首页 > 最新文献

2019 International Conference on Computational Science and Computational Intelligence (CSCI)最新文献

英文 中文
Increasing Student Interests in Power Engineering by 3dsMax and Unity3D 通过3dsMax和Unity3D增加学生对电力工程的兴趣
Sixuan Duan, Yao Xu, Ying Luo, Zhipeng Huang
This research paper introduces a new learning tool to increase student interests in power engineering. Insufficient visualization of the real power system operation and boring theory knowledge cause a general lack of interest in power systems. This paper realized the design of 3D virtual power system using 3ds Max and Unity3D software. Microgrid system, one significant example of a power system, is selected to demonstrate the 3D visualization. The built 3D visualization of microgrid can vividly show the details and function of each component in the Microgrid. Therefore, it can greatly increase students' enthusiasm for learning the power engineering. Moreover, the first time application of Unity3D in the microgrid system laid the foundation for the feasibility of virtual technology in the application of engineering education to further attract more students in all engineering areas.
本文介绍了一种新的学习工具,以提高学生对电力工程的兴趣。电力系统实际运行的可视化程度不够,理论知识枯燥,导致人们普遍对电力系统缺乏兴趣。本文利用3ds Max和Unity3D软件实现了三维虚拟电力系统的设计。以微电网系统为例,进行了三维可视化研究。所构建的微电网三维可视化可以生动地展示微电网中各部件的细节和功能。因此,可以大大提高学生学习电力工程的积极性。此外,Unity3D在微电网系统中的首次应用,为虚拟技术在工程教育中应用的可行性奠定了基础,进一步吸引更多工程领域的学生。
{"title":"Increasing Student Interests in Power Engineering by 3dsMax and Unity3D","authors":"Sixuan Duan, Yao Xu, Ying Luo, Zhipeng Huang","doi":"10.1109/CSCI49370.2019.00154","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00154","url":null,"abstract":"This research paper introduces a new learning tool to increase student interests in power engineering. Insufficient visualization of the real power system operation and boring theory knowledge cause a general lack of interest in power systems. This paper realized the design of 3D virtual power system using 3ds Max and Unity3D software. Microgrid system, one significant example of a power system, is selected to demonstrate the 3D visualization. The built 3D visualization of microgrid can vividly show the details and function of each component in the Microgrid. Therefore, it can greatly increase students' enthusiasm for learning the power engineering. Moreover, the first time application of Unity3D in the microgrid system laid the foundation for the feasibility of virtual technology in the application of engineering education to further attract more students in all engineering areas.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Web Security Issues 网络安全问题调查
T. Dhital, Bilal Gonen
There are different types media of communication, Internet is the most used and many believe that it is the most reliable form of communication. The Internet has been polluted with different forms of viruses and malware since it first started. As the Internet does not have a centralized control, it is vulnerable to different types of attacks. Businesses around the globe use Internet to perform their daily tasks and with the use of botnets, botmasters have been able to gain lots of personal information from these businesses, turning their computers into a useful bot. In this article, we will take a look at different types of attacks on businesses over the Internet and different types of botnets and how they are affecting personal data. We will also discuss different types of destructive practices on the Internet performed by individuals using malicious codes and application. It has not been a long time since people started learning about botnets attacks, but their evolution and usage rate has increased very rapidly in this short time. The goal of this study is to make people aware of various kinds of attacks and how one can keep their private information safe on the Internet.
