2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)最新文献

筛选
英文 中文
Causal Unstructured Pruning in Linear Networks Using Effective Information 基于有效信息的线性网络因果非结构化剪枝
Changyu Zeng, Li Liu, Haocheng Zhao, Yu Zhang, Wei Wang, Ning Cai, Yutao Yue
{"title":"Causal Unstructured Pruning in Linear Networks Using Effective Information","authors":"Changyu Zeng, Li Liu, Haocheng Zhao, Yu Zhang, Wei Wang, Ning Cai, Yutao Yue","doi":"10.1109/CyberC55534.2022.00056","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00056","url":null,"abstract":"Excessive number of parameters in today’s (deep) neural networks demands tremendous computational resources and slows down training speed. The problem also makes it difficult to deploy these neural network models on capability constrained devices such as mobile devices. To address this challenge, we propose an unstructured pruning method that measures the causal structure of neural networks based on effective information (EI). It introduces an intervention to the input and computes the mutual information between the interference and its corresponding output, within a single linear layer measuring the importance of each weight. In the experiments, we found that the sparsity of EI pruning can reach more than 90%. Only 10% of non-zero parameters in the linear layers were needed compared to the benchmark methods without pruning, while ensuring similar level of accuracy and stable training performance in iterative pruning. In addition, as the invariance of the causal structure of the network is exploited, the network after pruning using EI is highly generalizable and interpretable than other methods.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption 基于同态加密的云计算数据隐私保护
Jing Wang, Fengheng Wu, Tingbo Zhang, Xiaohua Wu
{"title":"DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption","authors":"Jing Wang, Fengheng Wu, Tingbo Zhang, Xiaohua Wu","doi":"10.1109/CyberC55534.2022.00016","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00016","url":null,"abstract":"Cloud computing has been widely used because of its low price, high reliability, and generality of services. However, considering that cloud computing transactions between users and service providers are usually asynchronous, data privacy involving users and service providers may lead to a crisis of trust, which in turn hinders the expansion of cloud computing applications. In this paper, we propose DPP, a data privacy-preserving cloud computing scheme based on homomorphic encryption, which achieves correctness, compatibility, and security. DPP implements data privacy-preserving by introducing homomorphic encryption. To verify the security of DPP, we instantiate DPP based on the Paillier homomorphic encryption scheme and evaluate the performance. The experiment results show that the time-consuming of the key steps in the DPP scheme is reasonable and acceptable.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Model Design for IoT-Based Flooding Forecast 基于物联网的洪水预测机器学习模型设计
Qinghua Wang
{"title":"Machine Learning Model Design for IoT-Based Flooding Forecast","authors":"Qinghua Wang","doi":"10.1109/CyberC55534.2022.00025","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00025","url":null,"abstract":"Flooding risk is a threat to sea-level residential areas in southern Sweden. An Internet of things (IoT) project has been deployed to monitor weather and water pipe conditions in Kristianstad, Sweden. The IoT data however only monitors the current condition and does not tell the future threat. Machine learning models using deep learning neural networks have been developed to predict future threats based on IoT data and weather forecast. This paper presents multiple model architectures and their performances. All the models are explainable. Finally, a conclusion is made by selecting the best-functioning model in the context of flooding risk prediction in Kristianstad.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Deep Learning Model for Real-time Detection and Recognition of Traffic Signs Images Based on YOLOv5 基于YOLOv5的交通标志图像实时检测与识别的轻量级深度学习模型
Hui He, Qihong Chen, Guoping Xie, Boxiong Yang, Shelei Li, Bo Zhou, Yuye Gu
{"title":"A Lightweight Deep Learning Model for Real-time Detection and Recognition of Traffic Signs Images Based on YOLOv5","authors":"Hui He, Qihong Chen, Guoping Xie, Boxiong Yang, Shelei Li, Bo Zhou, Yuye Gu","doi":"10.1109/CyberC55534.2022.00042","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00042","url":null,"abstract":"The rapid and accurate identification of various road traffic signs is an important research topic in automotive vision systems. Specifically, the correct identification of road signs is an urgent problem requiring effective solutions to facilitate automatic driving. This paper proposes a new approach, PP-LCNet-P2-CT, for the detection and recognition of urban road signs in an automotive vision system using an improved YOLOv5 deep learning model. The main improvement of the PP-LCNet-P2-CT model