2023 8th International Conference on Computer and Communication Systems (ICCCS)最新文献

筛选
英文 中文
A Trusted Routing Schemes for IoT 一种物联网可信路由方案
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10150714
Zipeng Diao, Bei Gong, Haotian Zhu, Yong Wu
{"title":"A Trusted Routing Schemes for IoT","authors":"Zipeng Diao, Bei Gong, Haotian Zhu, Yong Wu","doi":"10.1109/ICCCS57501.2023.10150714","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10150714","url":null,"abstract":"The Internet of Things has become an essential part of human life. When an IoT node transmits data, it needs to go through multiple hops to reach its destination, which relies on the support of routing algorithms. The IoT network architecture itself is deficient. It is easy to various routing attacks. For requirements of secure routing for IoT, we propose an intra-domain trusted routing scheme. Our trusted routing scheme is based on-demand routing protocol and references to link trust values. For routing functions, it includes a route negotiation process and pathfinding mechanism based on a modified heap optimization method. For security functions, the security of routing is protected by trusted computing mechanism. In the sybil attack experiment, our routing schemes provide well protection effect.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123636745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Contract-Based Multi-Stage Service Auction for Refraction Networks 基于智能合约的折射网络多阶段服务拍卖
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10151197
Xin Shi, Yunfei Guo, Ya-wen Wang, Yu Tong, Yanpeng Wu
{"title":"Smart Contract-Based Multi-Stage Service Auction for Refraction Networks","authors":"Xin Shi, Yunfei Guo, Ya-wen Wang, Yu Tong, Yanpeng Wu","doi":"10.1109/ICCCS57501.2023.10151197","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151197","url":null,"abstract":"As a promising Internet censorship circumvention technique, refraction networks have attracted the wide attention of researchers in recent years. However, it remains a crucial issue to be tackled, i.e., how to motivate more service providers, known as decoy routers, and clients to join refraction networks, especially with guaranteed security and privacy. To address the issue, we develop a decentralized service auction framework based on the blockchain constructed through clients and decoy routers. Further, we design a multi-stage service auction (MSSA) smart contract composed of multiple functions and events, which are triggered and executed autonomously to complete the tasks, including registration, double auction, first-price sealed auction, and payment clearing. Moreover, we implement the designed MSSA smart contract in the Remix integrated development environment and run a test case on Ethereum virtual machines. The experiment results verify the modest gas and ether cost of the smart contract-based solution and its effectiveness.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124941777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Voice Disguise Communication System Based on Real-Time Voice Conversion 基于实时语音转换的语音伪装通信系统
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10151253
Y. Li, Tong Nie, Tian Yang, Zesheng Zhu, Yingying Xu, Shengnan Zhang, Yucheng Shao, Yusheng Jiang
{"title":"A Voice Disguise Communication System Based on Real-Time Voice Conversion","authors":"Y. Li, Tong Nie, Tian Yang, Zesheng Zhu, Yingying Xu, Shengnan Zhang, Yucheng Shao, Yusheng Jiang","doi":"10.1109/ICCCS57501.2023.10151253","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151253","url":null,"abstract":"A Voice disguise communication (VDC) system is a system that disguises the voice in transmission and restores it at the receiving end. VDC systems have great application prospects in the field of confidential communication. The use of voice conversion (VC) can enhance the quality of voice disguise and reduce the recognition rate of eavesdroppers or automatic speaker verification (ASV) systems as a way to hide the identity of the speaker. There are three main constraints in applying VC to voice disguise at present: first, the real-time VC is poor and cannot meet the needs of real-time communication; second, the quality of voice disguise is not high, which is easily recognized by eavesdroppers or ASV systems; third, the corpus used for training is large, which poses certain difficulties and costs for implementation. Based on the above problems this research proposed a real-time VC method trained by a small corpus, and used it to design and implement a VDC system, and verified the effectiveness through experiments.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New Generation of Artificial Intelligence Technology ChatGPT Causes: Potential Legal Risks and Regulatory Countermeasures 新一代人工智能技术的成因:潜在的法律风险与监管对策
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10151292
Ya-zhai Qu, Bing Bai, Zixuan Zhang
