{"title":"An optimized prediction algorithm based on XGBoost","authors":"Cheng Sheng, Haizheng Yu","doi":"10.1109/NaNA56854.2022.00082","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00082","url":null,"abstract":"The real estate market is closely related to people's life. It is very important to accurately predict the future real estate price. Traditional methods are difficult to describe the nonlinear characteristics of house price prediction. XGBoost algorithm can effectively represent the nonlinear relationship in house price prediction. However, the selection of parameters determines the learning and generalization ability of XGBoost, and it is very important to determine the parameters of XGBoost. Particle swarm optimization algorithm can select the training parameters of XGBoost more quickly and accurately. Therefore, this paper studies the house price prediction based on the hybrid model of particle swarm optimization XGBoost algorithm, namely PSO-XGBoost model. Using the collected sample data of houses in Ames, Iowa, five different machine learning algorithms including PSO-XGBoost are used to predict house prices. Finally, the results of five algorithms are compared and analyzed. The experimental results show that PSO-XGBoost model has the highest prediction accuracy and the best effect, and the prediction effect of integrated learning algorithm is better than that of linear regression model.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"102 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The test and evaluation method for the effect of WLAN network quality on hosted services","authors":"Yiming Pan, Zhen Shao, Goujin Huang, Yiming Li, Fangfang Zuo","doi":"10.1109/NaNA56854.2022.00025","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00025","url":null,"abstract":"This paper proposes a method to evaluate WLAN network quality from the perspective of customer perception. This paper describes the construction of the test environment, the process of using mathematical methods to find the relationship between typical Internet Service Perception indicators and WLAN network quality indicators, and determines the boundary threshold of each quality interval. The method described in this paper can be used to provide optimization guidance and quality evaluation means for home WLAN networking.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124832961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hengwei Zhang, Zheming Li, Haowen Liu, Bo Yang, Chenwei Li, Jin-dong Wang
{"title":"Rotation Model Enhancement for Adversarial Attack","authors":"Hengwei Zhang, Zheming Li, Haowen Liu, Bo Yang, Chenwei Li, Jin-dong Wang","doi":"10.1109/NaNA56854.2022.00080","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00080","url":null,"abstract":"Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neural networks model, and excessively depend on that model. To address that problem, we propose a rotation model enhancement algorithm to craft adversarial examples. We improve rotation method in model enhancement. This algorithm constructs a possibility model to randomly rotate original images, and generates multiple transformed images. Therefore, we craft adversarial examples with single model, and boost attack on multiple models, which demonstrate considerable transferability and success rate for black-box attack. The simulation indicates the algorithm boost black-box attack with a 89.2% success rate.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131759672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuxiang Chen, Yao Hao, Zhongqiang Yi, Xiaoyu Guo, Chunxiang Xu
{"title":"Ciphertext storage scheme supporting data hierarchical management and control","authors":"Yuxiang Chen, Yao Hao, Zhongqiang Yi, Xiaoyu Guo, Chunxiang Xu","doi":"10.1109/NaNA56854.2022.00042","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00042","url":null,"abstract":"As file management is widely used in e-government and enterprise office, the file exchange, as the main means of sharing and collaborating in office, has been far from able to meet the needs of data security. Encrypted Storage with its highly security, controllability, can be an effective solution to the limitations of existing authority control services. However, during the data sharing and exchange, the file is separated from the owner, which has the problem of insufficient or over -authorization, thus needs fine-grained hierarchical control and cooperation. In this article, we propose a hierarchical management and control scheme for encrypted storage combined with ciphertext retrieval. The proposed scheme supports top-down privilege division without increasing the number of managed keys, all the data are processed and authorized strictly, the high-level user can deduce the keys of lower authorized users, but not vice versa, thus solving data leakage caused by over-authorization. Through performance and security analysis, we demonstrate that the scheme can better meet the data security and precise authorization requirements.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128535385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haining Meng, Jia-wan Zhang, Y. Zheng, Wenjiang Ji, Xinyu Tong, Xinhong Hei
{"title":"Track Irregularity Prediction Based on DWT-DLSTM Model","authors":"Haining Meng, Jia-wan Zhang, Y. Zheng, Wenjiang Ji, Xinyu Tong, Xinhong Hei","doi":"10.1109/NaNA56854.2022.00095","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00095","url":null,"abstract":"The long-term operation of high-speed railway will lead to track irregularity that will cause random vibration of the track system and affect driving safety. The accurate prediction of track irregularity is of great significance to the quality of high-speed railway. In this paper, we proposed a DWT-DLSTM model to predict the track irregularity for high-speed railway. Firstly, the track irregularity time series data is denoised through the discrete wavelet transform (DWT). Then the deep long short-term memory (DLSTM) neural network is adopted to predict the denoised data. Finally, the experiment results show that the proposed DWT-DLSTM model outperforms other traditional models and obtain more accurate prediction results for track irregularity.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125140393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Miyajima, Noritaka Shigei, H. Miyajima, N. Shiratori
