2021 2nd International Conference on Computer Communication and Network Security (CCNS)最新文献

筛选
英文 中文
Anomaly Detection with Partially Observed Anomaly Types 部分观测异常类型的异常检测
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00028
Wanting Zhang, Le Gao, Shaoyong Li, Wenqi Li
{"title":"Anomaly Detection with Partially Observed Anomaly Types","authors":"Wanting Zhang, Le Gao, Shaoyong Li, Wenqi Li","doi":"10.1109/CCNS53852.2021.00028","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00028","url":null,"abstract":"In this paper, we consider the problem of anomaly detection when a small number of anomaly types are observed. Previous research primarily focused on supervised learning, when all samples are labeled. And unsupervised learning is used, when all samples are unlabeled. However, many settings do not satisfy the above two situations. Recently, there are some studies on the situations that anomalies are partially observed (e.g., Anomaly Detection with partially Observed Anomalies). It is generally believed that the anomalies are classifiable in these studies. And it is common that the types of observed anomalies cannot include all types of anomalies in the case of partially observed anomalies. We refer to this problem as anomaly detection with partially observed anomaly types and propose a two-stage anomaly detection algorithm in this condition. The proposed method in this paper is based on Anomaly Detection with partially Observed Anomalies and is available in the new setting. Experimental results demonstrate the effectiveness of the proposed method both in the case of insufficient types of observed anomalies and in the case of sufficient types of observed anomalies. Besides, anomaly detection with partially observed anomaly types avoids the use of hyper-parameter and has high generality in different datasets.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Semantic Feature Representation Method Based on Dynamic Selection of Sub-word-level and Word-level 基于子词级和词级动态选择的语义特征表示方法
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00017
XiaoDong Cai, ZhuCheng Gao, Shuting Zheng
{"title":"A Semantic Feature Representation Method Based on Dynamic Selection of Sub-word-level and Word-level","authors":"XiaoDong Cai, ZhuCheng Gao, Shuting Zheng","doi":"10.1109/CCNS53852.2021.00017","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00017","url":null,"abstract":"Aiming at the problem that low-frequency words or unregistered words are difficult to learn effective word-level feature information due to lack of training samples, which makes the semantic expression of text inaccurate, this paper proposes a semantic feature representation method based on sub-word-level and word-level dynamic selection. First of all, using the bidirectional Long Short-Term Memory network (Bi-LSTM) to capture the characteristics of potential long-distance dependencies, a Bi-LSTM-based sub-word feature representation method is designed on the basis of the Skip-gram method. Then, in order to accurately obtain the semantic feature representation of words, a new gated dynamic selection mechanism is designed, which combines sub-word-level and word-level feature vectors to enrich the effective information of words. The experimental results show that the method proposed in this paper is effective. Compared with the word representation method of related research, the Pearson and Spearman correlation coefficients of this method are significantly improved on the STS dataset and SICK dataset.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction model of forest fire area based on the improved Extreme Gradient Boosting 基于改进极值梯度增强的森林火灾面积预测模型
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00011
C. Ran, Lv Fang
{"title":"Prediction model of forest fire area based on the improved Extreme Gradient Boosting","authors":"C. Ran, Lv Fang","doi":"10.1109/CCNS53852.2021.00011","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00011","url":null,"abstract":"The key state-owned forest areas in the Greater Khingan Mountains of Inner Mongolia are areas with a high incidence of forest fires. Accurate prediction of forest fire is necessary for forest fire prevention and effective control. This paper uses satellite fire and meteorological data in the Greater Khingan Mountains of Inner Mongolia as the experimental data set, and uses geographic information system software for data preprocessing. Temperature, air pressure, wind speed, elevation, etc. are selected as explanatory variables. The Extreme Gradient Boosting (XGBoost) is proposed to predicts the area of forest fire in the study area. Bayesian parameter adjustment method is used in the modeling process. The results show that the model is superior to traditional regression algorithms in terms of error parameters, training speed, and prediction accuracy.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Encryption and verification scheme of source IPv6 address between Internet domains Internet域间源IPv6地址的加密和验证方案
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00032
Longfei Zhen, Ke Ma
{"title":"Encryption and verification scheme of source IPv6 address between Internet domains","authors":"Longfei Zhen, Ke Ma","doi":"10.1109/CCNS53852.2021.00032","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00032","url":null,"abstract":"Source address verification is to prevent nodes on the same link from deceiving each other’s IP addresses, to prevent hackers from gaining the trust of each other’s terminals, and then controlling the terminals, thus avoiding the penetration of attacks. Based on this, this paper proposes an inter-domain source IPv6 address encryption and verification scheme based on HMAC (HMAC-SAV). The verification scheme verifies the origin of data from transmission path and source/destination-end and identifies the authenticity of data packets. It makes up for the shortcomings of traditional Ingress/Egress filtering, thus preventing IP address spoofing attacks. Through the test vector evaluation of the HMAC-SAV scheme, it is proved that this scheme is a feasible and effective source address verification scheme with multiple verification methods.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Storage and Query Method of Satellite Image Data based on HBase 基于HBase的卫星图像数据分布式存储与查询方法
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00021
Hongjuan Liu, Jiancun Li, Wenjing Li, Wei Huang, Zhitao Shao, Yuan Zhang, Shiguang Wang, Zhaoying Yang
{"title":"Distributed Storage and Query Method of Satellite Image Data based on HBase","authors":"Hongjuan Liu, Jiancun Li, Wenjing Li, Wei Huang, Zhitao Shao, Yuan Zhang, Shiguang Wang, Zhaoying Yang","doi":"10.1109/CCNS53852.2021.00021","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00021","url":null,"abstract":"With the rapid development of aerospace industry, satellite image data has shown a blowout growth. At present, the annual data reception capacity of a satellite has reached TB level, and the data size of a satellite image can reach about 2GB. This poses a serious challenge. Based on the Hadoop framework, this paper studies the HBase-based satellite image big data solution, and provides three query methods as HBase, Hive, and Impala according to the application scenario.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121870357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信