2022 9th International Conference on Dependable Systems and Their Applications (DSA)最新文献

筛选
英文 中文
Cognitive Radio Spectrum Sensing Technology 认知无线电频谱传感技术
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00144
Yandie Yang
{"title":"Cognitive Radio Spectrum Sensing Technology","authors":"Yandie Yang","doi":"10.1109/DSA56465.2022.00144","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00144","url":null,"abstract":"Spectrum sensing has important research implications for alleviating the conflict between static spectrum allocation strategies and dynamic spectrum demand. This paper provides a brief summary and comparison of some traditional detection techniques in spectrum sensing. This paper first conducts experiments on single-node spectrum sensing and discovers that the detection performance is severely impacted by the signal-to-noise ratio. For collaborative spectrum sensing, this paper first compares the traditional methods and then uses different machine learning techniques to detect the channel occupancy status based on ROC curves. The experimental results demonstrate that the machine learning-based approaches perform better in terms of channel detection.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Area Coverage Path Planning for Multiple UAVs Over Large Areas 多无人机大面积协同区域覆盖路径规划
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00053
Furong Zhang, Xiaopan Zhang
{"title":"Cooperative Area Coverage Path Planning for Multiple UAVs Over Large Areas","authors":"Furong Zhang, Xiaopan Zhang","doi":"10.1109/DSA56465.2022.00053","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00053","url":null,"abstract":"With the popularity and development of Unmanned Aerial Vehicle (UAV) technology, the UAV coverage path planning problem has also emerged. In this paper, we propose a new model of UA V coverage path planning problem, which uses multiple UAVs to cover a certain large area cooperatively, and considers the energy constraint of UA Vs on flight distance, UA V energy replenishment and UA V recovery in the coverage process. In this paper, we propose a two-stage approach to solve the problem. In the first stage, we propose a region decomposition method based on a regular triangular grid, which converts the search region into a graph composed of nodes and edges. In the second stage, we use mixed linear integer programming (MILP) method to plan the coverage path based on the graph generated in the first stage. We use the actual parameters such as the drone's own camera, speed, energy, etc. to dissecte a rectangular area and accurately solve the MILP model, in the process of solving we designed three different scenarios to verify the feasibility and versatility of the model, and the solution results meet the expectations. We also observed the effect of UA V base location on the solving speed and the effect of UA V flight altitude on the model solving target value.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware API Sequence Detection Model based on Pre-trained BERT in Professional domain 基于专业领域预训练BERT的恶意软件API序列检测模型
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00162
Rongheng Xu, Jilin Zhang, Li Zhou
{"title":"Malware API Sequence Detection Model based on Pre-trained BERT in Professional domain","authors":"Rongheng Xu, Jilin Zhang, Li Zhou","doi":"10.1109/DSA56465.2022.00162","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00162","url":null,"abstract":"With the development of the Internet, Internet information security is becoming more and more important. As far as malware detection is concerned, the increasingly serious distortion and scrambling have brought great challenges to the traditional detection methodstraditional methods such as feature database are difficult to effectively detect non-input viruses, and there is a very high cost of experts in detection. With the development of artificial intelligence technology, machine learning and deep learning methods are widely used to deal with tasks in the computer field. In dynamic detection, API call sequences generated by malicious software are widely used in software classification as features, because these sequences represent the behaviors of malicious software. However, traditional methods cannot capture the global relationship of API sequences. We use the BERT model based on transformer to learn the global relationship and add Windows API corpus to the pre-training model.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131511765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-UAV Path Planning Model with Multiple Battery Recharge Points 多电池充电点的多无人机路径规划模型
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00117
Mengjie Shan, Xiaopan Zhang
{"title":"Multi-UAV Path Planning Model with Multiple Battery Recharge Points","authors":"Mengjie Shan, Xiaopan Zhang","doi":"10.1109/DSA56465.2022.00117","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00117","url":null,"abstract":"In recent years, multi-UAV mission scheduling has become a very active research area. In this paper, a scenario is established in which multiple-access battery recharge points are set up to solve the problem of UAV enlistment in the current logistics scenario. The study constructs a mixed integer programming model based on UAV battery replacement as well as UAV cargo demand and UAV enlistment and flight characteristics, and designs solution cases based on the model and solves them using an exact solver, and experiments prove that the model built in this paper has good solution effectiveness and compatibility with the scenario.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A LDPC Decoding Algorithm based on Convolutional Neural Network 一种基于卷积神经网络的LDPC解码算法
