首页 > 最新文献

Journal of Cloud Computing-Advances Systems and Applications最新文献

英文 中文
A New Multi-Feature Recommendation Model Based on Recurrent Neural Network 基于递归神经网络的多特征推荐模型
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00048
Benshan Mei, Lin Chen, Shao-Jie Sun, Pan-Yu Chen, Wei-Liang Huang
With the problems of handling single-feature and overlooking user preferences in the recommendation algorithms, this paper proposes a Recurrent Neural NetWork-based Multi-feature Hybrid Recommendation Model (RN-MHRM). Firstly, features are extracted from user-item interaction data using the Latent Factor Model (LFM), and an improved Recurrent Neural NetWork (RNN) is used to replace the linear inner product of LFM vectors With non-linearity, Which aims at learning richer features that capture user's short-term interests. Secondly, to avoid single-feature, item information is introduced and the BERT model is used for extracting multi-features. Thirdly, both short-term and long-term interests are considered, and the user's long-term interests are trained by a FeedforWard Neural NetWork (FNN), Which greatly improves the recommendation performance. Experiments designed on multiple real datasets have shown that RN-MHRM effectively improves recommendation performance compared to the baseline model.
针对推荐算法处理单一特征和忽略用户偏好的问题,提出了一种基于递归神经网络的多特征混合推荐模型(RN-MHRM)。首先,利用潜在因素模型(Latent Factor Model, LFM)从用户-物品交互数据中提取特征,并利用改进的递归神经网络(Recurrent Neural NetWork, RNN)将LFM向量的线性内积替换为非线性,从而学习更丰富的能够捕捉用户短期兴趣的特征;其次,为避免特征单一,引入项目信息,利用BERT模型提取多特征;再次,将用户的短期兴趣和长期兴趣结合起来,利用前馈神经网络(FeedforWard Neural NetWork, FNN)对用户的长期兴趣进行训练,大大提高了推荐性能。在多个真实数据集上设计的实验表明,与基线模型相比,RN-MHRM有效地提高了推荐性能。
{"title":"A New Multi-Feature Recommendation Model Based on Recurrent Neural Network","authors":"Benshan Mei, Lin Chen, Shao-Jie Sun, Pan-Yu Chen, Wei-Liang Huang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00048","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00048","url":null,"abstract":"With the problems of handling single-feature and overlooking user preferences in the recommendation algorithms, this paper proposes a Recurrent Neural NetWork-based Multi-feature Hybrid Recommendation Model (RN-MHRM). Firstly, features are extracted from user-item interaction data using the Latent Factor Model (LFM), and an improved Recurrent Neural NetWork (RNN) is used to replace the linear inner product of LFM vectors With non-linearity, Which aims at learning richer features that capture user's short-term interests. Secondly, to avoid single-feature, item information is introduced and the BERT model is used for extracting multi-features. Thirdly, both short-term and long-term interests are considered, and the user's long-term interests are trained by a FeedforWard Neural NetWork (FNN), Which greatly improves the recommendation performance. Experiments designed on multiple real datasets have shown that RN-MHRM effectively improves recommendation performance compared to the baseline model.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"52 1","pages":"235-240"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90661901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictable Track-based Routing in Flying Ad hoc Networks 飞行自组织网络中基于可预测轨迹的路由
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00028
Zhu Kai, Bao-kang Zhao, Qin Xin
Flying Ad-hoc network (FANETs), a new kind of mobile AD hoc network, uses the aircraft as the air wireless communication node to construct a network and achieve effective communication at the network layer as a result of the ongoing expansion of communication networks into many industries. However, the high dynamics, limited node energy, and low network density of the FANETs present significant challenges to the FANETs routing protocol, which requires urgent attention in terms of its design. In order to address the issues associated with the routing metric of the FANETs routing protocol, such as the underutilization of link information and the inadequate consideration of the motion of UAVs, which result in high network packet loss rates, unstable routing, and long route reconvergence times, this paper proposes the Predictable Track-based Routing Protocol (PTP). PTP divides the routing protocol into three stages: route establishment, data transmission, and route maintenance. PTP creatively suggests Node Stability Factors (NSF) for UAV in the route establishment stage and develops a Q-learning algorithm to maintain it in accordance with the status of the nodes and nearby nodes. NSF combined the link quality calculated by HELLO messages to generate a link quality based on Q-learning(LQQ) metric. After that, the optimal path from the source node to the destination node is calculated based on this metric. In the data transfer phase, data is transmitted through the routes calculated in the route establishment phase. Create a new HELLO message during the routing maintenance phase to learn the location of the neighbor node and the two-hop neighbor node, predict the node’s future location using the Kalman filter algorithm based on the node’s past location, and react quickly when the link is about to change. Compared to conventional approaches, experiments demonstrate that PTP may successfully raise the successful data delivery rate by 10% to 30%, increase the average route survival time by up to 60%, and cut the average route reconvergence time by up to 80%.
