期刊:
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023,2024年:833-840 ISSN:2324-898X
通讯作者:
Tian, WL
作者机构:
[Ye, Xuming; Tian, Wenlong; Wang, Jinzhao; Wan, Yaping] Univ South China, Sch Comp Sci & Technol, Hengyang, Peoples R China.;[Tian, Wenlong] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore.;[Li, Ruixuan] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China.;[Tang, Junwei] Wuhan Text Univ, Sch Comp Sci & Artificial Intelligence, Wuhan, Peoples R China.;[Xu, Zhiyong] Suffolk Univ, Math & Comp Sci Dept, Boston, MA 02114 USA.
通讯机构:
[Tian, WL ] U;Univ South China, Sch Comp Sci & Technol, Hengyang, Peoples R China.;Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore.
会议名称:
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
会议时间:
01 November 2023
会议地点:
Exeter, United Kingdom
会议主办单位:
[Wang, Jinzhao;Tian, Wenlong;Ye, Xuming;Wan, Yaping] Univ South China, Sch Comp Sci & Technol, Hengyang, Peoples R China.^[Tian, Wenlong] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore.^[Li, Ruixuan] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China.^[Tang, Junwei] Wuhan Text Univ, Sch Comp Sci & Artificial Intelligence, Wuhan, Peoples R China.^[Xu, Zhiyong] Suffolk Univ, Math & Comp Sci Dept, Boston, MA 02114 USA.
会议论文集名称:
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
摘要:
With the increasing number of big data applications, large amounts of valuable data are distributed in different organizations or regions. Federated Learning (FL) enables collaborative model training without sharing sensitive data and is widely used in AI medical diagnosis, economy, and autonomous driving scenarios. However, it still leaks the privacy from the gradient exchange in federated learning. What's worse, state-of-the-art work, such as Batchcrypt, still suffers from computational overhead due to a considerable amount of computation and communication costs caused by homomorphic encryption. Therefore, we propose a novel symmetric key-based homomorphic encryption scheme, Sym-Fed. To unleash the power of symmetric encryption in federated learning, we combine random masking with symmetric encryption and keep the homomorphic property during the gradient exchange in the federated learning process. Finally, the security analysis and experimental results on real workloads show that our design achieves performance improvement 6x to 668x and reduces the communication overhead 1.2x to 107x compared with the state-of-the-art work, BatchCrypt and FATE, without model accuracy degradation and security compromise.
期刊:
2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT),2022年:21-29
通讯作者:
Tian, WL
作者机构:
[Ouyang, Chunping; Tian, Wenlong; Liu, Yongbin; Liu, Qifei; Li, Jing; Geng, Yuqing] Univ South China, Sch Comp Sci & Technol, Hengyang, Peoples R China.;[Tian, Wenlong] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore.;[Ouyang, Chunping; Tian, Wenlong; Liu, Yongbin] Hunan Prov Base Sci & Technol Innovat Cooperat, Hengyang, Peoples R China.;[Li, Ruixuan] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China.;[Xiao, Weijun] Virginia Commonwealth Univ, Elect & Comp Engn, Richmond, VA 23284 USA.
通讯机构:
[Tian, WL ] U;Univ South China, Sch Comp Sci & Technol, Hengyang, Peoples R China.;Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore.;Hunan Prov Base Sci & Technol Innovat Cooperat, Hengyang, Peoples R China.
会议名称:
2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)
会议时间:
December 2022
会议地点:
Vancouver, WA, USA
会议主办单位:
[Geng, Yuqing;Tian, Wenlong;Ouyang, Chunping;Liu, Yongbin;Liu, Qifei;Li, Jing] Univ South China, Sch Comp Sci & Technol, Hengyang, Peoples R China.^[Tian, Wenlong] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore.^[Tian, Wenlong;Ouyang, Chunping;Liu, Yongbin] Hunan Prov Base Sci & Technol Innovat Cooperat, Hengyang, Peoples R China.^[Li, Ruixuan] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China.^[Xiao, Weijun] Virginia Commonwealth Univ, Elect & Comp Engn, Richmond, VA 23284 USA.^[Xu, Zhiyong] Suffolk Univ, Math & Comp Sci Dept, Boston, MA 02114 USA.
