首页 > 最新文献

Journal of Cloud Computing-Advances Systems and Applications最新文献

英文 中文
Machine Learning-based EEG Signal Classification of Parkinson’s Disease 基于机器学习的帕金森病脑电信号分类
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00078
Hao Wu, Jun Qi, Yong Yue
As the second most common neurodegenerative disease in the world, Parkinson’s disease continues to affect the normal and healthy life of patients. In recent years, considerable progress has been made in studying the EEG of patients with Parkinson’s disease. Many EEG data of patients with Parkinson’s disease can be published, and more filtering algorithms and classification models suitable for EEG signals of Parkinson’s disease have been proposed. However, studying channel redundancy of EEG signals in Parkinson’s disease still faces challenges. The pathogenesis of Parkinson’s disease is still uncertain in medicine, and it is difficult to propose a channel selection scheme suitable for all patients with Parkinson’s disease. In this paper, the open UNM data set is used to extract multi-scale features based on the fourth-order Butterworth IIR filter and Wavelet Packet Transform. The channel selection is carried out by using single-channel verification. 12 and 25 channels with the relative best R2 scores were selected for the feature data set generated based on these two methods. The classification performance of data sets with and without channel selection was compared between the open and closed-eye data sets. The negative effect of open eye status on EEG classification of Parkinson’s disease was found, and the channel selection was used to improve the AUC by 1% in the same data set. Results showed that the proposed channel selection scheme can alleviate the overfitting phenomenon that occurred in the training set in the testing set while maintaining the classification accuracy.
帕金森病是世界上第二大常见的神经退行性疾病,一直影响着患者的正常健康生活。近年来,对帕金森病患者脑电图的研究取得了相当大的进展。大量帕金森病患者的脑电图数据得以发表,并提出了更多适合帕金森病患者脑电图信号的滤波算法和分类模型。然而,研究帕金森病脑电信号的通道冗余仍然面临挑战。帕金森病的发病机制在医学上仍不确定,难以提出适合所有帕金森病患者的通道选择方案。本文利用开放的UNM数据集,基于四阶Butterworth IIR滤波和小波包变换提取多尺度特征。通过单通道验证进行通道选择。根据这两种方法生成的特征数据集,分别选择R2得分相对最好的12和25个通道。比较了开眼和闭眼数据集在有通道选择和没有通道选择情况下的分类性能。发现睁眼状态对帕金森病EEG分类的负面影响,在相同的数据集中,采用通道选择将AUC提高1%。结果表明,所提出的通道选择方案在保持分类精度的同时,可以缓解训练集在测试集中出现的过拟合现象。
{"title":"Machine Learning-based EEG Signal Classification of Parkinson’s Disease","authors":"Hao Wu, Jun Qi, Yong Yue","doi":"10.1109/CSCloud-EdgeCom58631.2023.00078","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00078","url":null,"abstract":"As the second most common neurodegenerative disease in the world, Parkinson’s disease continues to affect the normal and healthy life of patients. In recent years, considerable progress has been made in studying the EEG of patients with Parkinson’s disease. Many EEG data of patients with Parkinson’s disease can be published, and more filtering algorithms and classification models suitable for EEG signals of Parkinson’s disease have been proposed. However, studying channel redundancy of EEG signals in Parkinson’s disease still faces challenges. The pathogenesis of Parkinson’s disease is still uncertain in medicine, and it is difficult to propose a channel selection scheme suitable for all patients with Parkinson’s disease. In this paper, the open UNM data set is used to extract multi-scale features based on the fourth-order Butterworth IIR filter and Wavelet Packet Transform. The channel selection is carried out by using single-channel verification. 12 and 25 channels with the relative best R2 scores were selected for the feature data set generated based on these two methods. The classification performance of data sets with and without channel selection was compared between the open and closed-eye data sets. The negative effect of open eye status on EEG classification of Parkinson’s disease was found, and the channel selection was used to improve the AUC by 1% in the same data set. Results showed that the proposed channel selection scheme can alleviate the overfitting phenomenon that occurred in the training set in the testing set while maintaining the classification accuracy.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"3 1","pages":"423-428"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89681333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Risk Assessment Model for Social High-Risk Individuals Based on Graph Attention Network 基于图注意网络的社会高危人群风险评估模型研究
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00024
Yan Li, Xin Su, Xin Liu, He Yi Mu, Y. Zheng, Shuping Wang
To better carry out early warning and control work for high-risk individuals in society, this paper proposes a risk assessment model based on graph attention networks. The model analyzes relevant background and relationship information of these individuals and constructs a knowledge graph accordingly. An improved graph attention mechanism is introduced to establish the risk assessment model. Real police character data was used to train and test the model, and experimental results indicated a prediction accuracy of 89.4%, with both accuracy and recall rates around 90%. This model can provide decision-making basis and technical support for early warning of public security personnel by identifying potential risks of high-risk individuals.
