首页 > 最新文献

Journal of Cloud Computing-Advances Systems and Applications最新文献

英文 中文
Optimized Random Forest for DDoS Attack Detection in SDN Environment SDN环境下针对DDoS攻击检测的优化随机森林
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00021
Zhaohui Ma, Jie Zhang, Mingdong Tang
Software Defined Network (SDN) is a new type of network architecture that realizes network virtualization, with the characteristics of the control and forwarding separation, open programming, centralized control, and its flexibility is more suitable for the current complex and changeable network environment. However, due to its centralized control characteristics, the controller is faced with a huge risk of being subjected to distributed denial of service (DDoS) attacks that will cause the entire network to be paralyzed. Therefore, the detection of DDoS attacks in SDN networks has become the research direction of many scholars. so an algorithm for detecting DDoS attacks in SDN networks using optimizing RFs is proposed. By selecting the appropriate traffic features, creating the traffic dataset in the SDN environment, and using the dataset to optimize the model parameters, the attack detection model is constructed, and the final detection algorithm is as accurate as 99.98% for the collected dataset, which is more accurate and efficient than the common machine learning algorithms such as SVC and KNN.
软件定义网络(Software Defined Network, SDN)是一种实现网络虚拟化的新型网络架构,具有控制与转发分离、开放编程、集中控制等特点,其灵活性更适合当前复杂多变的网络环境。然而,由于其集中控制的特点,控制器面临着遭受分布式拒绝服务攻击的巨大风险,这将导致整个网络瘫痪。因此,SDN网络中DDoS攻击的检测成为众多学者的研究方向。为此,提出了一种基于优化RFs的SDN网络DDoS攻击检测算法。通过选择合适的流量特征,在SDN环境下创建流量数据集,并利用数据集对模型参数进行优化,构建攻击检测模型,最终对采集到的数据集检测算法准确率高达99.98%,比常用的SVC、KNN等机器学习算法准确率更高、效率更高。
{"title":"Optimized Random Forest for DDoS Attack Detection in SDN Environment","authors":"Zhaohui Ma, Jie Zhang, Mingdong Tang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00021","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00021","url":null,"abstract":"Software Defined Network (SDN) is a new type of network architecture that realizes network virtualization, with the characteristics of the control and forwarding separation, open programming, centralized control, and its flexibility is more suitable for the current complex and changeable network environment. However, due to its centralized control characteristics, the controller is faced with a huge risk of being subjected to distributed denial of service (DDoS) attacks that will cause the entire network to be paralyzed. Therefore, the detection of DDoS attacks in SDN networks has become the research direction of many scholars. so an algorithm for detecting DDoS attacks in SDN networks using optimizing RFs is proposed. By selecting the appropriate traffic features, creating the traffic dataset in the SDN environment, and using the dataset to optimize the model parameters, the attack detection model is constructed, and the final detection algorithm is as accurate as 99.98% for the collected dataset, which is more accurate and efficient than the common machine learning algorithms such as SVC and KNN.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"14 1","pages":"72-77"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87782904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multivariate Time Series Anomaly Detection with Improved Encoder-Decoder Based Model 基于改进编码器-解码器模型的多变量时间序列异常检测
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00036
Jing Long, Cuiting Luo, Ruxin Chen
The ubiquitous use of real-time sensors in the Internet-of-Things (IoT) has brought great convenience to data collection. Moreover, sensor anomalies generated by external factors or malicious attacks pose a critical threat to the security of the IoT. Detecting anomalies in multivariate time series has become one of the significant issues in Io T security research. Most existing time series anomaly detection methods, however, merely consider time and space complexity, without taking into account the distance metrics among time series data, which leads inevitably to the model’s insufficient ability to accurately recognize anomalies. This investigation proposes a new hybrid model based on encoder-decoder architecture for time series anomaly detection. This model designs a multi-dimensional feature embedding module to enable utilize more interrelated features. Meanwhile, the relationships between sensors are explicitly learned by using a graph structure and reconstruct the nodes vectors by using a message propagation mechanism with a specific sampling strategy in this model. On this basis, a data fusion method based on the multi-head self-attention mechanism which effectively integrates various information such as time, variables, positional relationships, and distance metrics is designed for capturing global feature information. The experimental results on the dataset SWAT show that, compared with the state-of-the-arts, the proposed approach improves the Recall and F1-score metrics of anomaly detection performance by 8.2% and 5.0% respectively.
