首页 > 最新文献

2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)最新文献

英文 中文
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/cse53436.2021.00003","DOIUrl":"https://doi.org/10.1109/cse53436.2021.00003","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83822078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Diagnosis Method Based on CWGAN-GP-1DCNN 基于CWGAN-GP-1DCNN的故障诊断方法
H. Yin, Yacui Gao, Chuanyun Liu, Shuangyin Liu
In the actual industrial process, the fault data collection is difficult, and the fault sample is insufficient. The Imbalanced datasets is the main problem that is faced at present. However, the fault diagnosis method based on model optimization has over-fitting phenomenon in the training process. Therefore, using data enhancement methods to provide effective and sufficient fault samples for fault detection and diagnosis is a research hotspot to deal the data imbalance problem. To solve this problem, in this paper, a Conditional Wasserstein Generative Adversarial Network (CWGAN-GP1DCNN) with gradient penalty based on one dimensional Convolutional Neural Network is proposed to enhance the data of real fault samples to detect all kinds of bearing faults. Experimental results show that the proposed method can effectively enhance the sample data, improve the diagnosis accuracy under the condition of unbalanced fault samples, and has good robustness and effectiveness.
在实际工业过程中,故障数据采集困难,故障样本不足。数据集不平衡是目前面临的主要问题。然而,基于模型优化的故障诊断方法在训练过程中存在过拟合现象。因此,利用数据增强方法为故障检测和诊断提供有效、充足的故障样本是解决数据不平衡问题的研究热点。为了解决这一问题,本文提出了一种基于一维卷积神经网络的梯度惩罚条件Wasserstein生成对抗网络(CWGAN-GP1DCNN),对真实故障样本数据进行增强,以检测各种轴承故障。实验结果表明,该方法能有效增强样本数据,提高故障样本不平衡情况下的诊断准确率,具有良好的鲁棒性和有效性。
{"title":"Fault Diagnosis Method Based on CWGAN-GP-1DCNN","authors":"H. Yin, Yacui Gao, Chuanyun Liu, Shuangyin Liu","doi":"10.1109/CSE53436.2021.00013","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00013","url":null,"abstract":"In the actual industrial process, the fault data collection is difficult, and the fault sample is insufficient. The Imbalanced datasets is the main problem that is faced at present. However, the fault diagnosis method based on model optimization has over-fitting phenomenon in the training process. Therefore, using data enhancement methods to provide effective and sufficient fault samples for fault detection and diagnosis is a research hotspot to deal the data imbalance problem. To solve this problem, in this paper, a Conditional Wasserstein Generative Adversarial Network (CWGAN-GP1DCNN) with gradient penalty based on one dimensional Convolutional Neural Network is proposed to enhance the data of real fault samples to detect all kinds of bearing faults. Experimental results show that the proposed method can effectively enhance the sample data, improve the diagnosis accuracy under the condition of unbalanced fault samples, and has good robustness and effectiveness.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"27 1","pages":"20-26"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79076943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A K-nearest neighbor classifier based on homomorphic encryption scheme 基于同态加密方案的k近邻分类器
Zhenzhou Guo, Weifeng Jin, Xintong Li, Han Qi, Changqing Gong
Homomorphic encryption technology can analyze the data stored in the cloud without decryption, because the results of ciphertext calculation after decryption are the same as the corresponding plaintext calculation results. Based on homomorphic encryption and machine learning technology, this paper proposes a K-nearest neighbor classifier based on homomorphic encryption scheme, Homomorphic encryption technology can not only ensure the security of the data, but also analyze the data in the ciphertext state since the characteristics of homomorphism, avoiding the data insecurity problem caused by analyzing the data after decryption in the clound. In this scheme, we first improve the ciphertext comparison algorithm and improve the judgment of sample label in ciphertext state. Then, using k-nearest neighbor classifier, a ring based selection algorithm is designed to reduce the time of ciphertext operation. The results show that our scheme can realizes the ciphertext classification On the condition of ensuring the accuracy of classification. Compared with the original k-nearest neighbor classification method, the classification accuracy of the our algorithm is improved about 1%, but the time cost is larger than the original k-nearest neighbor classification method.
