{"title":"A Trusted Routing Schemes for IoT","authors":"Zipeng Diao, Bei Gong, Haotian Zhu, Yong Wu","doi":"10.1109/ICCCS57501.2023.10150714","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10150714","url":null,"abstract":"The Internet of Things has become an essential part of human life. When an IoT node transmits data, it needs to go through multiple hops to reach its destination, which relies on the support of routing algorithms. The IoT network architecture itself is deficient. It is easy to various routing attacks. For requirements of secure routing for IoT, we propose an intra-domain trusted routing scheme. Our trusted routing scheme is based on-demand routing protocol and references to link trust values. For routing functions, it includes a route negotiation process and pathfinding mechanism based on a modified heap optimization method. For security functions, the security of routing is protected by trusted computing mechanism. In the sybil attack experiment, our routing schemes provide well protection effect.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Contract-Based Multi-Stage Service Auction for Refraction Networks","authors":"Xin Shi, Yunfei Guo, Ya-wen Wang, Yu Tong, Yanpeng Wu","doi":"10.1109/ICCCS57501.2023.10151197","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151197","url":null,"abstract":"As a promising Internet censorship circumvention technique, refraction networks have attracted the wide attention of researchers in recent years. However, it remains a crucial issue to be tackled, i.e., how to motivate more service providers, known as decoy routers, and clients to join refraction networks, especially with guaranteed security and privacy. To address the issue, we develop a decentralized service auction framework based on the blockchain constructed through clients and decoy routers. Further, we design a multi-stage service auction (MSSA) smart contract composed of multiple functions and events, which are triggered and executed autonomously to complete the tasks, including registration, double auction, first-price sealed auction, and payment clearing. Moreover, we implement the designed MSSA smart contract in the Remix integrated development environment and run a test case on Ethereum virtual machines. The experiment results verify the modest gas and ether cost of the smart contract-based solution and its effectiveness.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124941777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Li, Tong Nie, Tian Yang, Zesheng Zhu, Yingying Xu, Shengnan Zhang, Yucheng Shao, Yusheng Jiang
{"title":"A Voice Disguise Communication System Based on Real-Time Voice Conversion","authors":"Y. Li, Tong Nie, Tian Yang, Zesheng Zhu, Yingying Xu, Shengnan Zhang, Yucheng Shao, Yusheng Jiang","doi":"10.1109/ICCCS57501.2023.10151253","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151253","url":null,"abstract":"A Voice disguise communication (VDC) system is a system that disguises the voice in transmission and restores it at the receiving end. VDC systems have great application prospects in the field of confidential communication. The use of voice conversion (VC) can enhance the quality of voice disguise and reduce the recognition rate of eavesdroppers or automatic speaker verification (ASV) systems as a way to hide the identity of the speaker. There are three main constraints in applying VC to voice disguise at present: first, the real-time VC is poor and cannot meet the needs of real-time communication; second, the quality of voice disguise is not high, which is easily recognized by eavesdroppers or ASV systems; third, the corpus used for training is large, which poses certain difficulties and costs for implementation. Based on the above problems this research proposed a real-time VC method trained by a small corpus, and used it to design and implement a VDC system, and verified the effectiveness through experiments.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The New Generation of Artificial Intelligence Technology ChatGPT Causes: Potential Legal Risks and Regulatory Countermeasures","authors":"Ya-zhai Qu, Bing Bai, Zixuan Zhang","doi":"10.1109/ICCCS57501.2023.10151292","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151292","url":null,"abstract":"In the context of rapid development of economy, society and science and technology, artificial intelligence technology has been widely used in many fields such as labor and employment, ideological and political education, scientific ethics and technological research, and legal application in recent years, especially in the field of legal application, where there are also many development opportunities and risk challenges. ChatGPT, which was introduced in November 2022 as a general artificial intelligence technology, was once favored by all circles and attracted global buzz. However, while ChatGPT has brought great convenience to economic and social development, its high-tech feature of “talking more like human beings” has also triggered heated debates at various industry levels, mainly in the form of ethical considerations and many legal risks. Therefore, this paper examines ChatGPT's linguistic style, linguistic ability, and argumentative validity, taking the field of legal application as an example, with the aim of making a deep ethical consideration of this strong artificial intelligence language model. We also summarize the potential legal risks associated with the introduction of ChatGPT, such as authorship disputes, data source legitimacy disputes, and big data information leakage, in the context of existing practice. In response to the above issues, this article intends to propose a series of solutions.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127102715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Duoyao Zhang, Weikai Liu, Jiaxin Jing, Liangbin Yang
