Computer Supported Cooperative Work-The Journal of Collaborative Computing最新文献

筛选
英文 中文
Multi-Source Domain Transfer Learning on Epilepsy Diagnosis 多源领域迁移学习在癫痫诊断中的应用
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152684
Aimei Dong, Zhiyun Qi, Yi Zhai, Guohua Lv
{"title":"Multi-Source Domain Transfer Learning on Epilepsy Diagnosis","authors":"Aimei Dong, Zhiyun Qi, Yi Zhai, Guohua Lv","doi":"10.1109/CSCWD57460.2023.10152684","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152684","url":null,"abstract":"Epilepsy is a neurological disease that occurs in all ages and seriously threatens physical and mental health. There are two problems in the present study. One is the limitation of the amount of publicly available medical data. And the other is that the distributions of the data are different but correlated. Conventional machine learning methods are not applicable. But transfer learning method has shown promising performance in solving both problems. In this paper, a multi-source domain transfer learning method called MDTL for epilepsy diagnosis is proposed. In order to fully exploit the specific features and common features of the dataset, we propose a domain specific feature extractor and a common feature extractor. For enhancing data, we transform the signals into time-frequency diagrams to rotate and crop. The three types of electrocardiogram (ECG) time-frequency diagram are put to train model, and the model is transferred to electroencephalogram (EEG) time-frequency diagrams. The results confirm that MDTL is effective in epilepsy diagnosis.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"11 1","pages":"83-88"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74834007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Protection Based on Packet Filtering for Home Internet-of-Things 基于包过滤的家庭物联网隐私保护
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152725
Beibei Cheng, Yiming Zhu, Yuxuan Chen, Xiaodan Gu, Kai Dong
{"title":"Privacy Protection Based on Packet Filtering for Home Internet-of-Things","authors":"Beibei Cheng, Yiming Zhu, Yuxuan Chen, Xiaodan Gu, Kai Dong","doi":"10.1109/CSCWD57460.2023.10152725","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152725","url":null,"abstract":"The development of home internet of things (H-IoT) devices brings convenience but poses significant privacy and security risks. Existing research minimizes data uploaded to the cloud but fails to process data locally, resulting in a trade-off between privacy and functionality. In this paper, we propose a privacy-preserving method that identifies and processes sensitive data sent from H-IoT devices at the edge side, ensuring functionality while preserving privacy. Our method applies different identification strategies to packets with different features, making it applicable to most H-IoT devices and scenarios. We validate our approach through experiments on a prototype system that monitors multiple cameras, demonstrating its effectiveness in preserving privacy while maintaining functionality.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"16 1","pages":"1214-1219"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75553588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy 一种基于差分隐私保护的在线深度学习算法
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152847
Jun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu
{"title":"A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy","authors":"Jun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu","doi":"10.1109/CSCWD57460.2023.10152847","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152847","url":null,"abstract":"Deep Reinforcement Learning (DRL) combines the perceptual capabilities of deep learning with the decision-making capabilities of Reinforcement Learning RL, which can achieve enhanced decision-making. However, the environmental state data contains the privacy of the users. There exists consequently a potential risk of environmental state information being leaked during RL training. Some data desensitization and anonymization technologies are currently being used to protect data privacy. There may still be a risk of privacy disclosure with these desensitization techniques. Meanwhile, policymakers need the environmental state to make decisions, which will cause the disclosure of raw environmental data. To address the privacy issues in DRL, we propose a differential privacy-based online DRL algorithm. The algorithm will add Gaussian noise to the gradients of the deep network according to the privacy budget. More important, we prove tighter bounds for the privacy budget. Furthermore, we train an autocoder to protect the raw environmental state data. In this work, we prove the privacy budget formulation for differential privacy-based online deep RL. Experiments show that the proposed algorithm can improve privacy protection while still having relatively excellent decisionmaking performance.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"29 1","pages":"559-564"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81634318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Model Pruning without Additional Computation and Structure Requirements 无需额外计算和结构要求的神经网络模型修剪
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152777
Yin Xie, Yigui Luo, Haihong She, Zhaohong Xiang
