{"title":"RF Fingerprint Recognition in Resource-Constrained Edge Computing","authors":"Di Liu, Hao Wang, Mengjuan Wang","doi":"10.1109/ICCWAMTIP53232.2021.9674057","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674057","url":null,"abstract":"RF fingerprinting is a method to identify different wireless devices based on hardware differences in the communication devices, aiming to assist in solving the problem of secure access to wireless networks. Traditional RF fingerprinting relies on feature extraction and the training and prediction of data under a single node. However, in real-world application scenarios, it is impractical to send all data to a centralized location, and these approaches do not take into account the limited resources such as bandwidth and storage in edge networks. In this paper, we use distributed machine learning to solve the problem of learning models from data from multiple edge nodes. And the high communication cost in distributed machine learning is optimized for the problem of resource constraint of edge devices. Simulation results show that the method can not only cope with the training problem of a large amount of data but also reduce the communication cost on the edge devices, which can reduce the training time by about 9%.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129727653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cross-Chain Solutions Based On Proxy Network","authors":"Wang Wei, Wang Juan, Wang Ziyang, Liuyaning","doi":"10.1109/ICCWAMTIP53232.2021.9674133","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674133","url":null,"abstract":"Most of the current research on cross-chain technology focuses on the efficiency and security of currency transactions, which cannot be well applied to the non-financial field of storing large-volume engineering documents and data. Cross-chain supervision and storage is more difficult, and data structure conversion is complicated. To solve these problems, this paper applies node performance index and identity evaluation techniques to engineering document data cross-linking, and proposes a cross-linking scheme of the agent network. Based on the government node characteristics of blockchain in the field of engineering document management, an agent node election algorithm is designed and an agent cross-chain network is constructed. Simulation results show that this scheme can complete agent election and cross-chain message forwarding, and has application value.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130975089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Collins Sey, Xiaoyu Li, Weizhong Qian, Linda Delali Fiasam, Seth Larweh Kodjiku, Adu Asare Baffour, Isaac Adjei-Mensah
{"title":"Tradeblock: Blockchain Based System for Online Classified Advertisement Industries","authors":"Collins Sey, Xiaoyu Li, Weizhong Qian, Linda Delali Fiasam, Seth Larweh Kodjiku, Adu Asare Baffour, Isaac Adjei-Mensah","doi":"10.1109/ICCWAMTIP53232.2021.9674070","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674070","url":null,"abstract":"For decades, classified ads were limited to newspapers, which offered advertisers, small-type notices grouped under specific categories. However, owing to the growing use of mobile internet, online classified market is rapidly gaining grounds in our world. This rapid growth in the classified industry has led to an increase in the number of companies seeking to gain share in this ever-growing market and also with a direct relation to increase in online scammers and fraudulent activities and also trust relationship issues. Scammers detected on one classified ad platform replicate their bad behaviors on multiple platforms. This research presents an innovative solution known as “TradeBlock”, for online classified ad industries to solve these key issues and to improve the whole online classified ad industry using blockchain's complete immutable and decentralized technology of keeping records.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128185425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulmg: A Static Detection Solution For Source Code Vulnerabilities Based On Code Property Graph and Graph Attention Network","authors":"Zhang Haojie, Liao Yujun, Liu Yiwei, Zhou Nanxin","doi":"10.1109/ICCWAMTIP53232.2021.9674145","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674145","url":null,"abstract":"As the number of vulnerabilities continues to rise, security incidents triggered by vulnerabilities emerge endlessly. Current vulnerability detection methods still have some problems, such as detecting only a single function, relying heavily on expert knowledge, and being unable to achieve automation. According to the observation of the Juliet dataset, we find vulnerability exists not only within the single function but also between the called function and the calling function. Meanwhile, there are some differences between vulnerable functions and non-vulnerable functions in the code property graph. Therefore, this article proposes a vulnerability detection solution named VULMG, which converts vulnerability detection into the graph classification problem. VULMG includes a vectorization component named VecG and a deep learning classification model named MGGAT. Based on the code property graph, VecG extracts the lexical, grammatical, and semantic information of the source code as a feature matrix and extracts information such as structure, control, and dependence as three adjacency matrices. MGGAT is a deep learning model based on the graph attention network, which is used for graph classification. Besides, VULMG uses the FCG to associate the calling function with the called function so that it can detect the cross-function vulnerabilities. We selected CWE369 and CWE476 from the Juliet dataset for testing, and the F1 scores were 94.43% and 96.3%. The evaluation results indicate that VULMG outperforms Flawfinder, RATS, BiLSTM, SVM, and GCN, which verifies the effectiveness of the proposed solution.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"62 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120817103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve Traffic Organization in the Passenger Gravitation Zone","authors":"Rajabov Bakhrom, Liu Lan","doi":"10.1109/ICCWAMTIP53232.2021.9674122","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674122","url":null,"abstract":"The modernization of production and the realization of its development require proper transportation infrastructure to build road transportation on all elements of the transportation network, expand the transportation of technical equipment, and improve its reliability. This article aims to study the improvement of traffic organization in the passenger gravity zone. This article takes this city as an example. According to the characteristics of the research objects, the factor analysis method is used to calculate and rank the attractiveness of nodes, and determine the attractiveness level and size of these nodes. Experimental data shows that in order to make it easier for tourists and citizens to transfer to buses, subways and other means of transportation in the city, the city must gradually establish a slow transportation transfer system. The slow traffic transfer system here is mainly the transfer of public bicycles, walking and other modes of transportation. The results of the experiment show that the survey of the transportation modes of 400 passengers to the city estimates that the current state of transportation in the city in the first half of 2020 is: buses accounted for 14.0%, walking accounted for 28.3%, bicycles and electric vehicles accounted for 24.2%, Private cars accounted for 19.2%, taxis accounted for 14.3%, so the slow traffic attracted 52.5%. Without systematically studying the nature of changes in passenger traffic in the transportation network, it is impossible to successfully solve the problem of rational organization of passenger transportation and effective use of rolling stock. Through the study of passenger volume, the distribution of time, route length and direction of travel can be determined, so as to better solve the problem of traffic organization.