首页 > 最新文献

2023 IEEE International Conference on Electro Information Technology (eIT)最新文献

英文 中文
Utilizing Computer Vision Algorithms to Detect and Classify Cyberattacks in IoT Environments in Real-Time 利用计算机视觉算法实时检测和分类物联网环境中的网络攻击
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187263
M. Gromov, David Arnold, J. Saniie
Computer vision has proven itself capable of accurately detecting and classifying objects within images. This also works in cases where images are used as a way of representing data, without being actual photographs. In cybersecurity, computer vision is rarely used, however it has been used to detect botnets successfully. We applied computer vision to determine how well it would be able to detect and classify a large number of attacks and determined that it would be able to run at a decent rate on a Jetson Nano. This was accomplished by training a convolutional neural network using data publicly available in the IoT-23 database, which contains packet captures of IoT devices with and without different malware infections. The neural network was evaluated on an RTX 3050 and a Jetson Nano to see if it could be used in IoT.
计算机视觉已经证明自己能够准确地检测和分类图像中的物体。这也适用于将图像用作表示数据的方式,而不是实际照片的情况。在网络安全领域,计算机视觉很少被使用,但它已经成功地用于检测僵尸网络。我们应用计算机视觉来确定它在检测和分类大量攻击方面的能力,并确定它能够在Jetson Nano上以不错的速度运行。这是通过使用IoT-23数据库中公开提供的数据训练卷积神经网络来完成的,该数据库包含有和没有不同恶意软件感染的物联网设备的数据包捕获。神经网络在RTX 3050和Jetson Nano上进行了评估,以确定它是否可以用于物联网。
{"title":"Utilizing Computer Vision Algorithms to Detect and Classify Cyberattacks in IoT Environments in Real-Time","authors":"M. Gromov, David Arnold, J. Saniie","doi":"10.1109/eIT57321.2023.10187263","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187263","url":null,"abstract":"Computer vision has proven itself capable of accurately detecting and classifying objects within images. This also works in cases where images are used as a way of representing data, without being actual photographs. In cybersecurity, computer vision is rarely used, however it has been used to detect botnets successfully. We applied computer vision to determine how well it would be able to detect and classify a large number of attacks and determined that it would be able to run at a decent rate on a Jetson Nano. This was accomplished by training a convolutional neural network using data publicly available in the IoT-23 database, which contains packet captures of IoT devices with and without different malware infections. The neural network was evaluated on an RTX 3050 and a Jetson Nano to see if it could be used in IoT.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protein Corona Formation Prediction on Engineered Nanomaterials 工程纳米材料中蛋白质电晕形成的预测
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187259
Nicholas Ferry, Kishwar Ahmed, S. Tasnim
Recent nanotechnology advances have catalyzed sev-eral different types of engineered nanomaterials (ENMs). The nanomaterial classification interprets to identifying any particle that is smaller than hundred nanometer. Protein corona (PC) is an agglomeration of proteins that form on an ENM in organic fluids. Machine learning techniques can be useful to predict the PC formation and interaction within an ENM. In this paper, we develop a random forest model for PC formation prediction on ENMs. Further, we leverage the deep neural network (DNN) technique to accurately and efficiently predict PC formation. We also present an architecture optimization of the trained DNN model to create practically instantaneous inferences. We preform simulation study to show effectiveness of our proposed model. Experiments show that the DNN model can achieve 83.81% accuracy in PC classification on ENMs, while can significantly improve the classification performance.
