首页 > 最新文献

2023 IEEE International Conference on Electro Information Technology (eIT)最新文献

英文 中文
Calculating an Approximate Voronoi Diagram using QuadTrees and Triangles 使用四叉树和三角形计算近似Voronoi图
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187239
T. E. Dettling, Byron DeVries, C. Trefftz
Calculating Voronoi diagrams quickly is useful across a range of fields and application areas. However, existing divide-and-conquer methods decompose into squares while boundaries between Voronoi diagram regions are often not perfectly horizontal or vertical. In this paper we introduce a novel method of dividing Approximate Voronoi Diagram spaces into triangles stored by quadtree data structures. While our implementation stores the resulting Voronoi diagram in a data structure, rather than setting each approximated point to its closest region, we provide a comparison of the decomposition time alone.
快速计算Voronoi图在一系列领域和应用领域都很有用。然而,现有的分治方法分解成正方形,而Voronoi图区域之间的边界往往不是完全水平或垂直的。本文介绍了一种用四叉树数据结构将近似Voronoi图空间划分为三角形的新方法。虽然我们的实现将生成的Voronoi图存储在一个数据结构中,而不是将每个近似点设置为最近的区域,但我们仅提供了分解时间的比较。
{"title":"Calculating an Approximate Voronoi Diagram using QuadTrees and Triangles","authors":"T. E. Dettling, Byron DeVries, C. Trefftz","doi":"10.1109/eIT57321.2023.10187239","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187239","url":null,"abstract":"Calculating Voronoi diagrams quickly is useful across a range of fields and application areas. However, existing divide-and-conquer methods decompose into squares while boundaries between Voronoi diagram regions are often not perfectly horizontal or vertical. In this paper we introduce a novel method of dividing Approximate Voronoi Diagram spaces into triangles stored by quadtree data structures. While our implementation stores the resulting Voronoi diagram in a data structure, rather than setting each approximated point to its closest region, we provide a comparison of the decomposition time alone.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130647381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protein Corona Formation Prediction on Engineered Nanomaterials 工程纳米材料中蛋白质电晕形成的预测
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187259
Nicholas Ferry, Kishwar Ahmed, S. Tasnim
Recent nanotechnology advances have catalyzed sev-eral different types of engineered nanomaterials (ENMs). The nanomaterial classification interprets to identifying any particle that is smaller than hundred nanometer. Protein corona (PC) is an agglomeration of proteins that form on an ENM in organic fluids. Machine learning techniques can be useful to predict the PC formation and interaction within an ENM. In this paper, we develop a random forest model for PC formation prediction on ENMs. Further, we leverage the deep neural network (DNN) technique to accurately and efficiently predict PC formation. We also present an architecture optimization of the trained DNN model to create practically instantaneous inferences. We preform simulation study to show effectiveness of our proposed model. Experiments show that the DNN model can achieve 83.81% accuracy in PC classification on ENMs, while can significantly improve the classification performance.
最近纳米技术的进步催化了几种不同类型的工程纳米材料(enm)。纳米材料分类解释为识别小于100纳米的任何颗粒。蛋白质电晕(PC)是有机流体中ENM上形成的蛋白质聚集。机器学习技术可用于预测ENM内PC的形成和相互作用。在本文中,我们建立了一个随机森林模型来预测enm上PC的形成。此外,我们利用深度神经网络(DNN)技术准确有效地预测PC的形成。我们还提出了训练好的DNN模型的架构优化,以创建实际的即时推断。通过仿真研究,验证了所提模型的有效性。实验表明,DNN模型在enm上的PC分类准确率达到83.81%,分类性能显著提高。
{"title":"Protein Corona Formation Prediction on Engineered Nanomaterials","authors":"Nicholas Ferry, Kishwar Ahmed, S. Tasnim","doi":"10.1109/eIT57321.2023.10187259","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187259","url":null,"abstract":"Recent nanotechnology advances have catalyzed sev-eral different types of engineered nanomaterials (ENMs). The nanomaterial classification interprets to identifying any particle that is smaller than hundred nanometer. Protein corona (PC) is an agglomeration of proteins that form on an ENM in organic fluids. Machine learning techniques can be useful to predict the PC formation and interaction within an ENM. In this paper, we develop a random forest model for PC formation prediction on ENMs. Further, we leverage the deep neural network (DNN) technique to accurately and efficiently predict PC formation. We also present an architecture optimization of the trained DNN model to create practically instantaneous inferences. We preform simulation study to show effectiveness of our proposed model. Experiments show that the DNN model can achieve 83.81% accuracy in PC classification on ENMs, while can significantly improve the classification performance.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134151338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT: A Threat Against the CIA Triad of Cyber Security ChatGPT:对CIA网络安全三合会的威胁
