首页 > 最新文献

Journal of Cloud Computing-Advances Systems and Applications最新文献

英文 中文
An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting System 一种高效的品牌化妆品防伪系统认证协议
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00029
Xiangwei Meng, Qingchun Yu, Wei Lang, Yufeng Liang, Zisang Xu, Kuan-Ching Li
The counterfeit brand cosmetics made available on the market have always been a widespread concern. Traditional anti-counterfeiting schemes usually focus on the authenticity of brand cosmetics. However, verifying the identity of the sales counter is also a challenging issue to be solved. In this paper, we propose a new authentication protocol for brand cosmetics anti-counterfeiting system which is used for checking the identity of sales counter and the authenticity of brand cosmetics. The sales counter authenticated by the anticounterfeiting server obtains a cosmetic authentication confirmation about the authenticity of the brand cosmetic. Besides, the security of proposed protocol is proved by informally analysis. Performance evaluation shows that the proposed protocol is efficiency.
市场上的假冒品牌化妆品一直是人们普遍关注的问题。传统的防伪方案通常侧重于品牌化妆品的真伪。然而,验证销售柜台的身份也是一个需要解决的具有挑战性的问题。本文提出了一种新的品牌化妆品防伪系统认证协议,用于检查销售柜台的身份和品牌化妆品的真伪。经过防伪服务器认证的销售专柜获得关于品牌化妆品真伪的化妆品认证确认。此外,通过非正式分析证明了协议的安全性。性能评估表明该协议是有效的。
{"title":"An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting System","authors":"Xiangwei Meng, Qingchun Yu, Wei Lang, Yufeng Liang, Zisang Xu, Kuan-Ching Li","doi":"10.1109/cscloud-edgecom58631.2023.00029","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00029","url":null,"abstract":"The counterfeit brand cosmetics made available on the market have always been a widespread concern. Traditional anti-counterfeiting schemes usually focus on the authenticity of brand cosmetics. However, verifying the identity of the sales counter is also a challenging issue to be solved. In this paper, we propose a new authentication protocol for brand cosmetics anti-counterfeiting system which is used for checking the identity of sales counter and the authenticity of brand cosmetics. The sales counter authenticated by the anticounterfeiting server obtains a cosmetic authentication confirmation about the authenticity of the brand cosmetic. Besides, the security of proposed protocol is proved by informally analysis. Performance evaluation shows that the proposed protocol is efficiency.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"6 1","pages":"120-125"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73065180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NLP Research Based on Transformer Model 基于变压器模型的自然语言处理研究
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00065
Junjie Wu, Xueting Huang, Jingnian Liu, Yingzi Huo, Gaojing Yuan, Ronglin Zhang
Natural language processing technology is an important research area in artificial intelligence which occupies a pivotal position in deep learning. This paper describes in detail the research of NLP based on Transformer structure, thus showing its ultra-high performance and development prospects. Therefore, this article provides a detailed description of the research on NLP based on the Transformer structure, in order to demonstrate its ultra-high performance and development prospects.
自然语言处理技术是人工智能的一个重要研究领域,在深度学习中占有举足轻重的地位。本文详细介绍了基于变压器结构的自然语言处理的研究,从而展示了其超高性能和发展前景。因此,本文对基于Transformer结构的NLP研究进行了详细的描述,以展示其超高性能和发展前景。
{"title":"NLP Research Based on Transformer Model","authors":"Junjie Wu, Xueting Huang, Jingnian Liu, Yingzi Huo, Gaojing Yuan, Ronglin Zhang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00065","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00065","url":null,"abstract":"Natural language processing technology is an important research area in artificial intelligence which occupies a pivotal position in deep learning. This paper describes in detail the research of NLP based on Transformer structure, thus showing its ultra-high performance and development prospects. Therefore, this article provides a detailed description of the research on NLP based on the Transformer structure, in order to demonstrate its ultra-high performance and development prospects.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"140 1","pages":"343-348"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76060919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Matrix Decomposition Efficiency: A Study on FT-Matrix DSP Based SVD Optimization 提高矩阵分解效率:基于ft矩阵DSP的SVD优化研究
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00085
Anxing Xie, Yonghua Hu, Aobo Cheng, Zhuoyou Tang, P. Liu, Xin Zhang
Matrix decomposition is a fundamental operation in linear algebra, and it has various applications in machine learning, signal processing, edge computing, and many other fields. Singular Value Decomposition (SVD) is a matrix decomposition method that can break down a matrix into three matrices: two orthogonal matrices and a diagonal matrix. With the development of domestic high-performance Digital Signal Value Processors (DSP), the demand for matrix computation based on DSP platforms is increasing. The research of SVD implemented based on DSP is important and meaningful. However, accessing the high-performance algorithm requires developers who are familiar with the hardware characteristics, in order to combine the unique features of the algorithm with the limited hardware resources. To reduce the cost of computing the SVD in matrix, we implement a vectorization mapping method for the SVD algorithm on the FT-M7002. The single instruction multiple data (SIMD) instructions embedded in the FT-M7002 processor were utilized to exploit the data-level parallelism in the SVD algorithm. Instead of using data movement and a scalar processing unit (SPU), we compute with a single vector processing element (VPE). Additionally, DMA transfer algorithm is designed to implement matrix transposition and resolve the issue of discontinuous data access. Experimental results show that the optimized SVD algorithm improves execution performance relative to the original SVD algorithm on FT by up to 5.0 ×. Furthermore, we demonstrate that the optimized SVD algorithm on the FT-M7002 performs 1.0-2.0× faster than the optimized SVD algorithm on TMS320C6678 processor.
