{"title":"LwF4IEE: An Incremental Learning Method for Interactive Event Extraction","authors":"Jiashun Duan, Xin Zhang, Chi Xu","doi":"10.1109/CyberC55534.2022.00026","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00026","url":null,"abstract":"Albeit great progress has been witnessed in event extraction, the accuracies achieved up to now by various automatic models still can not meet the performance requirements of some special applications such as disaster monitoring and rescue. It motivates us to introduce a new human-in-loop extraction mode called interactive event extraction (IEE), which works iteratively. Each iteration consists of three main steps: \"model recommending candidate results → manual selecting and correcting → model re-training and updating\". For candidate recommendation, we build an MRC (Machine Reading Comprehension)-based model that can output several most likely candidate elements, i.e., candidate triggers and arguments, by confidence evaluation. For model re-training and updating, we proposed an incremental learning method named LwF4IEE (Learning without Forgetting for IEE), which employs manual selected and corrected results as hard label and prediction of original model as soft label to avoid catastrophic forgetting. We conduct extensive experiments on datasets constructed from real-world Chinese texts. The results show that when setting the number of candidates to be 5, recalls of triggers and arguments reach 93.80% and 90.58% respectively, which is 11.51% and 11.33% higher compared with the basic MRC-based automatic extraction model. Moreover, LwF4IEE increases the recall of triggers by 2.71% on specific event types and only decreases by 0.24% on other types, achieving the purpose of learning without forgetting.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126807479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Personalized Recommendation Fusing Tag Feature and Temporal Context","authors":"Ling Li","doi":"10.1109/cyberc55534.2022.00058","DOIUrl":"https://doi.org/10.1109/cyberc55534.2022.00058","url":null,"abstract":"The rapid growth of users and items provides enormous potential for users to find their interested information. This has attracted a lot of attentions how to use both tag feature and temporal context to improve recommendation accuracy. In this paper, we calculate users’ similarity by using user-tag bipartite, so as to construct user-tag feature vector. Then, we take the temporal context into consideration to dynamically discover neighbors which have higher effect weights. Finally, we fuse the neighbor sets to collaborative filtering algorithm based on the neighborhood. We evaluate the proposed algorithm using a real-world data set and compare the performance with classical baseline methods, showing the improvements in terms of different evaluation.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115126134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Multiple Targets Pedestrian Reidentification with Night Scene Image Enhancement","authors":"Minkang Zhang, Ding Chen, Yongxin Huang","doi":"10.1109/CyberC55534.2022.00045","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00045","url":null,"abstract":"Pedestrian reidentification is a popular research topic in the field of computer vision in recent years, and is a technique that uses computer vision techniques to determine whether a specific pedestrian is present in an image or video. After research and experiment, we found that YOLOv3-based pedestrian reidentification in practice has the problem of low accuracy rate of recognizing pedestrian pictures taken at night and cannot recognize multiple pedestrians at one time. In this paper, we improve the above problems by introducing a picture enhancement module to improve the brightness and defogging of night pictures before recognition, and improve the practice of averaging the distance values of multiple results for the same pedestrian to enable multiple targets pedestrian recognition. The experimental results demonstrate that the average accuracy rate of recognizing pedestrian pictures taken at night has improved from 6.85% to 80%, while the average accuracy rate of multiple targets pedestrian recognition has reached 85.9%, which is competent for multiple targets pedestrian recognition tasks at night.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jian Gao, Jie Yu, Ning Wang, Panpan Feng, Huiqing Cheng, Bing Zhou, Zongmin Wang