同态加密技术可以对存储在云端的数据进行无需解密的分析,因为解密后的密文计算结果与对应的明文计算结果是一致的。本文基于同态加密和机器学习技术,提出了一种基于k近邻分类器的同态加密方案,同态加密技术不仅可以保证数据的安全性,而且由于同态的特性,可以在密文状态下对数据进行分析,避免了在云端解密后对数据进行分析所带来的数据不安全问题。在该方案中,我们首先改进了密文比较算法,改进了密文状态下样本标号的判断。然后,利用k近邻分类器,设计了一种基于环的密文选择算法,以减少密文操作的时间。实验结果表明,该方案能够在保证分类精度的前提下实现对密文的分类。与原k近邻分类方法相比,本算法的分类准确率提高了约1%,但时间开销比原k近邻分类方法大。
{"title":"A K-nearest neighbor classifier based on homomorphic encryption scheme","authors":"Zhenzhou Guo, Weifeng Jin, Xintong Li, Han Qi, Changqing Gong","doi":"10.1109/CSE53436.2021.00024","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00024","url":null,"abstract":"Homomorphic encryption technology can analyze the data stored in the cloud without decryption, because the results of ciphertext calculation after decryption are the same as the corresponding plaintext calculation results. Based on homomorphic encryption and machine learning technology, this paper proposes a K-nearest neighbor classifier based on homomorphic encryption scheme, Homomorphic encryption technology can not only ensure the security of the data, but also analyze the data in the ciphertext state since the characteristics of homomorphism, avoiding the data insecurity problem caused by analyzing the data after decryption in the clound. In this scheme, we first improve the ciphertext comparison algorithm and improve the judgment of sample label in ciphertext state. Then, using k-nearest neighbor classifier, a ring based selection algorithm is designed to reduce the time of ciphertext operation. The results show that our scheme can realizes the ciphertext classification On the condition of ensuring the accuracy of classification. Compared with the original k-nearest neighbor classification method, the classification accuracy of the our algorithm is improved about 1%, but the time cost is larger than the original k-nearest neighbor classification method.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"24 1","pages":"101-107"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75040901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improvement for Value-Based Reinforcement Learning Method Through Increasing Discount Factor Substitution 基于价值的强化学习方法的增加折现因子替代改进
Linjian Hou, Zhengming Wang, Han Long
Discount factor is typically considered as a constant value in conventional Reinforcement Learning (RL) methods, and the exponential inhibition is used to evaluate the future rewards that can guarantee the theoretical convergence of Bellman Equation. However, exponential inhibition mode greatly underestimates future rewards, which is obviously unreasonable. Future rewards, especially those that are closer to the completion of the task, should be given greater importance. In this paper, we review the rationale of discount factor and propose an increasing discount factor to reduce the underestimation effect of exponential inhibition on future rewards. We test two value-based reinforcement learning methods in three scenarios to verify our method. The experimental results show that value-based reinforcement learning with increasing discount factor is more efficient than it with fixed discount factor under certain circumstances.
在传统的强化学习(RL)方法中,折扣因子通常被认为是一个常数值,并使用指数抑制来评估未来奖励,从而保证Bellman方程的理论收敛性。然而,指数抑制模式大大低估了未来奖励,这显然是不合理的。未来的奖励,特别是那些接近完成任务的奖励,应该给予更大的重视。本文回顾了贴现因子的基本原理,并提出了增加贴现因子以减少指数抑制对未来奖励的低估效应。我们在三个场景中测试了两种基于值的强化学习方法来验证我们的方法。实验结果表明,在特定情况下,增加折现因子的基于值的强化学习比固定折现因子的强化学习更有效。
{"title":"An Improvement for Value-Based Reinforcement Learning Method Through Increasing Discount Factor Substitution","authors":"Linjian Hou, Zhengming Wang, Han Long","doi":"10.1109/CSE53436.2021.00023","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00023","url":null,"abstract":"Discount factor is typically considered as a constant value in conventional Reinforcement Learning (RL) methods, and the exponential inhibition is used to evaluate the future rewards that can guarantee the theoretical convergence of Bellman Equation. However, exponential inhibition mode greatly underestimates future rewards, which is obviously unreasonable. Future rewards, especially those that are closer to the completion of the task, should be given greater importance. In this paper, we review the rationale of discount factor and propose an increasing discount factor to reduce the underestimation effect of exponential inhibition on future rewards. We test two value-based reinforcement learning methods in three scenarios to verify our method. The experimental results show that value-based reinforcement learning with increasing discount factor is more efficient than it with fixed discount factor under certain circumstances.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"47 1","pages":"94-100"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76649024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Loop Closure Detection for Visual SLAM Systems Based on Convolutional Netural Network 基于卷积神经网络的视觉SLAM系统闭环检测
Xiangbin Shi, Lin Li
In this paper, the loop closure detection technology is studied. Aiming at the problem that the use of artificially marked feature points in the traditional visual SLAM algorithm leads to a significant decrease in the accuracy of the loop detection algorithm in a complex environment and an environment with obvious lighting changes, this paper proposes a loop closure detection algorithm based on deep learning. Firstly, the YOLOv4 model with optimized loss function is used to detect the target in the images collected by the camera. Then, the Locality Sensitive Hash function is used to reduce the dimension of high-dimensional data, and the loop is determined according to the cosine distance. Finally, the simulation results show that the algorithm can reduce the cumulative error of the robot, obtain the global consistency map, and achieve better results in real-time and accuracy.