矩阵分解是线性代数中的一项基本运算,在机器学习、信号处理、边缘计算等许多领域都有广泛的应用。奇异值分解(SVD)是一种矩阵分解方法,它可以将一个矩阵分解成三个矩阵:两个正交矩阵和一个对角矩阵。随着国内高性能数字信号值处理器(DSP)的发展,基于DSP平台的矩阵计算需求越来越大。基于DSP实现奇异值分解的研究是非常重要和有意义的。然而,访问高性能算法需要熟悉硬件特性的开发人员,以便将算法的独特特性与有限的硬件资源相结合。为了减少矩阵SVD的计算成本,我们在FT-M7002上实现了SVD算法的矢量化映射方法。利用FT-M7002处理器内嵌的单指令多数据(SIMD)指令,利用SVD算法的数据级并行性。我们不使用数据移动和标量处理单元(SPU),而是使用单个向量处理元素(VPE)进行计算。另外,设计了DMA传输算法,实现了矩阵变换,解决了数据访问不连续的问题。实验结果表明,与原SVD算法相比,优化后的SVD算法在FT上的执行性能提高了5.0倍。此外,我们还证明了优化后的奇异值分解算法在FT-M7002上的运算速度比在TMS320C6678处理器上的运算速度快1.0-2.0倍。
{"title":"Advancing Matrix Decomposition Efficiency: A Study on FT-Matrix DSP Based SVD Optimization","authors":"Anxing Xie, Yonghua Hu, Aobo Cheng, Zhuoyou Tang, P. Liu, Xin Zhang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00085","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00085","url":null,"abstract":"Matrix decomposition is a fundamental operation in linear algebra, and it has various applications in machine learning, signal processing, edge computing, and many other fields. Singular Value Decomposition (SVD) is a matrix decomposition method that can break down a matrix into three matrices: two orthogonal matrices and a diagonal matrix. With the development of domestic high-performance Digital Signal Value Processors (DSP), the demand for matrix computation based on DSP platforms is increasing. The research of SVD implemented based on DSP is important and meaningful. However, accessing the high-performance algorithm requires developers who are familiar with the hardware characteristics, in order to combine the unique features of the algorithm with the limited hardware resources. To reduce the cost of computing the SVD in matrix, we implement a vectorization mapping method for the SVD algorithm on the FT-M7002. The single instruction multiple data (SIMD) instructions embedded in the FT-M7002 processor were utilized to exploit the data-level parallelism in the SVD algorithm. Instead of using data movement and a scalar processing unit (SPU), we compute with a single vector processing element (VPE). Additionally, DMA transfer algorithm is designed to implement matrix transposition and resolve the issue of discontinuous data access. Experimental results show that the optimized SVD algorithm improves execution performance relative to the original SVD algorithm on FT by up to 5.0 ×. Furthermore, we demonstrate that the optimized SVD algorithm on the FT-M7002 performs 1.0-2.0× faster than the optimized SVD algorithm on TMS320C6678 processor.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"97 1","pages":"464-469"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79203358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Reconstruction From Traditional Methods to Deep Learning 从传统方法到深度学习的三维重建
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00072
Lan Yang, Chaoyi Yang, Rui Xie, Jingnian Liu, Huan Zhang, Wenjin Tan
Vision is one of the important pathways for human perception of external information, with over 80% of perception being acquired through vision. How to enable computers to possess efficient and flexible visual systems similar to humans has always been a hot topic in the field of computer science. One of the main goals of computer vision research is to reconstruct the geometric structure of 3D objects visible on the visible surfaces from 2D photos. Recently, this technology has become mature enough and its applications range from autonomous driving, virtual reality, cultural heritage preservation and restoration, among others, with significant research value. In this paper, we summarize the key technical issues in 3D reconstruction from existing technologies, first by summarizing traditional methods of 3D reconstruction, then analyzing commonly used deep learning methods for 3D reconstruction and their application scenarios in different fields. Finally, we conclude and provide an outlook on future development directions.
