• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Mobile Crowdsourcing Task Allocation Based on Dynamic Self-Attention GANs

    2024-05-25 14:40:12KaiWeiSongYuandQingxianPan
    Computers Materials&Continua 2024年4期

    Kai Wei ,Song Yu and Qingxian Pan,?

    1School of Computer and Control Engineering,Yantai University,Yantai,264005,China

    2School of Computer and Information Science,Southwest University,Chongqing,400715,China

    ABSTRACT Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4% increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83% compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation.

    KEYWORDS Mobile crowdsourcing;task allocation;anomaly detection;GAN;attention mechanisms

    1 Introduction

    Crowdsourcing is a novel method for problem-solving that leverages decentralized swarm intelligence[1].Given the challenges inherent in task allocation within a crowdsourcing environment,numerous researchers have proposed viable solutions[2–6]and outlined directions for subsequent research[7–10].For instance,Cheng et al.[11–14]improved the timeliness of crowdsourcing through predictionbased task assignments,utilizing data on workers’locations and trajectories.Zhao et al.[15–17]developed a preference-aware task assignment method,enhancing assignment volume by considering workers’temporal and spatial preferences.In a distinct approach,Ding et al.[18]introduced a dynamic delayed decision-making method for task assignment,alleviating issues such as poor quality resulting from hasty decisions by incorporating the timing of task assignment.Wang et al.[19]concentrated on robustness,devising an offline initiative to create a resilient task allocation scheme capable of handling unforeseen disruptions.This effort significantly bolstered the robustness of the allocation scheme.Chen et al.[20] delved into optimal task allocation among workers,introducing an impact-aware approach that maximizes task volume by calculating workers’affinity for tasks.Finally,Zhao et al.[21]employed worker turnover predictions in task allocation to maximize the total reward from task allocation.

    On crowdsourcing platforms,the presence of malicious actors among task workers and requesters can pose significant challenges [22].For instance,a requester may publish an invalid task,which cannot be completed when assigned to a worker and yields no reward.Such malicious requests undermine task quality and accuracy.Crowdsourcing abnormal activities are not only limited to malicious requests issued by task requesters but also include malicious behaviors of task workers.For example,workers may not arrive at the task location on time when performing tasks.To address this concern,Gadiraju et al.[23] investigated everyday malicious activities within crowdsourcing environments.They proposed a method to evaluate these activities by analyzing worker behavior,thereby assessing their trustworthiness.Spurling et al.[24] studied the threat posed by malicious workers to crowdsourcing platforms,employing interval-valued labels and worker reliability metrics to detect anomalous behavior.Zhao et al.[25] introduced a framework for detecting anomalies in malicious task requests or workers.Meanwhile,Kieu et al.[26,27] proposed solutions for handling anomalous data in multivariate time series,with the aim of enhancing robust anomaly detection in time series through unsupervised learning.This body of work underscores the importance of addressing malicious activities to ensure the integrity and effectiveness of crowdsourcing platforms.Li et al.[28–31] presented a variety of deep learning-based solutions for anomaly detection problems,utilizing tools such as generative adversarial networks and innovative autoencoders to tackle various challenges in anomaly detection.Similarly,Sattar et al.[32,33] leveraged deep learning and crowdsourcing technologies to address abnormal activities in different scenarios,including trajectory detection and business fraud.Commonly employed deep learning models for anomaly detection research include self-encoders and generative adversarial networks.The self-encoder,a widely used deep learning model [34–36] for unsupervised learning,comprises encoder and decoder components essential for data dimensionality reduction,feature learning,and generative modeling.The Generative Adversarial Network(GAN)[37,38]is a generative model consisting of generator and discriminator components.The network trains these two components against each other,creating a competitive environment.GAN has proven successful in enhancing images and data.The Self-Attention Mechanism [39] is an attentional mechanism used for processing sequential data.It enables the model to focus on information at different locations during data processing and is commonly employed in Natural Language Processing(NLP)tasks.

    Their work has contributed numerous practical methods for future research.Despite considerable progress,the current research field faces two significant challenges.Firstly,a majority of existing methods concentrate on typical crowdsourcing anomalies,neglecting the abnormal activities jointly carried out by workers and task requesters.Hence,it is imperative to incorporate the combination of fraudulent workers and malicious tasks into the analysis.Furthermore,the present methods lack adequate recognition of abnormal activities.Due to the limited occurrence of malicious workers and tasks in real-time data streams,the existing methodologies do not adequately address these anomalies,posing a considerable challenge for effective identification in large-scale data streams.Secondly,the efficiency of allocation algorithms becomes compromised when confronted with datasets containing a substantial number of abnormal nodes.

    Given the challenges outlined above,this study introduces a novel mechanism for invalid detection,referred to as Dynamic Self-Attention Generative Adversarial Networks (DSAGD).The purpose of DSAGD is to identify abnormal nodes in real-time data streams,enhancing the efficiency and reliability of crowdsourcing allocation.The paper bifurcates the invalid detection mechanism into two main components,as illustrated in Fig.1.The first segment comprises an autoencoder and a dynamic self-attention GAN network.This component models the issue of identifying malicious task requests and fraudulent workers as a related time series anomaly detection problem.Its primary goal is to assess whether the modeled multivariate time series data conforms to the expected distribution of the model and to handle the resulting abnormal nodes.Diverging from traditional methods,we employ two GANs,denoted as cross-generative adversarial networks,to train the autoencoder.This strategy enhances the autoencoder’s ability to learn the distribution of the original data more effectively.The second part focuses on the matching process between workers and tasks.The paper transforms task allocation into bipartite graph matching.This matching process incorporates the abnormal attribute values of each worker or task calculated in the first part.Subsequently,an efficient allocation algorithm is employed for comprehensive task allocation.The specific block diagram of the framework is illustrated in Fig.1.The primary contributions of this paper can be summarized as follows:

    1) We propose a cross GAN (C-GAN) network anomaly detection model to cross-train the autoencoder.

