2019 IEEE 19th International Conference on Communication Technology (ICCT)最新文献

筛选
英文 中文
Deity: Finding Deep Rooted Bugs in JavaScript Engines 神:在JavaScript引擎中发现根深蒂固的bug
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947153
Hongyang Lin, Junhu Zhu, Jianshan Peng, Dixia Zhu
{"title":"Deity: Finding Deep Rooted Bugs in JavaScript Engines","authors":"Hongyang Lin, Junhu Zhu, Jianshan Peng, Dixia Zhu","doi":"10.1109/ICCT46805.2019.8947153","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947153","url":null,"abstract":"Fuzzing [1] is a well-known technique which was employed to provide unexpected or random data as input to JavaScript engines in hopes of finding a security vulnerability. For effective fuzzing, the input must be both syntactically correct and uncommonly randomized for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. In this work, we introduced system Deity which managed to resolve the conflict with innovative AST(Abstract Syntax Tree) [2] based tree mutation and generating methods. It leverages a high-level structural representation of intermediate process JavaScript code. Our evaluation demonstrates the effectiveness of Deity. For large-scale JavaScript engines (njs, mjs, Javascript-Core, ChakraCore, Espruino, Jerryscript) fuzzing, our results significantly show that Deity can improve code coverage and finding more deep rooted bugs (i.e., 35 new bugs, among which we discovered 21 new vulnerabilities with 3 CVEs assigned) over Superion and CodeAlchemist.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Multi-modal Spatio-temporal Data Semantic Association Model Based on Ontology 基于本体的多模态时空数据语义关联模型
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947183
Yan Zhou, Qingqing Yang, Fan Jiang
{"title":"A Multi-modal Spatio-temporal Data Semantic Association Model Based on Ontology","authors":"Yan Zhou, Qingqing Yang, Fan Jiang","doi":"10.1109/ICCT46805.2019.8947183","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947183","url":null,"abstract":"Multi-modal spatio-temporal data is mixed data with spatio-temporal information, various types and complex modalities. Different modal data are usually related to each other. Effective organization and associated spatio-temporal data are the focus of massive data management and data information mining. Aiming at the characteristics of multidimensional, multi-scale, multi-temporal and multi-modality of spatio-temporal data, by analyzing its rich spatio-temporal information and semantic information, this paper proposes a multi-modal spatio-temporal data semantic association model with time information, spatial information and content object semantic information as three related factors. At the same time, based on the characteristics of multi-modal spatio-temporal data features low-level features heterogeneity, the ontology model of spatio-temporal data semantic expression that can describe data information uniformly is defined and constructed based on Ontology theory. The association query is realized by constructing multiple instances of different modal spatio-temporal data. The experimental analysis shows that the multi-modal spatio-temporal data semantic association model can effectively correlate spatio-temporal data of different modalities and has certain scalability.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125722040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design of CAN, LIN Bus Test Board CAN、LIN总线测试板的设计
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947008
Feng Luo, P. Wei
{"title":"A Design of CAN, LIN Bus Test Board","authors":"Feng Luo, P. Wei","doi":"10.1109/ICCT46805.2019.8947008","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947008","url":null,"abstract":"This paper proposes a CAN, LIN bus board design based on STM32. This paper analyzes the need for the control commands sent by the computer to be transmitted to the bus-controlled components during automotive test, and analyzes the insufficiency of existing PC-CAN/LIN adapter boards. Then this paper designs a function board containing serial port, RS232 module, CAN transceiver and LIN transceiver, and writes embedded software. After testing, the board designed in this paper can receive the message sent by the computer and convert it into bus message, and send it to the bus, to achieve the test of buses.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124059991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Image Watermarking in the Print-Cam Process 打印凸轮过程中的鲁棒图像水印
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947254
Shuang Liang, Xingjun Wang