本文对闭环检测技术进行了研究。针对传统视觉SLAM算法中使用人为标记特征点导致环路检测算法在复杂环境和光照变化明显的环境下精度明显下降的问题,本文提出了一种基于深度学习的闭环检测算法。首先,利用优化损失函数的YOLOv4模型对摄像机采集的图像中的目标进行检测。然后,利用Locality Sensitive Hash函数对高维数据进行降维,并根据余弦距离确定循环;最后,仿真结果表明,该算法可以减小机器人的累积误差,获得全局一致性图,在实时性和精度上取得较好的效果。
{"title":"Loop Closure Detection for Visual SLAM Systems Based on Convolutional Netural Network","authors":"Xiangbin Shi, Lin Li","doi":"10.1109/CSE53436.2021.00027","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00027","url":null,"abstract":"In this paper, the loop closure detection technology is studied. Aiming at the problem that the use of artificially marked feature points in the traditional visual SLAM algorithm leads to a significant decrease in the accuracy of the loop detection algorithm in a complex environment and an environment with obvious lighting changes, this paper proposes a loop closure detection algorithm based on deep learning. Firstly, the YOLOv4 model with optimized loss function is used to detect the target in the images collected by the camera. Then, the Locality Sensitive Hash function is used to reduce the dimension of high-dimensional data, and the loop is determined according to the cosine distance. Finally, the simulation results show that the algorithm can reduce the cumulative error of the robot, obtain the global consistency map, and achieve better results in real-time and accuracy.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"52 1","pages":"123-129"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82736922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel sentiment classification based on “word-phrase” attention mechanism 一种基于“词-短语”注意机制的情感分类方法
Guangyao Pang, Guobei Peng, Zizhen Peng, Jie He, Yan Yang, Zhiyi Mo
With the rapid development of the COVID-19 epidemic, people are prone to panic due to delayed and incomplete information received. In order to quickly identify the sentiments of massive Internet users, it provides a good reference for government agencies to formulate healthy public opinion guidance strategies. This paper proposes a novel sentiment classification based on “word-phrase” attention mechanism (SC-WPAtt). On the basis of TCN, we propose a shallow feature extraction model based on the word attention mechanism, and a deep extraction model based on the phrase attention mechanism. These models can effectively mine the auxiliary information contained in words, phrases (i.e. combined words) and overall comments, as well as their different contributions, so as to achieve more accurate emotion classification. Experiments show that the performance of the SC-WPAtt method proposed in this paper is better than that of the HN-Att method.