    2)We propose a dynamic self-attention model to enhance the representation of important features by dynamically adjusting the attention weight of the channel.

    3)We propose a P-queue KM algorithm in the second stage of the framework,which effectively solves the problem of low allocation efficiency in the two-part graph matching process.

    4)The effectiveness and allocation efficiency of the proposed framework are verified by comparing it with real datasets.

    Figure 1: Dynamic self-attention GAN invalidation detection framework

    2 Related Work

    2.1 Autoencoder

    The autoencoder is a type of unsupervised learning mechanism that consists of a feed-forward fully connected neural network comprising two components:An encoder and a decoder.Its primary purpose is to acquire efficient data representations.In the context of time series anomaly detection,the autoencoder can effectively identify the normal data distribution within the time series.By comparing the reconstructed data with the original data and measuring their discrepancy against a predefined threshold,one can infer whether there are anomalous nodes present in the original data.Consequently,it enables us to detect anomalies or reconstruction errors within data.The encoding-decoding process of an autoencoder can be formally described as follows:

    Eqs.(1)and(2)denote that the encoder maps the high-dimensional input to the potential spaceh,and the decoder maps back to the initial dimension to get the reconstructed outputXR.Autoencoder can adapt to data learning of different structures and learn data features well.

    2.2 Generating Adversarial Networks

    The Generative Adversarial Network (GAN),a deep learning model,comprises two primary components:The Generator and the Discriminator.This fundamental concept leverages an adversarial game,where the Generator and Discriminator are trained reciprocally in an antagonistic manner.In anomaly detection scenarios,GANs address the limitations of traditional statistical models that struggle to adapt to complex data distributions and identify anomalous sample data.This is achieved by training the generator to fit the distribution of actual samples and subsequently calculating the discrepancy between real samples and generated ones.The objective functions for training both generator and discriminator are as follows:

    whereXis the real data,D(x)denotes the probability from the real data,G(z)denotes the possibility of generating a pseudo-sample,zis the noisy data,and the a priori value of the noisy data.The generative adversarial network can learn data representation,generate new data samples,and improve the model’s sensitivity to abnormal data through adversarial mechanisms.

    2.3 Self-Attention Mechanism

    The attention mechanism is a deep learning technique primarily employed to augment a model’s capacity for processing and comprehending input data.In the context of anomaly detection,the objective is to identify outliers within the dataset.These outliers may exhibit distinct characteristics and statistical properties compared to normal nodes.By capturing dependencies and contextual information among data elements,the self-attention mechanism enables the model to gain a better understanding of the data distribution and effectively detect anomalies.The inputs to the self-attention mechanism consist of queries,keys,and values derived through linear transformations using trainable parameter matrices.The formal representation of the self-attention mechanism can be seen in Eq.(4):

    3 Method

    3.1 Definition of the Problem

    Problem 1 Crowdsourcing task:A crowdsourcing task can be represented as a ternaryt=〈a,e,l〉,represented by m-dimensional vectors,respectively,and the ternary describes the task arrival time and the end timet.e,as well as the task locationt.l.

    Problem 2 Crowdsourcing workers:A crowdsourced worker triad can be expressed as a triad that denotes the worker’s arrival timew.a,the worker’s end time of performing the taskw.e,and the worker’s positionw.l,respectively.

    Problem 3 Anomaly detection:In multivariate time series anomaly detection,the aim is to assign the corresponding attribute value to the input sequence for each timestampT,where the attribute value V is computed from the original sequence with the reconstructed fitted sequence.

    Problem 4 Task utility: In two-part graph matching,worker-task matching edges all have combined weight values computed from the base utility value and the anomalous attribute value of the formW=U+V,with an initialized random value.

    3.2 Dynamic Self-Attention GAN Invalidation Detection

    The Dynamic Self-Attention Generative Adversarial Network (DSAGD) is introduced in this section as a novel solution for invalid detection.In this study,we model the real-time task-worker request as a multivariate time series,where abnormal nodes are represented by invalid tasks issued by the task requester and malicious behaviors of the task worker.Consequently,we reframe the problem of identifying abnormal nodes in worker-task relationships as an outlier detection challenge within time series data.To address this challenge,our proposed framework incorporates a Cross-Generative Adversarial Network (C-GAN),which utilizes both perceptual node distribution GAN and reconstruction error GAN to cross-train the autoencoder and learn the distribution pattern of task time series.This section outlines the workflow of our anomaly detection mechanism,with Fig.2 illustrating the corresponding flow chart.

    Figure 2: Invalid detector flowchart

    3.2.1 Process Overview

    The overall process is depicted in Fig.2.Initially,the framework preprocesses the historical multivariate sequence data.Subsequently,the system transmits the preprocessed data to the autoencoder.The autoencoder then forwards various probability distributions to the distribution-aware GAN discriminator and receives feedback.This procedure enables the autoencoder to capture data features comprehensively and learn distribution patterns effectively.Afterward,the autoencoder generates fitted data and sends it to the reconstruction error GAN for comparison with the original data.Upon the arrival of real-time data,the trained model performs anomaly detection.

    3.2.2 Cross-Generative Adversarial Network

    In the Cross-Generative Adversarial Network (C-GAN),both the distribution-aware GAN and the reconstruction error-based GAN are integrated,enabling them to be trained adversarially.Regarding the network structure composition,the discriminator of the distribution-aware GAN consists of five convolutional layers.Each layer employs a 4 × 4 kernel size,a stride of 2,and a padding of 1.Conversely,the discriminator for the reconstruction error GAN comprises only one feature extraction layer and one classifier.