飞行自组网(Flying AD -hoc network, fanet)是一种新型的移动自组网,它利用飞机作为空中无线通信节点来构建网络,实现网络层的有效通信,是通信网络不断向多个行业扩展的结果。然而,FANETs的高动态性、有限的节点能量和低网络密度对FANETs路由协议提出了重大挑战,需要在其设计方面引起迫切的重视。针对FANETs路由协议的路由度量存在链路信息利用不足、无人机运动考虑不足等问题,导致网络丢包率高、路由不稳定、路由重新收敛时间长等问题,提出了基于可预测轨迹的路由协议(PTP)。PTP将路由协议分为路由建立、数据传输和路由维护三个阶段。PTP创造性地提出了无人机在航路建立阶段的节点稳定因子(NSF),并根据节点和附近节点的状态,开发了q -学习算法来维持NSF。NSF结合HELLO消息计算出的链路质量,生成基于Q-learning(LQQ)度量的链路质量。然后,根据该度量计算出从源节点到目的节点的最优路径。在数据传输阶段,数据通过路由建立阶段计算出的路由进行传输。在路由维护阶段创建新的HELLO消息,学习邻居节点和两跳邻居节点的位置,根据节点过去的位置使用卡尔曼滤波算法预测节点的未来位置,并在链路即将发生变化时快速反应。实验表明,与传统方法相比,PTP可以成功地将数据成功投递率提高10% ~ 30%,将平均路由生存时间提高60%,将平均路由重新收敛时间降低80%。
{"title":"Predictable Track-based Routing in Flying Ad hoc Networks","authors":"Zhu Kai, Bao-kang Zhao, Qin Xin","doi":"10.1109/CSCloud-EdgeCom58631.2023.00028","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00028","url":null,"abstract":"Flying Ad-hoc network (FANETs), a new kind of mobile AD hoc network, uses the aircraft as the air wireless communication node to construct a network and achieve effective communication at the network layer as a result of the ongoing expansion of communication networks into many industries. However, the high dynamics, limited node energy, and low network density of the FANETs present significant challenges to the FANETs routing protocol, which requires urgent attention in terms of its design. In order to address the issues associated with the routing metric of the FANETs routing protocol, such as the underutilization of link information and the inadequate consideration of the motion of UAVs, which result in high network packet loss rates, unstable routing, and long route reconvergence times, this paper proposes the Predictable Track-based Routing Protocol (PTP). PTP divides the routing protocol into three stages: route establishment, data transmission, and route maintenance. PTP creatively suggests Node Stability Factors (NSF) for UAV in the route establishment stage and develops a Q-learning algorithm to maintain it in accordance with the status of the nodes and nearby nodes. NSF combined the link quality calculated by HELLO messages to generate a link quality based on Q-learning(LQQ) metric. After that, the optimal path from the source node to the destination node is calculated based on this metric. In the data transfer phase, data is transmitted through the routes calculated in the route establishment phase. Create a new HELLO message during the routing maintenance phase to learn the location of the neighbor node and the two-hop neighbor node, predict the node’s future location using the Kalman filter algorithm based on the node’s past location, and react quickly when the link is about to change. Compared to conventional approaches, experiments demonstrate that PTP may successfully raise the successful data delivery rate by 10% to 30%, increase the average route survival time by up to 60%, and cut the average route reconvergence time by up to 80%.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"45 1","pages":"114-119"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82078062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System 基于价格意识的专车系统轨迹隐私保护
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00016
Sihui Jia, Saiqin Long, Z. Zheng, Qingyong Deng, Ping Wang, Shujuan Tian
With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work addressed the issue of the user’s initial and final location leakage and provided a strong utility guarantee in the RoD system. Further, the trajectory information is also important in the RoD system, it could contain a lot of private information about the user, such as health or identity, so it’s important to publish a distorted and productive trajectory. For this purpose, in this paper, we provide our trajectory protection method with pricing awareness based on previous work; the method uses supply and demand density function to guide the division of a discrete spatial grid, then uses the Markov chain to generate distorted trajectories on the grid to ensure trajectory continuity, and makes corresponding defenses against several attacks, such as Bayesian. The experiment results on real-world datasets prove the validity and robustness of the method.