实时传感器在物联网(IoT)中的广泛应用为数据采集带来了极大的便利。此外,由于外部因素或恶意攻击而产生的传感器异常对物联网的安全构成了严重威胁。多变量时间序列异常检测已成为物联网安全研究的重要课题之一。然而,现有的时间序列异常检测方法大多只考虑时间和空间的复杂性,而没有考虑时间序列数据之间的距离度量,这必然导致模型对异常的准确识别能力不足。提出了一种基于编码器-解码器结构的时间序列异常检测混合模型。该模型设计了一个多维特征嵌入模块,可以利用更多的相互关联的特征。同时,该模型利用图结构显式学习传感器之间的关系,并利用具有特定采样策略的消息传播机制重构节点向量。在此基础上,设计了一种基于多头自关注机制的数据融合方法,有效整合时间、变量、位置关系、距离度量等多种信息,实现全局特征信息的捕获。在SWAT数据集上的实验结果表明,与目前的方法相比,该方法的异常检测召回率和f1得分指标分别提高了8.2%和5.0%。
{"title":"Multivariate Time Series Anomaly Detection with Improved Encoder-Decoder Based Model","authors":"Jing Long, Cuiting Luo, Ruxin Chen","doi":"10.1109/CSCloud-EdgeCom58631.2023.00036","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00036","url":null,"abstract":"The ubiquitous use of real-time sensors in the Internet-of-Things (IoT) has brought great convenience to data collection. Moreover, sensor anomalies generated by external factors or malicious attacks pose a critical threat to the security of the IoT. Detecting anomalies in multivariate time series has become one of the significant issues in Io T security research. Most existing time series anomaly detection methods, however, merely consider time and space complexity, without taking into account the distance metrics among time series data, which leads inevitably to the model’s insufficient ability to accurately recognize anomalies. This investigation proposes a new hybrid model based on encoder-decoder architecture for time series anomaly detection. This model designs a multi-dimensional feature embedding module to enable utilize more interrelated features. Meanwhile, the relationships between sensors are explicitly learned by using a graph structure and reconstruct the nodes vectors by using a message propagation mechanism with a specific sampling strategy in this model. On this basis, a data fusion method based on the multi-head self-attention mechanism which effectively integrates various information such as time, variables, positional relationships, and distance metrics is designed for capturing global feature information. The experimental results on the dataset SWAT show that, compared with the state-of-the-arts, the proposed approach improves the Recall and F1-score metrics of anomaly detection performance by 8.2% and 5.0% respectively.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"4 1","pages":"161-166"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75587727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MobileNetV3-YOLOv5-based Network Model for Pedestrian Detection 基于mobilenetv3 - yolov5的行人检测网络模型
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00033
Xiai Yan, Shengkai Ding, Weiqi Shi
To solve the problem of pedestrian scale change, overlap, and occlusion under different cameras, we use the YOLOv5-based pedestrian detection algorithm which is more insensitive to target size, more real-time, and better on the ground. We also use MobileNetV3 as the backbone of YOLOv5 for the problems of weaker robustness and heavier network of YOLOv5. To improve the performance of the pedestrian detection algorithm, we also use a larger and more accurate home-grown dataset, SmartJW, to train and test the algorithm. This paper collects a dataset containing pedestrian images in various real-world scenarios through a dedicated video network in a region of Hunan. The dataset includes images of pedestrians at different times of day, in different weather, locations, and lighting conditions. In addition, to have faster detection speed and higher detection accuracy, we use an efficient and accurate target detection algorithm, YOLOv5. We use YOLOv5’s small network as the base framework of our pedestrian detection algorithm, based on which we make improvements to YOLOv5’s Backbone to obtain the MobileNetV3-YOLOv5 network, replacing the CSPNet with the MobileNetV3-large network. And finally trained and tested on our homemade dataset SmartJW. The results showed that we reached 0.983 for the mAP@0.5 and 0.728 for the mAP@0.5:0.95.