最近纳米技术的进步催化了几种不同类型的工程纳米材料(enm)。纳米材料分类解释为识别小于100纳米的任何颗粒。蛋白质电晕(PC)是有机流体中ENM上形成的蛋白质聚集。机器学习技术可用于预测ENM内PC的形成和相互作用。在本文中,我们建立了一个随机森林模型来预测enm上PC的形成。此外,我们利用深度神经网络(DNN)技术准确有效地预测PC的形成。我们还提出了训练好的DNN模型的架构优化,以创建实际的即时推断。通过仿真研究,验证了所提模型的有效性。实验表明,DNN模型在enm上的PC分类准确率达到83.81%,分类性能显著提高。
{"title":"Protein Corona Formation Prediction on Engineered Nanomaterials","authors":"Nicholas Ferry, Kishwar Ahmed, S. Tasnim","doi":"10.1109/eIT57321.2023.10187259","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187259","url":null,"abstract":"Recent nanotechnology advances have catalyzed sev-eral different types of engineered nanomaterials (ENMs). The nanomaterial classification interprets to identifying any particle that is smaller than hundred nanometer. Protein corona (PC) is an agglomeration of proteins that form on an ENM in organic fluids. Machine learning techniques can be useful to predict the PC formation and interaction within an ENM. In this paper, we develop a random forest model for PC formation prediction on ENMs. Further, we leverage the deep neural network (DNN) technique to accurately and efficiently predict PC formation. We also present an architecture optimization of the trained DNN model to create practically instantaneous inferences. We preform simulation study to show effectiveness of our proposed model. Experiments show that the DNN model can achieve 83.81% accuracy in PC classification on ENMs, while can significantly improve the classification performance.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134151338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT: A Threat Against the CIA Triad of Cyber Security ChatGPT:对CIA网络安全三合会的威胁
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187355
M. Chowdhury, Nafiz Rifat, M. Ahsan, Shadman Latif, Rahul Gomes, Md Saifur Rahman
The AI revolution has brought significant changes to society. AI-powered systems can analyze enormous amounts of data to optimize processes, improve accuracy, and cut costs. Nevertheless, addressing potential hazards and ethical issues related to AI enabled technologies, such as bias and job displacement, is essential. This paper presented an example of an AI revolution threatening cyber security, the ChatGPT. ChatGPT, a chatbot, can generate essays or code on demand. However, ChatGPT's security system can be circumvented or deceived to generate malicious content. Moreover, these AI enabled tools to have design issues, e.g., accuracy issues. As a result, ChatGPT can be accused of violating the confidentiality of information (privacy invasion), producing inaccurate information, and potentially facilitating attack tool generation that can compromise the availability principle of the CIA triad. This paper presents ChatGPT as a threat against the CIA triad principle by focusing on violating these principles.
人工智能革命给社会带来了巨大的变化。人工智能驱动的系统可以分析大量数据,以优化流程、提高准确性并降低成本。然而,解决与人工智能技术相关的潜在危险和伦理问题,如偏见和工作取代,是至关重要的。本文介绍了威胁网络安全的人工智能革命的一个例子,即ChatGPT。聊天机器人ChatGPT可以根据需要生成文章或代码。然而,ChatGPT的安全系统可以被绕过或欺骗来生成恶意内容。此外,这些人工智能工具存在设计问题,例如准确性问题。因此,ChatGPT可能被指控违反了信息的机密性(隐私侵犯),产生了不准确的信息,并可能促进了攻击工具的生成,从而损害了CIA黑社会的可用性原则。本文将ChatGPT作为对CIA三位一体原则的威胁,重点关注违反这些原则。
{"title":"ChatGPT: A Threat Against the CIA Triad of Cyber Security","authors":"M. Chowdhury, Nafiz Rifat, M. Ahsan, Shadman Latif, Rahul Gomes, Md Saifur Rahman","doi":"10.1109/eIT57321.2023.10187355","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187355","url":null,"abstract":"The AI revolution has brought significant changes to society. AI-powered systems can analyze enormous amounts of data to optimize processes, improve accuracy, and cut costs. Nevertheless, addressing potential hazards and ethical issues related to AI enabled technologies, such as bias and job displacement, is essential. This paper presented an example of an AI revolution threatening cyber security, the ChatGPT. ChatGPT, a chatbot, can generate essays or code on demand. However, ChatGPT's security system can be circumvented or deceived to generate malicious content. Moreover, these AI enabled tools to have design issues, e.g., accuracy issues. As a result, ChatGPT can be accused of violating the confidentiality of information (privacy invasion), producing inaccurate information, and potentially facilitating attack tool generation that can compromise the availability principle of the CIA triad. This paper presents ChatGPT as a threat against the CIA triad principle by focusing on violating these principles.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drowning Recognition for Ocean Surveillance using Computer Vision and Drone Control 基于计算机视觉和无人机控制的海洋监视溺水识别
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187281
M. Rakotondraibé, Tianyang Fang, J. Saniie
According to WHO's report from 2021, Drowning is the 3rd leading cause of unintentional death worldwide. The use of autonomous drones for drowning recognition can increase the survival rate and help lifeguards and rescuers with their life saving mission. This paper presents a real-time drowning recognition model and algorithm for ocean surveillance that can be implemented on a drone. The presented model has been trained using two different approaches and has 88% accuracy. Compared to the contemporary models of drowning recognition designed for swimming pools, the model presented is better suited for outdoor applications in the ocean.
