Journal of Cloud Computing-Advances Systems and Applications最新文献

筛选
英文 中文
A New Multi-Feature Recommendation Model Based on Recurrent Neural Network 基于递归神经网络的多特征推荐模型
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00048
Benshan Mei, Lin Chen, Shao-Jie Sun, Pan-Yu Chen, Wei-Liang Huang
{"title":"A New Multi-Feature Recommendation Model Based on Recurrent Neural Network","authors":"Benshan Mei, Lin Chen, Shao-Jie Sun, Pan-Yu Chen, Wei-Liang Huang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00048","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00048","url":null,"abstract":"With the problems of handling single-feature and overlooking user preferences in the recommendation algorithms, this paper proposes a Recurrent Neural NetWork-based Multi-feature Hybrid Recommendation Model (RN-MHRM). Firstly, features are extracted from user-item interaction data using the Latent Factor Model (LFM), and an improved Recurrent Neural NetWork (RNN) is used to replace the linear inner product of LFM vectors With non-linearity, Which aims at learning richer features that capture user's short-term interests. Secondly, to avoid single-feature, item information is introduced and the BERT model is used for extracting multi-features. Thirdly, both short-term and long-term interests are considered, and the user's long-term interests are trained by a FeedforWard Neural NetWork (FNN), Which greatly improves the recommendation performance. Experiments designed on multiple real datasets have shown that RN-MHRM effectively improves recommendation performance compared to the baseline model.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"52 1","pages":"235-240"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90661901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictable Track-based Routing in Flying Ad hoc Networks 飞行自组织网络中基于可预测轨迹的路由
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00028
Zhu Kai, Bao-kang Zhao, Qin Xin
{"title":"Predictable Track-based Routing in Flying Ad hoc Networks","authors":"Zhu Kai, Bao-kang Zhao, Qin Xin","doi":"10.1109/CSCloud-EdgeCom58631.2023.00028","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00028","url":null,"abstract":"Flying Ad-hoc network (FANETs), a new kind of mobile AD hoc network, uses the aircraft as the air wireless communication node to construct a network and achieve effective communication at the network layer as a result of the ongoing expansion of communication networks into many industries. However, the high dynamics, limited node energy, and low network density of the FANETs present significant challenges to the FANETs routing protocol, which requires urgent attention in terms of its design. In order to address the issues associated with the routing metric of the FANETs routing protocol, such as the underutilization of link information and the inadequate consideration of the motion of UAVs, which result in high network packet loss rates, unstable routing, and long route reconvergence times, this paper proposes the Predictable Track-based Routing Protocol (PTP). PTP divides the routing protocol into three stages: route establishment, data transmission, and route maintenance. PTP creatively suggests Node Stability Factors (NSF) for UAV in the route establishment stage and develops a Q-learning algorithm to maintain it in accordance with the status of the nodes and nearby nodes. NSF combined the link quality calculated by HELLO messages to generate a link quality based on Q-learning(LQQ) metric. After that, the optimal path from the source node to the destination node is calculated based on this metric. In the data transfer phase, data is transmitted through the routes calculated in the route establishment phase. Create a new HELLO message during the routing maintenance phase to learn the location of the neighbor node and the two-hop neighbor node, predict the node’s future location using the Kalman filter algorithm based on the node’s past location, and react quickly when the link is about to change. Compared to conventional approaches, experiments demonstrate that PTP may successfully raise the successful data delivery rate by 10% to 30%, increase the average route survival time by up to 60%, and cut the average route reconvergence time by up to 80%.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"45 1","pages":"114-119"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82078062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System 基于价格意识的专车系统轨迹隐私保护
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00016
Sihui Jia, Saiqin Long, Z. Zheng, Qingyong Deng, Ping Wang, Shujuan Tian
{"title":"Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System","authors":"Sihui Jia, Saiqin Long, Z. Zheng, Qingyong Deng, Ping Wang, Shujuan Tian","doi":"10.1109/CSCloud-EdgeCom58631.2023.00016","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00016","url":null,"abstract":"With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work addressed the issue of the user’s initial and final location leakage and provided a strong utility guarantee in the RoD system. Further, the trajectory information is also important in the RoD system, it could contain a lot of private information about the user, such as health or identity, so it’s important to publish a distorted and productive trajectory. For this purpose, in this paper, we provide our trajectory protection method with pricing awareness based on previous work; the method uses supply and demand density function to guide the division of a discrete spatial grid, then uses the Markov chain to generate distorted trajectories on the grid to ensure trajectory continuity, and makes corresponding defenses against several attacks, such as Bayesian. The experiment results on real-world datasets prove the validity and robustness of the method.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"60 1","pages":"37-45"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85627610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prediction Based Resource Reservation Algorithm for Service Handover in Edge Computing 边缘计算中基于预测的服务切换资源预留算法