会议论文集名称:
2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)
关键词:
Cloud Storage;Resemblance Detection;Context-Aware;Deduplication Ratio Prediction
摘要:
With the prevalence of cloud storage, people prefer to outsource their data to the cloud for flexibility and reliability. Undoubtedly, there are lots of redundancy among these data. However, high-end storage with deduplication costs heavy computation and increases the data management complexity. Potential customers need the redundancy proportion information of their outsourced data to decide whether high-end storage with deduplication is worthwhile. Thus, many researchers have previously attempted to predict the redundant ratio. However, existing mechanisms ignore the redundancy proportion among similar chunks containing many duplicate data. Although resemblance detection, detecting the duplicate parts among similar data, has become a hot issue, it is hardly applied to the conventional deduplication ratio estimation because of unacceptable calculation cost. Therefore, we analyze the limitations and challenges of deduplication ratio prediction in prediction scope and response time and further propose a novel prediction scheme. By leveraging the context-aware resemblance detection, and confidence interval theory, our method can achieve faster estimation speed with higher accuracy in deduplication ratio compared with the state-of-the-art work. Finally, the results show that our method can efficiently and effectively estimate the proportion of duplicate chunks and redundant data among similar chunks by conducting experiments on real workloads.
摘要:
The batch verification methods can relieve the bottleneck problem of vehicular authentication efficiency to accelerate the authentication speed during the group construction phase. However, in current batch verification methods, there exist some deficiencies such as the authentication methods applied in the actual scenario are sensitive to the group initialization and dynamic construction process and the intra-group communication efficiency have not been improved due to lack of effective dynamic group management. This paper proposes a fast and secure batch verification scheme based on dynamic group management and certificateless public-key cryptography. First, the two-way authentication between the proxy vehicle and the roadside unit (RSU) is established, and then the batch verification method relying on RSU-assisted are proposed based on dynamic management of the intra-group vehicles. Our method fully considers the security requirements of the group while solving certification efficiency. Theoretical analysis and simulation experiments show that compared with other existing solutions, the verification scheme in this paper reduces the computational delay and transmission overhead whilst increasing robustness in dynamic environments.
会议论文集名称:
DEStech Transactions on Computer Science and Engineering
关键词:
Complex networks;Routing strategy;Effective path;Local visibility and Detecting communities
摘要:
A routing strategy using nodes' effective path and dynamic information weight distribution was proposed, which based on the improved efficient path routing strategy in complex network. The strategy's weight factor was optimized by the new strategy, Considering the insufficient of local routing strategies in global performance and the community division technology in complex network, a kind of local visibility routing strategy according to the thought of community division was presented. On the condition of community division of the Bgll condensation algorithm, the topology structure information of neighbor nodes and all the community nodes were only stored in each node's routing list in the new strategy. When node transaction in community, global routing strategy was adopted and when between communities, minimum load strategy will be used. The simulation results indicate that in the different connection density networks, the performance of the new strategy achieves the best when community division's degree of modularization is the highest. Contrasted to other local routing strategy, the optimized strategy holds incomparable superiority on throughput, transmission delay and the packet loss.
会议论文集名称:
2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)
摘要:
This paper presents an efficiently wireless ECG acquisition system with lossless data compressing algorithm. The proposed algorithm were evaluated by using all patterns from MIT-BIH arrhythmia database, and the analytic result shows that the proposed lossless algorithm achieves the CR value of 2.64 in average. Therefore, the proposed algorithm has very outstanding performance.
通讯机构:
[Ouyang, Chunping] U;Univ South China, Sch Comp Sci & Technol, Hengyang 421001, Peoples R China.
会议名称:
2018 14th International Conference on Semantics, Knowledge and Grids (SKG)
会议时间:
September 2018
会议地点:
Guangzhou, China
会议主办单位:
[Chen, Xianglong;Ouyang, Chunping;Liu, Yongbin;Luo, Lingyun;Yang, Xiaohua] Univ South China, Sch Comp Sci & Technol, Hengyang 421001, Peoples R China.