    (1)Distribution-Aware GAN

    The distribution-aware GAN (depicted in dark green in Fig.2) employs the encoder (CNN) as the generator G1,and the decoder functions as the discriminator D1.The encoder consists of five convolutional layers,with each layer utilizing a 4 × 4 kernel,a stride of 2,and a padding of 1.Following each convolutional layer,there is a batch normalization layer and a subsequent ReLU activation function.The decoder is composed of six convolutional layers.The initial deconvolution layer employs a 4×4 convolution kernel,a stride of 1,and zero padding.The sequence is employed as the network input,and the hidden layer yields outputz.The distribution-aware GAN,in an effort to learn the data distribution pattern within the sequence and fit the data distribution,bootstraps the computation between the posterior distributionq(z) of the original data distributionand the encoded data distributionand the prior distributionp(z)of the hidden variablez.Given that the encoded value is a continuous distribution of sequential data rather than a discrete point,the computation formula forq(z)can formally be expressed as follows:

    Assuming that the coding distributions are Gaussian,is each coding distribution’s probability density function[40,41].Finally,backpropagation is performed using an encoder.Coding distribution is a probability distribution that represents the frequency or possibility of data elements.The combination of data distribution and coding distribution is designed to understand the uncertainty of model parameters better and enhance the model’s robustness.The hidden layer outputs a prior distribution to better control the generated samples.

    The distribution-aware GAN is designed to learn the original data distribution and bootstrap matching with the fitted data,with a loss function expressed as:

    The distribution-aware GAN tries to maximize the loss function as a whole,and the generator hopes to minimize the corresponding loss function,so the joint description of the two objectives is C1:

    (2)Reconstruction Error GAN

    Within the Reconstruction Error GAN (depicted in the gray area of Fig.2),the autoencoder serves as a generator in this study,taking in an input sequence and reconstructing the outputThe Reconstruction Error GAN is designed to guide the comparison between the original and reconstructed sequences,thereby preventing overfitting during the training process.The loss function for the Reconstruction Error GAN can be formally expressed as C2:

    3.2.3 Dynamic Channel Attention

    To effectively learn the feature weights between channels,this paper introduces a module specifically designed for learning channel weight attention,the Dynamic Channel Attention Module(DCAM).We guide the feature computation between two discriminators in the distribution-aware GAN and the reconstruction error GAN to assign higher feature weights to the data focused on interchannel[42],thereby enhancing the network’s capability to detect abnormal data nodes.

    In the context of dynamic channel attention,the total operations executed within the network layer can be collectively represented as follows:

    B represents the batch size,which is the number of samples processed in each iteration.Meanwhile,I signifies the input dimension size.To enhance learning capabilities,a reduction operation [43] is executed on the channel inputs to train crucial channels.Subsequently,another operation is performed to restore the features back to their original dimensions.Following these operations,the model assigns higher weights to essential features.

    3.2.4 Abnormal Detection

    The anomaly detection phase aims to compute the value of the anomalous attribute between the network input sequenceand the fitted output sequenceusing the formula:

    In this study,the aforementioned attribute values are incorporated into the worker-task assignment process,and workers or tasks with higher values are more likely to be identified as abnormal nodes.

    3.2.5 Assignment of Tasks

    In a two-stage task assignment,task assignment is transformed into two-part graph matching.Let us assume there is an undirected graph with a vertex set in the left set V and an edge set in the right set E,where the vertex set V consists of a left-hand side worker set W,and a right-hand side task set T.When tasks and workers arrive in real-time at a specific timestamp,i.e.,there are matchable nodes in both sets,the matching edges are added to the set.Initially,each edge is assigned an initial weightU(w,t).This paper introduces anomalous attribute values for each edgeValue,where unequal anomalies may be present between workers or tasks.Consequently,the total weight of the corresponding edges connecting workers and tasks can be represented as:

    Here,those with high anomaly attribute values are likelier to have lower anomaly weight utility.To achieve efficient two-part graph matching,this paper proposes an efficient allocation algorithm,namely the P-queue KM algorithm,as described in Algorithm 1.

    (1)Overview of algorithm flow

    This section presents an overview of the P-queue KM algorithm,providing a detailed introduction to its process and critical components.Initially,the algorithm initializes global variables and the left worker nodes,followed by a call to the breadth-first search algorithm to find the augmented path.During the path search,the algorithm adds the starting node to the priority queue and sorts it based on the relaxation value.If the queue is not empty,the algorithm removes the first element,marks it as accessed,traverses the right set,and calculates the slack value.If the augmented path is found,the algorithm updates the matching relationship;otherwise,it updates the label array based on the descending order of the relaxation value.Finally,the algorithm calculates the sum of the maximum matching weights and returns the matching results.The optimization method utilizes a priority queue to minimize the number of traversals by actively selecting the next vertex for extension.The time complexity of the improved KM algorithm in extending the next vertex is reduced fromO(n) toO(log n).

    4 Experimental Section

    In order to evaluate the performance of the anomaly detection mechanism proposed in this paper,the experimental design uses an actual multivariate time series data set,soil moisture active and passive remote sensing satellite(SMAP)[44],to simulate the crowdsourcing worker-task data stream.Table 1 shows the statistics of the data set.The statistical table includes the number of subsets,the size of the training set,and the size of the test set.We use PyTorch (v1.11 with Python 3.7.1) on Windows machines equipped with NVIDIA GTX1050Ti for experimentation.

    Table 1: Statistics of datasets

    4.1 Anomaly Detection Evaluation

    Model Comparison for Evaluation.This paper compares the performance of four models,namely,VAE [45],SA-GAN-Learn [25],SA-GAN-Random [25],and DSAGD.For parameter settings,the proposed anomaly detector in this study uses Adam as the optimizer,a learning rate of 0.001,a momentum β1 of 0.9,a momentum β2 of 0.999,a batch size of 256,a sequence length of 128,and 20 training iterations.The F1-score serves as the metric to evaluate the performance of the four aforementioned models in this paper,with a higher value indicating better model performance.The anomaly threshold selection range is set to [0,1],with an initial value of 0 and a step size of 0.01.Afterwards,the anomaly attribute values of different models are normalized to a fixed interval using min-max normalization.Then,the F1-score is calculated for each threshold,and the optimal F1-score is determined.We compare the following methods when evaluating the detection performance of malicious workers and invalid task requests:

    1)VAE:Variational autoencoder,an autoencoder extension.The network structure of VAE in this paper is the same as the other two SA-GAN networks.