{"title":"The New Generation of Artificial Intelligence Technology ChatGPT Causes: Potential Legal Risks and Regulatory Countermeasures","authors":"Ya-zhai Qu, Bing Bai, Zixuan Zhang","doi":"10.1109/ICCCS57501.2023.10151292","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151292","url":null,"abstract":"In the context of rapid development of economy, society and science and technology, artificial intelligence technology has been widely used in many fields such as labor and employment, ideological and political education, scientific ethics and technological research, and legal application in recent years, especially in the field of legal application, where there are also many development opportunities and risk challenges. ChatGPT, which was introduced in November 2022 as a general artificial intelligence technology, was once favored by all circles and attracted global buzz. However, while ChatGPT has brought great convenience to economic and social development, its high-tech feature of “talking more like human beings” has also triggered heated debates at various industry levels, mainly in the form of ethical considerations and many legal risks. Therefore, this paper examines ChatGPT's linguistic style, linguistic ability, and argumentative validity, taking the field of legal application as an example, with the aim of making a deep ethical consideration of this strong artificial intelligence language model. We also summarize the potential legal risks associated with the introduction of ChatGPT, such as authorship disputes, data source legitimacy disputes, and big data information leakage, in the context of existing practice. In response to the above issues, this article intends to propose a series of solutions.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127102715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Emergency Search and Event Evolutionary Graph Construction in Social Networks 社会网络中的紧急事件搜索与事件演化图构建研究
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10151108
Duoyao Zhang, Weikai Liu, Jiaxin Jing, Liangbin Yang
{"title":"Research on Emergency Search and Event Evolutionary Graph Construction in Social Networks","authors":"Duoyao Zhang, Weikai Liu, Jiaxin Jing, Liangbin Yang","doi":"10.1109/ICCCS57501.2023.10151108","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151108","url":null,"abstract":"[Purpose] With the rapid development of social networks, the public opinion environment on the Internet is changing rapidly. Nowadays, social networks have become one of the important platforms for internet users to understand current political news and discuss hot news, and the generation and dissemination of emergencies are inseparable from the important channel of social networks. It is necessary to effectively channel public opinion, reduce the malicious spread of users, and resolve the crisis of public opinion when an emergency occurs. [Method] This paper collects the comment data of three emergencies at the national security level under the microblog platform, and uses the natural language processing model to process the data, and constructs the emergency event evolutionary graph and the emergency abstract event evolutionary graph. [Conclusion] The results show that when a major emergency occurs, the severity, details and background of the event attract the most attention from the public, and they are the core elements that constitute the event evolutionary graph. In emergencies involving all aspects of national security, politics and medical care, the relevant departments shall guide a positive and favorable public opinion atmosphere in society and create a harmonious public opinion environment.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability Test Method of Nuclear Power DCS Network Communication Based on Fault Injection 基于故障注入的核电DCS网络通信可靠性试验方法
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10150497
Hua Tu, Likai Yao, Xin Wei Zhai, Chao Gui, Xiaole Fan
{"title":"Reliability Test Method of Nuclear Power DCS Network Communication Based on Fault Injection","authors":"Hua Tu, Likai Yao, Xin Wei Zhai, Chao Gui, Xiaole Fan","doi":"10.1109/ICCCS57501.2023.10150497","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10150497","url":null,"abstract":"In order to improve the communication reliability of nuclear power DCS system and avoid the hidden fault-tolerant design Defect left over to the commercial operation stage of units. In this study, the reliability test method of nuclear power DCS network communication based on fault injection technology is adopted, and faults are injected in physical layer and link layer according to different fault modes. By using this method, DCS network communication failure mode of Nuclear Power Plant in Validity can be realized.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Few-Shot Classification With Cross-Feature Fusion 基于交叉特征融合的少镜头分类
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10151269
Guohui Yao, Min Li, Dawei Song
