期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
Efficient Clustering Network Based on Matrix Factorization
1
作者 jieren cheng Jimei Li +2 位作者 Faqiang Zeng Zhicong Tao and Yue Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期281-298,共18页
Contrastive learning is a significant research direction in the field of deep learning.However,existing data augmentation methods often lead to issues such as semantic drift in generated views while the complexity of ... Contrastive learning is a significant research direction in the field of deep learning.However,existing data augmentation methods often lead to issues such as semantic drift in generated views while the complexity of model pre-training limits further improvement in the performance of existing methods.To address these challenges,we propose the Efficient Clustering Network based on Matrix Factorization(ECN-MF).Specifically,we design a batched low-rank Singular Value Decomposition(SVD)algorithm for data augmentation to eliminate redundant information and uncover major patterns of variation and key information in the data.Additionally,we design a Mutual Information-Enhanced Clustering Module(MI-ECM)to accelerate the training process by leveraging a simple architecture to bring samples from the same cluster closer while pushing samples from other clusters apart.Extensive experiments on six datasets demonstrate that ECN-MF exhibits more effective performance compared to state-of-the-art algorithms. 展开更多
关键词 Contrastive learning CLUSTERING matrix factorization
下载PDF
An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment 被引量:20
2
作者 jieren cheng Ruomeng Xu +2 位作者 Xiangyan Tang Victor S.Sheng Canting Cai 《Computers, Materials & Continua》 SCIE EI 2018年第4期95-119,共25页
Distributed denial-of-service(DDoS)is a rapidly growing problem with the fast development of the Internet.There are multitude DDoS detection approaches,however,three major problems about DDoS attack detection appear i... Distributed denial-of-service(DDoS)is a rapidly growing problem with the fast development of the Internet.There are multitude DDoS detection approaches,however,three major problems about DDoS attack detection appear in the big data environment.Firstly,to shorten the respond time of the DDoS attack detector;secondly,to reduce the required compute resources;lastly,to achieve a high detection rate with low false alarm rate.In the paper,we propose an abnormal network flow feature sequence prediction approach which could fit to be used as a DDoS attack detector in the big data environment and solve aforementioned problems.We define a network flow abnormal index as PDRA with the percentage of old IP addresses,the increment of the new IP addresses,the ratio of new IP addresses to the old IP addresses and average accessing rate of each new IP address.We design an IP address database using sequential storage model which has a constant time complexity.The autoregressive integrated moving average(ARIMA)trending prediction module will be started if and only if the number of continuous PDRA sequence value,which all exceed an PDRA abnormal threshold(PAT),reaches a certain preset threshold.And then calculate the probability that is the percentage of forecasting PDRA sequence value which exceed the PAT.Finally we identify the DDoS attack based on the abnormal probability of the forecasting PDRA sequence.Both theorem and experiment show that the method we proposed can effectively reduce the compute resources consumption,identify DDoS attack at its initial stage with higher detection rate and lower false alarm rate. 展开更多
关键词 DDoS attack time series prediction ARIMA big data
下载PDF
A Robust Zero-Watermarking Based on SIFT-DCT for Medical Images in the Encrypted Domain 被引量:5
3
作者 Jialing Liu Jingbing Li +4 位作者 Yenwei Chen Xiangxi Zou jieren cheng Yanlin Liu Uzair Aslam Bhatti 《Computers, Materials & Continua》 SCIE EI 2019年第7期363-378,共16页
Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical inform... Remote medical diagnosis can be realized by using the Internet,but when transmitting medical images of patients through the Internet,personal information of patients may be leaked.Aim at the security of medical information system and the protection of medical images,a novel robust zero-watermarking based on SIFT-DCT(Scale Invariant Feature Transform-Discrete Cosine Transform)for medical images in the encrypted domain is proposed.Firstly,the original medical image is encrypted in transform domain based on Logistic chaotic sequence to enhance the concealment of original medical images.Then,the SIFT-DCT is used to extract the feature sequences of encrypted medical images.Next,zero-watermarking technology is used to ensure that the region of interest of medical images are not changed.Finally,the robust of the algorithm is evaluated by the correlation coefficient between the original watermark and the attacked watermark.A series of attack experiments are carried out on this method,and the results show that the algorithm is not only secure,but also robust to both traditional and geometric attacks,especially in clipping attacks. 展开更多