    2) SA-GAN-Random: This model uses GAN for anomaly detection,especially proposes social awareness,and uses a random strategy for update.

    3)SA-GAN-Learn:This model uses changing learning rates to update awareness.

    Table 2 shows the performance of different models on the data set.In the SMAP dataset,DSAGD is about 4.07%superior to the best-performing SA-GAN-Random model.The overall value of DSAGD is approximately 3.9% better than the top SA-GAN-Random model.The above data comparison shows that the model in this paper has a significant performance improvement compared with other models.The model’s performance also varies because the data distribution varies across different datasets.DSAGD enhances weight learning between channels to assign a higher weight to abnormal nodes,enabling the model to identify abnormal nodes more effectively.

    Table 2: F1-score

    Table 3: Comparison of accuracy of different models

    Table 4: Recall rate comparison of different models

    Tables 3 and 4 compare the precision and recall rates of different models.The model in this paper is ahead of other models in terms of accuracy comparison.Regarding SMAP and overall value,the model in this paper is significantly ahead of other models.The above two comparisons can show the model’s effectiveness in this paper.

    As the Captain went in last he came out first, and made them all pass by him; he then closed the door, saying: Shut, Sesame! Every man bridled3 his horse and mounted, the Captain put himself at their head, and they returned as they came

    4.2 Task Allocation Evaluation

    Evaluation Comparison.For the two-part graph matching problem,the following five algorithms are compared in this paper:

    1)KM algorithm

    2)Greedy algorithm

    3)Greedy algorithm based on anomalous attribute values

    4)KM algorithm based on anomalous attribute values

    5)P-queue KM algorithm based on anomalous attribute values

    Evaluation Metrics.This study employs four critical metrics for evaluation:The total utility value of task assignment,the accuracy rate of worker assignment,the accuracy rate of crowdsourcing task assignment,and the time consumed in task assignment.Considering the scale of workers and tasks,we evaluate each of these indicators.The growth rate for the number of workers and tasks is set at 500,i.e.,500,1000,1500,and 2000,to emulate the large-scale data flow prevalent in real-world task allocation scenarios.

    4.2.1 Comparison of Total Weight Values

    In Table 5,the total task utility value for all algorithms demonstrates an upward trend with an increase in the number of workers or tasks.Specifically,for the SMAP dataset,the average enhancements are about 5.245%and 5.952%under the respective dimensions.It is apparent from the table that the total utility value increases with the increase in the number of workers and tasks.The increase in the total utility value is due to adding worker set and task set nodes in the bidirectional graph.In the SMAP datasets,the total utility value achieved by the proposed algorithm surpasses that of the greedy algorithm,is comparable to the KM algorithm,and slightly lags behind the KM algorithm in specific dimensions.Including abnormal attribute values during edge matching impacts the total utility value,contributing to this slight underperformance.The above four tables illustrate the proposed algorithm’s superiority in different dimensions,indicating its competitive edge over other algorithms.

    Table 5: SMAP the total weight of task allocation

    4.2.2 Comparison of Worker Distribution Accuracy

    Table 6 compares the worker assignment accuracy of different algorithms,expressed as the ratio of correctly assigned workers to the total number of workers.In the SMAP dataset,the improvements are 0.10%and 0.16%for the two respective scenarios.Given that the majority of abnormal activities in the crowdsourcing data stream originate from malicious task requester requests,various algorithms encounter a reduction in worker assignment accuracy.The proposed algorithm outperforms other algorithms in most scenarios in the worker count dimension.However,under the task count dimension,the algorithm’s performance is slightly inferior to the Greedy algorithm in specific systems,possibly due to its insufficient robustness in handling abnormal situations,indicating certain algorithm limitations.Overall,in both dimensions of the SMAP dataset,all algorithms demonstrate relative stability.The accuracy of the worker assignment algorithm in most scenarios surpasses that of other algorithms,signifying its competitive advantage over other algorithms.

    Table 6: SMAP the accuracy of worker allocation

    4.2.3 Comparison of Task Allocation Accuracy

    Table 7 illustrates a comparison of task allocation accuracy across different algorithms.In the SMAP dataset,the average enhancements under the worker count and task count dimensions are about 0.06% and 0.14%.In the SMAP dataset,under the worker count dimension,task allocation accuracy peaks when the worker count is 1000 and subsequently diminishes with an increase in the number of workers.Reduced accuracy suggests that increasing the number of workers may disrupt optimal task matching.Additionally,when the worker count is 1500,the performance of the proposed algorithm lags behind that of the outlier-based Greedy algorithm.However,when the worker count escalates to 2000,the outlier-based Greedy algorithm significantly decreases performance.Conversely,the proposed algorithm takes the lead when the worker count is 2000 and maintains this lead as the worker count continues to increase.This trend suggests that the proposed algorithm is more suitable for application scenarios with large groups of workers.In the task count dimension,all algorithms demonstrate relatively stable performance.The proposed algorithm leads under all four task counts,suggesting its suitability for large-scale task allocation.This suggests that the algorithm has some advantages.

    Table 7: SMAP the accuracy of task allocation

    4.2.4 Comparison of Execution Time

    Fig.3 delineates the task execution time for each algorithm.The objective of task allocation in this study is to minimize time expenditure.As the number of workers escalates,the time cost for all algorithms increases.In the SMAP dataset,the proposed algorithm holds the lowest execution time cost.At a worker count of 1000,the average efficiency reaches its zenith at 20.70%,and at a task count of 500,the highest average efficiency is 21.84%.The efficiency improvement arises from the proposed algorithm utilizing a more efficient search strategy than the traditional algorithm.This reduction in time cost for bidirectional graph search contributes to the enhanced execution efficiency of the algorithm.