{"title":"Robust Image Watermarking in the Print-Cam Process","authors":"Shuang Liang, Xingjun Wang","doi":"10.1109/ICCT46805.2019.8947254","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947254","url":null,"abstract":"Nowadays with the popularity of smartphones, it is increasingly valuable to capture side information in print media through phone cameras. The print-cam process produces serious attacks during capturing images, especially geometric distortions. In this paper, we propose a robust image watermarking method for the print-cam process, which is also evaluated on some different smartphones. In the embedding process, the method uses watermarking based on Discrete Cosine Transform (DCT). We introduce Scale-Invariant Feature Transform (SIFT), the local feature point detection techniques, to restore the geometric distortions, and then the reverse process of embedding is carried out to extract the watermark. The results show that the proposed method is considerably robust in the print-cam process. Meanwhile, the method is suitable for a wide range of smartphones and acceptable for real-life applications such as ID card verification, anti-counterfeit traceability, and medicine authentication.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on UAV Cluster Routing Strategy Based on Distributed SDN 基于分布式SDN的无人机集群路由策略研究
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947245
Yifan Sun, Zhichao Mi, Hai Wang, Yuqing Jiang, Ning Zhao
{"title":"Research on UAV Cluster Routing Strategy Based on Distributed SDN","authors":"Yifan Sun, Zhichao Mi, Hai Wang, Yuqing Jiang, Ning Zhao","doi":"10.1109/ICCT46805.2019.8947245","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947245","url":null,"abstract":"UAV clusters are able to strike targets flexibly in military operations, but the traditional routing cannot support multiple routing tables. In this paper, we present a routing strategy under multistage flow table based on distributed SDN architecture, which is more efficient for the combination and separation of UAVs. According to the characteristics of channels, we can schedule the mechanism and preset the priority. The distributed strategy does not have centralized controller, which can avoid network congestion and achieve higher reliability. The experimental platform of distributed interoperable data distribution with twenty nodes is established. The results show that this routing strategy is better than the traditional routing mode in terms of end-to-end delay and throughput.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobility Prediction Based Vehicular Edge Caching: A Deep Reinforcement Learning Based Approach 基于移动预测的车辆边缘缓存:一种基于深度强化学习的方法
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947024
Yanxiang Guo, Zhaolong Ning, Yu-Kwong Kwok
{"title":"Mobility Prediction Based Vehicular Edge Caching: A Deep Reinforcement Learning Based Approach","authors":"Yanxiang Guo, Zhaolong Ning, Yu-Kwong Kwok","doi":"10.1109/ICCT46805.2019.8947024","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947024","url":null,"abstract":"Caching on edge nodes can effectively reduce the burden on the Internet of Vehicles (IoV) networks. However, the inherent limitations of IoV networks, such as restricted storage capability of cache nodes and high mobility of vehicles may cause poor quality of services. Accurate prediction could achieve seamless switching between edge servers, reduce pre-fetch redundancy, and improve data transmission efficiency. This paper investigates how to pre-cache packets at edge nodes to speed up services to improve the user experience. We consider the trade-off between the modelling accuracy and computational complexity, and design a Markov Deep Q-Learning (MDQL) model to formulate the caching strategy. The k-order Markov model is first used to predict the mobility of vehicles, and the prediction results are used as the input of deep reinforcement learning (DRL) for training. The MDQL model can reduce the size of the action space and the computational complexity of DRL while considering the balance between the cache hit rate and the cache replacement rate. Experimental results demonstrate the effectiveness of the proposed method.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132625159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Region-aware Random Erasing 区域感知随机擦除
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947189
Zhen Yang, Zhipeng Wang, Wenshan Xu, Xiuying He, Zhichao Wang, Zhijian Yin
{"title":"Region-aware Random Erasing","authors":"Zhen Yang, Zhipeng Wang, Wenshan Xu, Xiuying He, Zhichao Wang, Zhijian Yin","doi":"10.1109/ICCT46805.2019.8947189","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947189","url":null,"abstract":"Object detection task, as a prevailing direction of computer vision, involves many challenges. One of its most general problems is overfitting. Random Erasing is a state-of-art Data Augmentation method for avoiding overfitting. However, it aims at classification task. When it is used to train object detection models, it sometimes discards the objects, then the bounding boxes correspond to some noise regions. To solve this shortcoming of Random Erasing, this paper proposes Range-aware Random Erasing data augment method. In training stage, Range-aware Random Erasing randomly occludes a part of foreground and a part of background rather than occludes a part of a whole image. By using this approach, we can not only enlarge our training dataset to reduce overfitting without discarding objects, but also reduce the impact of background information. By combing Region-aware Random Erasing with Tiny-YOLOv3 on two public datasets, Widerface and ILSVRC2015-VID, nice performance improvements in mAP are showed.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real-Time Traffic Flow Management Based on Visible Light Communication: A Case Study at Roundabout 基于可见光通信的交通流实时管理:以环形交叉路口为例