关键词 ROBUSTNESS CT Image ZERO-WATERMARKING SIFT-DCT encrypted domain
下载PDF
A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map 被引量:5
4
作者 Jing Liu Jingbing Li +5 位作者 jieren cheng Jixin Ma Naveed Sadiq Baoru Han Qiang Geng Yang Ai 《Computers, Materials & Continua》 SCIE EI 2019年第8期889-910,共22页
In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for med... In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform(DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms. 展开更多
关键词 Encrypted medical images ZERO-WATERMARKING DTCWT perceptual hash chaotic map
下载PDF
COVID-19 Public Opinion and Emotion Monitoring System Based on Time Series Thermal New Word Mining 被引量:5
5
作者 Yixian Zhang jieren cheng +6 位作者 Yifan Yang Haocheng Li Xinyi Zheng Xi Chen Boyi Liu Tenglong Ren Naixue Xiong 《Computers, Materials & Continua》 SCIE EI 2020年第9期1415-1434,共20页
With the spread and development of new epidemics,it is of great reference value to identify the changing trends of epidemics in public emotions.We designed and implemented the COVID-19 public opinion monitoring system... With the spread and development of new epidemics,it is of great reference value to identify the changing trends of epidemics in public emotions.We designed and implemented the COVID-19 public opinion monitoring system based on time series thermal new word mining.A new word structure discovery scheme based on the timing explosion of network topics and a Chinese sentiment analysis method for the COVID-19 public opinion environment are proposed.Establish a“Scrapy-Redis-Bloomfilter”distributed crawler framework to collect data.The system can judge the positive and negative emotions of the reviewer based on the comments,and can also reflect the depth of the seven emotions such as Hopeful,Happy,and Depressed.Finally,we improved the sentiment discriminant model of this system and compared the sentiment discriminant error of COVID-19 related comments with the Jiagu deep learning model.The results show that our model has better generalization ability and smaller discriminant error.We designed a large data visualization screen,which can clearly show the trend of public emotions,the proportion of various emotion categories,keywords,hot topics,etc.,and fully and intuitively reflect the development of public opinion. 展开更多
关键词 COVID-19 public opinion monitoring data mining Chinese sentiment analysis data visualization
下载PDF
A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX 被引量:3
6
作者 Jun Li jieren cheng +2 位作者 Naixue Xiong Lougao Zhan Yuan Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第10期723-741,共19页
Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health.However,big data faces many ongoing serious challenges in the process of collection,storage,and ... Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health.However,big data faces many ongoing serious challenges in the process of collection,storage,and use.Among them,data security and privacy problems have attracted extensive interest.In an effort to overcome this challenge,this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions(SGX).First of all,we define SGX as a trusted edge computing node,design data access module,data protection module,and data integrity check module,to achieve hardware-enhanced data privacy protection.Then,we design a smart contract framework to realize distributed data access control management in a big data environment.The crucial role of the smart contract was revealed by designing multiple access control contracts,register contracts,and history contracts.Access control contracts provide access control methods for different users and enable static access verification and dynamic access verification by checking the user’s properties and history behavior.Register contract contains user property information,edge computing node information,the access control and history smart contract information,and provides functions such as registration,update,and deletion.History contract records the historical behavior information of malicious users,receives the report information of malicious requestors from the access control contract,implements a misbehavior check method to determines whether the requestor has misbehavior,and returns the corresponding result.Finally,we design decentralized system architecture,prove the security properties,and analysis to verify the feasibility of the system.Results demonstrate that our method can effectively improve the timeliness of data,reduce network latency,and ensure the security,reliability,and traceability of data. 展开更多
关键词 SGX big data privacy protection smart contract access control
下载PDF
Novel DDoS Feature Representation Model Combining Deep Belief Network and Canonical Correlation Analysis 被引量:2
7
作者 Chen Zhang jieren cheng +3 位作者 Xiangyan Tang Victor SSheng Zhe Dong Junqi Li 《Computers, Materials & Continua》 SCIE EI 2019年第8期657-675,共19页