    Figure 3: The total task execution time of SMAP dataset in different environments

    After conducting a comparative analysis of the four groups of experiments mentioned above,it can be concluded that the P-queue KM algorithm proposed in this paper effectively optimizes the search operation and reduces time complexity.When dealing with large-scale data,this algorithm exhibits higher allocation efficiency compared to both the KM and greedy algorithms.Notably,comprehensive experiments are conducted in this study considering different dimensions such as the number of workers and tasks,providing an effective demonstration of the algorithm’s excellent performance and validating its effectiveness.

    5 Conclusion

    This paper proposes a novel and efficient anomaly detection framework,namely dynamic selfattention invalid detection framework,which can effectively identify abnormal data nodes in the multivariate time series of crowdsourcing workflows,thus promoting efficient task allocation.The framework learns historical distribution patterns of multivariate time series data to train the detector model,thus capturing anomalous data in actual crowdsourcing data streams.Moreover,this paper proposes an efficient P-queue KM matching algorithm,significantly reducing the time complexity of matching search for large-scale data.Numerous experiments demonstrate that the framework can effectively recognize and handle abnormal data while enhancing the allocation accuracy of workers and tasks in task allocation.In future work,we will delve into developing a more robust model for detecting a minimal number of abnormal nodes in crowdsourcing data and seek to optimize the limitations of the allocation algorithm in specific scenarios.

    Acknowledgement:In the research process of this paper,we thank Mr.Pan Qingxian for his careful guidance,and thank Mr.Yu Song and his laboratory classmates Fan Zequn and Li Jinru for their suggestions on the experimental content and article writing.It is their help that makes the research of this topic go smoothly.At the same time,I also thank the editors and reviewers of CMC journals,thank you for your review of the content of the article,and thank you for your valuable suggestions.Finally,thanks to the National Natural Science Foundation of China for funding this project.

    Funding Statement:National Natural Science Foundation of China(62072392).