为了解决不同摄像机下行人尺度变化、重叠、遮挡等问题,我们采用了基于yolov5的行人检测算法,该算法对目标大小不敏感,实时性更好,地面效果更好。针对YOLOv5鲁棒性较弱、网络较重的问题,我们也采用了MobileNetV3作为YOLOv5的主干。为了提高行人检测算法的性能,我们还使用了一个更大、更准确的国产数据集SmartJW来训练和测试算法。本文通过湖南某地区的专用视频网络收集了包含各种现实场景行人图像的数据集。该数据集包括一天中不同时间、不同天气、位置和照明条件下的行人图像。此外,为了更快的检测速度和更高的检测精度,我们使用了高效准确的目标检测算法YOLOv5。我们以YOLOv5的小型网络作为行人检测算法的基础框架,在此基础上对YOLOv5的骨干网络进行改进,得到MobileNetV3-YOLOv5网络,用mobilenetv3 -大型网络代替CSPNet。最后在我们自制的数据集SmartJW上进行训练和测试。结果表明,我们达到0.983的mAP@0.5和0.728的mAP@0.5:0.95。
{"title":"MobileNetV3-YOLOv5-based Network Model for Pedestrian Detection","authors":"Xiai Yan, Shengkai Ding, Weiqi Shi","doi":"10.1109/cscloud-edgecom58631.2023.00033","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00033","url":null,"abstract":"To solve the problem of pedestrian scale change, overlap, and occlusion under different cameras, we use the YOLOv5-based pedestrian detection algorithm which is more insensitive to target size, more real-time, and better on the ground. We also use MobileNetV3 as the backbone of YOLOv5 for the problems of weaker robustness and heavier network of YOLOv5. To improve the performance of the pedestrian detection algorithm, we also use a larger and more accurate home-grown dataset, SmartJW, to train and test the algorithm. This paper collects a dataset containing pedestrian images in various real-world scenarios through a dedicated video network in a region of Hunan. The dataset includes images of pedestrians at different times of day, in different weather, locations, and lighting conditions. In addition, to have faster detection speed and higher detection accuracy, we use an efficient and accurate target detection algorithm, YOLOv5. We use YOLOv5’s small network as the base framework of our pedestrian detection algorithm, based on which we make improvements to YOLOv5’s Backbone to obtain the MobileNetV3-YOLOv5 network, replacing the CSPNet with the MobileNetV3-large network. And finally trained and tested on our homemade dataset SmartJW. The results showed that we reached 0.983 for the mAP@0.5 and 0.728 for the mAP@0.5:0.95.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"31 1","pages":"144-149"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72559031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Application of Generative Adversarial Neural Network in Image Restoration 生成对抗神经网络在图像恢复中的应用研究
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00056
Yin'e Zhang, Xiaowen Ye, Qi Zhou
In recent years, more and more researchers use deep learning to process inpainting tasks. Among them, the use of generation countermeasure network to process inpainting tasks has become more and more popular and has achieved good results. However, there are still issues with blurry repair results and unsmooth structure. In this paper, we propose a method of inpainting based on u-net structure for generation adversarial network, the first two layers of our encoder use multi-scale shallow feature extraction modules (MSFEM) to extract lowdimensional texture and structural information. We introduce multi-scale spatial attention module (MSAM) into skip connections to obtain more shallow features and improve repair performance. The decoder uses improved dense convolutional blocks to fully utilize and extract feature information. The experiment used two datasets, CelebA and Palace2, through experiments, the repair effect of our proposed method is better than the state-of-the-art image inpainting approaches.
