Jie Yu, Jian Gao, Ning Wang, Panpan Feng, Bing Zhou, Zong-Hui Wang
{"title":"QT-STNet: A Spatial and Temporal Network Combined with QT Segment for MI Detection and Location","authors":"Jie Yu, Jian Gao, Ning Wang, Panpan Feng, Bing Zhou, Zong-Hui Wang","doi":"10.1109/CyberC55534.2022.00038","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00038","url":null,"abstract":"Myocardial infarction (MI) is a cardiovascular disease with high mortality, which can be diagnosed by electrocardiogram (ECG). Therefore, this paper proposes a spatial and temporal network combined with QT segment (QT-STNet) to detect and locate MI. First, QT segment is extracted by QT segment extraction module. Next, the QT segment is concatenated with the original signal to enhance the importance of the key information. Then, considering the spatial and temporal features of ECG, DenseNet is used to extract spatial features and Transformer is used to extract temporal features. Finally, the proposed method is test on PTB-XL dataset, and the precision, recall, F1 score and hamming loss are 0.881, 0.881, 0.876 and 0.051 respectively. The results show that the method is superior to other methods.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved YOLOv5s algorithm for small item detection of wheelhouse","authors":"Jin Hu, Wang Juan, Wang Zuli, Long Dan","doi":"10.1109/CyberC55534.2022.00044","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00044","url":null,"abstract":"With the development of deep learning, object detection has achieved rapid development in recent years, and is widely used in real-life scenarios such as face detection and automatic driving. In the field of ship navigation safety, it is necessary to identify whether some specific items appear in the wheelhouse to help determine whether there is a threat to drive safety. These items are usually small in size and require higher detection efficiency. To address this problem, this paper proposes a ship-specific item detection method that improves the YOLOv5s algorithm. By introducing the convolution attention mechanism module CBAM, the feature extraction ability of the network, the detection capability of small targets, and the detection accuracy are improved. The experimental results show that after the introduction of the attention mechanism, the precision rate of YOLOv5s on ship-specific items is 85.6%, the recall rate is 85.2%, and the average accuracy is 90.2%, which can complete the detection task of specific items of wheelhouse small targets","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Accelerating of Mobile Advertisement Dissemination in Vehicular Networks","authors":"Jie Wang","doi":"10.1109/CyberC55534.2022.00036","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00036","url":null,"abstract":"Mobile advertising is an appealing application in vehicular networks, by which relevant information can be delivered to (and then accessed by) vehicles and pedestrians in different regions. However, due to the complex interplay of mobility and data communication in the dissemination process, it is still not clear how likely an advertisement can be accessed at time t in a particular region, and how to accelerate the dissemination with a limited budget. To solve these problems, we establish a data dissemination model, rigorously define the stage of a dissemination process, and propose a total variance metric to quantitatively differentiate the impact of vehicle mobility from that of V2V communication. Simulations based on two real datasets of taxi traces show that the choice of initial advertisers (i.e., seeds) greatly affects the stage of the dissemination process, and two practical seed selection strategies are proposed as an application of the dissemination model.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126478775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning To Model The Complexity Of Algal Bloom","authors":"Hao Wu, Zhibin Lin, Borong Lin, Zhenhao Li, Nanlin Jin, Xiaohui Zhu","doi":"10.1109/CyberC55534.2022.00027","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00027","url":null,"abstract":"Literature of studying algal growth has started to take advantages of data mining and machine learning methods, such as classification, clustering, regression, correlation analysis and principal component analysis. However, the performance of such methods might heavily rely on the data collectable for the studies sites. Moreover, some factors directly relate to algal growth, including hydrodynamics, weather and ecology, are notoriously difficult to model and predict. In this paper we present a study to model algal bloom using deep learning methods. It is assumed that algal bloom is the consequence of all factors that are more or less associated with the growth of algal. This offers a new way of thinking that even unknown factors or those factors far too complicated to model can still be inexplicitly represented by the deep learning models. We evaluate this new approach through our studies of algal bloom in the JinJi Lake, Suzhou, China. The experimental results are compared with the popular machine learning methods used in literature. It has been found that the deep learning method can achieve a better accuracy in comparison with other well applied machine learning methods.