Distributed denial of service(DDoS)attacks launch more and more frequently and are more destructive.Feature representation as an important part of DDoS defense technology directly affects the efficiency of defense.Mos... Distributed denial of service(DDoS)attacks launch more and more frequently and are more destructive.Feature representation as an important part of DDoS defense technology directly affects the efficiency of defense.Most DDoS feature extraction methods cannot fully utilize the information of the original data,resulting in the extracted features losing useful features.In this paper,a DDoS feature representation method based on deep belief network(DBN)is proposed.We quantify the original data by the size of the network flows,the distribution of IP addresses and ports,and the diversity of packet sizes of different protocols and train the DBN in an unsupervised manner by these quantified values.Two feedforward neural networks(FFNN)are initialized by the trained deep belief network,and one of the feedforward neural networks continues to be trained in a supervised manner.The canonical correlation analysis(CCA)method is used to fuse the features extracted by two feedforward neural networks per layer.Experiments show that compared with other methods,the proposed method can extract better features. 展开更多
关键词 Deep belief network DDoS feature representation canonical correlation analysis
下载PDF
DDoS Attack Detection via Multi-Scale Convolutional Neural Network 被引量:2
8
作者 jieren cheng Yifu Liu +3 位作者 Xiangyan Tang Victor SSheng Mengyang Li Junqi Li 《Computers, Materials & Continua》 SCIE EI 2020年第3期1317-1333,共17页
Distributed Denial-of-Service(DDoS)has caused great damage to the network in the big data environment.Existing methods are characterized by low computational efficiency,high false alarm rate and high false alarm rate.... Distributed Denial-of-Service(DDoS)has caused great damage to the network in the big data environment.Existing methods are characterized by low computational efficiency,high false alarm rate and high false alarm rate.In this paper,we propose a DDoS attack detection method based on network flow grayscale matrix feature via multi-scale convolutional neural network(CNN).According to the different characteristics of the attack flow and the normal flow in the IP protocol,the seven-tuple is defined to describe the network flow characteristics and converted into a grayscale feature by binary.Based on the network flow grayscale matrix feature(GMF),the convolution kernel of different spatial scales is used to improve the accuracy of feature segmentation,global features and local features of the network flow are extracted.A DDoS attack classifier based on multi-scale convolution neural network is constructed.Experiments show that compared with correlation methods,this method can improve the robustness of the classifier,reduce the false alarm rate and the missing alarm rate. 展开更多
关键词 DDoS attack detection convolutional neural network network flow feature extraction
下载PDF
Forecasting Model Based on Information-Granulated GA-SVR and ARIMA for Producer Price Index 被引量:1
9
作者 Xiangyan Tang Liang Wang +2 位作者 jieren cheng Jing Chen Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2019年第2期463-491,共29页
The accuracy of predicting the Producer Price Index(PPI)plays an indispensable role in government economic work.However,it is difficult to forecast the PPI.In our research,we first propose an unprecedented hybrid mode... The accuracy of predicting the Producer Price Index(PPI)plays an indispensable role in government economic work.However,it is difficult to forecast the PPI.In our research,we first propose an unprecedented hybrid model based on fuzzy information granulation that integrates the GA-SVR and ARIMA(Autoregressive Integrated Moving Average Model)models.The fuzzy-information-granulation-based GA-SVR-ARIMA hybrid model is intended to deal with the problem of imprecision in PPI estimation.The proposed model adopts the fuzzy information-granulation algorithm to pre-classification-process monthly training samples of the PPI,and produced three different sequences of fuzzy information granules,whose Support Vector Regression(SVR)machine forecast models were separately established for their Genetic Algorithm(GA)optimization parameters.Finally,the residual errors of the GA-SVR model were rectified through ARIMA modeling,and the PPI estimate was reached.Research shows that the PPI value predicted by this hybrid model is more accurate than that predicted by other models,including ARIMA,GRNN,and GA-SVR,following several comparative experiments.Research also indicates the precision and validation of the PPI prediction of the hybrid model and demonstrates that the model has consistent ability to leverage the forecasting advantage of GA-SVR in non-linear space and of ARIMA in linear space. 展开更多
关键词 Data analysis producer price index fuzzy information granulation ARIMA model support vector model.
