2022 IEEE 8th International Conference on Computer and Communications (ICCC)最新文献

筛选
英文 中文
Adversarial Samples Defense Strategy Based on Service Orchestration 基于服务编排的对抗性样本防御策略
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065619
Mengxin Zhang, Xiaofeng Qiu
{"title":"Adversarial Samples Defense Strategy Based on Service Orchestration","authors":"Mengxin Zhang, Xiaofeng Qiu","doi":"10.1109/ICCC56324.2022.10065619","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065619","url":null,"abstract":"Deep neural networks (DNNs) are playing an increasingly significant role in the modern world. However, they are weak to adversarial samples that are generated by adding specially crafted perturbations. Most defenses against adversarial samples focused on refining the DNN models, which often sacrifice the performance and computational cost of models on benign samples. In this paper, we propose a manifold distance detection method to distinguish legitimate samples and adversarial samples by measuring the different distances on the manifold. The manifold distance detection method neither modifies the protected models nor requires knowledge of the process for generating adversarial samples. Inspired by the effectiveness of the manifold distance detection, we demonstrated a well-designed orchestrated defense strategy, named Manifold Distance Judge (MDJ), which selects the best image processing method that will effectively expand the manifold distance between legitimate and adversarial samples, and thus, enhances the performance of the following manifold distance detection method. Tests on the ImageNet dataset, the MDJ is effective against the most adversarial samples under white-box, gray-box, and black-box attack scenarios. We show empirically that the orchestration strategy MDJ is significantly better than Feature Squeezing on the recall rate. Meanwhile, MDJ achieves high detection rates against CW attack and DI-FGSM attack.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Complexity Multiuser Hybrid Precoding with Partially-Connected Architecture 具有部分连接架构的低复杂度多用户混合预编码
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065937
Jianing Li, Yuan Jiang, Lei Zhao, Bin Wang
{"title":"Low-Complexity Multiuser Hybrid Precoding with Partially-Connected Architecture","authors":"Jianing Li, Yuan Jiang, Lei Zhao, Bin Wang","doi":"10.1109/ICCC56324.2022.10065937","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065937","url":null,"abstract":"Hybrid precoding has evolved into an essential technology in millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems due to the low demand for the number of radio frequency (RF) chains. In this paper, in order to reduce the computational complexity of hybrid precoding, we propose a low-complexity two-stage multiuser hybrid precoding scheme. In the first stage, we focus on how to reduce the computational complexity under the premise of acceptable sum spectral efficiency loss. In the second stage, block diagonalization (BD) method is adopted to design digital precoder and classical water-filling method is utilized to address power allocation problem. Simulation results reveal that the proposed precoding scheme can achieve satisfactory level from the viewpoint of computational complexity, and meanwhile spectral efficiency can be guaranteed.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Music Generation Road from Statistical Method to Deep Learning 从统计方法到深度学习的音乐生成之路
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065693
Jiayun Xu, Weiting Qu, Dixin Li, Changjiang Zhang
{"title":"The Music Generation Road from Statistical Method to Deep Learning","authors":"Jiayun Xu, Weiting Qu, Dixin Li, Changjiang Zhang","doi":"10.1109/ICCC56324.2022.10065693","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065693","url":null,"abstract":"Automatic music generation is regarded as one of the most concerning research areas. However, the current music generation AI model lacks mainstream algorithms and norms, including model evaluation standards and objective music quality measurements. In this paper, we conducted experiments on traditional statistical models, machine learning models and deep learning models to generate music, respectively involving Markov Chain, SVM, Random Forest, LSTM, GAN models and their variants. In addition, we also proposed three new quantitative methods to measure the quality of computer-generated music using technical metrics: the Key Confidence Test, the Random Walk Test and the Word2Vec Similarity Test. These methods could be used to measure the quality of generated music and avoid the subjectivity of manual evaluation, thus providing reference for future music evaluation tasks.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122780421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
k-Means-Based Tactile Data Recognition Method for Sharp and Dangerous Objects for Robots 基于k均值的机器人尖锐危险物体触觉数据识别方法
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066027
Jing Yang, Shunyu Cen, Xiangyu Zhang, Honglin Luo, Taohong Zhao, Guangshu Wei, Zukun Yu, Qinglang Li