{"title":"Neural Network Model Pruning without Additional Computation and Structure Requirements","authors":"Yin Xie, Yigui Luo, Haihong She, Zhaohong Xiang","doi":"10.1109/CSCWD57460.2023.10152777","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152777","url":null,"abstract":"In past work, deep learning researchers always designed hyperparameters such as model structure and learning rate first and then used the training set to train the weights in this model. While unrestricted model structure design leads to massive neuron redundancy in neural network models. By pruning these redundant neurons, not only can the storage be compressed effectively, but also the operation can be accelerated. In this paper, we propose a method to utilize the training set to prune the model structure during training: 1) train the initialized model and bring it to basic convergence; 2) feed the entire training set into the model and calculate the activations of neurons in each layer; 3) calculate the threshold for neuron pruning in each layer according to the pruning ratio, delete neurons whose activation value is lower than the threshold, and correspondingly delete the weights of the upper and lower layers; 4) further train the pruned model so that it eventually converges. This method of deleting redundant neurons not only greatly deletes the parameters in the model but also achieves model acceleration. We applied this method to some mainstream neural network models: VGGNet and ResNet, and achieved good results.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"17 1","pages":"1734-1740"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89679863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning 基于多智能体深度强化学习的协同边缘缓存方法
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152789
Xiang Cao, Ningjiang Chen, Xuemei Yuan, Yifei Liu
{"title":"A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning","authors":"Xiang Cao, Ningjiang Chen, Xuemei Yuan, Yifei Liu","doi":"10.1109/CSCWD57460.2023.10152789","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152789","url":null,"abstract":"With the support of 5G technology, mobile edge computing has made the application of industrial IoT and power IoT more and more extensive. By deploying a certain number of edge servers at the edge of the network, network service delay may significantly reduce. For the IoT scenario where the content demand is unpredictable, there are multiple distributed cloud servers and the distributed cloud servers do not communicate directly, a feasible way to improve the network service quality is to dynamically optimize the storage of edge servers and formulate targeted caching strategies. This paper proposes an edge caching approach based on multi-agent deep deterministic policy gradient named MADDPG-C, which regards distributed cloud servers and edge servers as different types of agents and maximizes the efficiency of edge caching in cooperation and competition. Simulation experiments show that the proposed MADDPG-C can further improve the hit rate of the edge cache and reduce the waiting delay of terminal devices.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"41 7","pages":"1772-1777"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72471002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks 一种自适应IP跳变防御移动目标的网络攻击方法
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152746
Fengyuan Shi, Zhou-yu Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao
{"title":"AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks","authors":"Fengyuan Shi, Zhou-yu Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao","doi":"10.1109/CSCWD57460.2023.10152746","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152746","url":null,"abstract":"In a static network, attackers can easily launch network attacks on target hosts which have long-term constant IP addresses. In order to defend against attackers effectively, many defense approaches use IP hopping to dynamically transform IP configuration. However, these approaches usually focus on one type of network attacks, scanning attacks or Denial of Service (DoS) attacks, and cannot sense network situations. This paper proposes AHIP, an adaptive IP hopping method for moving target defense (MTD) to defend against different network attacks. We use a trained lightweight one-dimensional convolutional neural network (1D-CNN) detector to judge whether there are no attacks, scanning attacks or DoS attacks in the network, which can adaptively trigger corresponding IP hopping strategy. We use specific hardware and software to create the software defined network (SDN) environment for experiments. The experiments prove that AHIP performs better to thwart network attacks and has lower system overhead.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"53 1","pages":"1300-1305"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76483630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning 基于元学习的异构图少射恶意域检测
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152708
Yi Gao, Fangfang Yuan, Cong Cao, Majing Su, Dakui Wang, Yanbing Liu