为了更好地开展社会高危人群的预警和控制工作,本文提出了一种基于图关注网络的风险评估模型。该模型分析了这些个体的相关背景和关系信息,构建了相应的知识图谱。引入改进的图注意机制,建立了风险评估模型。利用真实警察性格数据对模型进行训练和测试,实验结果表明,该模型的预测准确率为89.4%,正确率和召回率均在90%左右。该模型可以通过识别高危人群的潜在风险,为公安人员的预警提供决策依据和技术支持。
{"title":"Research on Risk Assessment Model for Social High-Risk Individuals Based on Graph Attention Network","authors":"Yan Li, Xin Su, Xin Liu, He Yi Mu, Y. Zheng, Shuping Wang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00024","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00024","url":null,"abstract":"To better carry out early warning and control work for high-risk individuals in society, this paper proposes a risk assessment model based on graph attention networks. The model analyzes relevant background and relationship information of these individuals and constructs a knowledge graph accordingly. An improved graph attention mechanism is introduced to establish the risk assessment model. Real police character data was used to train and test the model, and experimental results indicated a prediction accuracy of 89.4%, with both accuracy and recall rates around 90%. This model can provide decision-making basis and technical support for early warning of public security personnel by identifying potential risks of high-risk individuals.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"4 1","pages":"91-95"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90070753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-empowered Federated Learning Framework Supprting GDPR-compliance 支持gdpr合规性的区块链授权联邦学习框架
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00074
Lijun Xiao, Dezhi Han, Sisi Zhou, Nengxiang Xu, Lin Chen, Siqi Xie
In recent years, data privacy security has been widely and highly valued by countries around the world. In the context of European Union’s General Data Protection Regulation (GDPR), the regulatory requirements of laws and regulations are becoming increasingly strict, bringing huge impacts and challenges to enterprises with user’s personal data such as internet services and financial technology. Up to a point, federal learning ensures data privacy by storing and processing personal data locally. However, due to malicious clients or central servers being able to launch attacks on global models or user privacy data, the security of federated learning is questioned, introducing blockchain into the federated learning framework is a feasible solution to address these data security issues. In this work, the concept of Blockchain (BC), Federated Learning (FL), GDPR and other similar data protection laws are presented, where a Blockchain-empowered Federated Learning (BC-empowered FL) framework is introduced. The challenges on complying with the GDPR are described, and the solutions or principles for improving the GDPR-compliance of BC-empowered FL systems are analyzed, sorting out the differences and connections among the GDPR-compliance methods yet laying a foundation to design legal and compliant applications for different domains and scenarios which need touch upon the user’s personal data.