{"title":"k-Means-Based Tactile Data Recognition Method for Sharp and Dangerous Objects for Robots","authors":"Jing Yang, Shunyu Cen, Xiangyu Zhang, Honglin Luo, Taohong Zhao, Guangshu Wei, Zukun Yu, Qinglang Li","doi":"10.1109/ICCC56324.2022.10066027","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066027","url":null,"abstract":"A robot senses its surroundings through its “skin.” Through this tactile sensing method, a robot can obtain tactile data of various shapes and sharp objects. Then, a robot can analyze whether objects are sharp and dangerous through these tactile data. This study proposes a k-means algorithm-based tactile data recognition method for sharp and dangerous objects for robots. It develops a distributed pressure tactile sensing device that aims to simulate how the human skin layer works. By using this device, multiple sets of data are obtained after collecting the data of seven types of objects with different degrees of sharpness, namely, a hobby knife, sharp pliers, a diamond-shaped block, a square charger, a pencil-shaped block, a ping-pong ball, and a cylindrical block. The data are classified and stored using the k-means algorithm. By sensing the data of the seven types of sharp objects studied in this work in real time on the developed device for analysis, human brain's judgment on the sharpness of the objects is simulated. Through the analysis of a large amount of experimental data and algorithm optimization, experimental results show that the device can recognize relatively regular square objects, objects with curved surfaces with small changes in the radius of curvature, and objects with tips of less complexity. Recognition accuracy can reach 95%.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122815340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of NR Positioning Evolution: From Scenarios to Techniques NR定位演进分析:从场景到技术
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065808
Hang Yin, Bowen Wang, Nanxi Li, Jianchi Zhu, X. She
{"title":"Analysis of NR Positioning Evolution: From Scenarios to Techniques","authors":"Hang Yin, Bowen Wang, Nanxi Li, Jianchi Zhu, X. She","doi":"10.1109/ICCC56324.2022.10065808","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065808","url":null,"abstract":"The development of 5G generates the promotion of mMTC scenarios such as HOT and V2X, which highlights the requirements of positioning enhancement. In this paper, NR positioning evolution is analyzed from 3GPP standard perspective. we provide the analysis of basic positioning method introduced in Rel-16 and summary the enhancement for improving the accuracy and reducing the latency on NR positioning in Rel-17. Moreover, in order to meet the services' requirement defined in 3GPP SA WG, we propose the potential techniques that can enhance the NR positioning for the newly introduced scenarios in Rel-18.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Service-Based RAN via Multi-state Markov Chain 基于多状态马尔可夫链的基于服务的无线局域网性能分析
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10066043
Huimin Zhang, Guangyi Liu, N. Li, Zhou Tong, Quan Zhao, Junshuai Sun
{"title":"Performance Analysis of Service-Based RAN via Multi-state Markov Chain","authors":"Huimin Zhang, Guangyi Liu, N. Li, Zhou Tong, Quan Zhao, Junshuai Sun","doi":"10.1109/ICCC56324.2022.10066043","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10066043","url":null,"abstract":"Service-based radio access network (RAN) which enables RAN to support diversified applications and vertical industries has aroused the widespread interest. The feasibility verification of the new architecture is particularly important before further research, which is the focus of this paper. This work presents the multi-state Markov approach into the service-based RAN for performance analysis. The key phases, namely orchestration and transmission phase, are extracted to build the multi-state Markov model. And the closed expression of the Markov characteristics are given. We set the simulator according to cell deployment and the task processing to validate the proposed model. Also, the evaluation results of Markov characteristics and typical performance metrics are provided which shows the accuracy of our model.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Alternate Control Delayed Systems 模糊交替控制延迟系统
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065957
Ning Tang, Yuming Feng, B. Onasanya, Wei Zhang
{"title":"Fuzzy Alternate Control Delayed Systems","authors":"Ning Tang, Yuming Feng, B. Onasanya, Wei Zhang","doi":"10.1109/ICCC56324.2022.10065957","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065957","url":null,"abstract":"This paper studies the asymptotic stability of nonlin-ear systems which is regulated by using fuzzy impulsive control. First of all, the system was formulated, the Lyapunov function was constructed, and then the fuzzy control component required for the nonlinear system to exhibit global asymptotic exponential stability under the regulation of the impulsive controller was developed. A unique fuzzy concept was introduced herein, which, compared to the conventional precise counterpart, was defined to perform only scalar approximations. Subsequently, a set of conditions sufficient for global asymptotic exponential stability was proposed for the impulsive controller. Halany inequality and its key generalizations were used while working out the mathematical proofs. Finally, examples were given to verify the general results obtained and their applicability.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Key Agreement Scheme for UAV Network 一种无人机网络轻量级密钥协议方案