{"title":"Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning","authors":"Yi Gao, Fangfang Yuan, Cong Cao, Majing Su, Dakui Wang, Yanbing Liu","doi":"10.1109/CSCWD57460.2023.10152708","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152708","url":null,"abstract":"The Domain Name System (DNS), one of the essential basic services on the Internet, is often abused by attackers to launch various cyber attacks, such as phishing and spamming. Researchers have proposed many machine learning-based and deep learning-based methods to detect malicious domains. However, these methods rely on a large-scale dataset with labeled samples for model training. The fact is that the labeled domain samples are limited in the real-world DNS dataset. In this paper, we propose a few-shot malicious domain detection model named MetaDom, which employs a meta-learning algorithm for model optimization. Specifically, We first model the DNS scenario as a heterogeneous graph to capture richer information by analysing the complex relations among domains, IP addresses and clients. Then, we learn the domain representations with a heterogeneous graph neural network on the DNS HG. Finally, considering that only few labeled data are available in the real-world DNS scenario, a meta-learning algorithm with knowledge distillation is introduced to optimize the model. Extensive experiments on the real DNS dataset show that MetaDom outperforms other state-of-the-art methods.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"62 1","pages":"727-732"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76791528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative Greedy Selection Hyper-heuristic with Linear Population Size Reduction 线性种群缩减的迭代贪心选择超启发式算法
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152792
Fuqing Zhao, Yuebao Liu, Tianpeng Xu
{"title":"Iterative Greedy Selection Hyper-heuristic with Linear Population Size Reduction","authors":"Fuqing Zhao, Yuebao Liu, Tianpeng Xu","doi":"10.1109/CSCWD57460.2023.10152792","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152792","url":null,"abstract":"Selecting appropriate algorithms for specific problems has become a significant challenge with the remarkable growth of heuristics and meta-heuristics. To address this challenge, an iterative greedy selection hyper-heuristic algorithm with linear population size reduction (LIGSHH) was proposed in this paper. Using an iterative greedy strategy to choose the high level of exploration, this heuristic selects the Low-Level Heuristics (LLHs) that best suit the current problem. Nine LLHs are specifically designed for continuous optimization problems. Additionally, the exploration and exploitation capabilities of the LIGSHH are balanced by reducing the population size linearly at different stages of the problem. The proposed LIGSHH algorithm and comparison algorithms are tested on the CEC2017 benchmark test suite, and the experimental results show that the LIGSHH algorithm outperforms other comparison algorithms.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"151 1","pages":"751-755"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79549566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keynote 2 : Promoting the diversity of digital technologies 主题演讲2:促进数字技术的多样性
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/cscwd57460.2023.10152801
{"title":"Keynote 2 : Promoting the diversity of digital technologies","authors":"","doi":"10.1109/cscwd57460.2023.10152801","DOIUrl":"https://doi.org/10.1109/cscwd57460.2023.10152801","url":null,"abstract":"","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"174 1","pages":""},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79664019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing 多跳拼车的两阶段车辆对调度
IF 2.4 3区 计算机科学
Computer Supported Cooperative Work-The Journal of Collaborative Computing Pub Date : 2023-05-24 DOI: 10.1109/CSCWD57460.2023.10152680
Xiaobo Wei, Peng Li, Weiyi Huang, Zhiyuan Liu, Qin Liu
{"title":"Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing","authors":"Xiaobo Wei, Peng Li, Weiyi Huang, Zhiyuan Liu, Qin Liu","doi":"10.1109/CSCWD57460.2023.10152680","DOIUrl":"https://doi.org/10.1109/CSCWD57460.2023.10152680","url":null,"abstract":"Ridesharing benefits the economy and the environment. In multi-hop ridesharing, passengers are permitted to switch vehicles within a single trip, extending the flexibility of conventional ridesharing. Nonetheless, vehicle dispatch is a difficult issue in multi-hop ridesharing. We subdivide the vehicle dispatching problem into the vehicle pairing problem and the request selection problem within a vehicle pair. To address these subproblems, we propose a two-stage framework for vehicle pair dispatching. In the initial stage, we model the vehicle pairing problem as a maximum vehicle-vehicle matching problem in a general graph, which differs from the conventional vehicle-request matching problem in a bipartite graph. The vehicle pairing algorithm is proposed to efficiently solve the vehicle pairing problem. In the second stage, we model the request selection problem as a multidimensional knapsack problem (d-KP) and propose an LP-relaxation request selection algorithm with an approximation ratio 1/5. Experiments conducted on a real-world dataset demonstrate the economic benefit of our proposed two-stage framework.","PeriodicalId":51008,"journal":{"name":"Computer Supported Cooperative Work-The Journal of Collaborative Computing","volume":"67 1","pages":"255-260"},"PeriodicalIF":2.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80437028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信