视觉是人类感知外部信息的重要途径之一,80%以上的感知是通过视觉获得的。如何使计算机具有与人类相似的高效、灵活的视觉系统一直是计算机科学领域的研究热点。计算机视觉研究的主要目标之一是从二维照片中重建可见表面上可见的三维物体的几何结构。近年来,该技术已经足够成熟,其应用范围涵盖自动驾驶、虚拟现实、文化遗产保护和修复等领域,具有重要的研究价值。本文从现有技术出发,总结了三维重建中的关键技术问题,首先总结了传统的三维重建方法,然后分析了常用的三维重建深度学习方法及其在不同领域的应用场景。最后,对未来的发展方向进行了总结和展望。
{"title":"3D Reconstruction From Traditional Methods to Deep Learning","authors":"Lan Yang, Chaoyi Yang, Rui Xie, Jingnian Liu, Huan Zhang, Wenjin Tan","doi":"10.1109/CSCloud-EdgeCom58631.2023.00072","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00072","url":null,"abstract":"Vision is one of the important pathways for human perception of external information, with over 80% of perception being acquired through vision. How to enable computers to possess efficient and flexible visual systems similar to humans has always been a hot topic in the field of computer science. One of the main goals of computer vision research is to reconstruct the geometric structure of 3D objects visible on the visible surfaces from 2D photos. Recently, this technology has become mature enough and its applications range from autonomous driving, virtual reality, cultural heritage preservation and restoration, among others, with significant research value. In this paper, we summarize the key technical issues in 3D reconstruction from existing technologies, first by summarizing traditional methods of 3D reconstruction, then analyzing commonly used deep learning methods for 3D reconstruction and their application scenarios in different fields. Finally, we conclude and provide an outlook on future development directions.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"33 1","pages":"387-392"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81702532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Fast Adaptive Transmission Models for International Inland Port Based on Edge Intelligence 基于边缘智能的国际内陆港口快速自适应传输模型研究
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00062
Yiwen Liu, Zhirong Zhu, Tangyan, Wenkan Wen, Xiaoning Peng, Yuanquan Shi
In this paper, we propose a logistics International Inland Port resource allocation method based on intelligent edge scheduling, and we do a reasonable pre-allocation of logistics resources by building an edge network in the urban system. By using multiple integrated learning models and regional prevalence classification algorithms, the distribution demand of each sub-distribution point is predicted. The proposed method is able to cope with uncertainties such as high distribution volume, variable distribution situations or long transportation distances. We use the HuaiHua International Inland Port as the simulation object, and the simulation results show that the proposed method has the highest efficiency in logistics distribution and is still highly adaptive in emergency situations.
本文提出了一种基于智能边缘调度的物流国际内陆港资源配置方法,通过在城市系统中构建边缘网络,对物流资源进行合理的预分配。采用多个综合学习模型和区域流行度分类算法,预测各子分布点的分布需求。该方法能够处理配送量大、配送情况多变、运输距离长等不确定性问题。以怀化国际内河港为仿真对象,仿真结果表明,该方法具有最高的物流配送效率,且在紧急情况下仍具有较高的适应性。
{"title":"Research on Fast Adaptive Transmission Models for International Inland Port Based on Edge Intelligence","authors":"Yiwen Liu, Zhirong Zhu, Tangyan, Wenkan Wen, Xiaoning Peng, Yuanquan Shi","doi":"10.1109/CSCloud-EdgeCom58631.2023.00062","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00062","url":null,"abstract":"In this paper, we propose a logistics International Inland Port resource allocation method based on intelligent edge scheduling, and we do a reasonable pre-allocation of logistics resources by building an edge network in the urban system. By using multiple integrated learning models and regional prevalence classification algorithms, the distribution demand of each sub-distribution point is predicted. The proposed method is able to cope with uncertainties such as high distribution volume, variable distribution situations or long transportation distances. We use the HuaiHua International Inland Port as the simulation object, and the simulation results show that the proposed method has the highest efficiency in logistics distribution and is still highly adaptive in emergency situations.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"27 1","pages":"324-329"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81777847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near-Source Attack for Isolated Networks with Covert Channel Transmission 隐蔽信道传输隔离网络的近源攻击
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00019
Zhiqiang Ruan, Yuchen Yang, Lejia Chen
This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-gapped networks. We first analyze and implement a common technology known as Ghost Tunnel, which allows the attacker to control the target host and transmit information without being detected. However, this method suffers from frame loss, repeated frame, and attack transparency. We then propose an improved solution to deliver malicious programs to the target host using a modified BadUSB hardware device. Once the attackers successfully get in the isolated networks, they can bypass security protection devices and exploit vulnerabilities of communication protocols, so that they can remote control of target devices and hidden data transmission. We further conducted experiments to verify the feasibility and effectiveness of this attack scheme. The results indicate that the attack logic is capable of inducing the target host to engage in covert communication. Finally, we give some defense measures for such attacks.