有不同类型的传播媒介,互联网是最常用的,许多人认为它是最可靠的传播形式。互联网从一开始就被各种形式的病毒和恶意软件所污染。由于互联网没有集中的控制,它很容易受到不同类型的攻击。全球各地的企业都使用互联网来完成日常任务,通过使用僵尸网络,僵尸管理员已经能够从这些企业获得大量的个人信息,将他们的计算机变成一个有用的机器人。在本文中,我们将介绍通过互联网和不同类型的僵尸网络对企业的不同类型的攻击,以及它们如何影响个人数据。我们还将讨论个人使用恶意代码和应用程序在互联网上进行的不同类型的破坏性行为。人们开始了解僵尸网络攻击并不是很长时间,但在这短时间内,它们的进化和使用率都在迅速增长。这项研究的目的是让人们意识到各种各样的攻击,以及如何在互联网上保护他们的私人信息安全。
{"title":"A Survey on Web Security Issues","authors":"T. Dhital, Bilal Gonen","doi":"10.1109/CSCI49370.2019.00047","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00047","url":null,"abstract":"There are different types media of communication, Internet is the most used and many believe that it is the most reliable form of communication. The Internet has been polluted with different forms of viruses and malware since it first started. As the Internet does not have a centralized control, it is vulnerable to different types of attacks. Businesses around the globe use Internet to perform their daily tasks and with the use of botnets, botmasters have been able to gain lots of personal information from these businesses, turning their computers into a useful bot. In this article, we will take a look at different types of attacks on businesses over the Internet and different types of botnets and how they are affecting personal data. We will also discuss different types of destructive practices on the Internet performed by individuals using malicious codes and application. It has not been a long time since people started learning about botnets attacks, but their evolution and usage rate has increased very rapidly in this short time. The goal of this study is to make people aware of various kinds of attacks and how one can keep their private information safe on the Internet.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting the Confidential Words in Japanese Judicial Precedents Using the Neural Network Combined POS Tag 利用神经网络结合词性标注预测日本司法判例中的机密词
Masakazu Kanazawa, Atsushi Ito, Kazuyuki Yamasawa, Takehiko Kasahara, Yuya Kiryu
In Japanese judicial field, most precedents are not publicly opened on Japanese court web pages to protect personal information. Confidential words such as personal names are replaced by other meaningless words. This operation takes time and effort because it is done manually. Therefore, we would like to predict the confidential words automatically. We propose the method of predicting the confidential words in Japanese judicial precedents using the neural network combined POS (Part of speech) tag. As the result we obtained 88% accuracy improvement for detecting the confidential words compared to the previously model. Then, we confirmed whether our model could be practical use or not.
在日本司法领域,为了保护个人信息,日本法院的网页上大多不公开公开判例。个人姓名等机密词语被其他无意义的词语所取代。由于该操作是手动完成的,因此需要花费时间和精力。因此,我们希望自动预测机密词。本文提出了一种结合词性标签的神经网络预测日语司法判例中机密词的方法。结果表明,与之前的模型相比,我们在检测机密词方面的准确率提高了88%。然后,我们验证了我们的模型是否可以实际使用。
{"title":"Predicting the Confidential Words in Japanese Judicial Precedents Using the Neural Network Combined POS Tag","authors":"Masakazu Kanazawa, Atsushi Ito, Kazuyuki Yamasawa, Takehiko Kasahara, Yuya Kiryu","doi":"10.1109/CSCI49370.2019.00066","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00066","url":null,"abstract":"In Japanese judicial field, most precedents are not publicly opened on Japanese court web pages to protect personal information. Confidential words such as personal names are replaced by other meaningless words. This operation takes time and effort because it is done manually. Therefore, we would like to predict the confidential words automatically. We propose the method of predicting the confidential words in Japanese judicial precedents using the neural network combined POS (Part of speech) tag. As the result we obtained 88% accuracy improvement for detecting the confidential words compared to the previously model. Then, we confirmed whether our model could be practical use or not.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Applications of Late Fusion Methods for EEG Signal Processing 脑电信号后期融合处理的新应用
Huan Yang, Kaijian Xia, Bi Anqi, Pengjiang Qian
Decision fusion consists in the combination of the outputs of multiple classifiers into a common decision that is more precise or stable. In most cases, however, only classical fusion techniques are considered. This work compares the performance of several state-of-the-art fusion methods on new applications of automatic stage classification of several neuropsychological tests. The tests were staged into three classes: stimulus display, retention interval, and subject response. The considered late fusion methods were: alpha integration; copulas; Dempster-Shafer combination; independent component analysis mixture models; and behavior knowledge space. Late fusion was able to improve the performance for the task, with alpha integration yielding the most stable result.