includes the following: (1) Replacing the YOLOv5 backbone network with the lightweight network PP-LCNet to improve the real-time performance of the detection network; (2) Adding a small target detection head to the detection head to meet the needs of target detection with different scales and mitigate the adverse effects caused by drastic target scale changes; and (3) Integrating the CBAM convolutional block attention model that focuses on target features and the transformer coding block that can capture different local information to ensure the accuracy of lightweight model target detection. The model was tested with the Tsinghua traffic sign dataset, TT100k. The results show that the mAP index of the PP-LCNet-P2-CT model is increased by 29.84% and the FPS is increased by 24.05%, while the number of model parameters is decreased by 32.78% and the GFLOPs decreased by 34.41% compared with the classic YOLOv5 algorithm. The PP-LCNet-P2-CT model allows complex deep learning to be used successfully for unmanned ground vehicles (UGVs) with ordinary computing speeds and high real-time requirements.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Attack and Defense for Webshell Detection on Machine Learning Models 基于机器学习模型的Webshell检测的对抗性攻击与防御
Q. Zhang, Lishen Chen, Qiao Yan
{"title":"Adversarial Attack and Defense for Webshell Detection on Machine Learning Models","authors":"Q. Zhang, Lishen Chen, Qiao Yan","doi":"10.1109/CyberC55534.2022.00017","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00017","url":null,"abstract":"Machine learning (ML) models can be used for the automated processing and analysis of source codes, thus improving the detection of webshell malware source codes, which can enhance the security of the whole network. However, despite the successes of ML-based models in webshell detection, these models lack large amounts of data for training and are vulnerable to adversarial examples. We have built a larger and more precise dataset containing 2015 manually labeled webshell malware. A detection model trained with this dataset can achieve higher detection accuracy. We have also proposed a method to generate adversarial examples for the programming language without changing its logic. The main idea of our method is to insert perturbation codes that do not modify the webshell program’s semantics, thereby creating an adversarial example that can bypass the model’s detection. This method can effectively attack the existing webshell malware ML detection models without changing the original malicious functions. Experiments have shown that our method can generate webshell malware adversarial examples that evade model detection while obtaining the model’s confidence output. To defend against such attacks, we have applied retraining and adversarial fine-tuning.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Relation Enhanced Model For Abstractive Dialogue Summarization 抽象对话摘要的关系增强模型
Pengyao Yi, Ruifang Liu
{"title":"A Relation Enhanced Model For Abstractive Dialogue Summarization","authors":"Pengyao Yi, Ruifang Liu","doi":"10.1109/CyberC55534.2022.00047","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00047","url":null,"abstract":"Traditional document summarization models perform less satisfactorily on dialogues due to the complex personal pronouns referential relationships and insufficient modeling of conversation. To address this problem, we propose a novel end-to-end Transformer-based model for abstractive dialogue summarization with Relation Enhanced method based on BART named RE-BART. Our model leverages local relation and global relation in a conversation to model dialogue and to generate better summaries. In detail, we consider that the verb and related arguments in a single utterance contribute to the local event for encoding the dialogue. And coreference information in a whole conversation represents the global relation which helps to trace the topic and information flow of the speakers. Then we design a dialogue relation enhanced model for modeling both information. Experiments on the SAMsum dataset show that our model outperforms various dialogue summarization approaches and achieves new state-of- the-art ROUGE results.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125267418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers 针对协同窃听者的物理层安全通信无人机轨迹优化
Huanran Zhang, Lingfeng Shen, Ning Wang, X. Mu