下载PDF
A Co-Verification Interface Design for High-Assurance CPS 被引量:1
10
作者 Yu Zhang Mengxing Huang +2 位作者 Hao Wang Wenlong Feng jieren cheng 《Computers, Materials & Continua》 SCIE EI 2019年第1期287-306,共20页
Cyber-Physical Systems(CPS)tightly integrate cyber and physical components and transcend traditional control systems and embedded system.Such systems are often mission-critical;therefore,they must be high-assurance.Hi... Cyber-Physical Systems(CPS)tightly integrate cyber and physical components and transcend traditional control systems and embedded system.Such systems are often mission-critical;therefore,they must be high-assurance.Highassurance CPS require co-verification which takes a comprehensive view of the whole system to verify the correctness of a cyber and physical components together.Lack of strict multiple semantic definition for interaction between the two domains has been considered as an obstacle to the CPS co-verification.A Cyber/Physical interface model for hierarchical a verification of CPS is proposed.First,we studied the interaction mechanism between computation and physical processes.We further classify the interaction mechanism into two levels:logic interaction level and physical interaction level.We define different types of interface model according to combinatorial relationships of the A/D(Analog to Digital)and D/A(Digital to Analog)conversion periodical instants.This interface model has formal semantics,and is efficient for simulation and formal verification.The experiment results show that our approach has major potential in verifying system level properties of complex CPS,therefore improving the high-assurance of CPS. 展开更多
关键词 CPS INTERFACE co-verification co-simulation high-assurance
下载PDF
A DDoS Attack Information Fusion Method Based on CNN for Multi-Element Data 被引量:1
11
作者 jieren cheng Canting Cai +3 位作者 Xiangyan Tang Victor SSheng Wei Guo Mengyang Li 《Computers, Materials & Continua》 SCIE EI 2020年第4期131-150,共20页
Traditional distributed denial of service(DDoS)detection methods need a lot of computing resource,and many of them which are based on single element have high missing rate and false alarm rate.In order to solve the pr... Traditional distributed denial of service(DDoS)detection methods need a lot of computing resource,and many of them which are based on single element have high missing rate and false alarm rate.In order to solve the problems,this paper proposes a DDoS attack information fusion method based on CNN for multi-element data.Firstly,according to the distribution,concentration and high traffic abruptness of DDoS attacks,this paper defines six features which are respectively obtained from the elements of source IP address,destination IP address,source port,destination port,packet size and the number of IP packets.Then,we propose feature weight calculation algorithm based on principal component analysis to measure the importance of different features in different network environment.The algorithm of weighted multi-element feature fusion proposed in this paper is used to fuse different features,and obtain multi-element fusion feature(MEFF)value.Finally,the DDoS attack information fusion classification model is established by using convolutional neural network and support vector machine respectively based on the MEFF time series.Experimental results show that the information fusion method proposed can effectively fuse multi-element data,reduce the missing rate and total error rate,memory resource consumption,running time,and improve the detection rate. 展开更多
关键词 DDoS attack multi-element data information fusion principal component analysis CNN
下载PDF
Blockchain Security Threats and Collaborative Defense:A Literature Review 被引量:1
12
作者 Xiulai Li jieren cheng +5 位作者 Zhaoxin Shi Jingxin Liu Bin Zhang Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第9期2597-2629,共33页
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu... As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies. 展开更多
关键词 Blockchain threat assessment collaborative defense security evaluation
下载PDF
PoEC: A Cross-Blockchain Consensus Mechanism for Governing Blockchain by Blockchain 被引量:1
13
作者 jieren cheng Yuan Zhang +4 位作者 Yuming Yuan Hui Li Xiangyan Tang Victor S.Sheng Guangjing Hu 《Computers, Materials & Continua》 SCIE EI 2022年第10期1385-1402,共18页
The research on the governing blockchain by blockchain supervision system is an important development trend of blockchain technology.In this system there is a supervisory blockchain managing and governing the supervis... The research on the governing blockchain by blockchain supervision system is an important development trend of blockchain technology.In this system there is a supervisory blockchain managing and governing the supervised blockchain based on blockchain technology,results in a uniquely cross-blockchain demand to consensus mechanism for solving the trust problem between supervisory blockchain and supervised blockchain.To solve this problem,this paper proposes a cross-blockchain consensus mechanism based on smart contract and a set of smart contracts endorse the crossblockchain consensus.New consensus mechanism called Proof-of-EndorseContracts(PoEC)consensus,which firstly transfers the consensus reached in supervisory blockchain to supervised