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065747
J. Liu, Lin Yuan, Zhi-Shang Feng, Xiong Chen, Zhi-Cheng Hang
{"title":"A Lightweight Key Agreement Scheme for UAV Network","authors":"J. Liu, Lin Yuan, Zhi-Shang Feng, Xiong Chen, Zhi-Cheng Hang","doi":"10.1109/ICCC56324.2022.10065747","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065747","url":null,"abstract":"With the wide application of Unmanned Aerial Vehicles (UAV), safety issues have become increasingly prominent. this paper proposes a lightweight key agreement scheme for UAV network (UAV-KAS) to solve the security problem of UAV communication, we use one-way hash for mutual identity authentication and Elliptic Curve Diffie-Hellman (ECDH) for key agreement, which improves the security of key agreement and reduces the calculation and communication cost of key agreement. The security and performance analysis show that the UAV-KAS has higher security and lower calculation cost. The proposed scheme improves the communication security problem of autonomous cooperation of UAVs. Moreover, it supports the joining and exiting of UAV, which improves the robustness of the UAVs network and can be applied to the dynamic network of UAVs with limited resources.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decoupled Teacher for Semi-Supervised Drone Detection 半监督无人机检测的解耦教师
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065897
Jiawei Wang, Tianyu Song, Yan Zhang, Shengmin Wang, Wenhui Lin, Zhigang Wang, Yuanyuan Qiao
{"title":"Decoupled Teacher for Semi-Supervised Drone Detection","authors":"Jiawei Wang, Tianyu Song, Yan Zhang, Shengmin Wang, Wenhui Lin, Zhigang Wang, Yuanyuan Qiao","doi":"10.1109/ICCC56324.2022.10065897","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065897","url":null,"abstract":"Aerial drones come in handy in a variety of science and research applications, sometimes even cause privacy harms during aerial surveillance. In many anti-drone situations, detection, tracking, and classification of drones are of great significance to secure the airspace. Drones are small in size, different in appearance, and have different flight attitudes for various flight environments, which makes the drone data sets too expensive to annotate and the foreground-background imbalance occurs in drone detection. Previous works on drone detection have focused on supervised learning, which depends on large labeled data set. To alleviate the problem of scarce labeled data sets, Semi-Supervised Learning can be employed to leverage unlabeled samples. In this paper, we propose a Semi-Supervised Object Detection method Decoupled Teacher to use unlabeled data and address the foreground-background imbalance issue. Specifically, Decoupled Teacher decouples the Exponential Moving Average mechanism in the general SSOD paradigm, and applies a fusion method of weak/strong data augmentation. We have bench-marked our method and the state-of-the-art SSOD methods using two publicly available drone data sets. The experiment results demonstrate the superior performance of our approach compared with the state-of-the-art methods.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122198378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Beam Handover Algorithm Based on Reinforcement Learning for mmWave System 基于强化学习的毫米波系统自适应波束切换算法
2022 IEEE 8th International Conference on Computer and Communications (ICCC) Pub Date : 2022-12-09 DOI: 10.1109/ICCC56324.2022.10065827
Jianzhong Yi, Chao Dong, K. Niu, Qiulin Xue, Junping Zhang
{"title":"Adaptive Beam Handover Algorithm Based on Reinforcement Learning for mmWave System","authors":"Jianzhong Yi, Chao Dong, K. Niu, Qiulin Xue, Junping Zhang","doi":"10.1109/ICCC56324.2022.10065827","DOIUrl":"https://doi.org/10.1109/ICCC56324.2022.10065827","url":null,"abstract":"In millimeter wave (mmWave) frequency band, the link quality is greatly affected by the environment. Coupled with the dense deployment of mmWave access points (APs) and the using of beamforming technology, beam handovers frequently occur in mobile communication systems. This paper optimizes the mmWave beam handover process using the Q-Learning method. Our proposed algorithm learns and senses the complex communication environment by the beam reporting information from the users. We consider the effects of handover cost and historical beam quality during the handover process. The adaptive handover threshold is obtained by querying the Q table according to the current state. Simulation results show that our proposed algorithm reduces the number of beam handover times and improves the system performance compared with the original scheme in the 3GPP protocol.","PeriodicalId":263098,"journal":{"name":"2022 IEEE 8th International Conference on Computer and Communications (ICCC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116837828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信