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00063
Peiyuan Guan, Yushuai Li, Amirhosein Taherkordi
{"title":"A Prediction Based Resource Reservation Algorithm for Service Handover in Edge Computing","authors":"Peiyuan Guan, Yushuai Li, Amirhosein Taherkordi","doi":"10.1109/CSCloud-EdgeCom58631.2023.00063","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00063","url":null,"abstract":"Handover is a crucial issue in ensuring the continuity of edge services in edge computing (EC) systems. Failure to handle hand-off properly may result in delays, data loss, or service interruption during service switching. Therefore, optimizing the hand-off process to ensure service continuity and satisfactory user experience is a significant challenge in the design of edge computing systems. In this paper, we propose a resource reservation algorithm that reserves a portion of computing resources in each base station to meet quality of service (QoS) requirements during service switching. We use an LSTM model to predict the number of new and existing users at a future time point to provide decision guidance for the resource reservation algorithm. Extensive simulation experiments demonstrate that the proposed algorithm outperforms the benchmark algorithms in a variety of environmental conditions.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"99 1","pages":"330-335"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73451820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery NAS-YOLOX:基于改进的YOLOX SAR图像的船舶检测
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00030
Hao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang, Yuan Fan, Yachao Zhou
{"title":"NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery","authors":"Hao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang, Yuan Fan, Yachao Zhou","doi":"10.1109/CSCloud-EdgeCom58631.2023.00030","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00030","url":null,"abstract":"Synthetic aperture radar (SAR) satellites can provide microwave remote sensing images that are not limited by weather and light, so they are widely used in the field of ocean monitoring. The current SAR ship detection method based on deep learning (DL) is difficult to more effectively fuse complex features, which leads to low detection accuracy of target ships and even missed or false detections. In order to solve this problem, this paper proposes an improved YOLOX-based SAR image ship detection method, called NAS-YOLOX. Based on the YOLOX algorithm, path aggregation feature pyramid network (PAFPN) is replaced by a neural architecture search - feature fusion network (NAS-FPN) to enhance the cross-scale fusion ability of the proposed model. And a dilated convolution feature enhancement module (DFEM) is also designed and embedded into the backbone network to boost the network receptive field and the ability to extract target information. Furthermore, a multi-scale channel-spatial attention (MCSA) is proposed to improve the attention to key areas of the ship. The experimental results on the HRSID public data set show that the AP0.5 of NAS-YOLOX is 6.3% higher than that of the YOLOX model. Compared with other ten mainstream target detection algorithms, NAS-YOLOX has also achieved excellent detection result.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"10 1","pages":"126-131"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86147868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quarks: A Secure and Decentralized Blockchain-Based Messaging Network 夸克:一个安全和分散的基于区块链的消息传递网络
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00053
M. K. B. Shuhan, Tariqul Islam, Enam A. Shuvo, Faisal Haque Bappy, Kamrul Hasan, Carlos Caicedo
{"title":"Quarks: A Secure and Decentralized Blockchain-Based Messaging Network","authors":"M. K. B. Shuhan, Tariqul Islam, Enam A. Shuvo, Faisal Haque Bappy, Kamrul Hasan, Carlos Caicedo","doi":"10.1109/CSCloud-EdgeCom58631.2023.00053","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00053","url":null,"abstract":"Over the past two decades, the popularity of messaging systems has increased both in enterprise and consumer level. Many of these systems used secure protocols like end-to-end encryption to ensure strong security features such as “future secrecy” for one-to-one communication. However, the majority of them rely on centralized servers owned by big IT companies, which allows them to use their users’ personal data. Also it allows the government to track and regulate their citizens’ activities, which poses significant threats to “digital freedom”. Also, these systems have failed to achieve security attributes like confidentiality, integrity, privacy, and future secrecy for group communications. In this paper, we present a novel blockchain-based secure messaging system named Quarks that overcomes the security pitfalls of the existing systems and eliminates the centralized control. We have analyzed our design of the system with security models and definitions from existing literature to demonstrate the system’s reliability and usability. We have developed a Proof of Concept (PoC) of the Quarks system leveraging Distributed Ledger Technology (DLT), and conducted load testing on that. We noticed that our PoC system achieves all the desired attributes that are prevalent in a traditional centralized messaging scheme despite the limited capacity of the development and testing environment. Therefore, this assures us the applicability of such systems in near future if scaled up properly.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"2 1","pages":"268-274"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87916950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient and Privacy preserving Computation Framework for Tibetan medicine 一种高效且保护隐私的藏药计算框架