{"title":"A CVD Critical Level-aware Scheduling Model Based on Reinforcement Learning for ECG Service Request","authors":"Jian Gao, Jie Yu, Ning Wang, Panpan Feng, Huiqing Cheng, Bing Zhou, Zongmin Wang","doi":"10.1109/CyberC55534.2022.00039","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00039","url":null,"abstract":"In the cardiovascular disease (CVD) diagnosis scenario, the number of electrocardiogram (ECG) service request data is large and the severity of CVD is different. Efficient task scheduling is the key to large cluster computer-aided CVD diagnosis. Therefore, in task scheduling, the workload changes and the critical condition of CVD must be paid attention to. We propose a CVD critical level-aware scheduling model based on reinforcement learning (CLS-RL) to optimize ECG service request scheduling. To solve the problem that there is no publicly available ECG service request data, this paper proposes a method of composing it. Then, we utilize RL with Actor-Critic to improve the efficiency of scheduling. Finally, we define the new objective functions for ECG service request scheduling. The experimental results show that the proposed CLS-RL is the best in comprehensive performance.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127434311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive defense scheme against container escape related to container management procedure","authors":"Zhimin Guo, Zhuo Lv, Nuannuan Li, Tao Yuan, Xue Gao, Zekun Yuan","doi":"10.1109/cyberc55534.2022.00051","DOIUrl":"https://doi.org/10.1109/cyberc55534.2022.00051","url":null,"abstract":"Container technology has become a widely used virtualization technology in cloud platform because of its lightweight virtualization characteristics. However, compared with traditional virtual machine technology, the security and isolation of the container are poor and it may lead to container escape, because container technology shares the kernel with the host. This attack will pose a serious threat to the host and other containers on the same host. We studied the container escape attack caused by container management vulnerabilities, and propose a comprehensive container security protection scheme by using AppArmor and Seccomp. Through the simulation of vulnerability environment, the structure proves that the scheme is indeed effective.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126072028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junfeng Ding, Haonan Zong, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang
{"title":"Study on the automatic modeling method of 3D information model for substations","authors":"Junfeng Ding, Haonan Zong, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang","doi":"10.1109/CyberC55534.2022.00053","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00053","url":null,"abstract":"Reverse modeling is a kind of technology that transforms natural scenes into three-dimensional models. The models are generated manually by referring to the point cloud obtained by a laser scanner, which is time-consuming, laborious, and complicated. To address this problem, we propose an automatic modeling method for the point cloud data of substations. First, an algorithm is designed to automatically generate a component model library by referring to the standard structure of the substation equipment. Then, we improve the Euclidean clustering to segment disconnected point cloud data. Finally, corresponding points are found according to the SHOT feature descriptor, and each component is identified with Hough voting. After the location information for each element in the scene is obtained, the models can be transferred to the scene to replace the corresponding part in the point cloud, thus completing the process of automatic modeling. The experiment compares the results of improved Euclidean clustering and traditional Euclidean clustering. The clustering method in this paper has a significant improvement in execution efficiency. In addition, we also give the final modeling result of the method in this paper. Compared with the Delaunay triangulation and Poisson surface reconstruction methods, the model built by this method is more complete.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big data encrypting transmission framework for a multi-AGV system","authors":"Tongpo Zhang, Yuxin Wan, M. López-Benítez, Enggee Lim, Fei Ma, Limin Yu","doi":"10.1109/CyberC55534.2022.00019","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00019","url":null,"abstract":"This project has developed a data transmission framework including Automated Guided Vehicles (AGVs), a cloud platform, edge computers and a master server. This framework is designed to provide a solution for protecting user privacy in the data transmission process of AGV in practical applications. The system divides the information collected by AGVs into messages and big data, where messages are transmitted through Message Queuing Telemetry Transport (MQTT) protocol and big data is transmitted through socket. Big data is collected by different sensors equipped in AGVs. Messages are processed by the AGV’s main chip. Meanwhile, public key encryption based on RSA algorithm is performed in the transmission process to ensure the privacy and safety of information and users.