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187355
M. Chowdhury, Nafiz Rifat, M. Ahsan, Shadman Latif, Rahul Gomes, Md Saifur Rahman
The AI revolution has brought significant changes to society. AI-powered systems can analyze enormous amounts of data to optimize processes, improve accuracy, and cut costs. Nevertheless, addressing potential hazards and ethical issues related to AI enabled technologies, such as bias and job displacement, is essential. This paper presented an example of an AI revolution threatening cyber security, the ChatGPT. ChatGPT, a chatbot, can generate essays or code on demand. However, ChatGPT's security system can be circumvented or deceived to generate malicious content. Moreover, these AI enabled tools to have design issues, e.g., accuracy issues. As a result, ChatGPT can be accused of violating the confidentiality of information (privacy invasion), producing inaccurate information, and potentially facilitating attack tool generation that can compromise the availability principle of the CIA triad. This paper presents ChatGPT as a threat against the CIA triad principle by focusing on violating these principles.
人工智能革命给社会带来了巨大的变化。人工智能驱动的系统可以分析大量数据,以优化流程、提高准确性并降低成本。然而,解决与人工智能技术相关的潜在危险和伦理问题,如偏见和工作取代,是至关重要的。本文介绍了威胁网络安全的人工智能革命的一个例子,即ChatGPT。聊天机器人ChatGPT可以根据需要生成文章或代码。然而,ChatGPT的安全系统可以被绕过或欺骗来生成恶意内容。此外,这些人工智能工具存在设计问题,例如准确性问题。因此,ChatGPT可能被指控违反了信息的机密性(隐私侵犯),产生了不准确的信息,并可能促进了攻击工具的生成,从而损害了CIA黑社会的可用性原则。本文将ChatGPT作为对CIA三位一体原则的威胁,重点关注违反这些原则。
{"title":"ChatGPT: A Threat Against the CIA Triad of Cyber Security","authors":"M. Chowdhury, Nafiz Rifat, M. Ahsan, Shadman Latif, Rahul Gomes, Md Saifur Rahman","doi":"10.1109/eIT57321.2023.10187355","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187355","url":null,"abstract":"The AI revolution has brought significant changes to society. AI-powered systems can analyze enormous amounts of data to optimize processes, improve accuracy, and cut costs. Nevertheless, addressing potential hazards and ethical issues related to AI enabled technologies, such as bias and job displacement, is essential. This paper presented an example of an AI revolution threatening cyber security, the ChatGPT. ChatGPT, a chatbot, can generate essays or code on demand. However, ChatGPT's security system can be circumvented or deceived to generate malicious content. Moreover, these AI enabled tools to have design issues, e.g., accuracy issues. As a result, ChatGPT can be accused of violating the confidentiality of information (privacy invasion), producing inaccurate information, and potentially facilitating attack tool generation that can compromise the availability principle of the CIA triad. This paper presents ChatGPT as a threat against the CIA triad principle by focusing on violating these principles.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Octree 3D Visualization Mapping based on Camera Information 基于摄像机信息的八叉树三维可视化映射
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187225
Ben-Li Wang, N. Houshangi
In this paper, an ORB-SLAM algorithm using RGB-D camera collects data for visualization. The collected point cloud data is first processed using a pass-through filter. Statistical filters are used to remove sparse outliers. Thereafter, downsampling is performed using a voxel filter. Increase the sampling amount appropriately according to the actual situation. After mentioned data processing, Octomap is used to visualize the information in Rviz with services provided in Robot Operating System (ROS) platform to build a three-dimensional map. This visualization approach can be applied to preliminary map construction for robot autonomous navigation and 3D modeling of 3D scanner.