blockchain by supervisory nodes,then packages the supervisory block in supervisory blockchain and transmits it to the smart contract deployed in the supervised blockchain,finally miners in supervised blockchain will execute and package the new block according to the status of the smart contract.The core part of the consensus mechanism is Endorse Contracts which designed and implemented by us and verified the effectiveness through experiments.PoEC consensus mechanism and Endorse Contracts support the supervised blockchain to join the governing blockchain by blockchain system without changing the original consensus mechanism,which has the advantages of low cost,high scalability and being able to crossblockchain.This paper proves that our method can provide a feasible crossblockchain governance scheme for the field of blockchain governance. 展开更多
关键词 Proof-of-endorse-contracts PoEC cross-blockchain consensus mechanism governing blockchain by blockchain
下载PDF
Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain 被引量:1
14
作者 jieren cheng Jun Li +3 位作者 Naixue Xiong Meizhu Chen Hao Guo Xinzhi Yao 《Computers, Materials & Continua》 SCIE EI 2020年第12期2247-2262,共16页
Nowadays,as lightweight mobile clients become more powerful and widely used,more and more information is stored on lightweight mobile clients,user sensitive data privacy protection has become an urgent concern and pro... Nowadays,as lightweight mobile clients become more powerful and widely used,more and more information is stored on lightweight mobile clients,user sensitive data privacy protection has become an urgent concern and problem to be solved.There has been a corresponding rise of security solutions proposed by researchers,however,the current security mechanisms on lightweight mobile clients are proven to be fragile.Due to the fact that this research field is immature and still unexplored in-depth,with this paper,we aim to provide a structured and comprehensive study on privacy protection using trusted execution environment(TEE)for lightweight mobile clients.This paper presents a highly effective and secure lightweight mobile client privacy protection system that utilizes TEE to provide a new method for privacy protection.In particular,the prototype of Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments(LMCPTEE)is built using Intel software guard extensions(SGX)because SGX can guarantee the integrity,confidentiality,and authenticity of private data.By putting lightweight mobile client critical data on SGX,the security and privacy of client data can be greatly improved.We design the authentication mechanism and privacy protection strategy based on SGX to achieve hardware-enhanced data protection and make a trusted connection with the lightweight mobile clients,thus build the distributed trusted system architecture.The experiment demonstrates that without relying on the performance of the blockchain,the LMCPTEE is practical,feasible,low-performance overhead.It can guarantee the privacy and security of lightweight mobile client private data. 展开更多
关键词 Blockchain privacy protection SGX lightweight mobile client
下载PDF
GrCol-PPFL:User-Based Group Collaborative Federated Learning Privacy Protection Framework 被引量:1
15
作者 jieren cheng Zhenhao Liu +2 位作者 Yiming Shi Ping Luo Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第1期1923-1939,共17页
With the increasing number of smart devices and the development of machine learning technology,the value of users’personal data is becoming more and more important.Based on the premise of protecting users’personal p... With the increasing number of smart devices and the development of machine learning technology,the value of users’personal data is becoming more and more important.Based on the premise of protecting users’personal privacy data,federated learning(FL)uses data stored on edge devices to realize training tasks by contributing training model parameters without revealing the original data.However,since FL can still leak the user’s original data by exchanging gradient information.The existing privacy protection strategy will increase the uplink time due to encryption measures.It is a huge challenge in terms of communication.When there are a large number of devices,the privacy protection cost of the system is higher.Based on these issues,we propose a privacy-preserving scheme of user-based group collaborative federated learning(GrCol-PPFL).Our scheme primarily divides participants into several groups and each group communicates in a chained transmission mechanism.All groups work in parallel at the same time.The server distributes a random parameter with the same dimension as the model parameter for each participant as a mask for the model parameter.We use the public datasets of modified national institute of standards and technology database(MNIST)to test the model accuracy.The experimental results show that GrCol-PPFL not only ensures the accuracy of themodel,but also ensures the security of the user’s original data when users collude with each other.Finally,through numerical experiments,we show that by changing the number of groups,we can find the optimal number of groups that reduces the uplink consumption time. 展开更多
关键词 Federated learning privacy protection uplink consumption time
下载PDF
