{"title":"Intelligent Image Saliency Detection Method Based on Convolution Neural Network Combining Global and Local Information","authors":"Songshang Zou, Wenshu Chen, Hao Chen","doi":"10.1155/2022/3647387","DOIUrl":"https://doi.org/10.1155/2022/3647387","url":null,"abstract":"Image saliency object detection can rapidly extract useful information from image scenes and further analyze it. At present, the traditional saliency target detection technology still has the edge of outstanding target that cannot be well preserved. Convolutional neural network (CNN) can extract highly general deep features from the images and effectively express the essential feature information of the images. This paper designs a model which applies CNN in deep saliency object detection tasks. It can efficiently optimize the edges of foreground objects and realize highly efficient image saliency detection through multilayer continuous feature extraction, refinement of layered boundary, and initial saliency feature fusion. The experimental result shows that the proposed method can achieve more robust saliency detection to adjust itself to complex background environment.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121685135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data","authors":"Jiawen Du, Yong Pi","doi":"10.1155/2022/3826126","DOIUrl":"https://doi.org/10.1155/2022/3826126","url":null,"abstract":"With the advent of the era of big data, people’s lives have undergone earth-shaking changes, not only getting rid of the cumbersome traditional data collection but also collecting and sorting information directly from people’s footprints on social networks. This paper explores and analyzes the privacy issues in current social networks and puts forward the protection strategies of users’ privacy data based on data mining algorithms so as to truly ensure that users’ privacy in social networks will not be illegally infringed in the era of big data. The data mining algorithm proposed in this paper can protect the user’s identity from being identified and the user’s private information from being leaked. Using differential privacy protection methods in social networks can effectively protect users’ privacy information in data publishing and data mining. Therefore, it is of great significance to study data publishing, data mining methods based on differential privacy protection, and their application in social networks.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationship Model between Human Resource Management Activities and Performance Based on LMBP Algorithm","authors":"Qiang Liu, Zhongwei Zhao","doi":"10.1155/2022/1125084","DOIUrl":"https://doi.org/10.1155/2022/1125084","url":null,"abstract":"The research on the relationship between human resource management activities and performance is an important topic of enterprise human resource management research. There are some errors between the relationship between human resource management activities and performance and the real situation, so it is impossible to accurately predict the performance fluctuation. Therefore, the relationship model between human resource management activities and performance based on the LMBP algorithm is constructed. Using the Levenberg–Marquardt (LM) algorithm and BP (back-propagation) neural network algorithm to establish a new LMBP algorithm, control the convergence of the new algorithm, optimize the accuracy of the algorithm, and then apply the LMBP algorithm to predict the risk of performance fluctuation under human resource management activities of enterprises, the indicators of human resource management activities of enterprises are determined, to complete the mining of enterprise performance data, the grey correlation analysis is combined, and the relationship model between human resource management activities and performance is built. The experimental samples are selected from CSMAR database, and the simulation experiment is designed. Using different algorithms to forecast the fluctuation of enterprise performance, the experimental results show that the LMBP algorithm can more accurately reflect the relationship between enterprise HRM and performance.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127157657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timed Automaton-Based Quantitative Feasibility Analysis of Symmetric Cipher in Embedded RTOS: A Case Study of AES","authors":"Yawen Ke, Xiaofeng Xia","doi":"10.1155/2022/4118994","DOIUrl":"https://doi.org/10.1155/2022/4118994","url":null,"abstract":"The real-time operating system (RTOS) has a wide range of application domains and provides devices with the ability to schedule resources. Because of the restricted resources of embedded devices and the real-time constraints of RTOS, the application of cryptographic algorithms in these devices will affect the running systems. The existing approaches for RTOS ciphers’ evaluation are mainly provided by experimental data performance analysis, which, however, lack a clear judgment on the affected RTOS performance indicators, such as task schedulability, bandwidth, as well as a quantitative prediction of the remaining resources of RTOS. By focusing on task schedulability in RTOS, this paper provides a timed automaton-based quantitative approach to judge the feasibility of ciphers in embedded RTOS. First, a cryptographic algorithm execution overhead estimation model is established. Then, by combining the overhead model with a sensitivity analysis method, we can analyze the feasibility of the cryptographic algorithm. Finally, a task-oriented and timed automaton-based model is built to verify the analysis results. We take AES as a case study and carry out experiments on embedded devices. The experimental results show the effectiveness of our approach, which will provide specific feasibility indicators for the application of cryptographic algorithms in RTOS.