本文提出了一种利用RGB-D相机采集数据进行可视化的ORB-SLAM算法。首先使用直通过滤器处理收集到的点云数据。统计过滤器用于去除稀疏的异常值。此后,使用体素过滤器执行下采样。根据实际情况适当增加采样量。经过上述数据处理后,利用Octomap在Rviz中利用机器人操作系统(Robot Operating System, ROS)平台提供的服务将信息可视化,构建三维地图。该可视化方法可用于机器人自主导航的初步地图构建和三维扫描仪的三维建模。
{"title":"Octree 3D Visualization Mapping based on Camera Information","authors":"Ben-Li Wang, N. Houshangi","doi":"10.1109/eIT57321.2023.10187225","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187225","url":null,"abstract":"In this paper, an ORB-SLAM algorithm using RGB-D camera collects data for visualization. The collected point cloud data is first processed using a pass-through filter. Statistical filters are used to remove sparse outliers. Thereafter, downsampling is performed using a voxel filter. Increase the sampling amount appropriately according to the actual situation. After mentioned data processing, Octomap is used to visualize the information in Rviz with services provided in Robot Operating System (ROS) platform to build a three-dimensional map. This visualization approach can be applied to preliminary map construction for robot autonomous navigation and 3D modeling of 3D scanner.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127873856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link Multiple Courses to Enhance Students' Hands-on Practice on Microprocessor Systems 连结多个课程,加强学生对微处理器系统的实践
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187309
Jack Li
Hands-on practice is an important fact to students' success, especially to the students who study in the field of Electrical Engineering and Electrical Engineering Technology (EET). Electronics systems have become so complex nowadays because of the high-density integrated circuits are widely used that it is hard for students to grasp the information about the systems in one course, especially microcontroller systems. In order to help students do more hands-on practice and understand a microprocessor system deeply, linking several courses together by using the same microcontroller was proposed in this paper. From the students' feedback, the setup really helps students do hands-on work on microprocesses with more confidence. The setup also helps the program reduce lab maintenance cost.
动手实践是学生成功的一个重要因素,特别是对于电气工程和电气工程技术(EET)领域的学生。如今,由于高密度集成电路的广泛应用,电子系统变得非常复杂,学生很难在一门课程中掌握有关系统的信息,尤其是单片机系统。为了帮助学生更多的动手实践和深入了解微处理器系统,本文提出了使用同一个微控制器将几门课程连接在一起的方法。从学生的反馈来看,这种设置确实帮助学生更有信心地动手处理微进程。这种设置还有助于降低实验室维护成本。
{"title":"Link Multiple Courses to Enhance Students' Hands-on Practice on Microprocessor Systems","authors":"Jack Li","doi":"10.1109/eIT57321.2023.10187309","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187309","url":null,"abstract":"Hands-on practice is an important fact to students' success, especially to the students who study in the field of Electrical Engineering and Electrical Engineering Technology (EET). Electronics systems have become so complex nowadays because of the high-density integrated circuits are widely used that it is hard for students to grasp the information about the systems in one course, especially microcontroller systems. In order to help students do more hands-on practice and understand a microprocessor system deeply, linking several courses together by using the same microcontroller was proposed in this paper. From the students' feedback, the setup really helps students do hands-on work on microprocesses with more confidence. The setup also helps the program reduce lab maintenance cost.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Homomorphic Encryption for Privacy in Principal Component Analysis 主成分分析中的同态加密隐私评估
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187220
David Arnold, J. Saniie
Principal Component Analysis (PCA) is a versatile Unsupervised Learning (UL) technique for reducing the dimensionality of datasets. As a result, PCA is widely used in consumer and research applications as a preprocessing tool for identifying important features prior to further analysis. In instances where on-site personnel or developers do not have the expertise to apply UL techniques, third party processors are frequently retained. However, the release of client or proprietary data poses a substantial security risk. This risk increases the regulatory and contractual burden on analysts when interacting with sensitive or classified information. Homomorphic Encryption (HE) cryptosystems are a novel family of encryption algorithms that permit approximate addition and multiplication on encrypted data. When applied to UL models, such as PCA, experts may apply their expertise while maintaining data privacy. In order to evaluate the potential application of Homomorphic Encryption, we implemented Principal Component Analysis using the Microsoft SEAL HE libraries. The resulting implementation was applied to the MNIST Handwritten dataset for feature reduction and image reconstruction. Based on our results, HE considerably increased the time required to process the dataset. However, the HE algorithm is still viable for non-real-time applications as it had an average pixel error of near-zero for all image reconstructions.