{"title":"Research on Emergency Search and Event Evolutionary Graph Construction in Social Networks","authors":"Duoyao Zhang, Weikai Liu, Jiaxin Jing, Liangbin Yang","doi":"10.1109/ICCCS57501.2023.10151108","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151108","url":null,"abstract":"[Purpose] With the rapid development of social networks, the public opinion environment on the Internet is changing rapidly. Nowadays, social networks have become one of the important platforms for internet users to understand current political news and discuss hot news, and the generation and dissemination of emergencies are inseparable from the important channel of social networks. It is necessary to effectively channel public opinion, reduce the malicious spread of users, and resolve the crisis of public opinion when an emergency occurs. [Method] This paper collects the comment data of three emergencies at the national security level under the microblog platform, and uses the natural language processing model to process the data, and constructs the emergency event evolutionary graph and the emergency abstract event evolutionary graph. [Conclusion] The results show that when a major emergency occurs, the severity, details and background of the event attract the most attention from the public, and they are the core elements that constitute the event evolutionary graph. In emergencies involving all aspects of national security, politics and medical care, the relevant departments shall guide a positive and favorable public opinion atmosphere in society and create a harmonious public opinion environment.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability Test Method of Nuclear Power DCS Network Communication Based on Fault Injection","authors":"Hua Tu, Likai Yao, Xin Wei Zhai, Chao Gui, Xiaole Fan","doi":"10.1109/ICCCS57501.2023.10150497","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10150497","url":null,"abstract":"In order to improve the communication reliability of nuclear power DCS system and avoid the hidden fault-tolerant design Defect left over to the commercial operation stage of units. In this study, the reliability test method of nuclear power DCS network communication based on fault injection technology is adopted, and faults are injected in physical layer and link layer according to different fault modes. By using this method, DCS network communication failure mode of Nuclear Power Plant in Validity can be realized.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Few-Shot Classification With Cross-Feature Fusion","authors":"Guohui Yao, Min Li, Dawei Song","doi":"10.1109/ICCCS57501.2023.10151269","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151269","url":null,"abstract":"Most existing methods for few-shot image classification treat the support features and query features separately, and the category of a query image is determined based on its similarity to the support images. However, the relationships between the query features and support features are often ignored. In this paper, we propose a strategy that exploits the relationships between query and support features and give more weights to the highly related features. A cross-feature fusion method is further proposed to combine with metric learning to reduce overfitting. Extensive experiments on a wide range of datasets show that our method has achieved advanced results.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Access Control Mechanism in Smart Identifier Network","authors":"Peidai Liu, Shuai Gao, Xindi Hou, Ningchun Liu","doi":"10.1109/ICCCS57501.2023.10150666","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10150666","url":null,"abstract":"In recent years, with the development of mobile Internet, cloud computing, and other technologies, the traditional Internet architecture has been challenging to meet the needs of future network development. As a revolutionary network architecture, SINET provides security and mobility for the network through the identification mapping separation technology. At the same time, the development of programmable data plane technology provides conditions for the large-scale deployment of SINET. In this paper, we proposed an Attribute-based access control(ABAC) mechanism based on multidimensional attributes of users and services in the PDP-based SINET. We designed the workflow of property registration and access requests of the network. We built a network prototype system and verified the function of the access control mechanism. The results show that the access control mechanism proposed in this paper can meet the network's fine-grained security management and control requirements and ensure the secure access of users and services in the network.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131485894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EfficientNet-Based Deep Learning Approach for Breast Cancer Detection With Mammography Images","authors":"Shi Gengtian, Bing Bai, Guo-Jun Zhang","doi":"10.1109/ICCCS57501.2023.10151156","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151156","url":null,"abstract":"Breast cancer is a major health concern affecting women worldwide. Early detection and accurate diagnosis of breast cancer are crucial for improving patient outcomes. In recent years, deep learning techniques have been increasingly applied to medical imaging, including mammography, for the detection and diagnosis of breast cancer. In this study, we proposed a deep learning-based approach using the EfficientNet architecture for the detection and classification of breast cancer. We evaluated the performance of our proposed approach using mammography images from the CBIS-DDSM dataset and achieved accuracy of 0.75 and AUC of 0.83. Our results demonstrate the effectiveness of using deep learning techniques in medical imaging for breast cancer detection and diagnosis.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zijian Zhang, Shouxian Mou, Jun Xu, Jiachen Hao, Jia Cao
{"title":"An Ultra Wide Band LNA with Current Reused Topology in 0.18-mu mathrm{m}$ GaAs pHEMT Process","authors":"Zijian Zhang, Shouxian Mou, Jun Xu, Jiachen Hao, Jia Cao","doi":"10.1109/ICCCS57501.2023.10151293","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151293","url":null,"abstract":"A current reused low noise amplifier with ultra wide bandwidth of 2–18 GHz and low power consumption is presented in this paper. Besides the current reuse technique to reduce the power consumption, a transistor-biased circuit is used to overcome the PVT problem. The proposed LNA is fabricated with $0.18-mu mathrm{m}$ GaAs pHEMT process. According to the post-layout simulation results, the LNA gives an average gain of 20.7 dB with a gain flatness of ±1.5 dB in the 2–18 GHz band. The noise figure is lower than 1.4 dB within the operating bandwidth. OP1dB of the LNA is over 3dBm. The power consumption is only 92 mW with single supply of 5V, which is extremely lower than the designs in literature. In addition, the proposed LNA has a compact size of $1.75times 1 text{mm}^{2}$.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127230441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}