近年来,数据隐私安全受到世界各国的广泛和高度重视。在欧盟《通用数据保护条例》(GDPR)的背景下,法律法规的监管要求越来越严格,给互联网服务、金融科技等拥有用户个人数据的企业带来了巨大的影响和挑战。在某种程度上,联邦政府通过在本地存储和处理个人数据来确保数据隐私。然而,由于恶意客户端或中央服务器能够对全局模型或用户隐私数据发起攻击,联邦学习的安全性受到质疑,将区块链引入联邦学习框架是解决这些数据安全问题的可行解决方案。在这项工作中,提出了区块链(BC),联邦学习(FL), GDPR和其他类似数据保护法的概念,其中引入了区块链授权的联邦学习(BC授权的FL)框架。阐述了符合GDPR的挑战,分析了bc授权FL系统提高GDPR合规性的解决方案或原则,梳理了GDPR合规性方法之间的差异和联系,为针对不同领域和场景设计合法合规的应用奠定了基础,这些领域和场景需要涉及用户个人数据。
{"title":"A Blockchain-empowered Federated Learning Framework Supprting GDPR-compliance","authors":"Lijun Xiao, Dezhi Han, Sisi Zhou, Nengxiang Xu, Lin Chen, Siqi Xie","doi":"10.1109/CSCloud-EdgeCom58631.2023.00074","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00074","url":null,"abstract":"In recent years, data privacy security has been widely and highly valued by countries around the world. In the context of European Union’s General Data Protection Regulation (GDPR), the regulatory requirements of laws and regulations are becoming increasingly strict, bringing huge impacts and challenges to enterprises with user’s personal data such as internet services and financial technology. Up to a point, federal learning ensures data privacy by storing and processing personal data locally. However, due to malicious clients or central servers being able to launch attacks on global models or user privacy data, the security of federated learning is questioned, introducing blockchain into the federated learning framework is a feasible solution to address these data security issues. In this work, the concept of Blockchain (BC), Federated Learning (FL), GDPR and other similar data protection laws are presented, where a Blockchain-empowered Federated Learning (BC-empowered FL) framework is introduced. The challenges on complying with the GDPR are described, and the solutions or principles for improving the GDPR-compliance of BC-empowered FL systems are analyzed, sorting out the differences and connections among the GDPR-compliance methods yet laying a foundation to design legal and compliant applications for different domains and scenarios which need touch upon the user’s personal data.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"40 1","pages":"399-404"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79663109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Traceable Location Privacy Preserving Scheme for Data Collection in Vehicular Fog Computing 一种用于车辆雾计算数据采集的可追踪位置隐私保护方案
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00020
Qinyang Chen, Keming Wang, Tao Xie
Vehicular fog computing (VFC) has emerged as a popular paradigm in the Internet of Vehicles (IoV) by replacing cloud servers with edge fog servers, thereby reducing communication latency and improving efficiency. However, data collection in VFC poses significant security challenges, particularly with respect to the privacy of location data, which is essential for effective vehicle data collection. While some traditional location privacy protection schemes have been developed, they fail to address the availability of location data and the traceability of special situations. To overcome these limitations, we propose a traceable vehicle location privacy protection scheme in VFC that ensures the availability of location data by using fuzzy location information and achieves the traceability of location data through a secret sharing scheme. The simulation results demonstrate its effectiveness and feasibility.