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124002551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NFCS: An Efficient Neural Framework for Cold Start Recommendation","authors":"Wang Zhou, Laixiang Qiu, Meijun Duan, Amin Ul Haq","doi":"10.1109/ICCWAMTIP53232.2021.9674059","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674059","url":null,"abstract":"In this article we have illustrated an efficient and effective neural framework referred to as NFCS for cold start recommendation. In this neural network, the average ratings will be as the input, and the missing ratings will be regarded as the dropout rate for the neural network. Therefore, in the output layer ratings will be reconstructed, which could provide an high performance solution for cold start problem. Experimental results also demonstrate that NFCS could outperform state-of-the-art PMF and IRCD-ICS over real life datasets.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123539246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized QC-LDPC Coded Cooperation for Single Relay Wireless Cooperative Communication System","authors":"Harit Rijal, Yang Fengfan, Gershon Rodor","doi":"10.1109/ICCWAMTIP53232.2021.9674081","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674081","url":null,"abstract":"This literature proposes an optimized design of a coded cooperative system using QC LDPC codes with joint decoding at the destination based on the bilayered Tanner graph. Firstly, the literature first introduces QC-LDPC and its construction method based on exponent matrix and base matrix. Then equivalent parity check matrix was constructed in the destination using the bi-layer Tanner graph for the coded cooperation. The literature implemented the iterative Belief Propagation (BP) algorithm-based decoding method to decode equivalent parity check matrix at the destination. Finally, BER performance analysis was performed. The performance analysis result illustrated that the optimized QC-LDPC coded cooperation has a better performance compared to the non-cooperative coded systems over similar channel conditions.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122855050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of PBFT Consensus Mechanism Based on Credibility","authors":"Wang Ziyang, Wang Juan, Liu Yaning, Wang Wei","doi":"10.1109/ICCWAMTIP53232.2021.9674168","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674168","url":null,"abstract":"Consensus mechanism is particularly critical in blockchain technology. Aiming at the shortcomings of traditional consensus mechanisms in the application of power system engineering management, this article improves the Byzantine Fault Tolerance (PBFT) consensus algorithm based on the reputation value. First, according to different business environments, design the corresponding credit value influencing factors, and then use each influencing factor as input, and use the random forest algorithm to classify the nodes into three node clusters based on the reputation value of high, medium, and low. Election of the master node is carried out in the high reputation value node cluster and the continuous election of the master node is suppressed, and the low reputation value cluster is detected to find possible malicious nodes. The simulation experiment results show that the master nodes are more secure and evenly distributed; at the same time, malicious nodes in the system can be found to ensure system stability.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Manifold-Derived Gradients Link the Cortical Morphology to Gene Expression in Patients with Epilepsy","authors":"Yang Siqi, Meng Yao, Zhiqiang Zhang, Liao Wei","doi":"10.1109/ICCWAMTIP53232.2021.9674125","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674125","url":null,"abstract":"Diffusion embedding techniques offer the means to map brain organizational principles into a single manifold, called gradients, which help us understand how multi-scale brain features are related to each other. These links can help us understand the neural mechanism, and further broaden our insight into the relation between structure and function. In this study, manifold gradient was leveraged to study the link of macroscopic morphology to cortical gene expression in 92 genetic generalized epilepsy with generalized tonic-clonic seizures (GTCS), and 116 healthy controls. Diffusion map embedding was used to estimate the gradients of morphometric similarity (MS) connectome, which described the interregional similarity through five cortical features. The results revealed significant between-group differences in the MS gradient in GTCS, mainly involved in high-level networks. And the changes in MS gradient showed a positively correlation between expression profile of epileptic risk genes.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Explore on Application of BDS-3 RSMC in the Field of Image Transmission","authors":"Ye Quanguo, Ji Jing, Chen Wei","doi":"10.1109/ICCWAMTIP53232.2021.9674094","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP53232.2021.9674094","url":null,"abstract":"As a core of the national spatial-info assets, the BeiDou satellite navigation system (BDS) has a unique function is short messages, it is different from GPS, GLONASS and other global navigation satellite systems (GNSS). In the white paper, the regional short messages communication (RSMC) has reached 1,000 Chinese characters per slot (or 14k bits per slot), and the system capacity has been increased to 10 million times per hour. For BDS-3 RSMC service, this paper proposes an engineering scheme of image transmission and processing based on “cloud-edge-end”, and via simulation verification, it is found that for high-definition (HD) images with a resolution of $1024times 768mathrm{p}$, H.265 and proposed compression method compares the average data, compression ratio, standard deviation, subjective evaluation and time and other indicators, and finally verifies that the RSMC can realize high-definition image transmission under the VP8 compression coding condition. The engineering scheme of “cloud-edge-end” is feasible. To this point, the RSMC will have the ability to escape the scope of text and audio in real-time. At the same time, the improvement of its coverage and system capacity will also increase the worth of the BDS-3 RSMC image transmission, and further improve the communication on transportation, emergency and other fields.","PeriodicalId":358772,"journal":{"name":"2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128893751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}