决策融合包括将多个分类器的输出组合成一个更精确或更稳定的公共决策。然而,在大多数情况下,只考虑经典的融合技术。这项工作比较了几种最先进的融合方法在几种神经心理测试自动阶段分类的新应用中的表现。测试分为三类:刺激表现、保留时间和受试者反应。考虑的后期融合方法有:α积分法;连系动词;Dempster-Shafer组合;独立成分分析混合模型;以及行为知识空间。后期融合能够提高任务的性能,alpha积分产生最稳定的结果。
{"title":"New Applications of Late Fusion Methods for EEG Signal Processing","authors":"Huan Yang, Kaijian Xia, Bi Anqi, Pengjiang Qian","doi":"10.1109/CSCI49370.2019.00116","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00116","url":null,"abstract":"Decision fusion consists in the combination of the outputs of multiple classifiers into a common decision that is more precise or stable. In most cases, however, only classical fusion techniques are considered. This work compares the performance of several state-of-the-art fusion methods on new applications of automatic stage classification of several neuropsychological tests. The tests were staged into three classes: stimulus display, retention interval, and subject response. The considered late fusion methods were: alpha integration; copulas; Dempster-Shafer combination; independent component analysis mixture models; and behavior knowledge space. Late fusion was able to improve the performance for the task, with alpha integration yielding the most stable result.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Forensics Pitfalls for Privacy and a Model for Providing Safeguards 物联网取证的隐私陷阱和提供保障的模型
Nawaf Almolhis, Micheal Haney
Internet of Things (IoT) is a new domain which is designed to make human lives more comfortable and convenient. Conversely, it has also raised issues of security and privacy as a data-driven could-based ecosystem. IoT technology raises challenges for digital forensics investigators when working on cybercrime or digital intrusions. Among these challenges, protacting consumer privacy when conducting investigations is important and difficult. Currently, literature has shown that there is not a single agreed upon IoT-forensic standard model that can protect privacy of 3rd party consumers. This research will address this limitation by developing a privacy-aware IoT forensics model. In this paper, by mapping the ISO/IEC 27037 standard to the three layered reference architecture of IoT, the authors discuss the breach of privacy that may happen when investigating an IoT environment.
物联网(IoT)是一个旨在使人类生活更加舒适和方便的新领域。相反,作为一个数据驱动的基于数据的生态系统,它也引发了安全和隐私问题。在处理网络犯罪或数字入侵时,物联网技术给数字取证调查人员带来了挑战。在这些挑战中,在进行调查时保护消费者隐私既重要又困难。目前,文献表明,没有一个统一的物联网取证标准模型可以保护第三方消费者的隐私。本研究将通过开发具有隐私意识的物联网取证模型来解决这一限制。在本文中,通过将ISO/IEC 27037标准映射到物联网的三层参考架构,作者讨论了在调查物联网环境时可能发生的隐私泄露。
{"title":"IoT Forensics Pitfalls for Privacy and a Model for Providing Safeguards","authors":"Nawaf Almolhis, Micheal Haney","doi":"10.1109/CSCI49370.2019.00036","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00036","url":null,"abstract":"Internet of Things (IoT) is a new domain which is designed to make human lives more comfortable and convenient. Conversely, it has also raised issues of security and privacy as a data-driven could-based ecosystem. IoT technology raises challenges for digital forensics investigators when working on cybercrime or digital intrusions. Among these challenges, protacting consumer privacy when conducting investigations is important and difficult. Currently, literature has shown that there is not a single agreed upon IoT-forensic standard model that can protect privacy of 3rd party consumers. This research will address this limitation by developing a privacy-aware IoT forensics model. In this paper, by mapping the ISO/IEC 27037 standard to the three layered reference architecture of IoT, the authors discuss the breach of privacy that may happen when investigating an IoT environment.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129599803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scalable Algorithms for Multivariate Integration with ParAdapt and CUDA 基于ParAdapt和CUDA的多变量集成的可扩展算法
O. Olagbemi, E. de Doncker
ParAdapt is a numerical integration software based on a classic global adaptive algorithm, which employs GPUs in providing integral evaluations. Based on adaptive region partitioning strategies developed for efficient integration and mapping to GPUs, ParAdapt renders the framework of the global adaptive scheme suitable for general functions in moderate dimensions, say 10 to 25. Speedup values achieved are in the double and triple digits up to very large numbers of subdivisions. While sequential adaptive strategies are generally considered effective for integral dimensions through about 10 or 12, it is our goal to move this threshold up considerably.
ParAdapt是一款基于经典全局自适应算法的数值积分软件,采用gpu提供积分计算。ParAdapt基于为高效集成和映射到gpu而开发的自适应区域划分策略,使全局自适应方案的框架适用于中等维度(例如10到25)的一般功能。在非常大的细分范围内,实现的加速值为两位数和三位数。虽然顺序自适应策略通常被认为对10或12个整体维度有效,但我们的目标是将这个阈值大幅提高。
{"title":"Scalable Algorithms for Multivariate Integration with ParAdapt and CUDA","authors":"O. Olagbemi, E. de Doncker","doi":"10.1109/CSCI49370.2019.00093","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00093","url":null,"abstract":"ParAdapt is a numerical integration software based on a classic global adaptive algorithm, which employs GPUs in providing integral evaluations. Based on adaptive region partitioning strategies developed for efficient integration and mapping to GPUs, ParAdapt renders the framework of the global adaptive scheme suitable for general functions in moderate dimensions, say 10 to 25. Speedup values achieved are in the double and triple digits up to very large numbers of subdivisions. While sequential adaptive strategies are generally considered effective for integral dimensions through about 10 or 12, it is our goal to move this threshold up considerably.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129733367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement of New Support System for Elderly People's Daily Life 老年人日常生活新支持体系的完善
S. Shimizu, Kouta Mizuide, Yuki Nakata, Masaya Hori, Kohshi Matsubara, Hiroaki Inoue
This report proposes a new support system that allows elderly people able to live with a sense of security without the help of other people. In this system, by using sensors, it is possible to watch closely the condition of elderly people from a distant public institution. Furthermore, the significant information to maintain their physical condition is presented by this system. Then, according to an experiment using this system, the possibility is made clear that this system would be useful for the support of elderly people.