车辆雾计算(VFC)通过用边缘雾服务器取代云服务器,从而减少通信延迟并提高效率,已成为车联网(IoV)的流行范式。然而,VFC中的数据收集带来了重大的安全挑战,特别是在位置数据的隐私方面,这对于有效的车辆数据收集至关重要。虽然一些传统的位置隐私保护方案已经开发出来,但它们无法解决位置数据的可用性和特殊情况的可追溯性。为了克服这些限制,我们提出了一种可追溯的VFC车辆位置隐私保护方案,该方案利用模糊位置信息来保证位置数据的可用性,并通过秘密共享方案实现位置数据的可追溯性。仿真结果验证了该方法的有效性和可行性。
{"title":"A Traceable Location Privacy Preserving Scheme for Data Collection in Vehicular Fog Computing","authors":"Qinyang Chen, Keming Wang, Tao Xie","doi":"10.1109/CSCloud-EdgeCom58631.2023.00020","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00020","url":null,"abstract":"Vehicular fog computing (VFC) has emerged as a popular paradigm in the Internet of Vehicles (IoV) by replacing cloud servers with edge fog servers, thereby reducing communication latency and improving efficiency. However, data collection in VFC poses significant security challenges, particularly with respect to the privacy of location data, which is essential for effective vehicle data collection. While some traditional location privacy protection schemes have been developed, they fail to address the availability of location data and the traceability of special situations. To overcome these limitations, we propose a traceable vehicle location privacy protection scheme in VFC that ensures the availability of location data by using fuzzy location information and achieves the traceability of location data through a secret sharing scheme. The simulation results demonstrate its effectiveness and feasibility.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"2 1","pages":"65-71"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79945372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secret and Traceable Approach for Cloud Data Sharing 云数据共享的秘密和可追踪方法
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00038
Chenying Xu, Yanfei Yin, Yingwen Chen
With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causing serious security issues. Access control mechanism based on cryptography can effectively protect the security of cloud data and prevent unauthorized access to it. Nevertheless, users may redistribute data to other users after obtaining it, which can harm the copyright interests of the data owner. To address this issue, this paper proposes a secret and traceable approach for cloud data sharing. We combine the lattice-based proxy re-encryption with digital watermarking technology for redistribution tracking in cloud data sharing scenario. The lattice cipher used in this scheme is an encryption algorithm with homomorphic property based on the Ring-LWE problem. It has the advantage of reducing the ciphertext length and improving the efficiency of encryption. This paper demonstrates the feasibility and effectiveness of this scheme from a series of experiments. The encryption of an image of size 1024*1024 pixels takes only 9.78 seconds on average. The computational performance of this scheme is roughly 91.434% better than the existing data sharing schemes supporting redistribution tracking.
随着云计算的发展,数据所有者普遍使用云服务来减少存储和计算开销。然而,存储在云服务器上的数据不受数据所有者的直接控制,导致了严重的安全问题。基于密码学的访问控制机制可以有效保护云数据的安全,防止未经授权的访问。然而,用户在获得数据后可能会将数据再分发给其他用户,这可能会损害数据所有者的版权利益。为了解决这个问题,本文提出了一种秘密的、可跟踪的云数据共享方法。将基于格的代理重加密与数字水印技术相结合,实现了云数据共享场景下的再分配跟踪。该方案中使用的格密码是一种基于Ring-LWE问题的具有同态性质的加密算法。它具有缩短密文长度,提高加密效率的优点。通过一系列实验验证了该方案的可行性和有效性。1024*1024像素的图像加密平均只需要9.78秒。与现有支持再分配跟踪的数据共享方案相比,该方案的计算性能提高约91.434%。
{"title":"A Secret and Traceable Approach for Cloud Data Sharing","authors":"Chenying Xu, Yanfei Yin, Yingwen Chen","doi":"10.1109/CSCloud-EdgeCom58631.2023.00038","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00038","url":null,"abstract":"With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causing serious security issues. Access control mechanism based on cryptography can effectively protect the security of cloud data and prevent unauthorized access to it. Nevertheless, users may redistribute data to other users after obtaining it, which can harm the copyright interests of the data owner. To address this issue, this paper proposes a secret and traceable approach for cloud data sharing. We combine the lattice-based proxy re-encryption with digital watermarking technology for redistribution tracking in cloud data sharing scenario. The lattice cipher used in this scheme is an encryption algorithm with homomorphic property based on the Ring-LWE problem. It has the advantage of reducing the ciphertext length and improving the efficiency of encryption. This paper demonstrates the feasibility and effectiveness of this scheme from a series of experiments. The encryption of an image of size 1024*1024 pixels takes only 9.78 seconds on average. The computational performance of this scheme is roughly 91.434% better than the existing data sharing schemes supporting redistribution tracking.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"19 1","pages":"173-180"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77990304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Spectrum Research 5G频谱研究
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00035
Peiyuan Zhu, Lijun Xiao, Shu Tan, Jiahong Cai, Yingzi Huo, Ronglin Zhang
With the growing demand for communication and the rapid development of global mobile communication technology, the fourth generation of mobile communication can no longer meet the needs of people in their working lives for mobile network communication, and the fifth generation of mobile communication is born. This paper first introduces three strategies for the use of the 5G spectrum, namely spectrum dedication, spectrum re-farming, and spectrum sharing. Secondly, it introduces the three main application scenarios for the 5G spectrum, namely enhanced mobile broadband (eMBB), ultrahigh reliability and ultra-low latency services (URLLC), and massive IoT communications (MTC). The presentation concludes with a summary of the impact of the 5G spectrum in today’s society and an outlook on its future development.
