Changyu Zeng, Li Liu, Haocheng Zhao, Yu Zhang, Wei Wang, Ning Cai, Yutao Yue
{"title":"Causal Unstructured Pruning in Linear Networks Using Effective Information","authors":"Changyu Zeng, Li Liu, Haocheng Zhao, Yu Zhang, Wei Wang, Ning Cai, Yutao Yue","doi":"10.1109/CyberC55534.2022.00056","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00056","url":null,"abstract":"Excessive number of parameters in today’s (deep) neural networks demands tremendous computational resources and slows down training speed. The problem also makes it difficult to deploy these neural network models on capability constrained devices such as mobile devices. To address this challenge, we propose an unstructured pruning method that measures the causal structure of neural networks based on effective information (EI). It introduces an intervention to the input and computes the mutual information between the interference and its corresponding output, within a single linear layer measuring the importance of each weight. In the experiments, we found that the sparsity of EI pruning can reach more than 90%. Only 10% of non-zero parameters in the linear layers were needed compared to the benchmark methods without pruning, while ensuring similar level of accuracy and stable training performance in iterative pruning. In addition, as the invariance of the causal structure of the network is exploited, the network after pruning using EI is highly generalizable and interpretable than other methods.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption","authors":"Jing Wang, Fengheng Wu, Tingbo Zhang, Xiaohua Wu","doi":"10.1109/CyberC55534.2022.00016","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00016","url":null,"abstract":"Cloud computing has been widely used because of its low price, high reliability, and generality of services. However, considering that cloud computing transactions between users and service providers are usually asynchronous, data privacy involving users and service providers may lead to a crisis of trust, which in turn hinders the expansion of cloud computing applications. In this paper, we propose DPP, a data privacy-preserving cloud computing scheme based on homomorphic encryption, which achieves correctness, compatibility, and security. DPP implements data privacy-preserving by introducing homomorphic encryption. To verify the security of DPP, we instantiate DPP based on the Paillier homomorphic encryption scheme and evaluate the performance. The experiment results show that the time-consuming of the key steps in the DPP scheme is reasonable and acceptable.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Model Design for IoT-Based Flooding Forecast","authors":"Qinghua Wang","doi":"10.1109/CyberC55534.2022.00025","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00025","url":null,"abstract":"Flooding risk is a threat to sea-level residential areas in southern Sweden. An Internet of things (IoT) project has been deployed to monitor weather and water pipe conditions in Kristianstad, Sweden. The IoT data however only monitors the current condition and does not tell the future threat. Machine learning models using deep learning neural networks have been developed to predict future threats based on IoT data and weather forecast. This paper presents multiple model architectures and their performances. All the models are explainable. Finally, a conclusion is made by selecting the best-functioning model in the context of flooding risk prediction in Kristianstad.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Deep Learning Model for Real-time Detection and Recognition of Traffic Signs Images Based on YOLOv5","authors":"Hui He, Qihong Chen, Guoping Xie, Boxiong Yang, Shelei Li, Bo Zhou, Yuye Gu","doi":"10.1109/CyberC55534.2022.00042","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00042","url":null,"abstract":"The rapid and accurate identification of various road traffic signs is an important research topic in automotive vision systems. Specifically, the correct identification of road signs is an urgent problem requiring effective solutions to facilitate automatic driving. This paper proposes a new approach, PP-LCNet-P2-CT, for the detection and recognition of urban road signs in an automotive vision system using an improved YOLOv5 deep learning model. The main improvement of the PP-LCNet-P2-CT model includes the following: (1) Replacing the YOLOv5 backbone network with the lightweight network PP-LCNet to improve the real-time performance of the detection network; (2) Adding a small target detection head to the detection head to meet the needs of target detection with different scales and mitigate the adverse effects caused by drastic target scale changes; and (3) Integrating the CBAM convolutional block attention model that focuses on target features and the transformer coding block that can capture different local information to ensure the accuracy of lightweight model target detection. The model was tested with the Tsinghua traffic sign dataset, TT100k. The results show that the mAP index of the PP-LCNet-P2-CT model is increased by 29.84% and the FPS is increased by 24.05%, while the number of model parameters is decreased by 32.78% and the GFLOPs decreased by 34.41% compared with the classic YOLOv5 algorithm. The PP-LCNet-P2-CT model allows complex deep learning to be used successfully for unmanned ground vehicles (UGVs) with ordinary computing speeds and high real-time requirements.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial Attack and Defense for Webshell Detection on Machine Learning Models","authors":"Q. Zhang, Lishen Chen, Qiao Yan","doi":"10.1109/CyberC55534.2022.00017","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00017","url":null,"abstract":"Machine learning (ML) models can be used for the automated processing and analysis of source codes, thus improving the detection of webshell malware source codes, which can enhance the security of the whole network. However, despite the successes of ML-based models in webshell detection, these models lack large amounts of data for training and are vulnerable to adversarial examples. We have built a larger and more precise dataset containing 2015 manually labeled webshell malware. A detection model trained with this dataset can achieve higher detection accuracy. We have also proposed a method to generate adversarial examples for the programming language without changing its logic. The main idea of our method is to insert perturbation codes that do not modify the webshell program’s semantics, thereby creating an adversarial example that can bypass the model’s detection. This method can effectively attack the existing webshell malware ML detection models without changing the original malicious functions. Experiments have shown that our method can generate webshell malware adversarial examples that evade model detection while obtaining the model’s confidence output. To defend against such attacks, we have applied retraining and adversarial fine-tuning.