随着新冠肺炎疫情的快速发展,人们容易因收到的信息延迟和不完整而产生恐慌情绪。为了快速识别海量网民的情绪,为政府机构制定健康的舆论引导策略提供了很好的参考。提出了一种基于“词-短语”注意机制的情感分类方法。在TCN的基础上,提出了基于词注意机制的浅特征提取模型和基于短语注意机制的深特征提取模型。这些模型可以有效地挖掘词、短语(即组合词)和整体评论中包含的辅助信息,以及它们的不同贡献,从而实现更准确的情感分类。实验表明,本文提出的SC-WPAtt方法的性能优于HN-Att方法。
{"title":"A novel sentiment classification based on “word-phrase” attention mechanism","authors":"Guangyao Pang, Guobei Peng, Zizhen Peng, Jie He, Yan Yang, Zhiyi Mo","doi":"10.1109/CSE53436.2021.00017","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00017","url":null,"abstract":"With the rapid development of the COVID-19 epidemic, people are prone to panic due to delayed and incomplete information received. In order to quickly identify the sentiments of massive Internet users, it provides a good reference for government agencies to formulate healthy public opinion guidance strategies. This paper proposes a novel sentiment classification based on “word-phrase” attention mechanism (SC-WPAtt). On the basis of TCN, we propose a shallow feature extraction model based on the word attention mechanism, and a deep extraction model based on the phrase attention mechanism. These models can effectively mine the auxiliary information contained in words, phrases (i.e. combined words) and overall comments, as well as their different contributions, so as to achieve more accurate emotion classification. Experiments show that the performance of the SC-WPAtt method proposed in this paper is better than that of the HN-Att method.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"9 1","pages":"51-56"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73093723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring investment strategies for federated learning infrastructure in medical care 探索医疗保健中联邦学习基础设施的投资策略
Ju Xing, Xu Zhang, Zexun Jiang, Ruilin Zhang, Cong Zha, Hao Yin
Recently, federated learning has gained substantial attention in medical care where privacy-preserving cooperation among hospitals is required. However, in a real-world situation, the deployment of a federated learning system among hospitals requires heavy investment in computing and network infrastructure. Under such a case, making investment effective across computing power and network capability is essential. In this paper, we propose an investment methodology following the growth saturation of learning efficiency. We also systematically study the impacts of non-investment factors on the application of this methodology. With consideration of relevant cost models, the methodology is validated cost-effective.
最近,联邦学习在医疗保健领域获得了极大的关注,这需要医院之间的隐私保护合作。然而,在现实世界中,在医院之间部署联邦学习系统需要在计算和网络基础设施上进行大量投资。在这种情况下,跨计算能力和网络能力进行有效的投资至关重要。在本文中,我们提出了一种遵循学习效率增长饱和的投资方法。本文还系统地研究了非投资因素对该方法应用的影响。结合相关成本模型,验证了该方法的成本效益。
{"title":"Exploring investment strategies for federated learning infrastructure in medical care","authors":"Ju Xing, Xu Zhang, Zexun Jiang, Ruilin Zhang, Cong Zha, Hao Yin","doi":"10.1109/CSE53436.2021.00034","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00034","url":null,"abstract":"Recently, federated learning has gained substantial attention in medical care where privacy-preserving cooperation among hospitals is required. However, in a real-world situation, the deployment of a federated learning system among hospitals requires heavy investment in computing and network infrastructure. Under such a case, making investment effective across computing power and network capability is essential. In this paper, we propose an investment methodology following the growth saturation of learning efficiency. We also systematically study the impacts of non-investment factors on the application of this methodology. With consideration of relevant cost models, the methodology is validated cost-effective.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"4 1","pages":"177-184"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89023198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near-duplicate Video Retrieval Based on Deep Unsupervised Key Frame Hashing 基于深度无监督关键帧哈希的近重复视频检索
Wenhao Zhao, Shijiao Yang, Mengqun Jin
In recent years, original videos are often re-edited, modified and redistributed, which not only cause copyright problems, but also deteriorate users’ experience. Near-duplicate video retrieval based on learning to hash has been widely concerned by people. However, there are still two major defects with existing methods. Firstly, the information capacity of hash code needs to be maximized. Secondly, the retrieval efficiency of partially repeated video is insufficient. In this paper, we propose a near-duplicate video retrieval method based on key frame hashing to improve retrieval performance. We design the semi-distributed hash layer to force the distribution of the continuous key frame hash code to approach the optimal distribution, i.e., the half-half distribution. By minimizing the semantic loss, quantization loss, and bit uncorrelated loss, we train our model to generate compact binary hash codes. To retrieve partially repeated videos, the proposed video subsequence matching method can accurately locate the near-duplicate fragments between the queried video and the target video. Experiments on two public datasets present that the mean average precision (MAP) of our hashing method is 0.63, which effectively improves the accuracy of video retrieval.