随着随叫随到(RoD)系统的广泛使用,许多隐私问题暴露出来,人们越来越担心私人信息是否会泄露。对于这个问题,我们之前的工作解决了用户初始和最终位置泄漏的问题,并在RoD系统中提供了强有力的效用保障。此外,轨迹信息在RoD系统中也很重要,它可能包含许多关于用户的私人信息,例如健康或身份,因此发布扭曲的和富有成效的轨迹非常重要。为此,本文在前人工作的基础上,提出了具有定价意识的轨迹保护方法;该方法利用供需密度函数指导离散空间网格的划分,然后利用马尔可夫链在网格上生成扭曲轨迹以保证轨迹的连续性,并对贝叶斯等几种攻击进行相应的防御。在实际数据集上的实验结果证明了该方法的有效性和鲁棒性。
{"title":"Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System","authors":"Sihui Jia, Saiqin Long, Z. Zheng, Qingyong Deng, Ping Wang, Shujuan Tian","doi":"10.1109/CSCloud-EdgeCom58631.2023.00016","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00016","url":null,"abstract":"With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work addressed the issue of the user’s initial and final location leakage and provided a strong utility guarantee in the RoD system. Further, the trajectory information is also important in the RoD system, it could contain a lot of private information about the user, such as health or identity, so it’s important to publish a distorted and productive trajectory. For this purpose, in this paper, we provide our trajectory protection method with pricing awareness based on previous work; the method uses supply and demand density function to guide the division of a discrete spatial grid, then uses the Markov chain to generate distorted trajectories on the grid to ensure trajectory continuity, and makes corresponding defenses against several attacks, such as Bayesian. The experiment results on real-world datasets prove the validity and robustness of the method.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"60 1","pages":"37-45"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85627610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prediction Based Resource Reservation Algorithm for Service Handover in Edge Computing 边缘计算中基于预测的服务切换资源预留算法
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00063
Peiyuan Guan, Yushuai Li, Amirhosein Taherkordi
Handover is a crucial issue in ensuring the continuity of edge services in edge computing (EC) systems. Failure to handle hand-off properly may result in delays, data loss, or service interruption during service switching. Therefore, optimizing the hand-off process to ensure service continuity and satisfactory user experience is a significant challenge in the design of edge computing systems. In this paper, we propose a resource reservation algorithm that reserves a portion of computing resources in each base station to meet quality of service (QoS) requirements during service switching. We use an LSTM model to predict the number of new and existing users at a future time point to provide decision guidance for the resource reservation algorithm. Extensive simulation experiments demonstrate that the proposed algorithm outperforms the benchmark algorithms in a variety of environmental conditions.