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of the EFL Mobile Learning Model in the Hybrid Distributed Terminal","authors":"Lijie Qu, Shihui Song, Zuochun Xiao","doi":"10.1155/2022/4429174","DOIUrl":"https://doi.org/10.1155/2022/4429174","url":null,"abstract":"With the integration of technology in higher education, mobile learning plays an important role in EFL classes. In order to optimize the efficiency of EFL learning, a mobile learning model in the hybrid distributed terminal is constructed. The online platform supporting both synchronous and asynchronous learning with three types of interaction helps build a blended learning model and creates a closed loop for ubiquitous online and offline learning with multiple evaluation, which also builds a community of inquiry-based learning to facilitate collaborative study and deep thinking. Aiming to improve the resource scheduling performance of learning information sharing mode, based on the traditional sharing mode hardware, the mobile learning software for the hybrid distributed terminal is thus optimized. Learning resources are mined and fused to realize the scheduling of learning information resources, and user interface management function is designed to construct the EFL mobile learning mode with the hybrid distributed terminal.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Usman Rauf Kamboh, Muhammad Shahid, Hamza Aldabbas, Ammar Rafiq, Bader Alouffi, Muhammad Asif Habib, Ubaid Ullah
{"title":"Radio Network Forensic with mmWave Using the Dominant Path Algorithm","authors":"Usman Rauf Kamboh, Muhammad Shahid, Hamza Aldabbas, Ammar Rafiq, Bader Alouffi, Muhammad Asif Habib, Ubaid Ullah","doi":"10.1155/2022/9692892","DOIUrl":"https://doi.org/10.1155/2022/9692892","url":null,"abstract":"For the last two decades, cybercrimes are growing on a daily basis. To track down cybercrimes and radio network crimes, digital forensic for radio networks provides foundations. The data transfer rate for the next-generation wireless networks would be much greater than today’s network in the coming years. The fifth-generation wireless systems are considering bands beyond 6 GHz. The network design of the next-generation wireless systems depends on propagation characteristics, frequency reuse, and bandwidth variation. This article declares the channel’s propagation characteristics of both line of sight (LoS) and non-LOS (NLoS) to construct and detect the path of rays coming from anomalies. The simulations were carried out to investigate the diffraction loss (DL) and frequency drop (FD). Indoor and outdoor measurements were taken with the omnidirectional circular dipole antenna with a transmitting frequency of 28 GHz and 60 GHz to compare the two bands of the 5th generation. Millimeter-wave communication comes with a higher constraint for implementing and deploying higher losses, low diffractions, and low signal penetrations for the mentioned two bands. For outdoor, a MATLAB built-in 3D ray tracing algorithm is used while for an indoor office environment, an in-house algorithmic simulator built using MATLAB is used to analyze the channel characteristics.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network","authors":"Se-Joon Park, Yong-Joon Lee, Won-Hyung Park","doi":"10.1155/2022/3686423","DOIUrl":"https://doi.org/10.1155/2022/3686423","url":null,"abstract":"Recently, due to the many features and advantages of cloud computing, “cloud service” is being introduced to countless industries around the world at an unbelievably rapid pace. However, with the rapid increase in the introduction of cloud computing services, security vulnerabilities are increasing and the risk of technology leakage from cloud computing services is also expected to increase in social network service. Therefore, this study will propose an AWS-based (Amazon Web Services) security architecture configuration method that can be applied for the entire life cycle (planning, establishment, and operation) of cloud services for better security in AWS Cloud Services, which is the most used cloud service in the world. The proposed AWS security guide consists of five different areas, Security Solution Selection Guide, Personal Information Safeguard Guide, Security Architecture Design Guide, Security Configuration Guide, and Operational Security Checklist, for a safe social network. The AWS Security Architecture has been designed with three reference models: Standard Security Architecture, Basic Security Architecture, and Essential Security Architecture. The AWS Security Guide and AWS Security Architecture proposed in this paper are expected to help many businesses and institutions that are hoping to establish and operate a safe and reliable AWS cloud system in the social network environment.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129179284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ran Li, Yuanfei Zhang, Lihua Yin, Zhe Sun, Zheng Lin, Peng Fu, Weiping Wang, Gang Shi
