{"title":"Anomaly Detection with Partially Observed Anomaly Types","authors":"Wanting Zhang, Le Gao, Shaoyong Li, Wenqi Li","doi":"10.1109/CCNS53852.2021.00028","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00028","url":null,"abstract":"In this paper, we consider the problem of anomaly detection when a small number of anomaly types are observed. Previous research primarily focused on supervised learning, when all samples are labeled. And unsupervised learning is used, when all samples are unlabeled. However, many settings do not satisfy the above two situations. Recently, there are some studies on the situations that anomalies are partially observed (e.g., Anomaly Detection with partially Observed Anomalies). It is generally believed that the anomalies are classifiable in these studies. And it is common that the types of observed anomalies cannot include all types of anomalies in the case of partially observed anomalies. We refer to this problem as anomaly detection with partially observed anomaly types and propose a two-stage anomaly detection algorithm in this condition. The proposed method in this paper is based on Anomaly Detection with partially Observed Anomalies and is available in the new setting. Experimental results demonstrate the effectiveness of the proposed method both in the case of insufficient types of observed anomalies and in the case of sufficient types of observed anomalies. Besides, anomaly detection with partially observed anomaly types avoids the use of hyper-parameter and has high generality in different datasets.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic Feature Representation Method Based on Dynamic Selection of Sub-word-level and Word-level","authors":"XiaoDong Cai, ZhuCheng Gao, Shuting Zheng","doi":"10.1109/CCNS53852.2021.00017","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00017","url":null,"abstract":"Aiming at the problem that low-frequency words or unregistered words are difficult to learn effective word-level feature information due to lack of training samples, which makes the semantic expression of text inaccurate, this paper proposes a semantic feature representation method based on sub-word-level and word-level dynamic selection. First of all, using the bidirectional Long Short-Term Memory network (Bi-LSTM) to capture the characteristics of potential long-distance dependencies, a Bi-LSTM-based sub-word feature representation method is designed on the basis of the Skip-gram method. Then, in order to accurately obtain the semantic feature representation of words, a new gated dynamic selection mechanism is designed, which combines sub-word-level and word-level feature vectors to enrich the effective information of words. The experimental results show that the method proposed in this paper is effective. Compared with the word representation method of related research, the Pearson and Spearman correlation coefficients of this method are significantly improved on the STS dataset and SICK dataset.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction model of forest fire area based on the improved Extreme Gradient Boosting","authors":"C. Ran, Lv Fang","doi":"10.1109/CCNS53852.2021.00011","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00011","url":null,"abstract":"The key state-owned forest areas in the Greater Khingan Mountains of Inner Mongolia are areas with a high incidence of forest fires. Accurate prediction of forest fire is necessary for forest fire prevention and effective control. This paper uses satellite fire and meteorological data in the Greater Khingan Mountains of Inner Mongolia as the experimental data set, and uses geographic information system software for data preprocessing. Temperature, air pressure, wind speed, elevation, etc. are selected as explanatory variables. The Extreme Gradient Boosting (XGBoost) is proposed to predicts the area of forest fire in the study area. Bayesian parameter adjustment method is used in the modeling process. The results show that the model is superior to traditional regression algorithms in terms of error parameters, training speed, and prediction accuracy.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption and verification scheme of source IPv6 address between Internet domains","authors":"Longfei Zhen, Ke Ma","doi":"10.1109/CCNS53852.2021.00032","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00032","url":null,"abstract":"Source address verification is to prevent nodes on the same link from deceiving each other’s IP addresses, to prevent hackers from gaining the trust of each other’s terminals, and then controlling the terminals, thus avoiding the penetration of attacks. Based on this, this paper proposes an inter-domain source IPv6 address encryption and verification scheme based on HMAC (HMAC-SAV). The verification scheme verifies the origin of data from transmission path and source/destination-end and identifies the authenticity of data packets. It makes up for the shortcomings of traditional Ingress/Egress filtering, thus preventing IP address spoofing attacks. Through the test vector evaluation of the HMAC-SAV scheme, it is proved that this scheme is a feasible and effective source address verification scheme with multiple verification methods.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Storage and Query Method of Satellite Image Data based on HBase","authors":"Hongjuan Liu, Jiancun Li, Wenjing Li, Wei Huang, Zhitao Shao, Yuan Zhang, Shiguang Wang, Zhaoying Yang","doi":"10.1109/CCNS53852.2021.00021","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00021","url":null,"abstract":"With the rapid development of aerospace industry, satellite image data has shown a blowout growth. At present, the annual data reception capacity of a satellite has reached TB level, and the data size of a satellite image can reach about 2GB. This poses a serious challenge. Based on the Hadoop framework, this paper studies the HBase-based satellite image big data solution, and provides three query methods as HBase, Hive, and Impala according to the application scenario.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121870357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}