根据世卫组织2021年的报告,溺水是全球第三大非故意死亡原因。使用自主无人机进行溺水识别可以提高存活率,并帮助救生员和救援人员完成救生任务。本文提出了一种可在无人机上实现的海洋监测实时溺水识别模型和算法。该模型使用两种不同的方法进行训练,准确率达到88%。与目前为游泳池设计的溺水识别模型相比,该模型更适合海洋中的户外应用。
{"title":"Drowning Recognition for Ocean Surveillance using Computer Vision and Drone Control","authors":"M. Rakotondraibé, Tianyang Fang, J. Saniie","doi":"10.1109/eIT57321.2023.10187281","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187281","url":null,"abstract":"According to WHO's report from 2021, Drowning is the 3rd leading cause of unintentional death worldwide. The use of autonomous drones for drowning recognition can increase the survival rate and help lifeguards and rescuers with their life saving mission. This paper presents a real-time drowning recognition model and algorithm for ocean surveillance that can be implemented on a drone. The presented model has been trained using two different approaches and has 88% accuracy. Compared to the contemporary models of drowning recognition designed for swimming pools, the model presented is better suited for outdoor applications in the ocean.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130200867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACapsule Q-Learning Based Reinforcement Model for Intrusion Detection System on Smart Grid 基于accapsule Q-Learning的智能电网入侵检测系统强化模型
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187374
T. T. Khoei, N. Kaabouch
Smart grid is an innovative technology that offers efficiency, low carbon emissions, and high energy storage. However, this promising technology has several shortcomings, including limited security. In this network, Intrusion Detection System (IDS) is one of the likely targeted systems that has limited security and is prone to several cyber vulnerabilities. To address a such challenge, several studies have been proposed to detect, classify, and mitigate these attacks using Artificial Intelligence (AI) techniques, although the proposed techniques in the literature suffer from high misdetection and false alarm rates. Additionally, limited data availability motivated the researchers to use another type of AI method, namely reinforcement learning to detect and classify attacks. In this paper, we propose a deep reinforcement learning-based technique, namely Q learning and capsule network as a deep learning model to detect attacks for IDS on smart grid networks. The benchmark of CICDDOs 2019 is selected to evaluate the model in terms of accuracy, detection, misdetection, false alarm rates, training time, and prediction time. We also investigate the performance of the proposed model based on discount values of 0.001 and 0.9. The experiments demonstrate that the proposed model has acceptable results, and the model with the lower discount values provides better results.