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00018
Ruoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu
{"title":"An Efficient and Privacy preserving Computation Framework for Tibetan medicine","authors":"Ruoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu","doi":"10.1109/CSCloud-EdgeCom58631.2023.00018","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00018","url":null,"abstract":"With the continuous development of Tibetan medicine, using machine learning technology to enhance the value of Tibetan medical data has become very important. However, the concerns of Tibetan medical institutions about data leakage have hindered the sharing of Tibetan medical data. Therefore, in this paper, we propose a privacy preserving computation framework based on dual servers. Our framework can securely store Tibetan medical data on cloud servers. The secure computation (such as machine learning training or machine learning prediction) is performed by cloud servers without compromising data. On the premise of ensuring data security, we combine the multi-key homomorphic encryption and secret sharing to design some secure building blocks. Through the security analysis and performance evaluation, our proposed scheme is efficient and practical.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"6 1","pages":"53-58"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74628181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Committee Members - CSCloud 2023 委员会成员- CSCloud 2023
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/cscloud-edgecom58631.2023.00007
{"title":"Committee Members - CSCloud 2023","authors":"","doi":"10.1109/cscloud-edgecom58631.2023.00007","DOIUrl":"https://doi.org/10.1109/cscloud-edgecom58631.2023.00007","url":null,"abstract":"","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"9 1","pages":""},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74565115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Blockchain-based Privacy Computing Research 基于区块链的隐私计算研究综述
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00049
Yang Yang, Kai Jin, Wei Liang, Yaqin Liu, Yuhui Li, Osama Hosam
{"title":"A Review of Blockchain-based Privacy Computing Research","authors":"Yang Yang, Kai Jin, Wei Liang, Yaqin Liu, Yuhui Li, Osama Hosam","doi":"10.1109/CSCloud-EdgeCom58631.2023.00049","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00049","url":null,"abstract":"Blockchain technology offers unique advantages in terms of decentralization, transparency, and de-anonymization. However, it also poses challenges to user anonymity and data privacy protection. Consequently, researchers have employed advanced cryptographic primitives to enhance the privacy and anonymity of blockchain-based privacy payments, as well as to extend privacy payment methods to more general forms of privacy computing. Nevertheless, relying on high-level cryptographic primitives and emerging technologies, these solutions have proven challenging for academic and industrial personnel to understand and apply. Therefore, we introduce the principle mechanisms of zero-knowledge proofs and homomorphic encryption and their typical algorithms, analyze and summarize recent research in blockchain privacy computing across several dimensions, and briefly present their potential applications.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"9 1","pages":"241-246"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84287580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Random Forest for DDoS Attack Detection in SDN Environment SDN环境下针对DDoS攻击检测的优化随机森林
IF 4 3区 计算机科学
Journal of Cloud Computing-Advances Systems and Applications Pub Date : 2023-07-01 DOI: 10.1109/CSCloud-EdgeCom58631.2023.00021
Zhaohui Ma, Jie Zhang, Mingdong Tang
{"title":"Optimized Random Forest for DDoS Attack Detection in SDN Environment","authors":"Zhaohui Ma, Jie Zhang, Mingdong Tang","doi":"10.1109/CSCloud-EdgeCom58631.2023.00021","DOIUrl":"https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00021","url":null,"abstract":"Software Defined Network (SDN) is a new type of network architecture that realizes network virtualization, with the characteristics of the control and forwarding separation, open programming, centralized control, and its flexibility is more suitable for the current complex and changeable network environment. However, due to its centralized control characteristics, the controller is faced with a huge risk of being subjected to distributed denial of service (DDoS) attacks that will cause the entire network to be paralyzed. Therefore, the detection of DDoS attacks in SDN networks has become the research direction of many scholars. so an algorithm for detecting DDoS attacks in SDN networks using optimizing RFs is proposed. By selecting the appropriate traffic features, creating the traffic dataset in the SDN environment, and using the dataset to optimize the model parameters, the attack detection model is constructed, and the final detection algorithm is as accurate as 99.98% for the collected dataset, which is more accurate and efficient than the common machine learning algorithms such as SVC and KNN.","PeriodicalId":56007,"journal":{"name":"Journal of Cloud Computing-Advances Systems and Applications","volume":"14 1","pages":"72-77"},"PeriodicalIF":4.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87782904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信