{"title":"Secure Distributed Processing of NG with Updatable Decomposition Data and Parameters","authors":"H. Miyajima, Noritaka Shigei, H. Miyajima, N. Shiratori","doi":"10.1109/NaNA56854.2022.00067","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00067","url":null,"abstract":"Machine learning using distributed data, such as federative learning (FL) and secure multiparty computation (SMC), is demanded to achieve both utility and confidentiality when using confidential data. There is a trade-off between utility and confidentiality, and in general, SMC can offer better confidentiality than FL and better utility than homomorphic encryption. In machine learning with SMC, confidentiality is improved by decomposing individual data and parameters into multiple pieces, storing each piece on each server, and learning without restoring the data or parameters themselves. However, once the conventional methods randomly decompose data and parameters, the decomposition remains permanently fixed. The fixed decomposition is considered undesirable because it gives malicious attackers more opportunities to attack the data and model. In this paper, we propose a secure distributed processing of neural gas (NG), which is one of unsupervised machine learning. In addition to the decomposition of data, the proposed method can update the decomposition of parameters during learning. Each server can independently update the decomposition of both data and parameters in the proposed method, and the data and parameters are never restored during learning. Our simulation result shows that it can achieve the same level of learning accuracy as the conventional methods.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128954584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object detection algorithm based on cosine similarity IoU","authors":"Sugang Ma, Ningbo Li, Peng Guansheng, Yanping Chen, Wang Ying, Zhiqiang Hou","doi":"10.1109/NaNA56854.2022.00077","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00077","url":null,"abstract":"Aiming at the problem that the traditional IoU-NMS algorithm has poor filtering of redundant boxes with high confidence scores in RetinaNet, an object detection algorithm based on cosine similarity IoU is proposed. Based on the original IoU calculation method, the cosine similarity between the detection boxes is calculated by the vector to better evaluate the similarity between them, which removes redundant boxes with high confidence scores and retain more accurate detection boxes. Meanwhile, CBAM is added to the ResNet-50 network to extract richer semantic information. the detection accuracy of the PASCAL VOC dataset reaches 80.6%, which is 2.1% higher than the benchmark algorithm.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"19 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121011379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimized Key-Value Raft Algorithm for Satisfying Linearizable Consistency","authors":"Xiao Liu, Zhao Huang, Quan Wang, Nan Luo","doi":"10.1109/NaNA56854.2022.00096","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00096","url":null,"abstract":"Nowadays, the distributed systems have been widely applied in a variety of fields. However, this raises more concerns on reliability. Consensus algorithm is an important measure to ensure reliability of distributed systems, but its strong consistency may reduce the performance, resulting in cluster failure or even downtime. To this end, we propose an accelerated log backtracking optimization Raft algorithm, called ALB-Raft. It can improve the performance of traditional raft algorithm by enabling the backward tracker to update quickly. In particular, to achieve strong consistency, we construct a fault-tolerant distributed key-value (KV) service which conforms to the linearizable semantics. The experimental results illustrate that, when compared to the traditional raft algorithm, the proposed ALB-Raft consensus algorithm can resolve 20% of hundreds of log entry conflicts. Moreover, the ALB-Raft algorithm can also avoid the linear increase in the number of messages with the aggravation of log conflicts to ensure strong consistency.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles","authors":"Yongjie Zhou, Jinbo Xiong, Renwan Bi, Youliang Tian","doi":"10.1109/NaNA56854.2022.00022","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00022","url":null,"abstract":"The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition cameras and lidar). For the sake of the category and location privacy leakage of sensing images shared by CAVs and computational inefficiency of privacy-preserving object detection framework in edge computing environment, we propose a lightweight and privacy-preserving detection framework (PPDF) to support secure extraction, classification and detection of image features, and achieve the goal of data transmission and computing security under the collaborative detection process of edge nodes. Particularly, we design a secure clustering prediction protocol of object anchors, a secure object classification and regression protocol, secure object upsampling and secure feature fusion protocols. Finally, PPDF based on edge-cooperation was constructed and two non-collusive edge servers were used to perform PPDF. Theoretical analysis of correctness, security and complexity indicate that PPDF can not only realize correctness of object detection, but also let category and location privacy of images are protected effectively and have excellent accuracy. Actual performance evaluation shows that PPDF can achieve the same detection accuracy as original YOLOv3-SPP model. At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPDF has obvious advantages in terms of computational cost and communication overhead.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115343135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Resource Allocation Scheme Based on Memetic Algorithm for D2D Communication","authors":"Yongqiang Xia, Luping Tang, Hairui Wang, Yijun Wang, Jialong Hou","doi":"10.1109/NaNA56854.2022.00008","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00008","url":null,"abstract":"In this paper, we propose a new resource allocation scheme based on improved memetic algorithm to solve the complex interference problem caused by multiple device-to-device (D2D) users multiplexing the channel resources occupied by multiple cellular users. Firstly, we initialize the total channel multiplexing strategies of D2D users according to the channel state information. Then, the global search and local search of the improved memetic algorithm are used to optimize these initial total channel multiplexing strategies. The optimization is accompanied by the dynamic control of D2D user transmission power, and the global optimal solution is found through iteration. The purpose is to maximize the system capacity while ensuring the minimum information transmission rate of each cellular user. Simulation results show that the convergence rate and system capacity of the proposed scheme are significantly improved compared with the existing methods, and the complexity of the algorithm is lower.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116002994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}