在边缘计算系统中,切换是保证边缘服务连续性的关键问题。在业务切换过程中,如果处理不当,可能会导致业务切换延迟、数据丢失或业务中断。因此,优化交接过程以确保服务连续性和满意的用户体验是边缘计算系统设计中的一个重大挑战。本文提出了一种资源预留算法,该算法在每个基站保留一部分计算资源,以满足业务切换时的服务质量(QoS)要求。我们使用LSTM模型来预测未来时间点的新用户和现有用户的数量,为资源预留算法提供决策指导。大量的仿真实验表明,该算法在各种环境条件下都优于基准算法。
{"title":"A Prediction Based Resource Reservation Algorithm for Service Handover in Edge Computing","authors":"Peiyuan Guan, Yushuai Li, Amirhosein Taherkordi","doi":"10.1109/CSCloud-EdgeCom58631.2023.00063","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00063","url":null,"abstract":"Handover is a crucial issue in ensuring the continuity of edge services in edge computing (EC) systems. Failure to handle hand-off properly may result in delays, data loss, or service interruption during service switching. Therefore, optimizing the hand-off process to ensure service continuity and satisfactory user experience is a significant challenge in the design of edge computing systems. In this paper, we propose a resource reservation algorithm that reserves a portion of computing resources in each base station to meet quality of service (QoS) requirements during service switching. We use an LSTM model to predict the number of new and existing users at a future time point to provide decision guidance for the resource reservation algorithm. Extensive simulation experiments demonstrate that the proposed algorithm outperforms the benchmark algorithms in a variety of environmental conditions.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"99 1","pages":"330-335"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73451820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quarks: A Secure and Decentralized Blockchain-Based Messaging Network 夸克:一个安全和分散的基于区块链的消息传递网络
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00053
M. K. B. Shuhan, Tariqul Islam, Enam A. Shuvo, Faisal Haque Bappy, Kamrul Hasan, Carlos Caicedo
Over the past two decades, the popularity of messaging systems has increased both in enterprise and consumer level. Many of these systems used secure protocols like end-to-end encryption to ensure strong security features such as “future secrecy” for one-to-one communication. However, the majority of them rely on centralized servers owned by big IT companies, which allows them to use their users’ personal data. Also it allows the government to track and regulate their citizens’ activities, which poses significant threats to “digital freedom”. Also, these systems have failed to achieve security attributes like confidentiality, integrity, privacy, and future secrecy for group communications. In this paper, we present a novel blockchain-based secure messaging system named Quarks that overcomes the security pitfalls of the existing systems and eliminates the centralized control. We have analyzed our design of the system with security models and definitions from existing literature to demonstrate the system’s reliability and usability. We have developed a Proof of Concept (PoC) of the Quarks system leveraging Distributed Ledger Technology (DLT), and conducted load testing on that. We noticed that our PoC system achieves all the desired attributes that are prevalent in a traditional centralized messaging scheme despite the limited capacity of the development and testing environment. Therefore, this assures us the applicability of such systems in near future if scaled up properly.
在过去的二十年中,消息传递系统在企业和消费者层面的普及程度都有所提高。许多这样的系统使用安全协议,如端到端加密,以确保强大的安全特性,如一对一通信的“未来保密”。然而,它们中的大多数依赖于大型IT公司拥有的集中式服务器,这些服务器允许它们使用用户的个人数据。此外,它还允许政府跟踪和监管公民的活动,这对“数字自由”构成了重大威胁。此外,这些系统无法实现组通信的机密性、完整性、隐私性和未来保密性等安全属性。在本文中,我们提出了一种新的基于区块链的安全消息传递系统,名为Quarks,它克服了现有系统的安全缺陷,消除了集中控制。我们用现有文献中的安全模型和定义分析了我们的系统设计,以证明系统的可靠性和可用性。我们利用分布式账本技术(DLT)开发了Quarks系统的概念验证(PoC),并对其进行了负载测试。我们注意到,尽管开发和测试环境的容量有限,我们的PoC系统实现了传统集中式消息传递方案中普遍存在的所有所需属性。因此,如果适当扩大规模,这保证了我们在不久的将来这种系统的适用性。
{"title":"Quarks: A Secure and Decentralized Blockchain-Based Messaging Network","authors":"M. K. B. Shuhan, Tariqul Islam, Enam A. Shuvo, Faisal Haque Bappy, Kamrul Hasan, Carlos Caicedo","doi":"10.1109/CSCloud-EdgeCom58631.2023.00053","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00053","url":null,"abstract":"Over the past two decades, the popularity of messaging systems has increased both in enterprise and consumer level. Many of these systems used secure protocols like end-to-end encryption to ensure strong security features such as “future secrecy” for one-to-one communication. However, the majority of them rely on centralized servers owned by big IT companies, which allows them to use their users’ personal data. Also it allows the government to track and regulate their citizens’ activities, which poses significant threats to “digital freedom”. Also, these systems have failed to achieve security attributes like confidentiality, integrity, privacy, and future secrecy for group communications. In this paper, we present a novel blockchain-based secure messaging system named Quarks that overcomes the security pitfalls of the existing systems and eliminates the centralized control. We have analyzed our design of the system with security models and definitions from existing literature to demonstrate the system’s reliability and usability. We have developed a Proof of Concept (PoC) of the Quarks system leveraging Distributed Ledger Technology (DLT), and conducted load testing on that. We noticed that our PoC system achieves all the desired attributes that are prevalent in a traditional centralized messaging scheme despite the limited capacity of the development and testing environment. Therefore, this assures us the applicability of such systems in near future if scaled up properly.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"2 1","pages":"268-274"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87916950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery NAS-YOLOX:基于改进的YOLOX SAR图像的船舶检测