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00165
Jiamei Gao, Bo Zhang, Bin Wang, Yang Liu
{"title":"A LDPC Decoding Algorithm based on Convolutional Neural Network","authors":"Jiamei Gao, Bo Zhang, Bin Wang, Yang Liu","doi":"10.1109/DSA56465.2022.00165","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00165","url":null,"abstract":"At present, low density parity check code (LDPC) has been widely used in channel coding and decoding because of its excellent performance, but with the increase of code length, the complexity of decoding algorithm has became higher and higher. In view of the limitations of decoding algorithm and the rapid development of artificial intelligence technology, it has great research prospects to solve the above problems through deep neural network. Therefore, this paper mainly focuses on the design and improvement of LDPC decoding process, and proposes an LDPC decoding model based on DenseNet neural network structure, which improves the LPDC decoding performance by optimizing DenseNet neural network structure. This method can recover information at the decoding end, avoiding the limitations of traditional short decoding loop and high complexity of decoding algorithm. The simulation results show that the LDPC decoding algorithm based on DenseNet neural network structure improves the decoding performance.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Separation based on As3-2mix Hybrid Strategy Combined Training Convolutional Time Domain Neural Network 基于As3-2mix混合策略结合训练卷积时域神经网络的语音分离
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00099
Pengxu Wang, Haijun Zhang
{"title":"Speech Separation based on As3-2mix Hybrid Strategy Combined Training Convolutional Time Domain Neural Network","authors":"Pengxu Wang, Haijun Zhang","doi":"10.1109/DSA56465.2022.00099","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00099","url":null,"abstract":"In recent years, time-domain speech separation methods have made great progress. The existing time-domain speech separation methods have shown good separation performance on wsj-2mix datasets. However, the performance of these models on Chinese speech datasets has not been studied in detail. To solve this problem, this paper makes a speech separation dataset based on aishell-3 open-source hi-fi Mandarin speech corpus, which we call as3-2mix. As3-2mix not only considers the original features of mixed speech, but also adopts two mixing strategies: same-sex mixing and opposite sex mixing. Based on as3-2mix dataset and different training strategies, we evaluate the generalization ability of convolutional time-domain neural network, and analyze the separated speech through PESQ, STOI, SDRi and SI-SNRi. The experimental results show that our PESQ reaches 2.48 and 2.26 on as3mm1-2mix and as3ff1-2mix datasets respectively, while our STOI reaches 2.46, 0.89 and 0.83 on as3mm1-2mix, as3ff1-2mix and as3fm1-2mix datasets respectively, it is higher than other methods on the same type of dataset. Although the performance of SDRi and SI-SNRi in Chinese dataset is not as good as that in English dataset, they still achieved 13.56dB and 13.21dB good scores, which also shows that different languages may affect some characteristics of speech and then affect the separation effect to a certain extent. Finally, when analyzing the speech amplitude, we find that the speech with large amplitude is conducive to improve PESQ and STOI, and the speech with small amplitude is conducive to improve the SDRi and SI-SNRi.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Convolutional Neural Network based Feature Extraction Method 基于改进卷积神经网络的特征提取方法
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00148
Yuanyuan Han, Jingchao Li, Jialan Shen, Bin Zhang
{"title":"Improved Convolutional Neural Network based Feature Extraction Method","authors":"Yuanyuan Han, Jingchao Li, Jialan Shen, Bin Zhang","doi":"10.1109/DSA56465.2022.00148","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00148","url":null,"abstract":"Deep learning algorithms based on convolutional neural networks have been widely researched and developed in the field of images. This helps in more accurate classification and recognition of images. In order to improve the recognition accuracy of convolutional neural network and optimize the learning performance of neural network, an improved dynamic adaptive pooling algorithm is proposed. First, an overview of the basic structure of convolutional neural networks, convolutional layers and pooling layer operations. Second, build a convolutional neural network model, study and compare different network pooling models. Finally, an improved dynamic adaptive pooling model is constructed for the case where the existing algorithm has a slow convergence speed. Experiment on handwritten database. The simulation results show that as the number of iterations continues to increase, the mean square error continues to decrease, and the recognition accuracy of the model continues to improve. The improved pooling method not only makes the feature extraction of the convolutional neural network more accurate, but also improves the convergence speed and model accuracy, and achieves the purpose of optimizing the network learning performance. This approach can be further extended to other models related to convolutional neural networks.