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ultra-low Dose CT Image Denoising based on Conditional Denoising Diffusion Probabilistic model","authors":"Qiwei Li, Chen Li, Chenggong Yan, Xiaomei Li, Haixia Li, Tianjing Zhang, Hui Song, Roman Schaffert, Weimin Yu, Yu Fan, Jianwei Ye, Hao Chen","doi":"10.1109/CyberC55534.2022.00041","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00041","url":null,"abstract":"Due to repeated examinations of lung nodules by Standard Dose Computed Tomography (SDCT), patients suffer from an increased risk of further cancer deterioration caused by the accumulated X-ray dose. Although radiologist have attempted using Ultra-low dose CT images instead of SDCT for diagnosis, the reduction of CT dose decreases the final reconstructed image quality and seriously hinders diagnosis. To compensate for the reduced image quality, we presents a novel noise reduction approach, conditional Denoising Diffusion Probabilistic Model (c-DDPM), by exploiting the advantages of Diffusion Probabilistic Models (DDPM). c-DDPM applies a 2.5D feature fusion strategy to account for CT spatial details, and constrains the denoising procession, by combining the loss function l2 and lssim. We evaluate c-DDPM and a state-of-the-art method CycleGAN, the commercial IMR method and iDose on an actual patients dataset with a total of 170 patients. Objective assessment shows that c-DDPM can suppress the isolated artifacts and generate more compelling ULDCT images with PSNR (35.19±0.73) and SSIM (0.85±0.03). The subjective evaluation performed by radiologists also demonstrates that our approach can effectively improve perceptual image quality, achieving an overall image quality score of 4/5 or above in 88.4% of cases and an image noise score of 4/5 or above in 100% of the cases. Finally, we provides comprehensive empirical evidence showing that in the lung nodule detection task, ULDCT images denoised through c-DDPM my be detected 11% more valid nodules than of CycleGAN.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123848779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BIM Credibility: A Framework of Blockchain-enabled BIM Data","authors":"Hui Jiang","doi":"10.1109/CyberC55534.2022.00022","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00022","url":null,"abstract":"The construction of buildings needs to rely on Building Information Modeling (BIM) model data. If we want to finally form a legally effective BIM database, we must know the source of the BIM data to ensure the security and traceability of the BIM data. Blockchain technology, assuring the immutability and provenance of data, can play an important role in the credibility of BIM data. The application of blockchain to BIM can solve these problems currently existing in BIM technology. This article establishes and proposes a framework of Blockchain-enabled BIM data. By the way of a software plugin or a new App, we can record the changes of the BIM model on the Blockchain. Furthermore, the designers can select some components and properties as core data and put these dadas on Blockchain by the BIM data services (BDS). This way can improve the efficiency of BIM data comparison. Thus, all stakeholders of the project can trace the BIM models to verify the credibility and ensure the safety of data.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128973559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-based Gesture Recognition Using Wearable Devices","authors":"Hao Wu, Jun Qi, Wen Wang, Jianjun Chen","doi":"10.1109/CyberC55534.2022.00043","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00043","url":null,"abstract":"Traditional gesture recognition solutions are based on touch screens or vision, limited by environmental conditions and not portable. The accelerometer-based gesture recognition technology can be integrated into small wearable smart devices, such as smart bracelets, smartwatches or smart rings. The portability and reliability of this technology make it a broad market and application space. This project is based on a smartwatch accelerometer dataset from TensorFlow Datasets. By experimenting with two different pre-processing algorithms: Kalman Filter and Savitzky-Golay Filter, feature extraction algorithms and machine learning algorithms (random forests, k-nearest neighbours, support vector machine), the relatively optimal algorithm for each part to combine to obtain a good accelerometer-based gesture recognition model were filtered out, including gravity reduction, Fourier transforms, a normal exception elimination algorithm, Savitzky-Golay Filter and Support Vector Machine (SVM). The best accuracy rate of this model is over 97%, with a similar degree of precision, recall rate and f1 score.