首页 > 最新文献

2022 10th International Symposium on Digital Forensics and Security (ISDFS)最新文献

英文 中文
An Improved Anonymous Identifier 改进的匿名标识符
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800823
Ray Kresman, L. Dunning, Jing-yan Lu
Privacy is an integral part of today’s digital transformation era and there is a paradigm shift toward anonymity in communication. This paper proposes an algorithm for assigning anonymous IDs to every member of a group of participants and provides an upper bound on one of the parameters of the algorithm. The algorithm terminates in one round.The proposed algorithm improves an earlier algorithm (AIDA) and mirrors its working. Simulation is used to show that AIDA may not terminate when the number of participants is large. We then discuss the software architecture and performance improvements offered by the proposed algorithm.
隐私是当今数字化转型时代不可或缺的一部分,通信中也出现了向匿名化的范式转变。提出了一种为参与者群中的每个成员分配匿名id的算法,并给出了该算法的一个参数的上界。算法在一轮结束。该算法改进了先前的AIDA算法,并反映了其工作原理。仿真结果表明,当参与者数量较大时,AIDA可能不会终止。然后讨论了该算法所提供的软件架构和性能改进。
{"title":"An Improved Anonymous Identifier","authors":"Ray Kresman, L. Dunning, Jing-yan Lu","doi":"10.1109/ISDFS55398.2022.9800823","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800823","url":null,"abstract":"Privacy is an integral part of today’s digital transformation era and there is a paradigm shift toward anonymity in communication. This paper proposes an algorithm for assigning anonymous IDs to every member of a group of participants and provides an upper bound on one of the parameters of the algorithm. The algorithm terminates in one round.The proposed algorithm improves an earlier algorithm (AIDA) and mirrors its working. Simulation is used to show that AIDA may not terminate when the number of participants is large. We then discuss the software architecture and performance improvements offered by the proposed algorithm.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115411561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Fatality Analysis by Gender using Predictive Analytics 使用预测分析按性别进行车辆死亡分析
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800820
Mena Youssef, Serkan Varol, Serkan Catma
Motor vehicle crashes in the United States are one of the significant causes of death. Females involved in motor vehicle fatal accidents show a significant increase in the last decade. This project investigates variables captured within the National Highway Traffic Safety Administration’s reporting system to see the contributing factors toward female driver involvement in crashes that result in a fatality in Tennessee. The findings showed that variables such as driver height, weight, age, and vehicle’s model year have the most influence per mean decrease Gini on female involvement in accidents resulting in fatalities. Government officials can use evidence gained from this study to introduce laws and safety measures to help decrease the rate of fatal accidents.
在美国,机动车碰撞事故是导致死亡的重要原因之一。在过去十年中,涉及机动车辆致命事故的女性人数显著增加。该项目调查了国家公路交通安全管理局报告系统中捕获的变量,以了解导致田纳西州女性驾驶员参与导致死亡的撞车事故的影响因素。研究结果显示,驾驶员身高、体重、年龄和车辆型号年份等变量对女性参与导致死亡的事故的平均基尼系数影响最大。政府官员可以利用从这项研究中获得的证据来引入法律和安全措施,以帮助降低致命事故的发生率。
{"title":"Vehicle Fatality Analysis by Gender using Predictive Analytics","authors":"Mena Youssef, Serkan Varol, Serkan Catma","doi":"10.1109/ISDFS55398.2022.9800820","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800820","url":null,"abstract":"Motor vehicle crashes in the United States are one of the significant causes of death. Females involved in motor vehicle fatal accidents show a significant increase in the last decade. This project investigates variables captured within the National Highway Traffic Safety Administration’s reporting system to see the contributing factors toward female driver involvement in crashes that result in a fatality in Tennessee. The findings showed that variables such as driver height, weight, age, and vehicle’s model year have the most influence per mean decrease Gini on female involvement in accidents resulting in fatalities. Government officials can use evidence gained from this study to introduce laws and safety measures to help decrease the rate of fatal accidents.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123042328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DOTMUG: A Threat Model for Target Specific APT Attacks–Misusing Google Teachable Machine DOTMUG:针对特定目标的APT攻击的威胁模型——滥用Google可教机器
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800780
P. Charan, P. Anand, S. Shukla, N. Selvan, Hrushikesh Chunduri
Target specific malware is one of the major concerns for many global IT firms and government organizations. In recent times, state-sponsored Advanced Persistent Threat (APT) groups have evolved in developing more intelligent and targeted malware by misusing various legitimate services. This work sheds light on modeling a threat scenario to emphasize how targeted attacks are performed by misusing legitimate services (Google Teachable Machine in our scenario) for malicious purposes in establishing foothold, lateral movement, and data exfiltration phases of APT life cycle. As a proof of concept, we validate our threat model with five different experiments highlighting how an attacker can execute a personalized boot sector ransomware and fileless malware on a targeted individual in corporate networks. Furthermore, assuming the attacker has limited information regarding the target, we use sinGAN to generate synthetic image samples to train a model for identifying the targets. In addition, we present a correlation study between target prediction confidence and effective payload deployment for all experiments. In our observation, targeted file-less malware turned out to be quicker and pestilent, averaging 25.11 seconds to encrypt the whole disk with 80% target prediction confidence.