近年来,越来越多的研究人员使用深度学习来处理喷漆任务。其中,利用生成对抗网络处理喷漆任务已经越来越流行,并取得了良好的效果。然而,仍然存在修复结果模糊和结构不光滑的问题。在本文中,我们提出了一种基于u-net结构的生成对抗网络的方法,我们的编码器的前两层使用多尺度浅层特征提取模块(MSFEM)来提取低维纹理和结构信息。在跳接中引入多尺度空间注意模块(MSAM),以获得更浅层的特征,提高修复性能。解码器采用改进的密集卷积块,充分利用和提取特征信息。实验使用了CelebA和Palace2两个数据集,通过实验,我们提出的方法的修复效果优于目前最先进的图像修复方法。
{"title":"Research on Application of Generative Adversarial Neural Network in Image Restoration","authors":"Yin'e Zhang, Xiaowen Ye, Qi Zhou","doi":"10.1109/CSCloud-EdgeCom58631.2023.00056","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00056","url":null,"abstract":"In recent years, more and more researchers use deep learning to process inpainting tasks. Among them, the use of generation countermeasure network to process inpainting tasks has become more and more popular and has achieved good results. However, there are still issues with blurry repair results and unsmooth structure. In this paper, we propose a method of inpainting based on u-net structure for generation adversarial network, the first two layers of our encoder use multi-scale shallow feature extraction modules (MSFEM) to extract lowdimensional texture and structural information. We introduce multi-scale spatial attention module (MSAM) into skip connections to obtain more shallow features and improve repair performance. The decoder uses improved dense convolutional blocks to fully utilize and extract feature information. The experiment used two datasets, CelebA and Palace2, through experiments, the repair effect of our proposed method is better than the state-of-the-art image inpainting approaches.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"79 1","pages":"287-291"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77663978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review on Detection of Manipulated Satellite Images 人造卫星图像检测系统综述
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00011
Yuchen Nie, Xiangling Ding, Wenyi Zhu, Yulin Zhao
The widespread use of image editing software and the development of image processing technology have made manipulated images very easy. Image forgery, especially in remote sensing satellite images, may bring incalculable and serious consequences, which makes researchers focus on how to verify the integrity of remote sensing images. This paper introduces remote sensing images and manipulating operations in remote sensing images, mainly splicing operations. After that, we discuss methods in depth for detecting and locating manipulation in remote sensing images in recent years. The generative model reflects its unparalleled advantages in these methods. Finally, the future development direction is prospected.
图像编辑软件的广泛使用和图像处理技术的发展使得对图像的处理变得非常容易。图像伪造,特别是遥感卫星图像的伪造,可能带来难以估量的严重后果,如何验证遥感图像的完整性成为研究人员关注的焦点。本文介绍了遥感图像和遥感图像中的操纵操作,主要是拼接操作。在此基础上,深入讨论了近年来遥感图像中检测和定位操作的方法。生成模型在这些方法中体现了其无可比拟的优势。最后,展望了未来的发展方向。
{"title":"A Systematic Review on Detection of Manipulated Satellite Images","authors":"Yuchen Nie, Xiangling Ding, Wenyi Zhu, Yulin Zhao","doi":"10.1109/CSCloud-EdgeCom58631.2023.00011","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00011","url":null,"abstract":"The widespread use of image editing software and the development of image processing technology have made manipulated images very easy. Image forgery, especially in remote sensing satellite images, may bring incalculable and serious consequences, which makes researchers focus on how to verify the integrity of remote sensing images. This paper introduces remote sensing images and manipulating operations in remote sensing images, mainly splicing operations. After that, we discuss methods in depth for detecting and locating manipulation in remote sensing images in recent years. The generative model reflects its unparalleled advantages in these methods. Finally, the future development direction is prospected.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"18 1","pages":"6-11"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75340339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE 基于环面FHE的快速算法增强机器学习的隐私性
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00017
Marc Titus Trifan, Alexandru Nicolau, A. Veidenbaum
The increased popularity of Machine Learning as a Service (MLaaS) makes the privacy of user data and network weights a critical concern. Using Torus FHE (TFHE) [1] offers a solution for privacy-preserving computation in a cloud environment by allowing computation directly over encrypted data. However, software TFHE implementations of cyphertext-cyphertext multiplication needed when both input data and weights are encrypted are either lacking or are too slow. This paper proposes a new way to improve the performance of such multiplication by applying carry save addition. Its theoretical speedup is proportional to the bit width of the plaintext integer operands. This also speeds up multi-operand summation. A speedup of 15x is obtained for 16-bit multiplication on a 64-core processor, when compared to previous results. Multiplication also becomes more than twice as fast on a GPU if our approach is utilized. This leads to much faster dot product and convolution computations, which combine multiplications and a multi-operand sum. A 45x speedup is achieved for a 16-bit, 32element dot product and $mathrm{a}sim 30mathrm{x}$ speedup for a convolution with a 32x32 filter size.