会议论文集名称:
2018 14th International Conference on Semantics, Knowledge and Grids (SKG)
关键词:
Text classification;Deep learning;CNN;RNN
摘要:
Deep learning has shown its effectiveness in many tasks such as text classification and computer vision. Most text classification tasks are concentrated in the use of convolution neural network and recurrent neural network to obtain text feature representation. In some researches, Attention mechanism is usually adopted to improve classification accuracy. According to the target of task 6 in NLP&CC2018, a hybrid deep learning model which combined BiGRU, CNN and Attention mechanism was proposed to improve text classification. The experimental results show that the Fl-score of the proposed model successfully excels the task's baseline model. Besides, this hybrid Deep Learning model gets higher Precision, Recall and Fl-score comparing with some other popular Deep Learning models, and the improvement of on Fl-score is 5.4% than the single CNN model.
会议论文集名称:
2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)
摘要:
The unmanned aerial vehicle (UAV) has been continuously developed for military uses, agricultural applications and various livelihood activities. This study proposes a moving object tracking algorithm suitable for UAV that help it automatically tracks the designated object. The prototype algorithm can be divided into three steps: 1) object detection; 2) object feature pixel extraction; and 3) feature pixel matching. The experimental result shows that the execution time can be achieved up to 24 fps under the resolution of 1280x720.
摘要:
It has long been known that there are software applications for which it is difficult to detect subtle errors, faults, defects, or anomalies because there is no reliable "test oracle" to indicate what the correct output should be for arbitrary input. The absence of a test oracle clearly presents a challenge in testing the software applications of scientific computing from the domain of nuclear power plant. Metamorphic testing has been shown to be a simple yet effective technique in addressing the quality assurance of these "non-testable programs." In this paper, we introduce Metamorphic testing method to address the oracle problem as mentioned above. We identify a metamorphic relation for a real-world scientific computing programs which do not have test oracles, and demonstrate the effectiveness of metamorphic testing in identifying the error.
期刊:
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2017, VOL 2,2017年2
通讯作者:
Li Meng
作者机构:
[Li Meng; Yang Xiao-Hua] CNNC Key Lab High Trusted Comp, Hengyang 421001, Hunan, Peoples R China.;[Li Yu-Yan; Wang Li-Jun] Univ South China, Sch Elect Engn, Hengyang 421001, Hunan, Peoples R China.
通讯机构:
[Li Meng] C;CNNC Key Lab High Trusted Comp, Hengyang 421001, Hunan, Peoples R China.
会议名称:
2017 25th International Conference on Nuclear Engineering
摘要:
In view of the characteristics of the physical code Nestor the focus is on the correctness of calculation for which the test adequacy criterion has been established. This is based on structural coverage and the input domain. According to such test adequacy criterion, testing strategies have been applied on the entire testing process. They consist of unit static, unit dynamic, integration, system and regression test strategy. Each strategy is composed of test target, test range, technology and method, entry criterion, completion criterion, test focus and priority. After compared with 11 basic benchmarks from nuclear power plants and calculation result of benchmark programs, the ELEMENT program result is correct and credible; the relative error of result is less than three percent. The ELEMENT testing is adequacy. Its test cases covers fuel grid element types, fuel types, non-combustible grid element types, and control rod computational models. Furthermore, it puts forward a research direction in the future.
期刊:
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016),2017年44:136-141 ISSN:2352-538X
通讯作者:
Tan, Min-Sheng
作者机构:
[Tan, Min-Sheng; Li, Yang-Wei; Xiang, Ting; Peng, Qun-Zhong; Guo, Miao; Wang, Chen-Cheng] Univ South China Hengyang, Sch Comp Sci & Technol, Hengyang 421001, Hunan, Peoples R China.
通讯机构:
[Tan, Min-Sheng] U;Univ South China Hengyang, Sch Comp Sci & Technol, Hengyang 421001, Hunan, Peoples R China.