{"title":"Few-Shot Classification With Cross-Feature Fusion","authors":"Guohui Yao, Min Li, Dawei Song","doi":"10.1109/ICCCS57501.2023.10151269","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151269","url":null,"abstract":"Most existing methods for few-shot image classification treat the support features and query features separately, and the category of a query image is determined based on its similarity to the support images. However, the relationships between the query features and support features are often ignored. In this paper, we propose a strategy that exploits the relationships between query and support features and give more weights to the highly related features. A cross-feature fusion method is further proposed to combine with metric learning to reduce overfitting. Extensive experiments on a wide range of datasets show that our method has achieved advanced results.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Access Control Mechanism in Smart Identifier Network 智能标识网络中的一种访问控制机制
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10150666
Peidai Liu, Shuai Gao, Xindi Hou, Ningchun Liu
{"title":"An Access Control Mechanism in Smart Identifier Network","authors":"Peidai Liu, Shuai Gao, Xindi Hou, Ningchun Liu","doi":"10.1109/ICCCS57501.2023.10150666","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10150666","url":null,"abstract":"In recent years, with the development of mobile Internet, cloud computing, and other technologies, the traditional Internet architecture has been challenging to meet the needs of future network development. As a revolutionary network architecture, SINET provides security and mobility for the network through the identification mapping separation technology. At the same time, the development of programmable data plane technology provides conditions for the large-scale deployment of SINET. In this paper, we proposed an Attribute-based access control(ABAC) mechanism based on multidimensional attributes of users and services in the PDP-based SINET. We designed the workflow of property registration and access requests of the network. We built a network prototype system and verified the function of the access control mechanism. The results show that the access control mechanism proposed in this paper can meet the network's fine-grained security management and control requirements and ensure the secure access of users and services in the network.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131485894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EfficientNet-Based Deep Learning Approach for Breast Cancer Detection With Mammography Images 基于高效率网络的乳房x光图像乳腺癌检测的深度学习方法
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10151156
Shi Gengtian, Bing Bai, Guo-Jun Zhang
{"title":"EfficientNet-Based Deep Learning Approach for Breast Cancer Detection With Mammography Images","authors":"Shi Gengtian, Bing Bai, Guo-Jun Zhang","doi":"10.1109/ICCCS57501.2023.10151156","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151156","url":null,"abstract":"Breast cancer is a major health concern affecting women worldwide. Early detection and accurate diagnosis of breast cancer are crucial for improving patient outcomes. In recent years, deep learning techniques have been increasingly applied to medical imaging, including mammography, for the detection and diagnosis of breast cancer. In this study, we proposed a deep learning-based approach using the EfficientNet architecture for the detection and classification of breast cancer. We evaluated the performance of our proposed approach using mammography images from the CBIS-DDSM dataset and achieved accuracy of 0.75 and AUC of 0.83. Our results demonstrate the effectiveness of using deep learning techniques in medical imaging for breast cancer detection and diagnosis.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ultra Wide Band LNA with Current Reused Topology in 0.18-mu mathrm{m}$ GaAs pHEMT Process 0.18-mu mathm {m}$ GaAs pHEMT过程中电流复用的超宽带LNA
2023 8th International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2023-04-21 DOI: 10.1109/ICCCS57501.2023.10151293
Zijian Zhang, Shouxian Mou, Jun Xu, Jiachen Hao, Jia Cao
{"title":"An Ultra Wide Band LNA with Current Reused Topology in 0.18-mu mathrm{m}$ GaAs pHEMT Process","authors":"Zijian Zhang, Shouxian Mou, Jun Xu, Jiachen Hao, Jia Cao","doi":"10.1109/ICCCS57501.2023.10151293","DOIUrl":"https://doi.org/10.1109/ICCCS57501.2023.10151293","url":null,"abstract":"A current reused low noise amplifier with ultra wide bandwidth of 2–18 GHz and low power consumption is presented in this paper. Besides the current reuse technique to reduce the power consumption, a transistor-biased circuit is used to overcome the PVT problem. The proposed LNA is fabricated with $0.18-mu mathrm{m}$ GaAs pHEMT process. According to the post-layout simulation results, the LNA gives an average gain of 20.7 dB with a gain flatness of ±1.5 dB in the 2–18 GHz band. The noise figure is lower than 1.4 dB within the operating bandwidth. OP1dB of the LNA is over 3dBm. The power consumption is only 92 mW with single supply of 5V, which is extremely lower than the designs in literature. In addition, the proposed LNA has a compact size of $1.75times 1 text{mm}^{2}$.","PeriodicalId":266168,"journal":{"name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127230441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信