机器学习即服务(MLaaS)的日益普及使得用户数据和网络权重的隐私成为一个关键问题。使用Torus FHE (TFHE)[1]通过允许直接在加密数据上进行计算,为云环境中的隐私保护计算提供了一种解决方案。然而,当输入数据和权值都加密时,需要的密文-密文乘法的软件TFHE实现要么缺乏,要么太慢。本文提出了一种利用进位节省加法来提高这种乘法运算性能的新方法。它的理论加速与明文整数操作数的位宽成正比。这也加快了多操作数求和的速度。与之前的结果相比,在64核处理器上进行16位乘法运算获得了15倍的加速。如果使用我们的方法,乘法运算在GPU上的速度也会提高两倍以上。这导致了更快的点积和卷积计算,它们结合了乘法和多操作数求和。对于16位,32元素的点积实现了45倍的加速,对于32 × 32滤波器大小的卷积实现了30倍的加速。
{"title":"Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE","authors":"Marc Titus Trifan, Alexandru Nicolau, A. Veidenbaum","doi":"10.1109/CSCloud-EdgeCom58631.2023.00017","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00017","url":null,"abstract":"The increased popularity of Machine Learning as a Service (MLaaS) makes the privacy of user data and network weights a critical concern. Using Torus FHE (TFHE) [1] offers a solution for privacy-preserving computation in a cloud environment by allowing computation directly over encrypted data. However, software TFHE implementations of cyphertext-cyphertext multiplication needed when both input data and weights are encrypted are either lacking or are too slow. This paper proposes a new way to improve the performance of such multiplication by applying carry save addition. Its theoretical speedup is proportional to the bit width of the plaintext integer operands. This also speeds up multi-operand summation. A speedup of 15x is obtained for 16-bit multiplication on a 64-core processor, when compared to previous results. Multiplication also becomes more than twice as fast on a GPU if our approach is utilized. This leads to much faster dot product and convolution computations, which combine multiplications and a multi-operand sum. A 45x speedup is achieved for a 16-bit, 32element dot product and $mathrm{a}sim 30mathrm{x}$ speedup for a convolution with a 32x32 filter size.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"39 1","pages":"46-52"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78815795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Apriori Algorithm Based on Transaction Sequence Counting 一种基于事务序列计数的改进Apriori算法
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00041
Zuoting Ning, Zihua Ouyang, Xiangcheng Deng
Apriori algorithm has the advantages of simplicity and easy realization, which can realize the search for some association between data. However, it also has unavoidable flaws. The traditional serial Apriori algorithm has the disadvantages of frequent scanning database, generating large amount of candidate item-set data and consuming a lot of memory resources. This paper proposes some technologies based on association principle, and proposes an improved Apriori algorithm to overcome the shortcomings of Apriori algorithm. When dealing with transactions, the algorithm filters out transactions that cannot generate frequent item-set, which can greatly reduce the amount of data processing. Theoretical analysis and experimental results show that the proposed scheme has the best performance in efficiency and stability.