本文研究了一种新的攻击方法——“近源攻击”。它利用802.11协议的广播帧建立隐藏隧道,绕过物理隔离网络或气隙网络。我们首先分析并实现一种称为幽灵隧道的常见技术,该技术允许攻击者控制目标主机并在不被检测到的情况下传输信息。但该方法存在丢帧、重复帧、攻击透明等缺点。然后,我们提出了一种改进的解决方案,使用改进的BadUSB硬件设备将恶意程序传递到目标主机。攻击者一旦成功进入隔离网络,就可以绕过安全防护设备,利用通信协议漏洞,远程控制目标设备,隐藏数据传输。我们进一步通过实验验证了该攻击方案的可行性和有效性。结果表明,该攻击逻辑能够诱导目标主机进行隐蔽通信。最后,提出了防范此类攻击的措施。
{"title":"Near-Source Attack for Isolated Networks with Covert Channel Transmission","authors":"Zhiqiang Ruan, Yuchen Yang, Lejia Chen","doi":"10.1109/CSCloud-EdgeCom58631.2023.00019","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00019","url":null,"abstract":"This paper investigates a new attack method called \"near-source attack\". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-gapped networks. We first analyze and implement a common technology known as Ghost Tunnel, which allows the attacker to control the target host and transmit information without being detected. However, this method suffers from frame loss, repeated frame, and attack transparency. We then propose an improved solution to deliver malicious programs to the target host using a modified BadUSB hardware device. Once the attackers successfully get in the isolated networks, they can bypass security protection devices and exploit vulnerabilities of communication protocols, so that they can remote control of target devices and hidden data transmission. We further conducted experiments to verify the feasibility and effectiveness of this attack scheme. The results indicate that the attack logic is capable of inducing the target host to engage in covert communication. Finally, we give some defense measures for such attacks.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"1068 1","pages":"59-64"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88107047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copyright 版权
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00003
{"title":"Copyright","authors":"","doi":"10.1109/cscloud-edgecom58631.2023.00003","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00003","url":null,"abstract":"","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"6 1","pages":""},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85585884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Program Chairs - EdgeCom 2023 EdgeCom 2023节目主持人致辞
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00008
{"title":"Message from the Program Chairs - EdgeCom 2023","authors":"","doi":"10.1109/cscloud-edgecom58631.2023.00008","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00008","url":null,"abstract":"","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"371 1","pages":""},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84928707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSA-Fed: Model Similarity Aware Federated Learning for Data Heterogeneous QoS Prediction 基于模型相似度感知的数据异构QoS预测联邦学习
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00055
Yuelong Liu, Zhuo Xu, Jian Lin, Jianlong Xu, Lingru Cai
In the era of big data, QoS prediction is crucial for providing high-quality cloud services. However, conventional centralized approaches may pose privacy risks as they require users to upload QoS data. Additionally, variations in geographic and network environments can lead to QoS data heterogeneity, making it difficult to achieve learning efficiency with traditional methods. To address the privacy and heterogeneity issues, we propose a novel federated matrix factorization method with model similarity awareness for QoS prediction, called MSA-Fed. MSA-Fed clusters the local models uploaded by users during the learning process and performs differential aggregation and assignments of global models based on the clustering results. We evaluated the proposed framework on a publicly available and widely used real-world QoS dataset, and the experimental results demonstrate the effectiveness of MSA-Fed in achieving accurate QoS prediction, improving communication efficiency and maintaining users’ privacy.