近年来,原创视频经常被重新编辑、修改和重新发布,这不仅造成了版权问题,而且影响了用户的体验。基于学习哈希的近重复视频检索技术受到了人们的广泛关注。然而,现有方法仍存在两大缺陷。首先,需要最大化哈希码的信息容量。其次,部分重复视频的检索效率不足。本文提出了一种基于关键帧哈希的近重复视频检索方法,以提高检索性能。我们设计了半分布式哈希层,以强制连续关键帧哈希码的分布接近最优分布,即半半分布。通过最小化语义损失、量化损失和位不相关损失,我们训练我们的模型来生成紧凑的二进制哈希码。为了检索部分重复的视频,本文提出的视频子序列匹配方法能够准确定位被查询视频与目标视频之间的近重复片段。在两个公开数据集上的实验表明,我们的哈希方法的平均精度(MAP)为0.63,有效地提高了视频检索的精度。
{"title":"Near-duplicate Video Retrieval Based on Deep Unsupervised Key Frame Hashing","authors":"Wenhao Zhao, Shijiao Yang, Mengqun Jin","doi":"10.1109/CSE53436.2021.00021","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00021","url":null,"abstract":"In recent years, original videos are often re-edited, modified and redistributed, which not only cause copyright problems, but also deteriorate users’ experience. Near-duplicate video retrieval based on learning to hash has been widely concerned by people. However, there are still two major defects with existing methods. Firstly, the information capacity of hash code needs to be maximized. Secondly, the retrieval efficiency of partially repeated video is insufficient. In this paper, we propose a near-duplicate video retrieval method based on key frame hashing to improve retrieval performance. We design the semi-distributed hash layer to force the distribution of the continuous key frame hash code to approach the optimal distribution, i.e., the half-half distribution. By minimizing the semantic loss, quantization loss, and bit uncorrelated loss, we train our model to generate compact binary hash codes. To retrieve partially repeated videos, the proposed video subsequence matching method can accurately locate the near-duplicate fragments between the queried video and the target video. Experiments on two public datasets present that the mean average precision (MAP) of our hashing method is 0.63, which effectively improves the accuracy of video retrieval.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"117 1","pages":"80-86"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79377419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semantic-based Replacement for Event Image Privacy 基于语义的事件图像隐私替换
Zhenfei Chen, Tianqing Zhu, Bing Tian, Yu Wang, Wei Ren
Thanks to the continuous development of deep learning and the updating of deep neural networks, the accuracy of various computer vision tasks continue improving. On the one hand, the accuracy of image recognition is significantly improved. On the other hand, it also poses a higher challenge of image-based privacy preservation. Although traditional privacy protection methods such as cryptography methods can provide a good privacy protection, they are extremely inconvenient to use and cannot provide good image utility. In order to obtain a balance between image privacy and utility, we propose a privacy-preserving model based on image semantic replacement. We perform semantic replacement or obfuscation to multiple information. Taking the human figures as an example, the information includes faces, scenes, and dressing style. As that information contributes the most to the recognition, we define those items as the privacy of the original image. We replace the event information of the original image, so that the figures in the image can no longer be recognized. With this strategy, the image can still be detected by various detection networks, such as scene detection, which ensures utility. The framework consists of three parts: detection network, scene replacement network, and clothing replacement network. A comprehensive and quantitative experiment set proves the effectiveness of the proposed model.