主成分分析(PCA)是一种通用的无监督学习(UL)技术,可用于降低数据集的维度。因此,PCA 被广泛应用于消费和研究领域,作为一种预处理工具,用于在进一步分析前识别重要特征。在现场人员或开发人员不具备应用 UL 技术的专业知识的情况下,通常会使用第三方处理器。然而,泄露客户或专有数据会带来巨大的安全风险。这种风险增加了分析师在处理敏感或机密信息时的监管和合同负担。同态加密(HE)密码系统是一种新型加密算法,允许对加密数据进行近似加法和乘法运算。当应用于 UL 模型(如 PCA)时,专家们可以应用他们的专业知识,同时维护数据隐私。为了评估同态加密的潜在应用,我们使用微软 SEAL HE 库实施了主成分分析。由此产生的实现应用于 MNIST 手写数据集,用于特征还原和图像重建。根据我们的结果,HE 大大增加了处理数据集所需的时间。不过,HE 算法在非实时应用中仍然是可行的,因为它在所有图像重建中的平均像素误差几乎为零。
{"title":"Evaluation of Homomorphic Encryption for Privacy in Principal Component Analysis","authors":"David Arnold, J. Saniie","doi":"10.1109/eIT57321.2023.10187220","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187220","url":null,"abstract":"Principal Component Analysis (PCA) is a versatile Unsupervised Learning (UL) technique for reducing the dimensionality of datasets. As a result, PCA is widely used in consumer and research applications as a preprocessing tool for identifying important features prior to further analysis. In instances where on-site personnel or developers do not have the expertise to apply UL techniques, third party processors are frequently retained. However, the release of client or proprietary data poses a substantial security risk. This risk increases the regulatory and contractual burden on analysts when interacting with sensitive or classified information. Homomorphic Encryption (HE) cryptosystems are a novel family of encryption algorithms that permit approximate addition and multiplication on encrypted data. When applied to UL models, such as PCA, experts may apply their expertise while maintaining data privacy. In order to evaluate the potential application of Homomorphic Encryption, we implemented Principal Component Analysis using the Microsoft SEAL HE libraries. The resulting implementation was applied to the MNIST Handwritten dataset for feature reduction and image reconstruction. Based on our results, HE considerably increased the time required to process the dataset. However, the HE algorithm is still viable for non-real-time applications as it had an average pixel error of near-zero for all image reconstructions.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Stock Machine Learning Model using Numerai Dataset 使用Numerai数据集构建股票机器学习模型
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187217
Jingwen Zhang, Ge Shi, Song Chen, Mao Zheng
In this paper, we report our experiments on using the Numerai data set to build a financial machine learning model. Numerai [1] is an AI-run, crowd-sourced hedge fund company based in San Francisco. It hosts the Numerai Tournament, which claimes to be the hardest data science tournament in the world [1]. We trained our model and participated in Numerai tournament for four months. The results were promising.
在本文中,我们报告了我们使用Numerai数据集构建金融机器学习模型的实验。Numerai[1]是一家人工智能运营的众包对冲基金公司,总部位于旧金山。它举办Numerai锦标赛,号称是世界上最难的数据科学锦标赛[1]。我们训练了我们的模型,参加了为期四个月的Numerai比赛。结果很有希望。
{"title":"Building a Stock Machine Learning Model using Numerai Dataset","authors":"Jingwen Zhang, Ge Shi, Song Chen, Mao Zheng","doi":"10.1109/eIT57321.2023.10187217","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187217","url":null,"abstract":"In this paper, we report our experiments on using the Numerai data set to build a financial machine learning model. Numerai [1] is an AI-run, crowd-sourced hedge fund company based in San Francisco. It hosts the Numerai Tournament, which claimes to be the hardest data science tournament in the world [1]. We trained our model and participated in Numerai tournament for four months. The results were promising.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ACapsule Q-Learning Based Reinforcement Model for Intrusion Detection System on Smart Grid 基于accapsule Q-Learning的智能电网入侵检测系统强化模型
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187374
T. T. Khoei, N. Kaabouch
Smart grid is an innovative technology that offers efficiency, low carbon emissions, and high energy storage. However, this promising technology has several shortcomings, including limited security. In this network, Intrusion Detection System (IDS) is one of the likely targeted systems that has limited security and is prone to several cyber vulnerabilities. To address a such challenge, several studies have been proposed to detect, classify, and mitigate these attacks using Artificial Intelligence (AI) techniques, although the proposed techniques in the literature suffer from high misdetection and false alarm rates. Additionally, limited data availability motivated the researchers to use another type of AI method, namely reinforcement learning to detect and classify attacks. In this paper, we propose a deep reinforcement learning-based technique, namely Q learning and capsule network as a deep learning model to detect attacks for IDS on smart grid networks. The benchmark of CICDDOs 2019 is selected to evaluate the model in terms of accuracy, detection, misdetection, false alarm rates, training time, and prediction time. We also investigate the performance of the proposed model based on discount values of 0.001 and 0.9. The experiments demonstrate that the proposed model has acceptable results, and the model with the lower discount values provides better results.