在大数据时代,QoS预测对于提供高质量的云服务至关重要。然而,传统的集中式方法可能会带来隐私风险,因为它们需要用户上传QoS数据。此外,地理和网络环境的变化会导致QoS数据的异构性,使传统方法难以达到学习效率。为了解决隐私和异构性问题,我们提出了一种新的具有模型相似性感知的联邦矩阵分解方法,称为MSA-Fed。MSA-Fed对用户在学习过程中上传的局部模型进行聚类,并根据聚类结果对全局模型进行微分聚合和分配。我们在一个公开可用且广泛使用的真实QoS数据集上对所提出的框架进行了评估,实验结果证明了MSA-Fed在实现准确的QoS预测、提高通信效率和维护用户隐私方面的有效性。
{"title":"MSA-Fed: Model Similarity Aware Federated Learning for Data Heterogeneous QoS Prediction","authors":"Yuelong Liu, Zhuo Xu, Jian Lin, Jianlong Xu, Lingru Cai","doi":"10.1109/CSCloud-EdgeCom58631.2023.00055","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00055","url":null,"abstract":"In the era of big data, QoS prediction is crucial for providing high-quality cloud services. However, conventional centralized approaches may pose privacy risks as they require users to upload QoS data. Additionally, variations in geographic and network environments can lead to QoS data heterogeneity, making it difficult to achieve learning efficiency with traditional methods. To address the privacy and heterogeneity issues, we propose a novel federated matrix factorization method with model similarity awareness for QoS prediction, called MSA-Fed. MSA-Fed clusters the local models uploaded by users during the learning process and performs differential aggregation and assignments of global models based on the clustering results. We evaluated the proposed framework on a publicly available and widely used real-world QoS dataset, and the experimental results demonstrate the effectiveness of MSA-Fed in achieving accurate QoS prediction, improving communication efficiency and maintaining users’ privacy.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"36 1","pages":"281-286"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83811739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Emotion Recognition Method 深度学习情感识别方法
IF 4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00067
Weidong Xiao, Wenjin Tan, Naixue Xiong, Ce Yang, Lin Chen, Rui Xie
Emotion recognition refers to the process of actively analyzing human emotions through computer technology, and it has become an important part of modern society. Traditional emotion recognition is mainly based on a single information source, such as text, speech, video, etc., from which emotional features are extracted for classification or regression to recognize human emotions. With the development of artificial intelligence technology, multimodal emotion recognition is gradually becoming widely used. It combines two or more types of information, such as text, speech, and visual information, in different ways to analyze emotions. Multimodal emotion recognition is far superior to a single modality in understanding emotions. This article mainly analyzes the technology of emotion analysis. Firstly, we introduce the basic concepts and research status of emotion recognition. Then, we introduce the main types of emotion recognition and describe various methods used in the process in detail. Finally, we discuss the challenges and future developments of emotion recognition.
情感识别是指通过计算机技术主动分析人类情感的过程,已成为现代社会的重要组成部分。传统的情感识别主要是基于单一的信息源,如文本、语音、视频等,从中提取情感特征进行分类或回归,从而识别人类的情感。随着人工智能技术的发展,多模态情感识别逐渐得到广泛应用。它结合了两种或两种以上类型的信息,如文本、语音和视觉信息,以不同的方式来分析情绪。多模态情绪识别在理解情绪方面远优于单模态。本文主要分析了情感分析技术。首先介绍了情绪识别的基本概念和研究现状。然后,我们介绍了情绪识别的主要类型,并详细描述了在此过程中使用的各种方法。最后,我们讨论了情感识别的挑战和未来的发展。
{"title":"Deep Learning Emotion Recognition Method","authors":"Weidong Xiao, Wenjin Tan, Naixue Xiong, Ce Yang, Lin Chen, Rui Xie","doi":"10.1109/CSCloud-EdgeCom58631.2023.00067","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00067","url":null,"abstract":"Emotion recognition refers to the process of actively analyzing human emotions through computer technology, and it has become an important part of modern society. Traditional emotion recognition is mainly based on a single information source, such as text, speech, video, etc., from which emotional features are extracted for classification or regression to recognize human emotions. With the development of artificial intelligence technology, multimodal emotion recognition is gradually becoming widely used. It combines two or more types of information, such as text, speech, and visual information, in different ways to analyze emotions. Multimodal emotion recognition is far superior to a single modality in understanding emotions. This article mainly analyzes the technology of emotion analysis. Firstly, we introduce the basic concepts and research status of emotion recognition. Then, we introduce the main types of emotion recognition and describe various methods used in the process in detail. Finally, we discuss the challenges and future developments of emotion recognition.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"126 1","pages":"357-362"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88681919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing-Advances Systems and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1