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134333141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Neural Networks Enhanced Phase Asynchronous Physical-Layer Network Coding","authors":"Xuesong Wang, Lu Lu","doi":"10.1109/cyberc55534.2022.00037","DOIUrl":"https://doi.org/10.1109/cyberc55534.2022.00037","url":null,"abstract":"Physical-layer network coding (PNC) is a promising technique in 6th-generation (6G) that can enhance the throughput of wireless communication systems, but it suffers from the performance loss because of relative phase offset that is brought by the asynchrony between different uplinks. Traditional way such as belief propagation (BP) that is used to solve the asynchrony needs estimated phases in uplinks as prior knowledge, and the computation complexity is high. In this paper, we propose a deep neural network (DNN) based PNC model that can deal with the phase asynchrony automatically and effectively without prior knowledge, and the system has small architecture that is easy to implement. Simulation results verify that our system has advantage of dealing with relative phase offset in PNC system under various modulation types.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133482300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juntuo Wang, Qiaochu Zhao, Dongheng Lin, Erick Purwanto, K. Man
{"title":"Conditional Metadata Embedding Data Preprocessing Method for Semantic Segmentation","authors":"Juntuo Wang, Qiaochu Zhao, Dongheng Lin, Erick Purwanto, K. Man","doi":"10.1109/CyberC55534.2022.00057","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00057","url":null,"abstract":"Semantic segmentation is one of the key research areas in computer vision, which has very important applications in areas such as autonomous driving and medical image diagnosis. In recent years, the technology has advanced rapidly, where current models have been able to achieve high accuracy and efficient speed on some widely used datasets. However, the semantic segmentation task still suffers from the inability to generate accurate boundaries in the case of insufficient feature information. Especially in the field of medical image segmentation, most of the medical image datasets usually have class imbalance issues and there are always variations in factors such as shape and color between different datasets and cell types. Therefore, it is difficult to establish general algorithms across different classes and robust algorithms that differ across different datasets. In this paper, we propose a conditional data preprocessing strategy, i.e., Conditional Metadata Embedding (CME) data preprocessing strategy. The CME data preprocessing method will embed conditional information to the training data, which can assist the model to better overcome the differences in the datasets and extract useful feature information in the images. The experimental results show that the CME data preprocessing method can help different models achieve higher segmentation performance on different datasets, which shows the high practicality and robustness of this method.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131125495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RTOSExtracter: Extracting user-defined functions in stripped RTOS-based firmware","authors":"Xinguang Xie, Junjian Ye, Lifa Wu, Rong Li","doi":"10.1109/CyberC55534.2022.00024","DOIUrl":"https://doi.org/10.1109/CyberC55534.2022.00024","url":null,"abstract":"In recent years, Real-Time Operating System (RTOS) has been widely used in the Internet of Things (IoT) devices in many fields. Meanwhile, IoT devices running RTOS are facing an increasing number of security vulnerabilities, which are caused mainly by user-defined functions. Therefore, researchers usually need to manually identify and analyze user-defined functions in the firmware to detect vulnerabilities. However, stripped RTOS-based firmware does not contain the debug symbols such as function names. There is no clear boundary between the system and user-defined functions, making it laborious and inefficient to identify user-defined functions from the thousands of functions.In this paper, we design and implement RTOSExtracter, an automated static analysis tool for identifying user-defined functions and their names in stripped RTOS-based firmware, which can be extended to support multiple RTOS types. This tool can disassemble the target firmware, recover the names of the task creation APIs, identify the parameter structure, and generate the parameter values that contain user-defined function addresses and function name addresses. To evaluate RTOSExtracter, we implemented a prototype of RTOSExtracter on IDA Pro with support for five common types of RTOS including FreeRTOS, LiteOS, RT-Thread, μC/OS-II, and μC/OS-III. We compiled 30 open-source projects covering these five RTOS types with 12 different compilers and optimizations and generated 275 firmware without the debug symbols to test RTOSExtracter. The experimental results show that RTOSExtracter identifies user-defined function addresses and function name addresses with high accuracy and low time cost. Furthermore, the case study shows that RTOSExtracter can effectively identify user-defined functions and their names in actual firmware.","PeriodicalId":234632,"journal":{"name":"2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}