随着通信需求的不断增长和全球移动通信技术的快速发展,第四代移动通信已经不能满足人们在工作生活中对移动网络通信的需求,第五代移动通信应运而生。本文首先介绍了5G频谱的三种使用策略,即频谱专用、频谱再耕种和频谱共享。其次,介绍了5G频谱的三大主要应用场景,即增强型移动宽带(eMBB)、超高可靠超低延迟业务(URLLC)和海量物联网通信(MTC)。报告最后总结了5G频谱对当今社会的影响,并展望了其未来发展。
{"title":"5G Spectrum Research","authors":"Peiyuan Zhu, Lijun Xiao, Shu Tan, Jiahong Cai, Yingzi Huo, Ronglin Zhang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00035","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00035","url":null,"abstract":"With the growing demand for communication and the rapid development of global mobile communication technology, the fourth generation of mobile communication can no longer meet the needs of people in their working lives for mobile network communication, and the fifth generation of mobile communication is born. This paper first introduces three strategies for the use of the 5G spectrum, namely spectrum dedication, spectrum re-farming, and spectrum sharing. Secondly, it introduces the three main application scenarios for the 5G spectrum, namely enhanced mobile broadband (eMBB), ultrahigh reliability and ultra-low latency services (URLLC), and massive IoT communications (MTC). The presentation concludes with a summary of the impact of the 5G spectrum in today’s society and an outlook on its future development.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"1 1","pages":"155-160"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75111540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning-Based Intrusion Detection System for IoT Environments with Locally Adapted Model 基于局部适应模型的物联网环境下联邦学习入侵检测系统
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00043
Souradip Roy, Juan Li, Yan Bai
As the Internet of Things (IoT) becomes more prevalent, the need for intrusion detection systems (IDS) to protect against cyberattacks increases. However, the limited computing capabilities of IoT devices often require sending data to a centralized cloud for analysis, which can cause energy consumption, privacy issues, and data leakage. To address these problems, we propose a Federated Learning-based IDS that distributes learning to local devices without sending data to a centralized cloud. We also create lightweight local learners to accommodate IoT device limitations and locally adapted models to handle non-independent intrusion data distribution. We evaluate our method using NBaIoT and CICIDS-2017 datasets, and our results demonstrate comparable performance to centralized learning on metrics including accuracy, precision, and recall, while addressing privacy and data leakage concerns.