A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain 被引量:1
16
作者 jieren cheng Xiulai Li +2 位作者 Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期975-992,共18页
With the rapid development of blockchain technology,the number of distributed applications continues to increase,so ensuring the security of the network has become particularly important.However,due to its decentraliz... With the rapid development of blockchain technology,the number of distributed applications continues to increase,so ensuring the security of the network has become particularly important.However,due to its decentralized,decentralized nature,blockchain networks are vulnerable to distributed denial-of-service(DDoS)attacks,which can lead to service stops,causing serious economic losses and social impacts.The research questions in this paper mainly include two aspects:first,the classification of DDoS,which refers to detecting whether blockchain nodes are suffering DDoS attacks,that is,detecting the data of nodes in parallel;The second is the problem of DDoS segmentation,that is,multiple pieces of data that appear at the same time are determined which type of DDoS attack they belong to.In order to solve these problems,this paper proposes a modified PointNet(MPointNet)for the classification and type segmentation of DDoS attacks.A dataset containing multiple DDoS attack types was constructed using the CIC-DDoS2019 dataset,and trained,validated,and tested accordingly.The results show that the proposed DDoS attack classification method has high performance and can be used for the actual blockchain security maintenance process.The accuracy rate of classification tasks reached 99.65%,and the accuracy of type segmentation tasks reached 85.47%.Therefore,the method proposed in this paper has high application value in detecting the classification and segmentation of DDoS attacks. 展开更多
关键词 Blockchain DDOS PointNet classification and segmentation
下载PDF
A Survey on Image Semantic Segmentation Using Deep Learning Techniques
17
作者 jieren cheng Hua Li +2 位作者 Dengbo Li Shuai Hua Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第1期1941-1957,共17页
Image semantic segmentation is an important branch of computer vision of a wide variety of practical applications such as medical image analysis,autonomous driving,virtual or augmented reality,etc.In recent years,due ... Image semantic segmentation is an important branch of computer vision of a wide variety of practical applications such as medical image analysis,autonomous driving,virtual or augmented reality,etc.In recent years,due to the remarkable performance of transformer and multilayer perceptron(MLP)in computer vision,which is equivalent to convolutional neural network(CNN),there has been a substantial amount of image semantic segmentation works aimed at developing different types of deep learning architecture.This survey aims to provide a comprehensive overview of deep learning methods in the field of general image semantic segmentation.Firstly,the commonly used image segmentation datasets are listed.Next,extensive pioneering works are deeply studied from multiple perspectives(e.g.,network structures,feature fusion methods,attention mechanisms),and are divided into four categories according to different network architectures:CNN-based architectures,transformer-based architectures,MLP-based architectures,and others.Furthermore,this paper presents some common evaluation metrics and compares the respective advantages and limitations of popular techniques both in terms of architectural design and their experimental value on the most widely used datasets.Finally,possible future research directions and challenges are discussed for the reference of other researchers. 展开更多
关键词 Deep learning semantic segmentation CNN MLP TRANSFORMER
下载PDF
A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT
18
作者 Yu Fan Jingbing Li +4 位作者 Uzair Aslam Bhatti Chunyan Shao cheng Gong jieren cheng Yenwei Chen 《Computers, Materials & Continua》 SCIE EI 2023年第1期1279-1302,共24页
Medical images are a critical component of the diagnostic process for clinicians.Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis,they must be encrypted due to the c... Medical images are a critical component of the diagnostic process for clinicians.Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis,they must be encrypted due to the characteristics of digital storage and information leakage associated with medical images.Traditional watermark embedding algorithm embeds the watermark information into the medical image,which reduces the quality of the medical image and affects the physicians’judgment of patient diagnosis.In addition,watermarks in this method have weak robustness under high-intensity geometric attacks when the medical image is attacked and the watermarks are destroyed.This paper proposes a novel watermarking algorithm using the convolutional neural networks(CNN)Inception V3 and the discrete cosine transform(DCT)to address above mentioned problems.First,the medical image is input into the Inception V3 network,which has been structured by adjusting parameters,such as the size of the convolution kernels and the typical architecture of the convolution modules.Second,the coefficients extracted from the fully connected layer of the network are transformed by DCT to obtain the feature vector of the medical image.At last,the watermarks are encrypted using the logistic map system and hash function,and the keys are stored by a third party.The encrypted watermarks and the original image features are performed logical operations to realize the embedding of zero-watermark.In the experimental section,multiple watermarking schemes using three different types of watermarks were implemented to verify the effectiveness of the three proposed algorithms.Our NC values for all the images are more than 90%accurate which shows the robustness of the algorithm.Extensive experimental results demonstrate the robustness under both conventional and high-intensity geometric attacks of the proposed algorithm. 展开更多