智能电网是一项创新技术,具有高效、低碳排放和高能量存储的特点。然而,这种有前途的技术有几个缺点,包括有限的安全性。在这个网络中,入侵检测系统(IDS)是可能被攻击的目标系统之一,其安全性有限,容易出现一些网络漏洞。为了应对这样的挑战,一些研究已经提出使用人工智能(AI)技术来检测、分类和减轻这些攻击,尽管文献中提出的技术存在较高的误检和误报率。此外,有限的数据可用性促使研究人员使用另一种人工智能方法,即强化学习来检测和分类攻击。在本文中,我们提出了一种基于深度强化学习的技术,即Q学习和胶囊网络作为深度学习模型来检测智能电网上的IDS攻击。选取CICDDOs 2019的基准,从准确率、检测、误检、虚警率、训练时间、预测时间等方面对模型进行评价。我们还研究了基于0.001和0.9的折扣值所提出的模型的性能。实验结果表明,所提模型具有可接受的结果,且折扣值越低的模型效果越好。
{"title":"ACapsule Q-Learning Based Reinforcement Model for Intrusion Detection System on Smart Grid","authors":"T. T. Khoei, N. Kaabouch","doi":"10.1109/eIT57321.2023.10187374","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187374","url":null,"abstract":"Smart grid is an innovative technology that offers efficiency, low carbon emissions, and high energy storage. However, this promising technology has several shortcomings, including limited security. In this network, Intrusion Detection System (IDS) is one of the likely targeted systems that has limited security and is prone to several cyber vulnerabilities. To address a such challenge, several studies have been proposed to detect, classify, and mitigate these attacks using Artificial Intelligence (AI) techniques, although the proposed techniques in the literature suffer from high misdetection and false alarm rates. Additionally, limited data availability motivated the researchers to use another type of AI method, namely reinforcement learning to detect and classify attacks. In this paper, we propose a deep reinforcement learning-based technique, namely Q learning and capsule network as a deep learning model to detect attacks for IDS on smart grid networks. The benchmark of CICDDOs 2019 is selected to evaluate the model in terms of accuracy, detection, misdetection, false alarm rates, training time, and prediction time. We also investigate the performance of the proposed model based on discount values of 0.001 and 0.9. The experiments demonstrate that the proposed model has acceptable results, and the model with the lower discount values provides better results.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link Multiple Courses to Enhance Students' Hands-on Practice on Microprocessor Systems 连结多个课程,加强学生对微处理器系统的实践
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187309
Jack Li
Hands-on practice is an important fact to students' success, especially to the students who study in the field of Electrical Engineering and Electrical Engineering Technology (EET). Electronics systems have become so complex nowadays because of the high-density integrated circuits are widely used that it is hard for students to grasp the information about the systems in one course, especially microcontroller systems. In order to help students do more hands-on practice and understand a microprocessor system deeply, linking several courses together by using the same microcontroller was proposed in this paper. From the students' feedback, the setup really helps students do hands-on work on microprocesses with more confidence. The setup also helps the program reduce lab maintenance cost.
动手实践是学生成功的一个重要因素,特别是对于电气工程和电气工程技术(EET)领域的学生。如今,由于高密度集成电路的广泛应用,电子系统变得非常复杂,学生很难在一门课程中掌握有关系统的信息,尤其是单片机系统。为了帮助学生更多的动手实践和深入了解微处理器系统,本文提出了使用同一个微控制器将几门课程连接在一起的方法。从学生的反馈来看,这种设置确实帮助学生更有信心地动手处理微进程。这种设置还有助于降低实验室维护成本。
{"title":"Link Multiple Courses to Enhance Students' Hands-on Practice on Microprocessor Systems","authors":"Jack Li","doi":"10.1109/eIT57321.2023.10187309","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187309","url":null,"abstract":"Hands-on practice is an important fact to students' success, especially to the students who study in the field of Electrical Engineering and Electrical Engineering Technology (EET). Electronics systems have become so complex nowadays because of the high-density integrated circuits are widely used that it is hard for students to grasp the information about the systems in one course, especially microcontroller systems. In order to help students do more hands-on practice and understand a microprocessor system deeply, linking several courses together by using the same microcontroller was proposed in this paper. From the students' feedback, the setup really helps students do hands-on work on microprocesses with more confidence. The setup also helps the program reduce lab maintenance cost.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smartphone App for Real-time Heart Rate Computation from Streaming ECG/EKG data 从流心电/心电图数据实时计算心率的智能手机应用程序
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187337
Ucchwas Talukder Utsha, B. Morshed
Cardiac disease, also known as cardiovascular disease, refers to a group of conditions that affect the heart and blood vessels. Diagnosis of cardiac disease typically involves a combination of medical history, physical examination, and various tests, such as electrocardiograms (ECG/EKG), echocardiograms, and stress tests. To address this concern, we introduce a mobile application called Smart-Health application, which can continuously monitor electrocardiogram signals and display Average Heart Rate (HR) along with the instantaneous HR. The aim of this project is to discover cardiac diseases so that doctors can monitor the accurate heart rate and take further actions based on the results. Smart-Health application typically works by collecting data from wrists or chest by electrodes. This data is then processed and analyzed to provide the user with insights into their health. We collected data from 10 participants and compared it with KardiaMobile (AliveCor®, Mountain View, CA, USA) commercial application. The error rate of the proposed algorithm depends on several factors, including the accuracy of the sensors used to capture the ECG signal, the algorithms used to process the signal, and the quality of the hardware and software components used to build the application. Experimental results show an accuracy of up to 95-99%. This Smart-Health application has the potential to improve health outcomes and reduce healthcare costs, making it a valuable tool for both individuals and healthcare providers.