{"title":"EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application","authors":"Ran Li, Yuanfei Zhang, Lihua Yin, Zhe Sun, Zheng Lin, Peng Fu, Weiping Wang, Gang Shi","doi":"10.1155/2022/1208846","DOIUrl":"https://doi.org/10.1155/2022/1208846","url":null,"abstract":"Emotion lexicon is an important auxiliary resource for text emotion analysis. Previous works mainly focused on positive and negative classification and less on fine-grained emotion classification. Researchers use lexicon-based methods to find that patients with depression express more negative emotions on social media. Emotional characteristics are an effective feature in detecting depression, but the traditional emotion lexicon has limitations in detecting depression and ignores many depression words. Therefore, we build an emotion lexicon for depression to further study the differences between healthy users and patients with depression. The experimental results show that the depression lexicon constructed in this paper is effective and has a better effect of classifying users with depression.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124000385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lianshan Liu, Lingzhuang Meng, Weimin Zheng, Yanjun Peng, Xiaoli Wang
{"title":"A Novel High-Capacity Information Hiding Scheme Based on Improved U-Net","authors":"Lianshan Liu, Lingzhuang Meng, Weimin Zheng, Yanjun Peng, Xiaoli Wang","doi":"10.1155/2022/4345494","DOIUrl":"https://doi.org/10.1155/2022/4345494","url":null,"abstract":"With the gradual introduction of deep learning into the field of information hiding, the capacity of information hiding has been greatly improved. Therefore, a solution with a higher capacity and a good visual effect had become the current research goal. A novel high-capacity information hiding scheme based on improved U-Net was proposed in this paper, which combined improved U-Net network and multiscale image analysis to carry out high-capacity information hiding. The proposed improved U-Net structure had a smaller network scale and could be used in both information hiding and information extraction. In the information hiding network, the secret image was decomposed into wavelet components through wavelet transform, and the wavelet components were hidden into image. In the extraction network, the features of the hidden image were extracted into four components, and the extracted secret image was obtained. Both the hiding network and the extraction network of this scheme used the improved U-Net structure, which preserved the details of the carrier image and the secret image to the greatest extent. The simulation experiment had shown that the capacity of this scheme was greatly improved than that of the traditional scheme, and the visual effect was good. And compared with the existing similar solution, the network size has been reduced by nearly 60%, and the processing speed has been increased by 20%. The image effect after hiding the information was improved, and the PSNR between the secret image and the extracted image was improved by 6.3 dB.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126595358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN","authors":"Ping Li, Songtao Guo, Jiahui Wu, Quanjun Zhao","doi":"10.1155/2022/7294638","DOIUrl":"https://doi.org/10.1155/2022/7294638","url":null,"abstract":"Compared with the classical structure with only one controller in software-defined networking (SDN), multi-controller topology structure in SDN provides a new type of cross-domain forwarding network architecture with multiple centralized controllers and distributed forwarding devices. However, when the network includes multiple domains, lack of trust among the controllers remains a challenge how to verify the correctness of cross-domain forwarding behaviors in different domains. In this paper, we propose a novel secure multi-controller rule enforcement verification (BlockREV) mechanism in SDN to guarantee the correctness of cross-domain forwarding. We first adopt blockchain technology to provide the immutability and privacy protection for forwarding behaviors. Furthermore, we present an address-based aggregate signature scheme with appropriate cryptographic primitives, which is provably secure in the random oracle model. Moreover, we design a verification algorithm based on hash values of forwarding paths to check the consistency of forwarding order. Finally, experimental results demonstrate that the proposed BlockREV mechanism is effective and suitable for multi-controller scenarios in SDN.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114616372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}