    Author Contributions:The authors confirm contribution to the paper as follows: Study conception and design: Wei Kai,Pan Qingxian;data collection: Wei Kai;analysis and interpretation of results:Wei Kai,Pan Qingxian,Yu Song;draft manuscript preparation:Wei Kai,Pan Qingxian.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Data not available due to researches’restrictions.Due to the nature of this research,participants of this study did not agree for their data to be shared publicly,so supporting data is not available.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲丝袜综合中文字幕| 18禁裸乳无遮挡免费网站照片| 日韩一区二区三区影片| kizo精华| 在线观看av片永久免费下载| 国产精品爽爽va在线观看网站| 国产亚洲精品久久久com| 亚洲美女搞黄在线观看| 国语自产精品视频在线第100页| 2021天堂中文幕一二区在线观| 变态另类丝袜制服| 久99久视频精品免费| 一级爰片在线观看| 插逼视频在线观看| av又黄又爽大尺度在线免费看 | 女人被狂操c到高潮| 亚洲av中文字字幕乱码综合| 亚洲激情五月婷婷啪啪| 久久久久久大精品| 少妇人妻精品综合一区二区| 亚洲成av人片在线播放无| 三级国产精品欧美在线观看| av又黄又爽大尺度在线免费看 | 久久久久国产网址| 村上凉子中文字幕在线| 日本免费a在线| 人妻系列 视频| 亚洲av中文字字幕乱码综合| 久久99精品国语久久久| 观看美女的网站| 久久精品国产亚洲网站| 欧美高清成人免费视频www| 欧美精品一区二区大全| 激情 狠狠 欧美| 亚洲成人久久爱视频| 黄色欧美视频在线观看| 精品人妻偷拍中文字幕| 久久久久久大精品| 嘟嘟电影网在线观看| 国产伦理片在线播放av一区| 97人妻精品一区二区三区麻豆| 亚洲av电影在线观看一区二区三区 | 亚洲无线观看免费| 97人妻精品一区二区三区麻豆| 青青草视频在线视频观看| 一级黄片播放器| 国产欧美日韩精品一区二区| 2022亚洲国产成人精品| 观看美女的网站| 久久精品国产99精品国产亚洲性色| 免费av观看视频| 久99久视频精品免费| 一级毛片aaaaaa免费看小| 寂寞人妻少妇视频99o| 97超视频在线观看视频| 欧美色视频一区免费| 亚洲在线自拍视频| 1000部很黄的大片| 嫩草影院精品99| 精品无人区乱码1区二区| 午夜免费男女啪啪视频观看| 日本与韩国留学比较| 中文字幕熟女人妻在线| 又爽又黄无遮挡网站| 欧美人与善性xxx| 日本色播在线视频| 性插视频无遮挡在线免费观看| 蜜桃久久精品国产亚洲av| 欧美激情久久久久久爽电影| 国产成人免费观看mmmm| 在线免费十八禁| 最近最新中文字幕大全电影3| 日本免费在线观看一区| 床上黄色一级片| 在线免费十八禁| 精品久久久久久久人妻蜜臀av| 国产三级中文精品| 我要搜黄色片| 精品久久久久久成人av| 国产极品精品免费视频能看的| 亚洲国产精品专区欧美| 简卡轻食公司| 亚洲,欧美,日韩| 亚洲国产精品sss在线观看| 两个人视频免费观看高清| 午夜福利成人在线免费观看| 亚洲色图av天堂| 亚洲美女视频黄频| 1024手机看黄色片| 免费av观看视频| 国产精品无大码| 岛国在线免费视频观看| 国产在线一区二区三区精 | 日本av手机在线免费观看| 免费看日本二区| 精品酒店卫生间| 国产精品av视频在线免费观看| 国模一区二区三区四区视频| 中文字幕久久专区| 国内少妇人妻偷人精品xxx网站| 国产av不卡久久| 日韩 亚洲 欧美在线| 久久久久久久久中文| 国产精品福利在线免费观看| 欧美成人a在线观看| 国产 一区 欧美 日韩| 国产极品精品免费视频能看的| 麻豆国产97在线/欧美| 免费在线观看成人毛片| 国产午夜精品论理片| 免费观看a级毛片全部| 亚洲aⅴ乱码一区二区在线播放| 亚洲美女搞黄在线观看| 亚洲精品aⅴ在线观看| 国产精品爽爽va在线观看网站| 啦啦啦啦在线视频资源| 三级经典国产精品| 麻豆国产97在线/欧美| 一级黄片播放器| 不卡视频在线观看欧美| 亚洲国产精品专区欧美| 日韩 亚洲 欧美在线| 欧美日韩国产亚洲二区| 亚洲欧美成人综合另类久久久 | 男女啪啪激烈高潮av片| 日韩成人av中文字幕在线观看| 午夜福利成人在线免费观看| 亚洲第一区二区三区不卡| АⅤ资源中文在线天堂| 国产精品伦人一区二区| 全区人妻精品视频| 男女国产视频网站| 欧美高清性xxxxhd video| 美女脱内裤让男人舔精品视频| 国产男人的电影天堂91| 嘟嘟电影网在线观看| h日本视频在线播放| 爱豆传媒免费全集在线观看| 久久精品国产99精品国产亚洲性色| 国产黄片美女视频| 亚洲国产欧美在线一区| 又爽又黄无遮挡网站| .