心脏病,也被称为心血管疾病,是指一组影响心脏和血管的疾病。心脏病的诊断通常包括病史、体格检查和各种检查,如心电图(ECG/EKG)、超声心动图和压力测试。为了解决这一问题,我们推出了一款名为Smart-Health的移动应用程序,该应用程序可以连续监测心电图信号,并显示平均心率(HR)以及瞬时HR。这个项目的目的是发现心脏疾病,这样医生就可以监测准确的心率,并根据结果采取进一步的行动。智能健康应用通常通过电极从手腕或胸部收集数据。然后对这些数据进行处理和分析,为用户提供有关其健康状况的见解。我们收集了10名参与者的数据,并将其与KardiaMobile (AliveCor®,Mountain View, CA, USA)的商业应用程序进行了比较。该算法的错误率取决于几个因素,包括用于捕获心电信号的传感器的精度、用于处理信号的算法以及用于构建应用程序的硬件和软件组件的质量。实验结果表明,该方法的准确率可达95-99%。这种智能健康应用程序具有改善健康结果和降低医疗成本的潜力,使其成为个人和医疗保健提供者的宝贵工具。
{"title":"A Smartphone App for Real-time Heart Rate Computation from Streaming ECG/EKG data","authors":"Ucchwas Talukder Utsha, B. Morshed","doi":"10.1109/eIT57321.2023.10187337","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187337","url":null,"abstract":"Cardiac disease, also known as cardiovascular disease, refers to a group of conditions that affect the heart and blood vessels. Diagnosis of cardiac disease typically involves a combination of medical history, physical examination, and various tests, such as electrocardiograms (ECG/EKG), echocardiograms, and stress tests. To address this concern, we introduce a mobile application called Smart-Health application, which can continuously monitor electrocardiogram signals and display Average Heart Rate (HR) along with the instantaneous HR. The aim of this project is to discover cardiac diseases so that doctors can monitor the accurate heart rate and take further actions based on the results. Smart-Health application typically works by collecting data from wrists or chest by electrodes. This data is then processed and analyzed to provide the user with insights into their health. We collected data from 10 participants and compared it with KardiaMobile (AliveCor®, Mountain View, CA, USA) commercial application. The error rate of the proposed algorithm depends on several factors, including the accuracy of the sensors used to capture the ECG signal, the algorithms used to process the signal, and the quality of the hardware and software components used to build the application. Experimental results show an accuracy of up to 95-99%. This Smart-Health application has the potential to improve health outcomes and reduce healthcare costs, making it a valuable tool for both individuals and healthcare providers.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Homomorphic Encryption for Privacy in Principal Component Analysis 主成分分析中的同态加密隐私评估
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187220
David Arnold, J. Saniie
Principal Component Analysis (PCA) is a versatile Unsupervised Learning (UL) technique for reducing the dimensionality of datasets. As a result, PCA is widely used in consumer and research applications as a preprocessing tool for identifying important features prior to further analysis. In instances where on-site personnel or developers do not have the expertise to apply UL techniques, third party processors are frequently retained. However, the release of client or proprietary data poses a substantial security risk. This risk increases the regulatory and contractual burden on analysts when interacting with sensitive or classified information. Homomorphic Encryption (HE) cryptosystems are a novel family of encryption algorithms that permit approximate addition and multiplication on encrypted data. When applied to UL models, such as PCA, experts may apply their expertise while maintaining data privacy. In order to evaluate the potential application of Homomorphic Encryption, we implemented Principal Component Analysis using the Microsoft SEAL HE libraries. The resulting implementation was applied to the MNIST Handwritten dataset for feature reduction and image reconstruction. Based on our results, HE considerably increased the time required to process the dataset. However, the HE algorithm is still viable for non-real-time applications as it had an average pixel error of near-zero for all image reconstructions.