Apriori算法具有简单、易于实现的优点,可以实现对数据之间某种关联的搜索。然而,它也有不可避免的缺陷。传统的串行Apriori算法存在频繁扫描数据库、产生大量候选项集数据和消耗大量内存资源的缺点。本文提出了一些基于关联原理的技术,并提出了一种改进的Apriori算法来克服Apriori算法的不足。在处理事务时,算法过滤掉不能产生频繁项集的事务,大大减少了数据处理量。理论分析和实验结果表明,该方案具有较好的效率和稳定性。
{"title":"An Improved Apriori Algorithm Based on Transaction Sequence Counting","authors":"Zuoting Ning, Zihua Ouyang, Xiangcheng Deng","doi":"10.1109/CSCloud-EdgeCom58631.2023.00041","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00041","url":null,"abstract":"Apriori algorithm has the advantages of simplicity and easy realization, which can realize the search for some association between data. However, it also has unavoidable flaws. The traditional serial Apriori algorithm has the disadvantages of frequent scanning database, generating large amount of candidate item-set data and consuming a lot of memory resources. This paper proposes some technologies based on association principle, and proposes an improved Apriori algorithm to overcome the shortcomings of Apriori algorithm. When dealing with transactions, the algorithm filters out transactions that cannot generate frequent item-set, which can greatly reduce the amount of data processing. Theoretical analysis and experimental results show that the proposed scheme has the best performance in efficiency and stability.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"269 1","pages":"192-196"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79865056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT IFLV:集成FCN、LSTM和ViT的无线网络入侵检测模型
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00086
Wenmin Zeng, Dezhi Han, Mingming Cui, Zhongdai Wu, Bing Han, Hongxu Zhou
Wireless networks are vulnerable to various network attacks due to easy access to the nodes. The development of technologies for network intrusion detection, including those based on deep learning, is expected to bring ultimate solutions to this problem. Nevertheless, existing intrusion detection models based on deep learning have low detection accuracy and cannot effectively detect several new types of attacks. Aimed at such, this article proposes IFLV, an intrusion detection model for wireless networks, by integrating Fully Convolutional Network (FCN), Long Short-Term Memory (LSTM), and Vision Transformer (ViT). IFLV can extract the local and global features of traffic data and learn its temporal and spatial features, to improve the accuracy of network traffic classification. Based on the improvements of the traditional ViT model to overcome the poor classification effect in small and medium-sized datasets, IFLV can achieve expressive results even with fewer training resources. Experimental results show that IFLV has a high accuracy of network traffic intrusion detection with an accuracy of 99.973% in the AWID dataset and significantly superior performance compared to existing models.