随着物联网(IoT)的普及,入侵检测系统(IDS)抵御网络攻击的需求也在增加。然而,物联网设备有限的计算能力往往需要将数据发送到集中式云进行分析,这可能会导致能源消耗、隐私问题和数据泄露。为了解决这些问题,我们提出了一个基于联邦学习的IDS,它将学习分发到本地设备,而无需将数据发送到集中式云。我们还创建了轻量级本地学习器,以适应物联网设备的限制和本地适应的模型,以处理非独立的入侵数据分布。我们使用NBaIoT和CICIDS-2017数据集对我们的方法进行了评估,结果表明,我们的方法在准确度、精密度和召回率等指标上与集中式学习的性能相当,同时解决了隐私和数据泄露问题。
{"title":"Federated Learning-Based Intrusion Detection System for IoT Environments with Locally Adapted Model","authors":"Souradip Roy, Juan Li, Yan Bai","doi":"10.1109/CSCloud-EdgeCom58631.2023.00043","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00043","url":null,"abstract":"As the Internet of Things (IoT) becomes more prevalent, the need for intrusion detection systems (IDS) to protect against cyberattacks increases. However, the limited computing capabilities of IoT devices often require sending data to a centralized cloud for analysis, which can cause energy consumption, privacy issues, and data leakage. To address these problems, we propose a Federated Learning-based IDS that distributes learning to local devices without sending data to a centralized cloud. We also create lightweight local learners to accommodate IoT device limitations and locally adapted models to handle non-independent intrusion data distribution. We evaluate our method using NBaIoT and CICIDS-2017 datasets, and our results demonstrate comparable performance to centralized learning on metrics including accuracy, precision, and recall, while addressing privacy and data leakage concerns.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"10 1","pages":"203-209"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75258619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks BContext2Name:基于多标签学习和神经网络的剥离二进制文件命名函数
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00037
Bing Xia, Yunxiang Ge, Ruinan Yang, Jiabin Yin, Jianmin Pang, Chongjun Tang
Conducting binary function naming helps reverse engineers understand the internal workings of the code and perform malicious code analysis without accessing the source code. However, the loss of debugging information poses the challenge of insufficient high-level semantic information description for stripping binary code function naming. Meanwhile, the existing binary function naming scheme has one function label for only one sample. The long-tail effect of function labels for a single sample makes the machine learning-based prediction models face the challenge. To obtain a function correlation label and improve the propensity score of uncommon tail labels, we propose a multi-label learning-based binary function naming model BContext2Name. This model automatically generates relevant labels for binary function naming by function context information with the help of PfastreXML model. The experimental results show that BContext2Name can enrich function labels and alleviate the long-tail effect that exists for a single sample class. To obtain high-level semantics of binary functions, we align pseudocode and basic blocks based on disassembly and decompilation, identify concrete or abstract values of API parameters by variable tracking, and construct API-enhanced control flow graphs. Finally, a seq2seq neural network translation model with attention mechanism is constructed between function multi-label learning and enhanced control flow graphs. Experiments on the dataset reveal that the F1 values of the BContext2Name model improve by 3.55% and 15.23% over the state-of-the-art XFL and Nero, respectively. This indicates that function multi-label learning can provide accurate labels for binary functions and can help reverse analysts understand the inner working mechanism of binary code. Code and data for this evaluation are available at https://github.com/CSecurityZhongYuan/BContext2Name.