主成分分析(PCA)是一种通用的无监督学习(UL)技术,可用于降低数据集的维度。因此,PCA 被广泛应用于消费和研究领域,作为一种预处理工具,用于在进一步分析前识别重要特征。在现场人员或开发人员不具备应用 UL 技术的专业知识的情况下,通常会使用第三方处理器。然而,泄露客户或专有数据会带来巨大的安全风险。这种风险增加了分析师在处理敏感或机密信息时的监管和合同负担。同态加密(HE)密码系统是一种新型加密算法,允许对加密数据进行近似加法和乘法运算。当应用于 UL 模型(如 PCA)时,专家们可以应用他们的专业知识,同时维护数据隐私。为了评估同态加密的潜在应用,我们使用微软 SEAL HE 库实施了主成分分析。由此产生的实现应用于 MNIST 手写数据集,用于特征还原和图像重建。根据我们的结果,HE 大大增加了处理数据集所需的时间。不过,HE 算法在非实时应用中仍然是可行的,因为它在所有图像重建中的平均像素误差几乎为零。
{"title":"Evaluation of Homomorphic Encryption for Privacy in Principal Component Analysis","authors":"David Arnold, J. Saniie","doi":"10.1109/eIT57321.2023.10187220","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187220","url":null,"abstract":"Principal Component Analysis (PCA) is a versatile Unsupervised Learning (UL) technique for reducing the dimensionality of datasets. As a result, PCA is widely used in consumer and research applications as a preprocessing tool for identifying important features prior to further analysis. In instances where on-site personnel or developers do not have the expertise to apply UL techniques, third party processors are frequently retained. However, the release of client or proprietary data poses a substantial security risk. This risk increases the regulatory and contractual burden on analysts when interacting with sensitive or classified information. Homomorphic Encryption (HE) cryptosystems are a novel family of encryption algorithms that permit approximate addition and multiplication on encrypted data. When applied to UL models, such as PCA, experts may apply their expertise while maintaining data privacy. In order to evaluate the potential application of Homomorphic Encryption, we implemented Principal Component Analysis using the Microsoft SEAL HE libraries. The resulting implementation was applied to the MNIST Handwritten dataset for feature reduction and image reconstruction. Based on our results, HE considerably increased the time required to process the dataset. However, the HE algorithm is still viable for non-real-time applications as it had an average pixel error of near-zero for all image reconstructions.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach Towards Fusion of Steganography and Cryptography for Enhanced Data Security using RGB Image 一种基于RGB图像的隐写与加密融合增强数据安全性的新方法
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187231
Zeeshan Abbas, K. Chong
Security has now become an essential part of communication on both sender and receiver's side. It is challenging to deliver comprehensive security against invaders since a lot of algorithms are expounded and can effortlessly get significant data by performing different hacking methods. High security-based algorithms like AES are nowadays used in various systems, as they present a high performance and is quite faster than most of stream-based encryption algorithms. Regardless of how reliable the technique is, the cipher-text always creates a doubt in brain when someone notices it, which makes the data prone to interception. Here arises another method of security to eliminate that suspicion, hence, we incorporate the confidential information into another format, such as an image, sound, video, or text and then transmit through the network. A novel security system based on three steps of hybrid architecture has been proposed in this paper by combining steganography and cryptography with codebooks. Two different keys are used to encrypt and then hide that highly secured encrypted message into the cover image. The message is encrypted first with AES algorithm and then placed at random positions in the cover image using codebook and KSA algorithm. AES encrypted message is mapped onto values of predefined codebooks then hide those encrypted message bits in LSBs of the cover image. The selected parameters are then passed on to the decryption side to recover the original message. Based on the achieved experimental results, it has outperformed the previous methodologies and without having the secret keys it is unfeasible to extract the message in a readable format.
