mitigate the communication bottleneck, and at the same time tolerate popular Byzantine attacks, we propose FedGraD, which leverages gradient difference compression and combines robust aggregation rules in federated learning settings. Our experimental results on three different datasets a9a, w8a and mushrooms show good performance of our method.
目前,联邦学习已成为大规模分布式机器学习的主流范式,但它面临着通信瓶颈的问题。为了解决这个问题,最近的研究通常采用不同的压缩技术,如稀疏化压缩器和量化压缩器。然而,这些方法都是有损压缩,并且有两个缺点。首先,它们可能导致全局参数的信息丢失。其次,携带较少信息的压缩参数比完整参数更容易受到恶意工作者的攻击,导致模型的拜占庭式故障。在本文中,为了避免信息丢失,缓解通信瓶颈,同时容忍流行的拜占庭攻击,我们提出了FedGraD,它利用梯度差分压缩并在联邦学习设置中结合鲁棒聚合规则。在a9a、w8a和mushroom三个不同的数据集上的实验结果表明了我们的方法的良好性能。
{"title":"Applying Robust Gradient Difference Compression to Federated Learning","authors":"Yueyao Chen, Beilun Wang, Tianyi Ma, Cheng Chen","doi":"10.1109/CSCWD57460.2023.10152826","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152826","url":null,"abstract":"Nowadays, federated learning has been a prevailing paradigm for large-scale distributed machine learning, which is faced with the problem of communication bottleneck. To solve this problem, recent works usually apply different compression techniques such as sparsification and quantization compressors. However, such approaches are all lossy compression and have two drawbacks. First, they could lead to information loss of the global parameter. Second, compressed parameters carrying less information would be more likely to be attacked by malicious workers than full parameters, leading to a Byzantine failure of the model. In this paper, to avoid information loss, mitigate the communication bottleneck, and at the same time tolerate popular Byzantine attacks, we propose FedGraD, which leverages gradient difference compression and combines robust aggregation rules in federated learning settings. Our experimental results on three different datasets a9a, w8a and mushrooms show good performance of our method.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"3 1","pages":"1748-1753"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72461426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical privacy-preserving mixing protocol for Bitcoin 实用的比特币隐私保护混合协议
IF 2.4 3区 计算机科学 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152733
Qianqian Chang, Lin Xu, L. Zhang
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanonymization attacks. The exisiting schemes typically require a trusted-third party to achieve anonymity, however this usually faces a single-point fault. In addition, existing schemes suffer from high communication complexity and impracticality. This paper proposes a practical privacy-preserving mixing protocol for Bitcoin to achieve unlink-ability of input and output address of transactions. Compared to existing schemes, our protocol improves practicality. The communication complexity of our protocol is linearly related to the number of peers. Moreover, our protocol is scalable as it works not only for Bitcoin, but also for other cryptocurrencies.
加密货币的隐私性在各个领域都受到高度关注。研究表明,比特币中使用的假名只能提供较弱的隐私。在去匿名化攻击下,用户的隐私可能会受到威胁。现有的方案通常需要可信的第三方来实现匿名,然而这通常面临单点故障。此外,现有方案存在通信复杂度高、不实用等问题。本文提出了一种实用的比特币隐私保护混合协议,以实现交易输入和输出地址的不可链接性。与现有方案相比,我们的协议提高了实用性。我们的协议的通信复杂性与对等体的数量成线性关系。此外,我们的协议是可扩展的,因为它不仅适用于比特币,还适用于其他加密货币。
{"title":"Practical privacy-preserving mixing protocol for Bitcoin","authors":"Qianqian Chang, Lin Xu, L. Zhang","doi":"10.1109/CSCWD57460.2023.10152733","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152733","url":null,"abstract":"The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanonymization attacks. The exisiting schemes typically require a trusted-third party to achieve anonymity, however this usually faces a single-point fault. In addition, existing schemes suffer from high communication complexity and impracticality. This paper proposes a practical privacy-preserving mixing protocol for Bitcoin to achieve unlink-ability of input and output address of transactions. Compared to existing schemes, our protocol improves practicality. The communication complexity of our protocol is linearly related to the number of peers. Moreover, our protocol is scalable as it works not only for Bitcoin, but also for other cryptocurrencies.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"39 6","pages":"17-22"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72470666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Supported Cooperative Work-The Journal of Collaborative Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1