进行二进制函数命名有助于逆向工程师理解代码的内部工作原理,并在不访问源代码的情况下执行恶意代码分析。然而,调试信息的丢失给剥离二进制代码函数命名带来了高级语义信息描述不足的挑战。同时,现有的二进制函数命名方案只对一个样本使用一个函数标签。单个样本的函数标签的长尾效应使得基于机器学习的预测模型面临挑战。为了获得函数相关标签并提高不常见尾标签的倾向得分,我们提出了一种基于多标签学习的二元函数命名模型BContext2Name。该模型借助PfastreXML模型,根据函数上下文信息自动生成二进制函数命名的相关标签。实验结果表明,BContext2Name可以丰富函数标签,减轻单个样本类存在的长尾效应。为了获得二进制函数的高级语义,我们基于反汇编和反编译对伪代码和基本块进行对齐,通过变量跟踪识别API参数的具体或抽象值,并构建API增强控制流图。最后,在函数多标签学习和增强控制流图之间构建了一个具有注意机制的seq2seq神经网络翻译模型。在数据集上的实验表明,BContext2Name模型的F1值比最先进的XFL和Nero分别提高了3.55%和15.23%。这表明函数多标签学习可以为二进制函数提供准确的标签,有助于逆向分析人员了解二进制代码的内部工作机制。此评估的代码和数据可在https://github.com/CSecurityZhongYuan/BContext2Name上获得。
{"title":"BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks","authors":"Bing Xia, Yunxiang Ge, Ruinan Yang, Jiabin Yin, Jianmin Pang, Chongjun Tang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00037","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00037","url":null,"abstract":"Conducting binary function naming helps reverse engineers understand the internal workings of the code and perform malicious code analysis without accessing the source code. However, the loss of debugging information poses the challenge of insufficient high-level semantic information description for stripping binary code function naming. Meanwhile, the existing binary function naming scheme has one function label for only one sample. The long-tail effect of function labels for a single sample makes the machine learning-based prediction models face the challenge. To obtain a function correlation label and improve the propensity score of uncommon tail labels, we propose a multi-label learning-based binary function naming model BContext2Name. This model automatically generates relevant labels for binary function naming by function context information with the help of PfastreXML model. The experimental results show that BContext2Name can enrich function labels and alleviate the long-tail effect that exists for a single sample class. To obtain high-level semantics of binary functions, we align pseudocode and basic blocks based on disassembly and decompilation, identify concrete or abstract values of API parameters by variable tracking, and construct API-enhanced control flow graphs. Finally, a seq2seq neural network translation model with attention mechanism is constructed between function multi-label learning and enhanced control flow graphs. Experiments on the dataset reveal that the F1 values of the BContext2Name model improve by 3.55% and 15.23% over the state-of-the-art XFL and Nero, respectively. This indicates that function multi-label learning can provide accurate labels for binary functions and can help reverse analysts understand the inner working mechanism of binary code. Code and data for this evaluation are available at https://github.com/CSecurityZhongYuan/BContext2Name.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"22 1","pages":"167-172"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85100602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A One-Dimensional Residual Network and Physical Fitness-Based Exercise Prescription Recommendation Method 一维残差网络及基于体能的运动处方推荐方法
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00046
Runqing Fan, Zhenlian Peng, Buqing Cao, Jianxun Liu, Peng Che, Tieping Chen
In the context of the national big data strategy, physical fitness test data has become one of the main influencing factors in guiding and promoting the participation of the population in sports and fitness. Recommending exercise prescriptions based on national physical fitness test data has become an important research topic. However, currently, there is little research on how to accurately use computer data processing technology to recommend exercise prescriptions based on physical fitness test data. In this study, we propose a ResNet-based Exercise Prescription (ResNet-EP) method that utilizes one-dimensional residual neural network technology to recommend exercise prescriptions based on physical fitness testing data. This method comprehensively analyzes physical fitness testing data and exercise prescription data and realizes the automatic recommendation of exercise prescriptions. Experimental results on a real dataset demonstrate that the ResNet-EP model outperforms other comparison models in terms of precision (79.98%), recall (83.73%), and F1 score (81.81%). This study provides novel insights into the combination of physical fitness testing and exercise.