智能电网是一项创新技术,具有高效、低碳排放和高能量存储的特点。然而,这种有前途的技术有几个缺点,包括有限的安全性。在这个网络中,入侵检测系统(IDS)是可能被攻击的目标系统之一,其安全性有限,容易出现一些网络漏洞。为了应对这样的挑战,一些研究已经提出使用人工智能(AI)技术来检测、分类和减轻这些攻击,尽管文献中提出的技术存在较高的误检和误报率。此外,有限的数据可用性促使研究人员使用另一种人工智能方法,即强化学习来检测和分类攻击。在本文中,我们提出了一种基于深度强化学习的技术,即Q学习和胶囊网络作为深度学习模型来检测智能电网上的IDS攻击。选取CICDDOs 2019的基准,从准确率、检测、误检、虚警率、训练时间、预测时间等方面对模型进行评价。我们还研究了基于0.001和0.9的折扣值所提出的模型的性能。实验结果表明,所提模型具有可接受的结果,且折扣值越低的模型效果越好。
{"title":"ACapsule Q-Learning Based Reinforcement Model for Intrusion Detection System on Smart Grid","authors":"T. T. Khoei, N. Kaabouch","doi":"10.1109/eIT57321.2023.10187374","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187374","url":null,"abstract":"Smart grid is an innovative technology that offers efficiency, low carbon emissions, and high energy storage. However, this promising technology has several shortcomings, including limited security. In this network, Intrusion Detection System (IDS) is one of the likely targeted systems that has limited security and is prone to several cyber vulnerabilities. To address a such challenge, several studies have been proposed to detect, classify, and mitigate these attacks using Artificial Intelligence (AI) techniques, although the proposed techniques in the literature suffer from high misdetection and false alarm rates. Additionally, limited data availability motivated the researchers to use another type of AI method, namely reinforcement learning to detect and classify attacks. In this paper, we propose a deep reinforcement learning-based technique, namely Q learning and capsule network as a deep learning model to detect attacks for IDS on smart grid networks. The benchmark of CICDDOs 2019 is selected to evaluate the model in terms of accuracy, detection, misdetection, false alarm rates, training time, and prediction time. We also investigate the performance of the proposed model based on discount values of 0.001 and 0.9. The experiments demonstrate that the proposed model has acceptable results, and the model with the lower discount values provides better results.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach Towards Fusion of Steganography and Cryptography for Enhanced Data Security using RGB Image 一种基于RGB图像的隐写与加密融合增强数据安全性的新方法
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187231
Zeeshan Abbas, K. Chong
Security has now become an essential part of communication on both sender and receiver's side. It is challenging to deliver comprehensive security against invaders since a lot of algorithms are expounded and can effortlessly get significant data by performing different hacking methods. High security-based algorithms like AES are nowadays used in various systems, as they present a high performance and is quite faster than most of stream-based encryption algorithms. Regardless of how reliable the technique is, the cipher-text always creates a doubt in brain when someone notices it, which makes the data prone to interception. Here arises another method of security to eliminate that suspicion, hence, we incorporate the confidential information into another format, such as an image, sound, video, or text and then transmit through the network. A novel security system based on three steps of hybrid architecture has been proposed in this paper by combining steganography and cryptography with codebooks. Two different keys are used to encrypt and then hide that highly secured encrypted message into the cover image. The message is encrypted first with AES algorithm and then placed at random positions in the cover image using codebook and KSA algorithm. AES encrypted message is mapped onto values of predefined codebooks then hide those encrypted message bits in LSBs of the cover image. The selected parameters are then passed on to the decryption side to recover the original message. Based on the achieved experimental results, it has outperformed the previous methodologies and without having the secret keys it is unfeasible to extract the message in a readable format.