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00030
Hao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang, Yuan Fan, Yachao Zhou
Synthetic aperture radar (SAR) satellites can provide microwave remote sensing images that are not limited by weather and light, so they are widely used in the field of ocean monitoring. The current SAR ship detection method based on deep learning (DL) is difficult to more effectively fuse complex features, which leads to low detection accuracy of target ships and even missed or false detections. In order to solve this problem, this paper proposes an improved YOLOX-based SAR image ship detection method, called NAS-YOLOX. Based on the YOLOX algorithm, path aggregation feature pyramid network (PAFPN) is replaced by a neural architecture search - feature fusion network (NAS-FPN) to enhance the cross-scale fusion ability of the proposed model. And a dilated convolution feature enhancement module (DFEM) is also designed and embedded into the backbone network to boost the network receptive field and the ability to extract target information. Furthermore, a multi-scale channel-spatial attention (MCSA) is proposed to improve the attention to key areas of the ship. The experimental results on the HRSID public data set show that the AP0.5 of NAS-YOLOX is 6.3% higher than that of the YOLOX model. Compared with other ten mainstream target detection algorithms, NAS-YOLOX has also achieved excellent detection result.
合成孔径雷达(SAR)卫星可以提供不受天气和光照限制的微波遥感图像,因此在海洋监测领域得到了广泛的应用。目前基于深度学习(DL)的SAR船舶检测方法难以更有效地融合复杂特征,导致目标船舶的检测精度较低,甚至出现漏检或误检。为了解决这一问题,本文提出了一种改进的基于yolox的SAR图像舰船检测方法,称为NAS-YOLOX。在YOLOX算法的基础上,将路径聚合特征金字塔网络(PAFPN)替换为神经结构搜索特征融合网络(NAS-FPN),增强了模型的跨尺度融合能力。设计了扩展卷积特征增强模块(expanded convolution feature enhancement module, DFEM),并将其嵌入到骨干网络中,以增强网络的接收场和目标信息的提取能力。在此基础上,提出了一种多尺度通道空间注意力(MCSA)方法,提高了对船舶关键区域的注意力。在HRSID公共数据集上的实验结果表明,NAS-YOLOX模型的AP0.5比YOLOX模型高6.3%。与其他十种主流目标检测算法相比,NAS-YOLOX也取得了优异的检测效果。
{"title":"NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery","authors":"Hao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang, Yuan Fan, Yachao Zhou","doi":"10.1109/CSCloud-EdgeCom58631.2023.00030","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00030","url":null,"abstract":"Synthetic aperture radar (SAR) satellites can provide microwave remote sensing images that are not limited by weather and light, so they are widely used in the field of ocean monitoring. The current SAR ship detection method based on deep learning (DL) is difficult to more effectively fuse complex features, which leads to low detection accuracy of target ships and even missed or false detections. In order to solve this problem, this paper proposes an improved YOLOX-based SAR image ship detection method, called NAS-YOLOX. Based on the YOLOX algorithm, path aggregation feature pyramid network (PAFPN) is replaced by a neural architecture search - feature fusion network (NAS-FPN) to enhance the cross-scale fusion ability of the proposed model. And a dilated convolution feature enhancement module (DFEM) is also designed and embedded into the backbone network to boost the network receptive field and the ability to extract target information. Furthermore, a multi-scale channel-spatial attention (MCSA) is proposed to improve the attention to key areas of the ship. The experimental results on the HRSID public data set show that the AP0.5 of NAS-YOLOX is 6.3% higher than that of the YOLOX model. Compared with other ten mainstream target detection algorithms, NAS-YOLOX has also achieved excellent detection result.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"10 1","pages":"126-131"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86147868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient and Privacy preserving Computation Framework for Tibetan medicine 一种高效且保护隐私的藏药计算框架
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00018
Ruoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu
With the continuous development of Tibetan medicine, using machine learning technology to enhance the value of Tibetan medical data has become very important. However, the concerns of Tibetan medical institutions about data leakage have hindered the sharing of Tibetan medical data. Therefore, in this paper, we propose a privacy preserving computation framework based on dual servers. Our framework can securely store Tibetan medical data on cloud servers. The secure computation (such as machine learning training or machine learning prediction) is performed by cloud servers without compromising data. On the premise of ensuring data security, we combine the multi-key homomorphic encryption and secret sharing to design some secure building blocks. Through the security analysis and performance evaluation, our proposed scheme is efficient and practical.