这份报告提出了一个新的支持系统,使老年人能够在没有别人帮助的情况下有安全感地生活。在这个系统中,通过使用传感器,可以从遥远的公共机构密切观察老年人的状况。此外,该系统还提供了维护其身体状况的重要信息。然后,根据使用该系统的实验,明确了该系统对老年人的支持是有用的可能性。
{"title":"Improvement of New Support System for Elderly People's Daily Life","authors":"S. Shimizu, Kouta Mizuide, Yuki Nakata, Masaya Hori, Kohshi Matsubara, Hiroaki Inoue","doi":"10.1109/CSCI49370.2019.00197","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00197","url":null,"abstract":"This report proposes a new support system that allows elderly people able to live with a sense of security without the help of other people. In this system, by using sensors, it is possible to watch closely the condition of elderly people from a distant public institution. Furthermore, the significant information to maintain their physical condition is presented by this system. Then, according to an experiment using this system, the possibility is made clear that this system would be useful for the support of elderly people.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127403993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Engineers at Play 软件工程师的工作
Soma Datta, M. Mirza
Active learning helps students to retain the course material and apply it to the real world when needed. Involving games in teaching has gained much attention over the past few years. Educational games have always helped students by promoting participation and active learning. It has helped them by motivating and bringing out the best ideas in them in order to understand a skill or a concept. It is an emerging pedagogy. This study discusses how games can help classroom teaching. Also, how the concepts that are taught through games can be used to solve real world problems. Agile software development has been taught to graduate students in the Software Engineering program using games. The games used in this study are the ones which are also used in the software industry to teach employees about Agile framework. The results of the study and student feedbacks are presented in this paper.
主动学习帮助学生记住课程材料,并在需要时将其应用于现实世界。在过去的几年里,将游戏融入教学中受到了广泛的关注。教育类游戏总是通过促进学生的参与和主动学习来帮助他们。它通过激发和激发他们最好的想法来帮助他们理解一项技能或一个概念。这是一种新兴的教学法。本研究探讨游戏如何帮助课堂教学。此外,如何利用游戏传授的概念来解决现实世界的问题。敏捷软件开发已经通过游戏教授给软件工程专业的研究生。本研究中使用的游戏也是软件行业中用来教授员工敏捷框架的游戏。本文介绍了研究的结果和学生的反馈。
{"title":"Software Engineers at Play","authors":"Soma Datta, M. Mirza","doi":"10.1109/CSCI49370.2019.00155","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00155","url":null,"abstract":"Active learning helps students to retain the course material and apply it to the real world when needed. Involving games in teaching has gained much attention over the past few years. Educational games have always helped students by promoting participation and active learning. It has helped them by motivating and bringing out the best ideas in them in order to understand a skill or a concept. It is an emerging pedagogy. This study discusses how games can help classroom teaching. Also, how the concepts that are taught through games can be used to solve real world problems. Agile software development has been taught to graduate students in the Software Engineering program using games. The games used in this study are the ones which are also used in the software industry to teach employees about Agile framework. The results of the study and student feedbacks are presented in this paper.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127514278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PassGAN-Based Honeywords System 基于passan的honeyword系统
M. Fauzi, Bian Yang, Edlira Martiri
In this work, we simulate a game between the attacker and the defender to evaluate their possible strategies in a honeyword system. For the attacker's guessing strategy, the Top-PW attack is used and a novel PassGAN-based attack is proposed. Meanwhile, for the defender's honeywords generation strategy, a PassGAN-based method is implemented and a novel two-stages PassGAN-based generation strategy is proposed. The experiment results show that the Top-PW attack is generally more successful than the PassGAN-based attack for the attacker while the proposed two-stages PassGAN-based approach is proven to be the most suitable honeyword generation strategy for the defender. The proposed two-stages PassGAN-based method for the defender's generation strategy can decrease the attacker's success rate to 9% and surpass some previous honeywords generation methods.