国产精品久久| 国产成年人精品一区二区| 国产人妻一区二区三区在| 日韩在线高清观看一区二区三区| 九九久久精品国产亚洲av麻豆| 国产精品嫩草影院av在线观看| 欧美变态另类bdsm刘玥| 免费播放大片免费观看视频在线观看 | 内地一区二区视频在线| av在线蜜桃| 国产高清国产精品国产三级 | 国产高清视频在线观看网站| 日本黄色片子视频| 亚洲中文字幕日韩| 久久精品久久精品一区二区三区| 大又大粗又爽又黄少妇毛片口| 久久久午夜欧美精品| 91在线精品国自产拍蜜月| 尤物成人国产欧美一区二区三区| 神马国产精品三级电影在线观看| 一区二区三区免费毛片| 亚洲国产日韩欧美精品在线观看| 七月丁香在线播放| 欧美3d第一页| 寂寞人妻少妇视频99o| 嫩草影院精品99| 日本三级黄在线观看| 寂寞人妻少妇视频99o| 欧美性感艳星| 欧美97在线视频| 亚洲真实伦在线观看| 99国产精品一区二区蜜桃av| 日韩一区二区视频免费看| 精华霜和精华液先用哪个| 最近手机中文字幕大全| 日韩,欧美,国产一区二区三区 | 91精品一卡2卡3卡4卡| 少妇被粗大猛烈的视频| 三级毛片av免费| 人妻制服诱惑在线中文字幕| 国产欧美另类精品又又久久亚洲欧美| 三级毛片av免费| 三级经典国产精品| 国产亚洲午夜精品一区二区久久 | 韩国av在线不卡| 白带黄色成豆腐渣| a级毛片免费高清观看在线播放| 久久草成人影院| 免费观看在线日韩| 国产免费一级a男人的天堂| 国产亚洲最大av| 别揉我奶头 嗯啊视频| 纵有疾风起免费观看全集完整版 | 日本欧美国产在线视频| 亚洲最大成人中文| 国产高清视频在线观看网站| 国产精品久久电影中文字幕| 神马国产精品三级电影在线观看| videossex国产| 小蜜桃在线观看免费完整版高清| 亚洲精品日韩av片在线观看| 日韩亚洲欧美综合| 一个人看的www免费观看视频| 国产黄a三级三级三级人| 亚洲一区高清亚洲精品| 国产精品1区2区在线观看.| 国产成人福利小说| 高清在线视频一区二区三区 | 春色校园在线视频观看| 久久久久国产网址| 国产精品精品国产色婷婷| 色尼玛亚洲综合影院| 亚洲精品日韩在线中文字幕| 亚洲精品影视一区二区三区av| 啦啦啦观看免费观看视频高清| 国产 一区精品| 免费观看的影片在线观看| 在线播放无遮挡| 久久久久久伊人网av| 欧美xxxx性猛交bbbb| 国产精品国产高清国产av| 久久精品影院6| 亚洲精品456在线播放app| 亚洲av日韩在线播放| 日韩成人av中文字幕在线观看| 日本一本二区三区精品| 亚洲精品日韩av片在线观看| 国产美女午夜福利| 免费观看在线日韩| 69人妻影院| 国产日韩欧美在线精品| 欧美日韩精品成人综合77777| 欧美色视频一区免费| 少妇熟女aⅴ在线视频| 久久人人爽人人爽人人片va| 欧美成人精品欧美一级黄| 纵有疾风起免费观看全集完整版 | 日本免费a在线| 夜夜爽夜夜爽视频| 最近最新中文字幕免费大全7| 久久久国产成人精品二区| 国产成人精品久久久久久| 天美传媒精品一区二区| 久久久精品大字幕| av国产免费在线观看| 免费观看的影片在线观看| 亚洲性久久影院| 国产一区亚洲一区在线观看| 极品教师在线视频| 国产精品国产三级专区第一集| 免费观看的影片在线观看| 日韩国内少妇激情av| 变态另类丝袜制服| 久久久精品大字幕| 日日撸夜夜添| 久久精品国产99精品国产亚洲性色| 大话2 男鬼变身卡| 成人无遮挡网站| 中文资源天堂在线| 国产成人精品婷婷| 午夜久久久久精精品| 97人妻精品一区二区三区麻豆| 国产老妇伦熟女老妇高清| 岛国毛片在线播放| 一级二级三级毛片免费看| 午夜精品一区二区三区免费看| 日本色播在线视频| 女人被狂操c到高潮| 纵有疾风起免费观看全集完整版 | 水蜜桃什么品种好| 熟女电影av网| 亚洲aⅴ乱码一区二区在线播放| 国产精品野战在线观看| 草草在线视频免费看| 桃色一区二区三区在线观看| 天天躁夜夜躁狠狠久久av| 午夜免费激情av| 亚洲最大成人中文| 综合色丁香网| 日韩成人伦理影院| 一级毛片电影观看 | 日韩中字成人| 成年免费大片在线观看| 午夜福利网站1000一区二区三区| 在现免费观看毛片| 日本-黄色视频高清免费观看| 男女视频在线观看网站免费| 亚洲国产精品合色在线| 嫩草影院新地址| 免费av观看视频| 黑人高潮一二区| 99热这里只有精品一区| 国产亚洲5aaaaa淫片| 狠狠狠狠99中文字幕| 中文字幕久久专区| 亚州av有码| 简卡轻食公司| 国产高清不卡午夜福利| videossex国产| 亚洲国产精品合色在线| 一级毛片久久久久久久久女| 在线播放无遮挡| 麻豆国产97在线/欧美| 亚洲天堂国产精品一区在线| 九九久久精品国产亚洲av麻豆| 久久草成人影院| 久久99精品国语久久久| 青春草国产在线视频| 国产女主播在线喷水免费视频网站 | 日韩高清综合在线| 99视频精品全部免费 在线| 69av精品久久久久久| 精品少妇黑人巨大在线播放 | 网址你懂的国产日韩在线| 天美传媒精品一区二区| 免费看光身美女| 偷拍熟女少妇极品色| 少妇的逼水好多| 免费电影在线观看免费观看| 日韩欧美国产在线观看| 九九久久精品国产亚洲av麻豆| 女的被弄到高潮叫床怎么办| 亚洲精品乱码久久久久久按摩| 亚洲精品国产av成人精品| 免费无遮挡裸体视频| 狠狠狠狠99中文字幕| 伦精品一区二区三区| 噜噜噜噜噜久久久久久91| 青春草视频在线免费观看| 免费av毛片视频| 一卡2卡三卡四卡精品乱码亚洲| 国产一区二区三区av在线| 免费黄色在线免费观看| 日日啪夜夜撸| 久久精品久久久久久久性| 久久久亚洲精品成人影院| 午夜精品在线福利| av在线蜜桃| 精品欧美国产一区二区三| 精品熟女少妇av免费看| 1024手机看黄色片| 午夜福利高清视频| 国产中年淑女户外野战色| 久久久久久九九精品二区国产| 好男人在线观看高清免费视频| 国产av码专区亚洲av| 一边摸一边抽搐一进一小说| 国产熟女欧美一区二区| 国产精华一区二区三区| 我的老师免费观看完整版| 亚洲欧美清纯卡通| 身体一侧抽搐| 亚洲国产精品成人久久小说| 日韩一本色道免费dvd| 麻豆成人午夜福利视频| 91午夜精品亚洲一区二区三区| 熟女人妻精品中文字幕| 日韩三级伦理在线观看| 中文字幕人妻熟人妻熟丝袜美| 婷婷六月久久综合丁香| av黄色大香蕉| 亚洲18禁久久av| 丝袜喷水一区| 亚洲av福利一区| av在线老鸭窝| 99在线人妻在线中文字幕| 国产色婷婷99| 国产精品三级大全| 亚洲国产日韩欧美精品在线观看| 午夜亚洲福利在线播放| 中文资源天堂在线| 国产黄片视频在线免费观看| 看十八女毛片水多多多| 性色avwww在线观看| 精品国产露脸久久av麻豆 | 非洲黑人性xxxx精品又粗又长| 日韩一本色道免费dvd| 热99re8久久精品国产| 精品人妻偷拍中文字幕| 99热这里只有是精品在线观看| 1000部很黄的大片| 久久精品夜色国产| 91aial.com中文字幕在线观看| 啦啦啦啦在线视频资源| 少妇丰满av| 内地一区二区视频在线| 美女黄网站色视频| 可以在线观看毛片的网站| 床上黄色一级片| a级一级毛片免费在线观看| 