无线网络由于易于接入节点,容易受到各种网络攻击。网络入侵检测技术的发展,包括基于深度学习的技术,有望最终解决这一问题。然而,现有的基于深度学习的入侵检测模型检测精度较低,无法有效检测出多种新型攻击。为此,本文提出了一种集成了全卷积网络(FCN)、长短期记忆(LSTM)和视觉变换(ViT)的无线网络入侵检测模型IFLV。IFLV可以提取流量数据的局部和全局特征,并学习其时空特征,提高网络流量分类的准确性。基于对传统ViT模型的改进,克服了中小型数据集分类效果差的问题,IFLV在训练资源较少的情况下,也能获得具有表现力的结果。实验结果表明,IFLV在AWID数据集上具有较高的网络流量入侵检测准确率,准确率达到99.973%,性能明显优于现有模型。
{"title":"IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT","authors":"Wenmin Zeng, Dezhi Han, Mingming Cui, Zhongdai Wu, Bing Han, Hongxu Zhou","doi":"10.1109/CSCloud-EdgeCom58631.2023.00086","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00086","url":null,"abstract":"Wireless networks are vulnerable to various network attacks due to easy access to the nodes. The development of technologies for network intrusion detection, including those based on deep learning, is expected to bring ultimate solutions to this problem. Nevertheless, existing intrusion detection models based on deep learning have low detection accuracy and cannot effectively detect several new types of attacks. Aimed at such, this article proposes IFLV, an intrusion detection model for wireless networks, by integrating Fully Convolutional Network (FCN), Long Short-Term Memory (LSTM), and Vision Transformer (ViT). IFLV can extract the local and global features of traffic data and learn its temporal and spatial features, to improve the accuracy of network traffic classification. Based on the improvements of the traditional ViT model to overcome the poor classification effect in small and medium-sized datasets, IFLV can achieve expressive results even with fewer training resources. Experimental results show that IFLV has a high accuracy of network traffic intrusion detection with an accuracy of 99.973% in the AWID dataset and significantly superior performance compared to existing models.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"145 1","pages":"470-475"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77320613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Efficient and Secure Task Allocation Scheme in Mobile Crowd Sensing 在移动人群感知中实现高效安全的任务分配方案
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00022
Zhixue Li, Shiwen Zhang, N. Xiong, Wei Liang
In recent years, as a novel perceptual paradigm, Mobile Crowd Sensing (MCS) has gradually become one of the most popular research contents. It utilizes mobile devices carried by users to collect various sensing data about social events and phenomena. To improve the credibility of the data, it is critical to recruit mobile users, but it leads to the privacy leakage of mobile users. Therefore, how to achieve efficient task allocation while protecting user data privacy is a challenging problem in MCS. In this paper, we propose an efficient and secure task allocation scheme (ESTA). In ESTA, the service provider enables to forecast the spatial distribution of sensing users and select high quality sensing data according to their trust levels without invading user privacy. By utilizing the advantage of federated learning (FL) that does not centrally collect the user data to prevent privacy leakage. Finally, we show the security properties of ESTA and demonstrate its efficiency in terms of task finished ratio and task allocation ratio.
近年来,移动人群感知作为一种全新的感知范式逐渐成为最热门的研究内容之一。它利用用户随身携带的移动设备,收集有关社会事件和现象的各种传感数据。为了提高数据的可信度,招募移动用户至关重要,但这会导致移动用户的隐私泄露。因此,如何在保护用户数据隐私的同时实现高效的任务分配是MCS中一个具有挑战性的问题。本文提出了一种高效安全的任务分配方案(ESTA)。在ESTA中,服务提供商可以在不侵犯用户隐私的情况下,预测感知用户的空间分布,并根据用户的信任程度选择高质量的感知数据。通过利用联邦学习(FL)不集中收集用户数据的优势,防止隐私泄露。最后,我们展示了ESTA的安全特性,并从任务完成率和任务分配率两方面证明了它的效率。
{"title":"Achieving Efficient and Secure Task Allocation Scheme in Mobile Crowd Sensing","authors":"Zhixue Li, Shiwen Zhang, N. Xiong, Wei Liang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00022","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00022","url":null,"abstract":"In recent years, as a novel perceptual paradigm, Mobile Crowd Sensing (MCS) has gradually become one of the most popular research contents. It utilizes mobile devices carried by users to collect various sensing data about social events and phenomena. To improve the credibility of the data, it is critical to recruit mobile users, but it leads to the privacy leakage of mobile users. Therefore, how to achieve efficient task allocation while protecting user data privacy is a challenging problem in MCS. In this paper, we propose an efficient and secure task allocation scheme (ESTA). In ESTA, the service provider enables to forecast the spatial distribution of sensing users and select high quality sensing data according to their trust levels without invading user privacy. By utilizing the advantage of federated learning (FL) that does not centrally collect the user data to prevent privacy leakage. Finally, we show the security properties of ESTA and demonstrate its efficiency in terms of task finished ratio and task allocation ratio.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"11 1","pages":"78-84"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89071879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automotive Lightweight Design Modeling And Intelligent Optimization Learn Key Technologies 汽车轻量化设计建模与智能优化学习关键技术