在国家大数据战略背景下,体质测试数据已成为指导和促进全民参与体育健身的主要影响因素之一。基于国民体质测试数据推荐运动处方已成为一个重要的研究课题。然而,目前关于如何准确地利用计算机数据处理技术根据体质测试数据推荐运动处方的研究很少。在本研究中,我们提出了一种基于resnet的运动处方(ResNet-EP)方法,该方法利用一维残差神经网络技术,根据体能测试数据推荐运动处方。该方法综合分析体能测试数据和运动处方数据,实现运动处方的自动推荐。在真实数据集上的实验结果表明,ResNet-EP模型在准确率(79.98%)、召回率(83.73%)和F1分数(81.81%)方面均优于其他比较模型。这项研究为体能测试和锻炼的结合提供了新的见解。
{"title":"A One-Dimensional Residual Network and Physical Fitness-Based Exercise Prescription Recommendation Method","authors":"Runqing Fan, Zhenlian Peng, Buqing Cao, Jianxun Liu, Peng Che, Tieping Chen","doi":"10.1109/CSCloud-EdgeCom58631.2023.00046","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00046","url":null,"abstract":"In the context of the national big data strategy, physical fitness test data has become one of the main influencing factors in guiding and promoting the participation of the population in sports and fitness. Recommending exercise prescriptions based on national physical fitness test data has become an important research topic. However, currently, there is little research on how to accurately use computer data processing technology to recommend exercise prescriptions based on physical fitness test data. In this study, we propose a ResNet-based Exercise Prescription (ResNet-EP) method that utilizes one-dimensional residual neural network technology to recommend exercise prescriptions based on physical fitness testing data. This method comprehensively analyzes physical fitness testing data and exercise prescription data and realizes the automatic recommendation of exercise prescriptions. Experimental results on a real dataset demonstrate that the ResNet-EP model outperforms other comparison models in terms of precision (79.98%), recall (83.73%), and F1 score (81.81%). This study provides novel insights into the combination of physical fitness testing and exercise.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"28 1","pages":"223-228"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81607808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Aggregation Protocol Resisting Collusion Attacks in the Internet of Vehicles Environment 车联网环境下抗合谋攻击的聚合协议
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00014
Zisang Xu, Ruirui Zhang, Peng Huang, Jianbo Xu
In the Internet of Vehicles(IoV) based on federated learning, the vehicle avoids the server from collecting sensitive data of users by uploading model parameters. However, after research, it is found that the model parameters uploaded by the vehicle are also vulnerable to model inversion attacks or other attacks, thus exposing sensitive data of users. Therefore, this paper proposes an aggregation protocol resisting collusion attacks in the Internet of Vehicles environment. First, the Roadside Unit (RSU) and the Trusted Authority (TA) cooperate to issue tokens for the vehicle to reduce the authentication overhead of the vehicle frequently crossing domains. Second, the protocol uses blinding factors and secret sharing techniques to effectively resist collusion attacks between entities. Finally, after mathematical analysis, it is proved that the protocol has high security and efficiency.
在基于联邦学习的车联网(IoV)中,车辆通过上传模型参数来避免服务器收集用户敏感数据。然而,经过研究发现,车辆上传的模型参数也容易受到模型反转攻击或其他攻击,从而暴露了用户的敏感数据。为此,本文提出了一种车联网环境下抗合谋攻击的聚合协议。首先,路边单元(RSU)和可信机构(TA)合作为车辆颁发令牌,以减少车辆频繁跨域的身份验证开销。其次,利用盲因子和秘密共享技术,有效抵御实体间串通攻击。最后,通过数学分析,证明了该协议具有较高的安全性和效率。
{"title":"An Aggregation Protocol Resisting Collusion Attacks in the Internet of Vehicles Environment","authors":"Zisang Xu, Ruirui Zhang, Peng Huang, Jianbo Xu","doi":"10.1109/CSCloud-EdgeCom58631.2023.00014","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00014","url":null,"abstract":"In the Internet of Vehicles(IoV) based on federated learning, the vehicle avoids the server from collecting sensitive data of users by uploading model parameters. However, after research, it is found that the model parameters uploaded by the vehicle are also vulnerable to model inversion attacks or other attacks, thus exposing sensitive data of users. Therefore, this paper proposes an aggregation protocol resisting collusion attacks in the Internet of Vehicles environment. First, the Roadside Unit (RSU) and the Trusted Authority (TA) cooperate to issue tokens for the vehicle to reduce the authentication overhead of the vehicle frequently crossing domains. Second, the protocol uses blinding factors and secret sharing techniques to effectively resist collusion attacks between entities. Finally, after mathematical analysis, it is proved that the protocol has high security and efficiency.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"35 2 1","pages":"24-29"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77691398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing-Advances Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1