Hao Chen, Lin Chen, Xiaoyun Kuang, Aidong Xu, Yiwei Yang
{"title":"Support Forward Secure Smart Grid Data Deduplication and Deletion Mechanism","authors":"Hao Chen, Lin Chen, Xiaoyun Kuang, Aidong Xu, Yiwei Yang","doi":"10.1109/ASSP54407.2021.00019","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00019","url":null,"abstract":"With the vigorous development of the Internet and the widespread popularity of smart devices, the amount of data it generates has also increased exponentially, which has also promoted the generation and development of cloud computing and big data. Given cloud computing and big data technology, cloud storage has become a good solution for people to store and manage data at this stage. However, when cloud storage manages and regulates massive amounts of data, its security issues have become increasingly prominent. Aiming at a series of security problems caused by a malicious user's illegal operation of cloud storage and the loss of all data, this paper proposes a threshold signature scheme that is signed by a private key composed of multiple users. When this method performs key operations of cloud storage, multiple people are required to sign, which effectively prevents a small number of malicious users from violating data operations. At the same time, the threshold signature method in this paper uses a double update factor algorithm. Even if the attacker obtains the key information at this stage, he can not calculate the complete key information before and after the time period, thus having the two-way security and greatly improving the security of the data in the cloud storage.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"718 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115127164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time Series Classification Based on Multi-scale Dynamic Convolutional Features and Distance Features","authors":"Tian Wang, Zhaoying Liu, Ting Zhang, Yujian Li","doi":"10.1109/ASSP54407.2021.00044","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00044","url":null,"abstract":"Time series classification is one of the most important and challenging problems in the field of data mining. This paper presents a time series classification model named FusionNet, which is based on multi-scale dynamic convolutional features and distance features. The main contribution of this paper includes three aspects: firstly, based on the multi-scale dynamic convolution operation, we propose a Multi-Scale Dynamic Convolution Network (MSDCNet). It uses multi-scale dynamic convolution to dynamically adjust the convolutional kernels for different input data and extract the features of time series. Secondly, by calculating the distance between the prototypes and the embedding vectors, we construct a Prototype Network (PrototypeNet) to extract the distance features of time series. At the same time, we design a distance loss to ensure to calculate the effective distance features. Finally, we fuse the multi-scale dynamic convolution features with the distance features to obtain the fusing features for classification. Experimental results on 44 UCR datasets show that the proposed FusionNet achieves better results on multiple datasets than the previous model, demonstrating its effectiveness.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Radio-Frequency Electromagnetic Field Radiated Immunity Automatic Test System in GTEM Cell Based on Labview","authors":"Keying Ma, Yunyun Hu, Hongtao Niu, Xiao-wei Tang, Wei Wang, Yifan Cui","doi":"10.1109/ASSP54407.2021.00034","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00034","url":null,"abstract":"Radio frequency electromagnetic field radi-ated immunity test is an important part of EMC (Electromagnetic Compatibility) test, which is usually tested in anechoic chamber to evaluate the immunity of the equipment to radio-frequency electromagnetic radiation. The construction of anechoic chamber and the system in-tegration almost cost millions or even tens of millions of yuan. Additionally, the test in chamber is inefficient be-cause the signal generator outputs slowly in order to avoid damage to high power equipments. For the users who just need the test of small products and equipment parts, the system of chamber is cost-ineffective. To solve the problem, the author designs a test system. The hardware of the sys-tem is based on GTEM (Gigahertz Transverse Electromagnetic) cell, equipped with suitable signal gen-erator, power amplifier, field strength probe etc. The software of the system is based on Labview automatic test program, which can realize the functions of instrument control, PID (Proportion, Integral, Differential) automatic adjustment, automatic test etc. The test results of the system meet the requirements of relevant standards. The system cost can be controlled in less than one million yuan. And the system without high power equipments is high efficiency and has low site requirements, which meets us-er's small products test demand.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131799265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Model Based on Multi-dimensional Attributes in Edge Computing","authors":"Jinhui Zhu, Liang Chen, Xiantong Liu, Lincong Zhao, Peipei Shen, Jinghan Chen","doi":"10.1109/ASSP54407.2021.00022","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00022","url":null,"abstract":"As a supplement to the cloud computing model, the edge computing model can use edge servers and edge devices to coordinate information processing on the edge of the network to help Internet of Thing (IoT) data storage, transmission, and computing tasks. In view of the complex and changeable situation of edge computing IoT scenarios, this paper proposes a multi-dimensional trust evaluation factor selection scheme. Improve the traditional trusted modeling method based on direct/indirect trust, introduce multi-dimensional trusted decision attributes and rely on the collaboration of edge servers and edge device nodes to infer and quantify the trusted relationship between nodes, and combine the information entropy theory to smoothly weight the calculation results of multi-dimensional decision attributes. Improving the current situation where the traditional trusted assessment scheme's dynamic adaptability to the environment and the lack of reliability of trusted assessment are relatively lacking. Simulation experiments show that the edge computing IoT multi-dimensional trust evaluation model proposed in this paper has better performance than the trusted model in related literature.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134116228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/assp54407.2021.00003","DOIUrl":"https://doi.org/10.1109/assp54407.2021.00003","url":null,"abstract":"","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoping Wang, Akhtar Badshah, Shanshan Tu, M. Waqas