久久久精品94久久精品| 亚洲,欧美,日韩| 最近中文字幕高清免费大全6| 少妇熟女aⅴ在线视频| 91久久精品国产一区二区成人| 亚洲经典国产精华液单| 插阴视频在线观看视频| 纵有疾风起免费观看全集完整版 | 中文字幕亚洲精品专区| 黄片wwwwww| 亚洲人成网站在线播| 久久久久精品久久久久真实原创| 午夜久久久久精精品| 亚洲精品色激情综合| 中文字幕久久专区| 舔av片在线| 国产午夜精品论理片| 最近中文字幕高清免费大全6| 99久久九九国产精品国产免费| 六月丁香七月| 免费观看在线日韩| 欧美xxxx性猛交bbbb| 蜜臀久久99精品久久宅男| 成年免费大片在线观看| 久久精品夜夜夜夜夜久久蜜豆| 国产久久久一区二区三区| 亚洲国产精品专区欧美| 大又大粗又爽又黄少妇毛片口| 久久久久久久午夜电影| 97超碰精品成人国产| 欧美性感艳星| 国产白丝娇喘喷水9色精品| 久久午夜福利片| 午夜福利在线观看免费完整高清在| 男人和女人高潮做爰伦理| 欧美一区二区精品小视频在线| 午夜激情福利司机影院| av国产免费在线观看| 色尼玛亚洲综合影院| 久久久久久久久久黄片| 99久久精品一区二区三区| 丰满乱子伦码专区| 国产免费男女视频| 成人无遮挡网站| av在线蜜桃| 精品无人区乱码1区二区| 亚洲国产精品sss在线观看| 九九爱精品视频在线观看| 97超视频在线观看视频| 久久久欧美国产精品| 青青草视频在线视频观看| 白带黄色成豆腐渣| 男人和女人高潮做爰伦理| 男人舔奶头视频| 蜜桃亚洲精品一区二区三区| 日日撸夜夜添| 麻豆一二三区av精品| 欧美一区二区亚洲| 国产高清不卡午夜福利| 成人性生交大片免费视频hd| 深夜a级毛片| 直男gayav资源| 黑人高潮一二区| 亚洲人成网站在线观看播放| 搡老妇女老女人老熟妇| 国产熟女欧美一区二区| 非洲黑人性xxxx精品又粗又长| 国产精品综合久久久久久久免费| 99久国产av精品国产电影| 亚洲av日韩在线播放| 国产精品一区www在线观看| 亚洲激情五月婷婷啪啪| 欧美3d第一页| 在线观看一区二区三区| 亚洲不卡免费看| 精品久久久久久电影网 | 亚洲欧洲国产日韩| 久久人妻av系列| 精品午夜福利在线看| 国产色婷婷99| 国产精品爽爽va在线观看网站| 波多野结衣巨乳人妻| 我要看日韩黄色一级片| 搞女人的毛片| 99国产精品一区二区蜜桃av| 美女脱内裤让男人舔精品视频| 午夜老司机福利剧场| 高清午夜精品一区二区三区| 亚洲综合精品二区| 国产免费一级a男人的天堂| 国产美女午夜福利| 91aial.com中文字幕在线观看| 成人亚洲精品av一区二区| 久久婷婷人人爽人人干人人爱| 丝袜喷水一区| 国产一区二区亚洲精品在线观看| 亚洲性久久影院| 六月丁香七月| 寂寞人妻少妇视频99o| 国产美女午夜福利| 亚洲成人精品中文字幕电影| 精品99又大又爽又粗少妇毛片| 婷婷六月久久综合丁香| 国产成人精品一,二区| 97在线视频观看| 伦精品一区二区三区| 卡戴珊不雅视频在线播放| 网址你懂的国产日韩在线| videossex国产| av在线蜜桃| 韩国高清视频一区二区三区| 亚洲精品日韩av片在线观看| 国产乱人偷精品视频| 国产男人的电影天堂91| 国产精品不卡视频一区二区| 精品免费久久久久久久清纯| 一级黄色大片毛片| 亚洲国产精品成人久久小说| 村上凉子中文字幕在线| 国产精品永久免费网站| 久久久久久久久久黄片| 久久久欧美国产精品| 最近中文字幕高清免费大全6| av天堂中文字幕网| 简卡轻食公司| 深夜a级毛片| 中文字幕制服av| av免费在线看不卡| 波多野结衣巨乳人妻| 一级二级三级毛片免费看| 白带黄色成豆腐渣| 国语对白做爰xxxⅹ性视频网站| av在线蜜桃| 51国产日韩欧美| 日本午夜av视频| 国产大屁股一区二区在线视频| 精品久久久久久久久av| 午夜免费男女啪啪视频观看| 欧美zozozo另类| 网址你懂的国产日韩在线| 午夜精品在线福利| 91午夜精品亚洲一区二区三区| 久久99热6这里只有精品| 久久精品夜夜夜夜夜久久蜜豆| 亚洲av成人精品一区久久| 国产亚洲最大av| 欧美不卡视频在线免费观看| 午夜精品在线福利| 日本五十路高清| 高清毛片免费看| 又粗又硬又长又爽又黄的视频| 中国美白少妇内射xxxbb| 69av精品久久久久久| 国产极品精品免费视频能看的| 日本黄色片子视频| 色综合亚洲欧美另类图片| 秋霞伦理黄片| 亚洲av电影在线观看一区二区三区 | 国产精品,欧美在线| 久久精品熟女亚洲av麻豆精品 | 在线免费观看的www视频| 天堂av国产一区二区熟女人妻| 国产精品精品国产色婷婷| 精品国产一区二区三区久久久樱花 | 亚洲综合色惰| 男女国产视频网站| 国产老妇女一区| 亚洲一区高清亚洲精品| 免费av毛片视频| 国产在线男女| 一区二区三区乱码不卡18| 蜜臀久久99精品久久宅男| 国产色爽女视频免费观看| 日本av手机在线免费观看| 纵有疾风起免费观看全集完整版 | 啦啦啦韩国在线观看视频| 亚洲av熟女| 亚洲激情五月婷婷啪啪| 国产大屁股一区二区在线视频| 少妇裸体淫交视频免费看高清| 亚洲第一区二区三区不卡| 中文字幕亚洲精品专区| 亚洲精品国产成人久久av| 在线天堂最新版资源| 欧美3d第一页| 少妇的逼好多水| 国产精品1区2区在线观看.| 99热这里只有是精品在线观看| 亚洲自偷自拍三级| 女人久久www免费人成看片 | 搡女人真爽免费视频火全软件| 免费av观看视频| 亚洲四区av| 久久久久精品久久久久真实原创| 亚洲精华国产精华液的使用体验| 毛片女人毛片| 国产不卡一卡二| 国产精品人妻久久久久久| 大香蕉97超碰在线| 少妇丰满av| 国产亚洲精品av在线| 一个人观看的视频www高清免费观看| 日本黄大片高清| 成人亚洲精品av一区二区| 日韩强制内射视频| 高清午夜精品一区二区三区| 国产精品蜜桃在线观看| 久久久精品94久久精品| 夜夜看夜夜爽夜夜摸| 中文字幕制服av| 嫩草影院精品99| 成人毛片60女人毛片免费| 免费黄网站久久成人精品| 99九九线精品视频在线观看视频| 日本黄大片高清| 直男gayav资源| 日本av手机在线免费观看| 久久久亚洲精品成人影院| 国产高清三级在线| 久久韩国三级中文字幕| av在线观看视频网站免费| 国产探花在线观看一区二区| 97热精品久久久久久|