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel DenseNet-based Deep Reinforcement Framework for Portfolio Management","authors":"Ruoyi Gao, Fengchen Gu, Ruoyu Sun, Angelos Stefanidis, Xiaotian Ren, Jionglong Su","doi":"10.1109/CyberC55534.2022.00033","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00033","url":null,"abstract":"The objective of portfolio management is to realize portfolio optimization, i.e., maximizing the cumulative return of the portfolio over continuous trading periods. Using Artificial Intelligence algorithms, e.g., Deep Reinforcement Learning (DRL), to realize portfolio optimization is an emerging research trend. Jiang et al.’s Ensemble of Identical Independent Evaluators (EIIE) framework achieves at least a four-fold improvement in the indicator of final portfolio value. Their framework has high flexibility to allow us to replace components to achieve continuous improvement. In EIIE, the DRL agent uses neural networks to extract data features from historical data of assets and evaluate each asset’s potential growth. This paper introduces a novel network architecture called Dense Based EIIE (DBE), which is embedded in an DRL framework based on Convolutional Neural Network (CNN) and Densely Convoluted Neural Network (DenseNet) module. Compared to Jiang et al.’s strategy, our improved framework uses DenseNet to achieve the EIIE framework, further increasing profitability. In all three experiments carried out, our strategy outperforms Jiang et al.’s strategy and nine traditional strategies. Our strategy achieves at least a 17% improvement in cumulative return compared to other strategies. Furthermore, it achieves at least twice as much in Sharpe Ratio as other strategies.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124813258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han
{"title":"On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid","authors":"Jianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han","doi":"10.1109/CyberC55534.2022.00013","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00013","url":null,"abstract":"Data aggregation can not only achieve data compression, but also ensure the privacy of individual data, which is widely used in smart grid. To obtain in-depth data analysis and integrity of the transmitted data, Zhang et al. proposed a verifiable privacy-preserving multi-type data aggregation scheme in smart grid (DOI:10.1109/TDSC.2021.3124546, IEEE T DEPEND SECURE). They claim that their scheme can achieve the integrity of encrypted data and aggregated data. However, by analyzing Zhang et al.’s scheme, we find that it does not achieve the data integrity they claim. An adversary can arbitrarily tamper with the encrypted data of the smart meter and the aggregated data of the aggregation gateway. Then the corresponding attacks are given. Finally, after analyzing the reasons for such attacks, we provide a suggestion to overcome them.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Hybrid Steganography Scheme Employing A Time-Varying Delayed Chaotic Neural Network","authors":"Karim H. Moussa, Marwa H. El-Sherif","doi":"10.1109/CyberC55534.2022.00032","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00032","url":null,"abstract":"A secure hybrid audio steganography algorithm using Discrete Wavelet Transform (DWT) and Hopfield Chaotic Neural Network is presented in this paper. An uncompressed audio file is used as a cover medium and a greyscale image is used as secret data. The pixels of the secret image are reordered using cyclic shifting to increase the system security, then the permutated pixels are encoded by applying Hamming code (7,4) before embedding them in the DWT coefficients of the stereo audio signal. The chaotic neural network is applied here to generate a random sequence to choose the embedding locations of hidden image pixels. Regarding the system’s quality, the Peak Signal to Noise Ratio of stego-audio files is above 60 dB, which is close to the original audio quality. Furthermore, the algorithm has an improved embedding payload than previously proposed algorithms and high-security performance, as proved by the results obtained.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122152413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}