{"title":"UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers","authors":"Huanran Zhang, Lingfeng Shen, Ning Wang, X. Mu","doi":"10.1109/CyberC55534.2022.00055","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00055","url":null,"abstract":"In this paper, we study the maximization of the secrecy throughput of an air-to-ground UAV communication system through UAV trajectory optimization, in a scenario where multiple cooperating eavesdroppers exist. Two cooperative eavesdropping strategies, namely Selection Combing-Cooperative Eavesdropping (SC-CE) and Maximal Ratio Combining-Cooperative Eavesdropping (MRC-CE) are considered for the cooperating eavesdroppers. Based on the mathematical forms of the formulated optimization problems corresponding to the two cooperative eavesdropping schemes, we propose to use the Trajectory Increment Iteration (TII) algorithm and the Particle Swarm Optimization (PSO) algorithm to solve for the optimal trajectory, respectively. Simulation results show that by optimizing the UAV trajectory against cooperative eavesdropping, the physical layer security performance of the system can be effectively improved.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on fast convergence method of IIR low pass filter IIR低通滤波器快速收敛方法研究
Zuping Zhang
{"title":"Study on fast convergence method of IIR low pass filter","authors":"Zuping Zhang","doi":"10.1109/CyberC55534.2022.00035","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00035","url":null,"abstract":"In wireless communication, such as 4G LTE,5G NR and next G modem design, it is necessary to average the measured values such as noise power, time domain correlation of frequency offset estimation, frequency domain correlation of time offset estimation and signal-to-noise ratio (SNR) over a period of time in order to reduce noise and make them converge to stable estimation. These measurements have the characteristic that they are stabilized around a constant value for a relatively long time, they can be assumed nearly zero-frequency or low frequency signal with additional Gaussian noise. This paper discusses two kinds of IIR low pass filter to filter the above measured metrics. The one is nonlinear phase low pass filter, the other is nearly linear phase low pass filter. A new method is proposed to reduce the convergence time of IIR filter forced response, including adaptive determination of filter coefficient, selection of appropriate initial system value, and update long term value when the compensation occur.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ghost Expectation Point with Deep Reinforcement Learning in Financial Portfolio Management 基于深度强化学习的幽灵期望点金融投资组合管理
Xuting Yang, Ruoyu Sun, Xiaotian Ren, Angelos Stefanidis, Fengchen Gu, Jionglong Su
{"title":"Ghost Expectation Point with Deep Reinforcement Learning in Financial Portfolio Management","authors":"Xuting Yang, Ruoyu Sun, Xiaotian Ren, Angelos Stefanidis, Fengchen Gu, Jionglong Su","doi":"10.1109/CyberC55534.2022.00030","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00030","url":null,"abstract":"Reinforcement learning algorithms have a wide range of applications in diverse areas, such as portfolio management, automatic driving, and visual object detection. This paper introduces a novel network architecture Ghost expectation point (GXPT) embedded in a deep reinforcement learning framework based on GhostNet, which is constructed using convolutional neural networks and ghost bottleneck modules. The Ghost bottleneck module can generate many Ghost feature maps, improving the ability of the network to extract information from the real-world market. Furthermore, the number of parameters and floating point operations (FLOPs) is reduced. We use the GXPT to realize Jiang et al.’s Ensemble of Identical Independent Evaluators (EIIE) framework. In the EIIE framework, GhostNet is adapted to implement Identical Independent Evaluators to evaluate the growth potential of each asset. In our experiments, we chose the Accumulated Portfolio Value (APV) and the Sharpe Ratio (SR) to assess the efficiency of our strategy in the back-test. It is found that our strategy is at least 5.11% and 29.9% higher than the comparison strategies in APV and SR, respectively.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dangerous Action Recognition for Ship Sailing to Limited Resource Environment 有限资源环境下船舶航行危险行为识别
Shengchao Yuan, Yimin Zhou, Lei Shi, Yongxin Huang
{"title":"Dangerous Action Recognition for Ship Sailing to Limited Resource Environment","authors":"Shengchao Yuan, Yimin Zhou, Lei Shi, Yongxin Huang","doi":"10.1109/CyberC55534.2022.00050","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00050","url":null,"abstract":"Action recognition is a comprehensive application prospect in the surveillance video source but most of the well-known models have significant computational cost feature. Take a bottom-up algorithm named OpenPose as an example, it consumes a lot of time to solve a task. If dangerous action monitoring is deployed on overseas ships, which can not afford such a large amount of computation and storage cost. Meanwhile, a oversea ship is mostly offline during ocean voyages and cannot upload and download data. This paper addresses this issue by improving on the PyTorch-OpenPose model, adjusting the resolution of the input images and removing some of the unneeded skeletal key-point information from the model. Experimental results demonstrate that the execution time is reduced by about 71%, while the memory footprint is reduced by about 62%.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信