随着藏医药的不断发展,利用机器学习技术提升藏医数据的价值变得非常重要。然而,藏医机构对数据泄露的担忧阻碍了藏医数据的共享。因此,本文提出了一种基于双服务器的隐私保护计算框架。我们的框架可以在云服务器上安全地存储藏医数据。安全计算(如机器学习训练或机器学习预测)由云服务器执行,而不会损害数据。在保证数据安全的前提下,我们将多密钥同态加密和秘密共享相结合,设计了一些安全的构件。通过安全性分析和性能评估,证明了该方案的有效性和实用性。
{"title":"An Efficient and Privacy preserving Computation Framework for Tibetan medicine","authors":"Ruoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu","doi":"10.1109/CSCloud-EdgeCom58631.2023.00018","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00018","url":null,"abstract":"With the continuous development of Tibetan medicine, using machine learning technology to enhance the value of Tibetan medical data has become very important. However, the concerns of Tibetan medical institutions about data leakage have hindered the sharing of Tibetan medical data. Therefore, in this paper, we propose a privacy preserving computation framework based on dual servers. Our framework can securely store Tibetan medical data on cloud servers. The secure computation (such as machine learning training or machine learning prediction) is performed by cloud servers without compromising data. On the premise of ensuring data security, we combine the multi-key homomorphic encryption and secret sharing to design some secure building blocks. Through the security analysis and performance evaluation, our proposed scheme is efficient and practical.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"6 1","pages":"53-58"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74628181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Committee Members - CSCloud 2023 委员会成员- CSCloud 2023
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00007
{"title":"Committee Members - CSCloud 2023","authors":"","doi":"10.1109/cscloud-edgecom58631.2023.00007","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00007","url":null,"abstract":"","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"9 1","pages":""},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74565115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Emotion Recognition based on Semi-Supervised Adversarial Variational Autoencoder 基于半监督对抗变分自编码器的语音情感识别
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00054
Yufeng Xiao, Yuqin Bo, Zhiling Zheng
The application of semi-supervised learning in the field of speech emotion recognition can alleviate the problem of dependence on the amount of labeled data. Its core assumption is that the labeled and unlabeled data have the same feature representations, which determine the performance of the models. Therefore, this paper proposes a novel speech emotion recognition model based on semi-supervised adversarial variational autoencoding (SSAVAE), which reaps the advantages of generative adversarial network(GAN) and variational autoencoding(VAE) to learn the distribution of input data in the feature space. On the one hand, it can overcome the disturbance of the input data through learning the distribution of the input data in the feature space. On the other hand, it can approximate arbitrary feature distribution by introducing GAN. Concretely, SSAVAE considers the unlabeled data as the problem of the lack of emotional label attributes. The labeled data share the category information with the unlabeled data in the feature space. Several experiments are conducted on the FAU Aibo dataset to evaluate the effectiveness of the algorithm. The results show that the proposed method is superior to other benchmark algorithms and has strong feature learning capabilities.