会议名称:
3rd International Conference on Wireless Communication and Sensor Networks (WCSN)
会议时间:
DEC 10-11, 2016
会议地点:
Wuhan, PEOPLES R CHINA
会议主办单位:
[Tan, Min-Sheng;Wang, Chen-Cheng;Guo, Miao;Xiang, Ting;Peng, Qun-Zhong;Li, Yang-Wei] Univ South China Hengyang, Sch Comp Sci & Technol, Hengyang 421001, Hunan, Peoples R China.
会议论文集名称:
ACSR-Advances in Comptuer Science Research
关键词:
the improvement of LEACH algorithm;optimal cluster head selection;cluster heads forecasting mechanism;time schedule
摘要:
In order to solve the problem of LEACH Algorithm cannot guarantee the larger residual energy node absolutely were elected as cluster head, and it consumes large amounts of energy for double counting of cluster head election, at the same time, the influence of the node distance for cluster head election is not included. The improved LEACH algorithm has solved the problems very well, it makes a use of cluster heads projection to decrease the number of cluster competition by combining with the optimal cluster head selection algorithm, which can reduce the node energy consumption, then to achieve equilibrium network energy consumption and prolong the survival time of the network. And the experimental results are shown that the improved LEACH algorithm balanced the energy consumption of the entire network, significantly reduced the power consumption of the nodes in the monitoring area, delayed the first dead nodes appear on the number of rounds, and prolonged the life cycle of monitoring network.
摘要:
Image annotation is a task of assigning semantic labels to an image. Recently, deep neural networks with visual attention have been utilized successfully in many computer vision tasks. In this paper, we show that conventional attention mechanism is easily misled by the salient class, i.e., the attended region always contains part of the image area describing the content of salient class at different attention iterations. To this end, we propose a novel attention shaping mechanism, which aims to maximize the non-overlapping area between consecutive attention processes by taking into account the history of previous attention vectors. Several weighting polices are studied to utilize the history information in different manners. In two benchmark datasets, i.e., PASCAL VOC2012 and MIRFlickr-25k, the average precision is improved by up to 10% in comparison with the state-of-the-art annotation methods.
通讯机构:
[Tan, Min-Sheng] U;Univ South China, Sch Comp Sci & Technol, Hengyang 421001, Hunan, Peoples R China.
会议名称:
3rd International Conference on Wireless Communication and Sensor Networks (WCSN 2016)
关键词:
Immune peril principle;Internet of Things perception layer;danger degrees of signal;perception;response
摘要:
Danger signal perception and response model of perception layer in IoT based on immune peril principle (DSPRM-IPP) and related algorithms were proposed. DSPRM-IPP model includes immunologic tolerance module, danger perception and accumulation module and response module. Immunologic tolerance module's duty is screening detector which is not matching with autologous collection at the beginning of the sensing layer node deployment, it also constantly adjust to the current detector according to the working environment in process of perception. Danger perception and accumulation module is responsible for the danger signal recognition and accumulation, and detector set generated by immunologic tolerance module is used to determine whether the current signal is danger signal or not. Appropriate response strategy will be taken according to the results of comparing potential cost and response cost in response module. The experimental results show that DSPRM-IPP effectively detects the danger with a low rate of false positives, it also has good adaptability that could adjust constantly according to the working environment and node proportion of residual energy.
摘要:
Dynamic trust relationship making quantization model based on multiple attribute decision has been researched in this paper. Considering the problem that all information from nodes feedback would be not true or reliable, this paper improves a new rule to calculate the feedback trust and proposes a new quantization model on dynamic trust-relationship based on improved feedback trust. On this basis, from the complex structure characteristics of network, this paper introduces the nodes similarity and proposes a improved model of dynamic trust-relationship based on multi-attribution. The simulation experiment showed that the new model have better dynamic adaptability and get a better accuracy and stability of trust evaluation of network.
期刊:
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2016年10102:549-558 ISSN:0302-9743
期刊:
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2016年10102:559-567 ISSN:0302-9743