在这项工作中,我们模拟了攻击者和防御者之间的博弈,以评估他们在蜜词系统中的可能策略。针对攻击者的猜测策略,采用了Top-PW攻击,提出了一种新的基于passgan的攻击方法。同时,针对防御者的蜜词生成策略,实现了一种基于passgan的方法,提出了一种新的两阶段passgan生成策略。实验结果表明,对于攻击者来说,Top-PW攻击通常比基于passgan的攻击更成功,而所提出的基于两阶段passgan的方法被证明是最适合防御者的蜜词生成策略。提出的基于两阶段passgan的防御者生成策略可以将攻击者的成功率降低到9%,并且超过了之前的一些honeyword生成方法。
{"title":"PassGAN-Based Honeywords System","authors":"M. Fauzi, Bian Yang, Edlira Martiri","doi":"10.1109/CSCI49370.2019.00037","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00037","url":null,"abstract":"In this work, we simulate a game between the attacker and the defender to evaluate their possible strategies in a honeyword system. For the attacker's guessing strategy, the Top-PW attack is used and a novel PassGAN-based attack is proposed. Meanwhile, for the defender's honeywords generation strategy, a PassGAN-based method is implemented and a novel two-stages PassGAN-based generation strategy is proposed. The experiment results show that the Top-PW attack is generally more successful than the PassGAN-based attack for the attacker while the proposed two-stages PassGAN-based approach is proven to be the most suitable honeyword generation strategy for the defender. The proposed two-stages PassGAN-based method for the defender's generation strategy can decrease the attacker's success rate to 9% and surpass some previous honeywords generation methods.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129014866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Heterogeneous Computing for Markov Models in Big Data 大数据中马尔可夫模型的异构计算
M. Malita, G. Popescu, G. Stefan
Many Big Data problems, Markov Model related included, are solved using heterogenous systems: host + parallel programmable accelerator. The current solutions for the accelerator part - for example, GPU used as GPGPU - provide limited accelerations due to some architectural constraints. The paper introduces the use of a programmable parallel accelerator able to perform efficient vector and matrix operations avoiding the limitations of the current systems designed using "of-theshelf" solutions. Our main result is an architecture whose actual performance is a much higher percentage from its peak performance than those of the consecrated accelerators. The performance improvements we offer come from the following two features: the addition of a reduction network at the output of a linear array of cells and an appropriate use of a serial register distributed along the same linear array of cells. Thus, for a n-state Markov Model, instead of a solution with the size in O(n2) and an acceleration in O(n2=logn), we offer an accelerator with the size in O(n) and the acceleration in O(n).
许多大数据问题,包括与马尔可夫模型相关的问题,都是使用异构系统来解决的:主机+并行可编程加速器。目前对于加速部分的解决方案——例如,GPU作为GPGPU使用——由于一些架构上的限制,提供有限的加速。本文介绍了一种可编程并行加速器的使用,该加速器能够执行有效的矢量和矩阵运算,避免了当前使用“现成”解决方案设计的系统的局限性。我们的主要结果是一个架构,其实际性能比其峰值性能高得多,而不是那些专用加速器。我们提供的性能改进来自以下两个特征:在线性单元阵列的输出处增加了一个缩减网络,并适当使用了沿相同线性单元阵列分布的串行寄存器。因此,对于n态马尔可夫模型,我们提供了一个大小为O(n2)和加速度为O(n2=logn)的加速器,而不是大小为O(n)和加速度为O(n)的加速器。
{"title":"Heterogeneous Computing for Markov Models in Big Data","authors":"M. Malita, G. Popescu, G. Stefan","doi":"10.1109/CSCI49370.2019.00279","DOIUrl":"https://doi.org/10.1109/CSCI49370.2019.00279","url":null,"abstract":"Many Big Data problems, Markov Model related included, are solved using heterogenous systems: host + parallel programmable accelerator. The current solutions for the accelerator part - for example, GPU used as GPGPU - provide limited accelerations due to some architectural constraints. The paper introduces the use of a programmable parallel accelerator able to perform efficient vector and matrix operations avoiding the limitations of the current systems designed using \"of-theshelf\" solutions. Our main result is an architecture whose actual performance is a much higher percentage from its peak performance than those of the consecrated accelerators. The performance improvements we offer come from the following two features: the addition of a reduction network at the output of a linear array of cells and an appropriate use of a serial register distributed along the same linear array of cells. Thus, for a n-state Markov Model, instead of a solution with the size in O(n2) and an acceleration in O(n2=logn), we offer an accelerator with the size in O(n) and the acceleration in O(n).","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Computational Science and Computational Intelligence (CSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1