关键词 Inception V3 multi-watermarking DCT watermark encryption robustness
下载PDF
Gate-Attention and Dual-End Enhancement Mechanism for Multi-Label Text Classification
19
作者 jieren cheng Xiaolong Chen +3 位作者 Wenghang Xu Shuai Hua Zhu Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第11期1779-1793,共15页
In the realm of Multi-Label Text Classification(MLTC),the dual challenges of extracting rich semantic features from text and discerning inter-label relationships have spurred innovative approaches.Many studies in sema... In the realm of Multi-Label Text Classification(MLTC),the dual challenges of extracting rich semantic features from text and discerning inter-label relationships have spurred innovative approaches.Many studies in semantic feature extraction have turned to external knowledge to augment the model’s grasp of textual content,often overlooking intrinsic textual cues such as label statistical features.In contrast,these endogenous insights naturally align with the classification task.In our paper,to complement this focus on intrinsic knowledge,we introduce a novel Gate-Attention mechanism.This mechanism adeptly integrates statistical features from the text itself into the semantic fabric,enhancing the model’s capacity to understand and represent the data.Additionally,to address the intricate task of mining label correlations,we propose a Dual-end enhancement mechanism.This mechanism effectively mitigates the challenges of information loss and erroneous transmission inherent in traditional long short term memory propagation.We conducted an extensive battery of experiments on the AAPD and RCV1-2 datasets.These experiments serve the dual purpose of confirming the efficacy of both the Gate-Attention mechanism and the Dual-end enhancement mechanism.Our final model unequivocally outperforms the baseline model,attesting to its robustness.These findings emphatically underscore the imperativeness of taking into account not just external knowledge but also the inherent intricacies of textual data when crafting potent MLTC models. 展开更多
关键词 Multi-label text classification feature extraction label distribution information sequence generation
下载PDF
An Adaptive DDoS Detection and Classification Method in Blockchain Using an Integrated Multi-Models
20
作者 Xiulai Li jieren cheng +3 位作者 chengchun Ruan Bin Zhang Xiangyan Tang Mengzhe Sun 《Computers, Materials & Continua》 SCIE EI 2023年第12期3265-3288,共24页
With the rising adoption of blockchain technology due to its decentralized,secure,and transparent features,ensuring its resilience against network threats,especially Distributed Denial of Service(DDoS)attacks,is cruci... With the rising adoption of blockchain technology due to its decentralized,secure,and transparent features,ensuring its resilience against network threats,especially Distributed Denial of Service(DDoS)attacks,is crucial.This research addresses the vulnerability of blockchain systems to DDoS assaults,which undermine their core decentralized characteristics,posing threats to their security and reliability.We have devised a novel adaptive integration technique for the detection and identification of varied DDoS attacks.To ensure the robustness and validity of our approach,a dataset amalgamating multiple DDoS attacks was derived from the CIC-DDoS2019 dataset.Using this,our methodology was applied to detect DDoS threats and further classify them into seven unique attack subcategories.To cope with the broad spectrum of DDoS attack variations,a holistic framework has been pro-posed that seamlessly integrates five machine learning models:Gate Recurrent Unit(GRU),Convolutional Neural Networks(CNN),Long-Short Term Memory(LSTM),Deep Neural Networks(DNN),and Support Vector Machine(SVM).The innovative aspect of our framework is the introduction of a dynamic weight adjustment mechanism,enhancing the system’s adaptability.Experimental results substantiate the superiority of our ensemble method in comparison to singular models across various evaluation metrics.The framework displayed remarkable accuracy,with rates reaching 99.71%for detection and 87.62%for classification tasks.By developing a comprehensive and adaptive methodology,this study paves the way for strengthening the defense mechanisms of blockchain systems against DDoS attacks.The ensemble approach,combined with the dynamic weight adjustment,offers promise in ensuring blockchain’s enduring security and trustworthiness. 展开更多
关键词 Blockchain DDOS multi-models adaptive detection
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部