安全现在已经成为发送方和接收方通信的重要组成部分。由于许多算法被阐述,并且通过执行不同的黑客方法可以毫不费力地获得重要数据,因此提供针对入侵者的全面安全性是具有挑战性的。像AES这样的基于高安全性的算法现在被用于各种系统,因为它们表现出高性能,并且比大多数基于流的加密算法快得多。无论技术有多可靠,当有人注意到密文时,总是会在大脑中产生怀疑,这使得数据容易被拦截。这里出现了另一种安全方法来消除这种怀疑,因此,我们将机密信息合并为另一种格式,例如图像,声音,视频或文本,然后通过网络传输。本文将隐写术、密码学与码本相结合,提出了一种基于三步混合体系结构的新型安全系统。使用两个不同的密钥进行加密,然后将高度安全的加密信息隐藏到封面图像中。该信息首先用AES算法加密,然后使用码本和KSA算法在封面图像中随机放置。AES加密信息被映射到预定义的码本上,然后将这些加密信息位隐藏在封面图像的lsdb中。然后将选定的参数传递给解密端,以恢复原始消息。实验结果表明,该方法的性能优于以往的方法,并且在没有密钥的情况下,无法以可读格式提取消息。
{"title":"A Novel Approach Towards Fusion of Steganography and Cryptography for Enhanced Data Security using RGB Image","authors":"Zeeshan Abbas, K. Chong","doi":"10.1109/eIT57321.2023.10187231","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187231","url":null,"abstract":"Security has now become an essential part of communication on both sender and receiver's side. It is challenging to deliver comprehensive security against invaders since a lot of algorithms are expounded and can effortlessly get significant data by performing different hacking methods. High security-based algorithms like AES are nowadays used in various systems, as they present a high performance and is quite faster than most of stream-based encryption algorithms. Regardless of how reliable the technique is, the cipher-text always creates a doubt in brain when someone notices it, which makes the data prone to interception. Here arises another method of security to eliminate that suspicion, hence, we incorporate the confidential information into another format, such as an image, sound, video, or text and then transmit through the network. A novel security system based on three steps of hybrid architecture has been proposed in this paper by combining steganography and cryptography with codebooks. Two different keys are used to encrypt and then hide that highly secured encrypted message into the cover image. The message is encrypted first with AES algorithm and then placed at random positions in the cover image using codebook and KSA algorithm. AES encrypted message is mapped onto values of predefined codebooks then hide those encrypted message bits in LSBs of the cover image. The selected parameters are then passed on to the decryption side to recover the original message. Based on the achieved experimental results, it has outperformed the previous methodologies and without having the secret keys it is unfeasible to extract the message in a readable format.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of a Predictive Method for Obstacle Detection and Safe Operation of Autonomous Vehicles 自动驾驶汽车障碍物检测与安全运行预测方法的验证
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187222
Lila Areephanthu, B. Abegaz
This paper focuses on the verification of an object detection and avoidance method for autonomous vehicles to maneuver their way safely and efficiently. The model predictive control approach is explored and compared with other control approaches based on variables such as safe detection distance and safe operating time. The results indicate that the proposed approach could be promising for autonomous vehicles that often comprise various types of sensors and components and could otherwise be difficult to test and verify with traditional methods.
本文重点研究了一种自动驾驶汽车安全高效机动的目标检测和回避方法的验证。对模型预测控制方法进行了探索,并与其他基于安全检测距离和安全运行时间等变量的控制方法进行了比较。研究结果表明,对于通常由各种类型的传感器和部件组成的自动驾驶汽车来说,这种方法很有希望,否则很难用传统方法进行测试和验证。
{"title":"Verification of a Predictive Method for Obstacle Detection and Safe Operation of Autonomous Vehicles","authors":"Lila Areephanthu, B. Abegaz","doi":"10.1109/eIT57321.2023.10187222","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187222","url":null,"abstract":"This paper focuses on the verification of an object detection and avoidance method for autonomous vehicles to maneuver their way safely and efficiently. The model predictive control approach is explored and compared with other control approaches based on variables such as safe detection distance and safe operating time. The results indicate that the proposed approach could be promising for autonomous vehicles that often comprise various types of sensors and components and could otherwise be difficult to test and verify with traditional methods.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE International Conference on Electro Information Technology (eIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1