安全现在已经成为发送方和接收方通信的重要组成部分。由于许多算法被阐述,并且通过执行不同的黑客方法可以毫不费力地获得重要数据,因此提供针对入侵者的全面安全性是具有挑战性的。像AES这样的基于高安全性的算法现在被用于各种系统,因为它们表现出高性能,并且比大多数基于流的加密算法快得多。无论技术有多可靠,当有人注意到密文时,总是会在大脑中产生怀疑,这使得数据容易被拦截。这里出现了另一种安全方法来消除这种怀疑,因此,我们将机密信息合并为另一种格式,例如图像,声音,视频或文本,然后通过网络传输。本文将隐写术、密码学与码本相结合,提出了一种基于三步混合体系结构的新型安全系统。使用两个不同的密钥进行加密,然后将高度安全的加密信息隐藏到封面图像中。该信息首先用AES算法加密,然后使用码本和KSA算法在封面图像中随机放置。AES加密信息被映射到预定义的码本上,然后将这些加密信息位隐藏在封面图像的lsdb中。然后将选定的参数传递给解密端,以恢复原始消息。实验结果表明,该方法的性能优于以往的方法,并且在没有密钥的情况下,无法以可读格式提取消息。
{"title":"A Novel Approach Towards Fusion of Steganography and Cryptography for Enhanced Data Security using RGB Image","authors":"Zeeshan Abbas, K. Chong","doi":"10.1109/eIT57321.2023.10187231","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187231","url":null,"abstract":"Security has now become an essential part of communication on both sender and receiver's side. It is challenging to deliver comprehensive security against invaders since a lot of algorithms are expounded and can effortlessly get significant data by performing different hacking methods. High security-based algorithms like AES are nowadays used in various systems, as they present a high performance and is quite faster than most of stream-based encryption algorithms. Regardless of how reliable the technique is, the cipher-text always creates a doubt in brain when someone notices it, which makes the data prone to interception. Here arises another method of security to eliminate that suspicion, hence, we incorporate the confidential information into another format, such as an image, sound, video, or text and then transmit through the network. A novel security system based on three steps of hybrid architecture has been proposed in this paper by combining steganography and cryptography with codebooks. Two different keys are used to encrypt and then hide that highly secured encrypted message into the cover image. The message is encrypted first with AES algorithm and then placed at random positions in the cover image using codebook and KSA algorithm. AES encrypted message is mapped onto values of predefined codebooks then hide those encrypted message bits in LSBs of the cover image. The selected parameters are then passed on to the decryption side to recover the original message. Based on the achieved experimental results, it has outperformed the previous methodologies and without having the secret keys it is unfeasible to extract the message in a readable format.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of a Predictive Method for Obstacle Detection and Safe Operation of Autonomous Vehicles 自动驾驶汽车障碍物检测与安全运行预测方法的验证
Pub Date : 2023-05-18 DOI: 10.1109/eIT57321.2023.10187222
Lila Areephanthu, B. Abegaz
This paper focuses on the verification of an object detection and avoidance method for autonomous vehicles to maneuver their way safely and efficiently. The model predictive control approach is explored and compared with other control approaches based on variables such as safe detection distance and safe operating time. The results indicate that the proposed approach could be promising for autonomous vehicles that often comprise various types of sensors and components and could otherwise be difficult to test and verify with traditional methods.
本文重点研究了一种自动驾驶汽车安全高效机动的目标检测和回避方法的验证。对模型预测控制方法进行了探索,并与其他基于安全检测距离和安全运行时间等变量的控制方法进行了比较。研究结果表明,对于通常由各种类型的传感器和部件组成的自动驾驶汽车来说,这种方法很有希望,否则很难用传统方法进行测试和验证。
{"title":"Verification of a Predictive Method for Obstacle Detection and Safe Operation of Autonomous Vehicles","authors":"Lila Areephanthu, B. Abegaz","doi":"10.1109/eIT57321.2023.10187222","DOIUrl":"https://doi.org/10.1109/eIT57321.2023.10187222","url":null,"abstract":"This paper focuses on the verification of an object detection and avoidance method for autonomous vehicles to maneuver their way safely and efficiently. The model predictive control approach is explored and compared with other control approaches based on variables such as safe detection distance and safe operating time. The results indicate that the proposed approach could be promising for autonomous vehicles that often comprise various types of sensors and components and could otherwise be difficult to test and verify with traditional methods.","PeriodicalId":113717,"journal":{"name":"2023 IEEE International Conference on Electro Information Technology (eIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE International Conference on Electro Information Technology (eIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1