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Relation Enhanced Model For Abstractive Dialogue Summarization","authors":"Pengyao Yi, Ruifang Liu","doi":"10.1109/CyberC55534.2022.00047","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00047","url":null,"abstract":"Traditional document summarization models perform less satisfactorily on dialogues due to the complex personal pronouns referential relationships and insufficient modeling of conversation. To address this problem, we propose a novel end-to-end Transformer-based model for abstractive dialogue summarization with Relation Enhanced method based on BART named RE-BART. Our model leverages local relation and global relation in a conversation to model dialogue and to generate better summaries. In detail, we consider that the verb and related arguments in a single utterance contribute to the local event for encoding the dialogue. And coreference information in a whole conversation represents the global relation which helps to trace the topic and information flow of the speakers. Then we design a dialogue relation enhanced model for modeling both information. Experiments on the SAMsum dataset show that our model outperforms various dialogue summarization approaches and achieves new state-of- the-art ROUGE results.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125267418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers","authors":"Huanran Zhang, Lingfeng Shen, Ning Wang, X. Mu","doi":"10.1109/CyberC55534.2022.00055","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00055","url":null,"abstract":"In this paper, we study the maximization of the secrecy throughput of an air-to-ground UAV communication system through UAV trajectory optimization, in a scenario where multiple cooperating eavesdroppers exist. Two cooperative eavesdropping strategies, namely Selection Combing-Cooperative Eavesdropping (SC-CE) and Maximal Ratio Combining-Cooperative Eavesdropping (MRC-CE) are considered for the cooperating eavesdroppers. Based on the mathematical forms of the formulated optimization problems corresponding to the two cooperative eavesdropping schemes, we propose to use the Trajectory Increment Iteration (TII) algorithm and the Particle Swarm Optimization (PSO) algorithm to solve for the optimal trajectory, respectively. Simulation results show that by optimizing the UAV trajectory against cooperative eavesdropping, the physical layer security performance of the system can be effectively improved.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on fast convergence method of IIR low pass filter","authors":"Zuping Zhang","doi":"10.1109/CyberC55534.2022.00035","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00035","url":null,"abstract":"In wireless communication, such as 4G LTE,5G NR and next G modem design, it is necessary to average the measured values such as noise power, time domain correlation of frequency offset estimation, frequency domain correlation of time offset estimation and signal-to-noise ratio (SNR) over a period of time in order to reduce noise and make them converge to stable estimation. These measurements have the characteristic that they are stabilized around a constant value for a relatively long time, they can be assumed nearly zero-frequency or low frequency signal with additional Gaussian noise. This paper discusses two kinds of IIR low pass filter to filter the above measured metrics. The one is nonlinear phase low pass filter, the other is nearly linear phase low pass filter. A new method is proposed to reduce the convergence time of IIR filter forced response, including adaptive determination of filter coefficient, selection of appropriate initial system value, and update long term value when the compensation occur.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ghost Expectation Point with Deep Reinforcement Learning in Financial Portfolio Management","authors":"Xuting Yang, Ruoyu Sun, Xiaotian Ren, Angelos Stefanidis, Fengchen Gu, Jionglong Su","doi":"10.1109/CyberC55534.2022.00030","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00030","url":null,"abstract":"Reinforcement learning algorithms have a wide range of applications in diverse areas, such as portfolio management, automatic driving, and visual object detection. This paper introduces a novel network architecture Ghost expectation point (GXPT) embedded in a deep reinforcement learning framework based on GhostNet, which is constructed using convolutional neural networks and ghost bottleneck modules. The Ghost bottleneck module can generate many Ghost feature maps, improving the ability of the network to extract information from the real-world market. Furthermore, the number of parameters and floating point operations (FLOPs) is reduced. We use the GXPT to realize Jiang et al.’s Ensemble of Identical Independent Evaluators (EIIE) framework. In the EIIE framework, GhostNet is adapted to implement Identical Independent Evaluators to evaluate the growth potential of each asset. In our experiments, we chose the Accumulated Portfolio Value (APV) and the Sharpe Ratio (SR) to assess the efficiency of our strategy in the back-test. It is found that our strategy is at least 5.11% and 29.9% higher than the comparison strategies in APV and SR, respectively.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shengchao Yuan, Yimin Zhou, Lei Shi, Yongxin Huang
{"title":"Dangerous Action Recognition for Ship Sailing to Limited Resource Environment","authors":"Shengchao Yuan, Yimin Zhou, Lei Shi, Yongxin Huang","doi":"10.1109/CyberC55534.2022.00050","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00050","url":null,"abstract":"Action recognition is a comprehensive application prospect in the surveillance video source but most of the well-known models have significant computational cost feature. Take a bottom-up algorithm named OpenPose as an example, it consumes a lot of time to solve a task. If dangerous action monitoring is deployed on overseas ships, which can not afford such a large amount of computation and storage cost. Meanwhile, a oversea ship is mostly offline during ocean voyages and cannot upload and download data. This paper addresses this issue by improving on the PyTorch-OpenPose model, adjusting the resolution of the input images and removing some of the unneeded skeletal key-point information from the model. Experimental results demonstrate that the execution time is reduced by about 71%, while the memory footprint is reduced by about 62%.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}