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00071
Gejing Xu, Wei Liang, Jiahong Cai, Jiahong Xiao, Xingyu Chen, Yinyan Gong
The automotive industry has always been seeking innovative solutions to improve car performance, safety, and cost savings. Lightweight design technology has become one of the solutions. This article summarizes the modeling and optimization methods of automotive lightweight design, as well as key technologies based on intelligent optimization learning. First, this article outlines the basic concepts of automotive lightweight design, as well as the needs and challenges of the industry for lightweight design. Then, the modeling methods of lightweight design are introduced in detail, including geometric modeling, topology optimization, structural optimization, and multidisciplinary optimization. At the same time, commonly used materials, manufacturing processes, and testing methods in lightweight design are introduced, as well as relevant design guidelines and standards. This article also introduces some algorithms and their applicable scenarios. Additionally, this article summarizes the application prospects and future development directions of key technologies for automotive lightweight design modeling and intelligent optimization learning. We emphasize the opportunities and challenges in this field and propose how to continue promoting the development of lightweight design technology and responding to increasingly complex market demands. This article provides a systematic review of key technologies for automotive lightweight design modeling and intelligent optimization learning, which helps researchers and practitioners to deepen their understanding of the technical development and application trends in this field.
汽车行业一直在寻求创新的解决方案,以提高汽车的性能、安全性和成本节约。轻量化设计技术已成为解决方案之一。本文综述了汽车轻量化设计的建模与优化方法,以及基于智能优化学习的关键技术。首先,本文概述了汽车轻量化设计的基本概念,以及行业对轻量化设计的需求和挑战。然后,详细介绍了轻量化设计的建模方法,包括几何建模、拓扑优化、结构优化和多学科优化。同时介绍了轻量化设计中常用的材料、制造工艺和测试方法,以及相关的设计指南和标准。本文还介绍了一些算法及其应用场景。总结了汽车轻量化设计建模和智能优化学习关键技术的应用前景和未来发展方向。我们强调了这一领域的机遇和挑战,并提出了如何继续推动轻量化设计技术的发展,以应对日益复杂的市场需求。本文对汽车轻量化设计建模和智能优化学习的关键技术进行了系统综述,有助于研究人员和从业人员加深对该领域技术发展和应用趋势的理解。
{"title":"Automotive Lightweight Design Modeling And Intelligent Optimization Learn Key Technologies","authors":"Gejing Xu, Wei Liang, Jiahong Cai, Jiahong Xiao, Xingyu Chen, Yinyan Gong","doi":"10.1109/CSCloud-EdgeCom58631.2023.00071","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00071","url":null,"abstract":"The automotive industry has always been seeking innovative solutions to improve car performance, safety, and cost savings. Lightweight design technology has become one of the solutions. This article summarizes the modeling and optimization methods of automotive lightweight design, as well as key technologies based on intelligent optimization learning. First, this article outlines the basic concepts of automotive lightweight design, as well as the needs and challenges of the industry for lightweight design. Then, the modeling methods of lightweight design are introduced in detail, including geometric modeling, topology optimization, structural optimization, and multidisciplinary optimization. At the same time, commonly used materials, manufacturing processes, and testing methods in lightweight design are introduced, as well as relevant design guidelines and standards. This article also introduces some algorithms and their applicable scenarios. Additionally, this article summarizes the application prospects and future development directions of key technologies for automotive lightweight design modeling and intelligent optimization learning. We emphasize the opportunities and challenges in this field and propose how to continue promoting the development of lightweight design technology and responding to increasingly complex market demands. This article provides a systematic review of key technologies for automotive lightweight design modeling and intelligent optimization learning, which helps researchers and practitioners to deepen their understanding of the technical development and application trends in this field.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"7 1","pages":"381-386"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82849971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing-Advances Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1