半监督学习在语音情感识别领域的应用,可以缓解对标注数据量的依赖问题。它的核心假设是标记和未标记的数据具有相同的特征表示,这决定了模型的性能。为此,本文提出了一种基于半监督对抗变分自编码(SSAVAE)的语音情感识别模型,该模型利用生成对抗网络(GAN)和变分自编码(VAE)的优势,学习输入数据在特征空间中的分布。一方面,它可以通过学习输入数据在特征空间中的分布来克服输入数据的干扰;另一方面,它可以通过引入GAN近似任意特征分布。具体而言,SSAVAE将未标记数据视为缺乏情感标签属性的问题。标记的数据与特征空间中未标记的数据共享类别信息。在FAU Aibo数据集上进行了多次实验,以评估该算法的有效性。结果表明,该方法优于其他基准算法,具有较强的特征学习能力。
{"title":"Speech Emotion Recognition based on Semi-Supervised Adversarial Variational Autoencoder","authors":"Yufeng Xiao, Yuqin Bo, Zhiling Zheng","doi":"10.1109/CSCloud-EdgeCom58631.2023.00054","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00054","url":null,"abstract":"The application of semi-supervised learning in the field of speech emotion recognition can alleviate the problem of dependence on the amount of labeled data. Its core assumption is that the labeled and unlabeled data have the same feature representations, which determine the performance of the models. Therefore, this paper proposes a novel speech emotion recognition model based on semi-supervised adversarial variational autoencoding (SSAVAE), which reaps the advantages of generative adversarial network(GAN) and variational autoencoding(VAE) to learn the distribution of input data in the feature space. On the one hand, it can overcome the disturbance of the input data through learning the distribution of the input data in the feature space. On the other hand, it can approximate arbitrary feature distribution by introducing GAN. Concretely, SSAVAE considers the unlabeled data as the problem of the lack of emotional label attributes. The labeled data share the category information with the unlabeled data in the feature space. Several experiments are conducted on the FAU Aibo dataset to evaluate the effectiveness of the algorithm. The results show that the proposed method is superior to other benchmark algorithms and has strong feature learning capabilities.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"1 1","pages":"275-280"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88627494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Blockchain-based Privacy Computing Research 基于区块链的隐私计算研究综述
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00049
Yang Yang, Kai Jin, Wei Liang, Yaqin Liu, Yuhui Li, Osama Hosam
Blockchain technology offers unique advantages in terms of decentralization, transparency, and de-anonymization. However, it also poses challenges to user anonymity and data privacy protection. Consequently, researchers have employed advanced cryptographic primitives to enhance the privacy and anonymity of blockchain-based privacy payments, as well as to extend privacy payment methods to more general forms of privacy computing. Nevertheless, relying on high-level cryptographic primitives and emerging technologies, these solutions have proven challenging for academic and industrial personnel to understand and apply. Therefore, we introduce the principle mechanisms of zero-knowledge proofs and homomorphic encryption and their typical algorithms, analyze and summarize recent research in blockchain privacy computing across several dimensions, and briefly present their potential applications.
区块链技术在去中心化、透明度和去匿名化方面提供了独特的优势。然而,它也对用户匿名性和数据隐私保护提出了挑战。因此,研究人员采用了先进的加密原语来增强基于区块链的隐私支付的隐私性和匿名性,并将隐私支付方法扩展到更一般的隐私计算形式。然而,这些解决方案依赖于高级加密原语和新兴技术,对于学术和工业人员来说,理解和应用这些解决方案具有挑战性。因此,我们介绍了零知识证明和同态加密的基本机制及其典型算法,从多个维度分析和总结了区块链隐私计算的最新研究,并简要介绍了它们的潜在应用。
{"title":"A Review of Blockchain-based Privacy Computing Research","authors":"Yang Yang, Kai Jin, Wei Liang, Yaqin Liu, Yuhui Li, Osama Hosam","doi":"10.1109/CSCloud-EdgeCom58631.2023.00049","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00049","url":null,"abstract":"Blockchain technology offers unique advantages in terms of decentralization, transparency, and de-anonymization. However, it also poses challenges to user anonymity and data privacy protection. Consequently, researchers have employed advanced cryptographic primitives to enhance the privacy and anonymity of blockchain-based privacy payments, as well as to extend privacy payment methods to more general forms of privacy computing. Nevertheless, relying on high-level cryptographic primitives and emerging technologies, these solutions have proven challenging for academic and industrial personnel to understand and apply. Therefore, we introduce the principle mechanisms of zero-knowledge proofs and homomorphic encryption and their typical algorithms, analyze and summarize recent research in blockchain privacy computing across several dimensions, and briefly present their potential applications.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"9 1","pages":"241-246"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84287580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing-Advances Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1