由于深度学习的不断发展和深度神经网络的不断更新,各种计算机视觉任务的精度不断提高。一方面,图像识别的准确率显著提高。另一方面,也对基于图像的隐私保护提出了更高的挑战。传统的隐私保护方法如密码学方法虽然可以提供很好的隐私保护,但使用起来极其不方便,不能提供很好的图像效用。为了在图像隐私性和实用性之间取得平衡,提出了一种基于图像语义替换的隐私保护模型。我们对多个信息进行语义替换或混淆。以人物为例,这些信息包括面孔、场景和着装风格。由于这些信息对识别的贡献最大,我们将这些信息定义为原始图像的隐私。我们对原图像中的事件信息进行替换,使图像中的人物不再被识别。使用该策略,图像仍然可以被各种检测网络检测,例如场景检测,从而保证了实用性。该框架由三部分组成:检测网络、场景替换网络和服装替换网络。一组全面、定量的实验证明了该模型的有效性。
{"title":"A Semantic-based Replacement for Event Image Privacy","authors":"Zhenfei Chen, Tianqing Zhu, Bing Tian, Yu Wang, Wei Ren","doi":"10.1109/CSE53436.2021.00028","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00028","url":null,"abstract":"Thanks to the continuous development of deep learning and the updating of deep neural networks, the accuracy of various computer vision tasks continue improving. On the one hand, the accuracy of image recognition is significantly improved. On the other hand, it also poses a higher challenge of image-based privacy preservation. Although traditional privacy protection methods such as cryptography methods can provide a good privacy protection, they are extremely inconvenient to use and cannot provide good image utility. In order to obtain a balance between image privacy and utility, we propose a privacy-preserving model based on image semantic replacement. We perform semantic replacement or obfuscation to multiple information. Taking the human figures as an example, the information includes faces, scenes, and dressing style. As that information contributes the most to the recognition, we define those items as the privacy of the original image. We replace the event information of the original image, so that the figures in the image can no longer be recognized. With this strategy, the image can still be detected by various detection networks, such as scene detection, which ensures utility. The framework consists of three parts: detection network, scene replacement network, and clothing replacement network. A comprehensive and quantitative experiment set proves the effectiveness of the proposed model.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"8 1","pages":"130-137"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79466632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods 使用静态方法的JavaScript浏览器端密码挖掘检测
Peiran Wang, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, Gang Long
Because of the rise of the Monroe coin, many JavaScript files with embedded malicious code are used to mine cryptocurrency using the computing power of the browser client. This kind of script does not have any obvious behaviors when it is running, so it is difficult for common users to witness them easily. This feature could lead the browser side cryptocurrency mining abused without the user’s permission. Traditional browser security strategies focus on information disclosure and malicious code execution, but not suitable for such scenes. Thus, we present a novel detection method named MineDetector using a machine learning algorithm and static features for automatically detecting browser-side cryptojacking scripts on the websites. MineDetector extracts five static feature groups available from the abstract syntax tree and text of codes and combines them using the machine learning method to build a powerful cryptojacking classifier. In the real experiment, MineDetector achieves the accuracy of 99.41% and the recall of 93.55% and has better performance in time comparing with present dynamic methods. We also made our work user-friendly by developing a browser extension that is click-to-run on the Chrome browser.
由于门罗币的兴起,许多嵌入恶意代码的JavaScript文件被用来利用浏览器客户端的计算能力来挖掘加密货币。这种脚本在运行时没有任何明显的行为,普通用户很难轻易看到。此功能可能导致浏览器端加密货币挖掘在未经用户许可的情况下被滥用。传统的浏览器安全策略侧重于信息泄露和恶意代码执行,不适合此类场景。因此,我们提出了一种名为MineDetector的新型检测方法,该方法使用机器学习算法和静态特征来自动检测网站上的浏览器端加密脚本。MineDetector从抽象语法树和代码文本中提取5个可用的静态特征组,并使用机器学习方法将它们组合起来,构建一个强大的加密劫持分类器。在实际实验中,该方法的准确率为99.41%,召回率为93.55%,与现有的动态方法相比,具有更好的实时性。我们还通过开发一个在Chrome浏览器上点击即可运行的浏览器扩展,使我们的工作对用户友好。
{"title":"MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods","authors":"Peiran Wang, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, Gang Long","doi":"10.1109/CSE53436.2021.00022","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00022","url":null,"abstract":"Because of the rise of the Monroe coin, many JavaScript files with embedded malicious code are used to mine cryptocurrency using the computing power of the browser client. This kind of script does not have any obvious behaviors when it is running, so it is difficult for common users to witness them easily. This feature could lead the browser side cryptocurrency mining abused without the user’s permission. Traditional browser security strategies focus on information disclosure and malicious code execution, but not suitable for such scenes. Thus, we present a novel detection method named MineDetector using a machine learning algorithm and static features for automatically detecting browser-side cryptojacking scripts on the websites. MineDetector extracts five static feature groups available from the abstract syntax tree and text of codes and combines them using the machine learning method to build a powerful cryptojacking classifier. In the real experiment, MineDetector achieves the accuracy of 99.41% and the recall of 93.55% and has better performance in time comparing with present dynamic methods. We also made our work user-friendly by developing a browser extension that is click-to-run on the Chrome browser.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"22 1","pages":"87-93"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80070521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1