{"title":"Blockchain-Based Security Management Platform","authors":"Xiaoping Wang, Akhtar Badshah, Shanshan Tu, M. Waqas","doi":"10.1109/ASSP54407.2021.00026","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00026","url":null,"abstract":"As a new generation of information technology, blockchain plays an increasingly prominent role in social operation, bringing significant changes to the economic process, social organization and governance. Blockchain application scenarios are complex and diverse, with many computing nodes, scattered locations and dynamic topology changes. Security threats have become an essential factor restricting blockchain development, and various security problems have become increasingly prominent. The blockchain network lacks an effective security management mechanism, resulting in the frequent flow of illegal data on the chain and malicious attacks, which seriously affects the operation order and healthy development of the blockchain network. Based on trusted computing technology, this paper carries out the research on the blockchain-oriented management platform, constructs a distributed blockchain management center, carries out system management, security management and audit management of the blockchain, and provides a safe and reliable guarantee for the stable operation of the blockchain network.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"86 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121002904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoping Wang, Akhtar Badshah, Shanshan Tu, M. Waqas
{"title":"Blockchain Boundary Security Protection based on Trusted Computing","authors":"Xiaoping Wang, Akhtar Badshah, Shanshan Tu, M. Waqas","doi":"10.1109/ASSP54407.2021.00042","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00042","url":null,"abstract":"Blockchain has the characteristics of openness and decentralization and faces many security threats in application scenarios. Apply trusted computing technology to establish trusted blockchain boundaries and build a systematic security protection framework to meet the security requirements in blockchain application scenarios. Therefore, this paper combines trusted computing technology with blockchain security protection requirements, proposes blockchain trusted boundary, focuses on blockchain boundary trusted measurement technology, and ensures the security and credibility of blockchain boundary from systematization.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116514011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phoneme Recognition Using Interlaced Derivative Pattern and Co-occurrence Matrix Method","authors":"G. Liao, B. Ling, R. W. Lam","doi":"10.1109/ASSP54407.2021.00036","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00036","url":null,"abstract":"Accurate recognition of phonemes has always been a difficult point in speech recognition. This paper attempts to use the co-occurrence matrix method and interlaced derivative patterns method in image processing to complete the task of phoneme recognition. First, perform segmentation of speech based on the spectral energy and spectral centroid. Second, perform feature extraction, and calculate the four features of the co-occurrence matrix method, interlaced derivative pattern method, multi-dimensional voice program parameters and gammatone frequency cepstral coefficients of the phoneme segment. Among them, the co-occurrence matrix method and interlaced derivative pattern method are calculated based on the gammatone spectrum of the voice. Then, use random forest to calculate the importance of feature vectors, and select the top 30 features that random forest considers the most important as the features used in this article. Finally, random forest is used for classification. Note that the phoneme data sets used in this article are all downloaded from YouTube, and the classification we do is vowels, semivowels and consonants. To our best knowledge, this is the first paper that presents the phoneme recognition using interlaced derivative pattern and co-occurrence matrix method.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Image Super-resolution Based On Relative Average Generative Adversarial Networks","authors":"Y. Liu, Li Zhu","doi":"10.1109/ASSP54407.2021.00014","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00014","url":null,"abstract":"Face image plays an important role in visual perception and various computer vision tasks. However, due to the influence factors of equipment and environment, the image often has the problem of low resolution. In order to relieve this problem, this paper proposes a face image super-resolution reconstruction algorithm based on Relative average Generative Adversarial Networks. Different from the standard discriminator D in Generative Adversarial Networks(GAN), which estimates the probability that one input image is real and natural, a relativistic average discriminator tries to predict on average the probability that a real image is relatively more realistic than a fake one. At the same time, the loss function used to measure the spatial similarity of image pixels is combined with the perceptual loss function used to measure the similarity of image feature spaces, so that the network pays attention to the reconstruction of image pixel information while taking into account the feature information of the image. Experimental results demonstrate the effectiveness of the proposed method in multi-scale face image super-resolution, and the evaluation indicators (PSNR and SSIM) tested on common test sets are better than those of the contrast algorithm, it also has better visual perception and more detailed information.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116767453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Group Construction Mechanism Based on Trusted Management","authors":"Xin Rui, Zhu Jinhui, Liu Xin, Chen Liandong, Chen Kai, Zhu Jingxuan","doi":"10.1109/ASSP54407.2021.00029","DOIUrl":"https://doi.org/10.1109/ASSP54407.2021.00029","url":null,"abstract":"The Internet of things connects a large number of device nodes through the Internet, realizing the interconnection of all things at any time and anywhere. However, the multi-source heterogeneous, free and open characteristics of the Internet of things lead to the lack of dynamic adaptability of the current network connection model and can not deal with a variety of security threats. Therefore, how to build a safe and reliable trusted group is a key problem to be solved in the Internet of things environment. Trusted measurement technology can comprehensively measure the large-scale terminal nodes of the Internet of things, ensure the credibility of the perceived nodes, and lay the foundation for the overall security of the Internet of things. In the Internet of things environment, the main research content of this paper is how to use the trusted measurement technology to build a safe and reliable trusted group, and solve the security threat faced by the trusted group in the dynamic operation process. Firstly, this paper analyzes the centralized and distributed network structure in the Internet of things perception network, and then designs the corresponding perception node Trusted measurement scheme and trusted group construction mechanism. In this paper, for the centralized networking, the sensing node has the three-tier structure characteristics of “base station, domain management node and ordinary sensing node”. In the Trusted measurement stage, hierarchical measurement is used to measure the static environment, dynamic behavior and energy of the sensing node respectively. In the construction of trusted groups, hierarchical management is used to decide whether individuals join trusted groups; Reduce the possibility of malicious nodes as management nodes by adding monitoring nodes; Regularly evaluate the security status of nodes and eliminate malicious nodes in time.","PeriodicalId":153782,"journal":{"name":"2021 2nd Asia Symposium on Signal Processing (ASSP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131102678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}