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124355636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transform Domain End-to-end Learning Communication System 转换域端到端学习通信系统
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00161
Cheng Chang, Hui Zhou, Chao He, Zilong Zhao, Wulong Li
{"title":"Transform Domain End-to-end Learning Communication System","authors":"Cheng Chang, Hui Zhou, Chao He, Zilong Zhao, Wulong Li","doi":"10.1109/DSA56465.2022.00161","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00161","url":null,"abstract":"Unknown time-varying interference is a common and practical problem for communication system. An end-to-end learning communication system with transform domain interference suppression is proposed in this paper to suppress the real-time interference for the autoencoder(AE) neural networks. The basic idea is to dynamical shape the waveform in transform domain at both the AE transmitter and the receiver to avoid interfered spectral regions. The simulation shows that the proposed method can save 2dB Eb/N0 at bit error ratio 10−4 than AE-based communication system with 20% wideband time-varying interference.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"171 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120885558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Learning based Self-updating Incremental Malware Detection Model 基于在线学习的自更新增量恶意软件检测模型
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00145
Donghui Zhao, Liang Kou, Jilin Zhang
{"title":"Online Learning based Self-updating Incremental Malware Detection Model","authors":"Donghui Zhao, Liang Kou, Jilin Zhang","doi":"10.1109/DSA56465.2022.00145","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00145","url":null,"abstract":"With the rapid evolution of machine learning technology, ML-based malware detection is widely accepted as a panacea towards effective malware de-tection. However, facing with the great number of detecion system, malware can always breakthrough. It is chanllenging for the train models to detect a malware that newly show up. This phenomenon is widely known as concept drift. To address this chal-lenge, we proposed a online learning based malware detection system, which is based on the API sequences generated by the processes when it is running and also able to recognize concept drift. The sustainbility of detection system can be significantly improved with online learning algorithms. Lastly, in order to detect malware as much as possible, we use the incremental model structure.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"134 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120890737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Envy Detection with Deep Learning and Snapshot Ensemble 基于深度学习和快照集成的特征嫉妒检测
2022 9th International Conference on Dependable Systems and Their Applications (DSA) Pub Date : 2022-08-01 DOI: 10.1109/DSA56465.2022.00037
Minnan Zhang, Jingdong Jia
{"title":"Feature Envy Detection with Deep Learning and Snapshot Ensemble","authors":"Minnan Zhang, Jingdong Jia","doi":"10.1109/DSA56465.2022.00037","DOIUrl":"https://doi.org/10.1109/DSA56465.2022.00037","url":null,"abstract":"Code Smell is a code symptom of deep-seated quality problems caused by design defects or improper coding habits in software. It may not directly affect the operation of program, but it affects the readability, understandability and maintainability of code. Therefore, the identification, location and reconstruction of code smell are becoming increasingly significant. Combined with the deep learning methods, based on the existing model for detecting Feature Envy, this paper optimizes it from three aspects: introducing the attention mechanism, expanding and modifying the model structure, and applying the snapshot ensemble. The experimental results show that compared with the standard results, the model proposed in this paper gets a better performance on four evaluation metrics: precision, recall, F1 measure and AUC. Based on the research results of this experiment, we can see the effectiveness of deep learning in the field of code smell detection and the prospect of theories in natural language processing to be utilized in code smell detection, which provides a practical cornerstone for the research of deep learning based smell detection methods in the future.","PeriodicalId":208148,"journal":{"name":"2022 9th International Conference on Dependable Systems and Their Applications (DSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121233463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信