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947137
Maged Fakirah, S. Leng, Qing Wang
{"title":"Real-Time Traffic Flow Management Based on Visible Light Communication: A Case Study at Roundabout","authors":"Maged Fakirah, S. Leng, Qing Wang","doi":"10.1109/ICCT46805.2019.8947137","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947137","url":null,"abstract":"Roundabouts are sort of circular intersections founded to ensure vehicles safety on the roads. Nevertheless, they do not prevent accidents entirely, where conflicts may occur at existed intersections causing traffic congestion, or even, serious accidents. In this study, an intelligent transportation system (ITS) solution is proposed to safely coordinate autonomous vehicles crossing at roundabouts via the Visible Light Communication (VLC) technique, since recent studies have shown that the VLC technique can be effectively utilized in dynamic vehicular communications. The proposed system focuses on vehicle-to-infrastructure communications (V2I), where on-site VLC terminals are distributed at entrances of the roundabout to control the traffic flow in real time. Simulation results exhibit that prospective collision at roundabouts can be avoided effectively based on the proposed system.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128168841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Incremental Identification Method for Fraud Phone Calls Based on Broad Learning System 基于广义学习系统的诈骗电话增量识别方法
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947271
Rui Zhong, Xiaocen Dong, Rongheng Lin, Hua Zou
{"title":"An Incremental Identification Method for Fraud Phone Calls Based on Broad Learning System","authors":"Rui Zhong, Xiaocen Dong, Rongheng Lin, Hua Zou","doi":"10.1109/ICCT46805.2019.8947271","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947271","url":null,"abstract":"With the continuous development of the communication industry, more and more fraud calls appear in the user’s daily life and the crime of telecom fraud is growing rapidly, causing huge losses every year. Traditional fraud detection methods are less flexible and they all belong to passive interception and rely on intelligent terminals. At present, a more accurate and timely method is needed to deal with the evolving fraud. Therefore, this paper proposes an identification method for fraud phone calls based on Broad Learning System (BLS). We processed the text data of fraud phone calls through the first 15s of the call content identification monitoring, constructed the TF-IDF model, then converted it into a neural network based on the BLS and identified the fraud phone calls on this model. At the same time, the model can be updated quickly by corresponding incremental learning algorithm without retraining based on the BLS, which is suitable for fraud identification systems with few data features but high real-time prediction requirements. The method mentioned above is experimented and analyzed in detail. The results show that this method has higher accuracy and excellent training speed on fraud data. Compared with the original fraud identification methods, it can actively intercept and has higher accuracy. Compared with other neural network algorithms used in fraud system, the method has better training speed, can ensure the accuracy and timeliness of online fraud identification and help quickly identify fraud phone calls.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132994265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Massive MIMO Channel Estimation Based on Improved Variable Step Size Regular Backtracking SAMP Algorithms 基于改进变步长规则回溯SAMP算法的海量MIMO信道估计
2019 IEEE 19th International Conference on Communication Technology (ICCT) Pub Date : 2019-10-01 DOI: 10.1109/ICCT46805.2019.8947171
Hao Xu, Chunshu Li
{"title":"Massive MIMO Channel Estimation Based on Improved Variable Step Size Regular Backtracking SAMP Algorithms","authors":"Hao Xu, Chunshu Li","doi":"10.1109/ICCT46805.2019.8947171","DOIUrl":"https://doi.org/10.1109/ICCT46805.2019.8947171","url":null,"abstract":"The traditional channel estimation methods LS and MMSE are used in MIMO channel estimation. Because of the large number of pilots required, the computation of inverse covariance matrix is required, which results in high computational complexity. Considering the sparsity of wireless channel in time domain, compressed sensing theory can be used to estimate the channel. The common greedy algorithms of compressed sensing include OMP algorithm and CoSaMP algorithm, which need to take sparsity as a known condition, so their use is limited. In this paper, an improved variable step-size regular backtracking SAMP algorithm based on compressed sensing theory is proposed to estimate the channel of Massive MIMO system. This algorithm improves the reconstruction accuracy of traditional SAMP algorithm in channel estimation and avoids the need for known sparsity, so it has good application value. In addition, good estimation results are also obtained under the noise environment, which proves the advantages of the algorithm.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信