针对特定目标的恶意软件是许多全球IT公司和政府组织主要关注的问题之一。最近,国家资助的高级持续性威胁(APT)组织通过滥用各种合法服务,开发出更智能、更有针对性的恶意软件。这项工作阐明了对威胁场景的建模,以强调如何通过滥用合法服务(在我们的场景中是Google teachectable Machine)来执行有针对性的攻击,从而在APT生命周期的立足点、横向移动和数据泄露阶段建立恶意目的。作为概念验证,我们通过五个不同的实验验证了我们的威胁模型,这些实验突出了攻击者如何在企业网络中的目标个人上执行个性化的引导扇区勒索软件和无文件恶意软件。此外,假设攻击者对目标的信息有限,我们使用sinGAN生成合成图像样本来训练识别目标的模型。此外,我们还对所有实验的目标预测置信度与有效载荷部署之间的相关性进行了研究。在我们的观察中,有针对性的无文件恶意软件变得更快、更有害,平均25.11秒加密整个磁盘,目标预测置信度为80%。
{"title":"DOTMUG: A Threat Model for Target Specific APT Attacks–Misusing Google Teachable Machine","authors":"P. Charan, P. Anand, S. Shukla, N. Selvan, Hrushikesh Chunduri","doi":"10.1109/ISDFS55398.2022.9800780","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800780","url":null,"abstract":"Target specific malware is one of the major concerns for many global IT firms and government organizations. In recent times, state-sponsored Advanced Persistent Threat (APT) groups have evolved in developing more intelligent and targeted malware by misusing various legitimate services. This work sheds light on modeling a threat scenario to emphasize how targeted attacks are performed by misusing legitimate services (Google Teachable Machine in our scenario) for malicious purposes in establishing foothold, lateral movement, and data exfiltration phases of APT life cycle. As a proof of concept, we validate our threat model with five different experiments highlighting how an attacker can execute a personalized boot sector ransomware and fileless malware on a targeted individual in corporate networks. Furthermore, assuming the attacker has limited information regarding the target, we use sinGAN to generate synthetic image samples to train a model for identifying the targets. In addition, we present a correlation study between target prediction confidence and effective payload deployment for all experiments. In our observation, targeted file-less malware turned out to be quicker and pestilent, averaging 25.11 seconds to encrypt the whole disk with 80% target prediction confidence.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125887562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation 基于光流的无人机碰撞方向估计法证调查
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800790
A. Editya, T. Ahmad, H. Studiawan
Nowadays drones have an important role to help people in several aspects. For example, drones are very beneficial in military sector. In this sector, drones may have a collision with different reasons, such as human error and a malfunctioning system. Therefore, forensic investigation helps the authority to find out drone collision cause. One indication before having collision is a change of direction of the drone. This cause can be detected by analyzing drone flying direction which changes irregularly. In this paper, we propose to use direction estimation method to assist the forensic investigation of a drone collision. We apply optical flow methods, specifically Lucas-Kanade, Horn-Schunck, and Gunnar-Farnerback. Based on the experimental results, Lucas-Kanade technique can achieve the best direction estimation providing a specific motion vector and also a filter to reduce noise.
如今,无人机在几个方面帮助人们发挥着重要作用。例如,无人机在军事领域非常有益。在这个领域,无人机可能会因为不同的原因发生碰撞,比如人为失误和系统故障。因此,法医调查有助于当局找出无人机碰撞的原因。发生碰撞前的一个迹象是无人机改变了方向。通过分析无人机飞行方向的不规则变化,可以发现这一原因。在本文中,我们提出了使用方向估计方法来辅助无人机碰撞的法医调查。我们应用光流方法,特别是Lucas-Kanade, Horn-Schunck和Gunnar-Farnerback。实验结果表明,Lucas-Kanade技术在提供特定的运动矢量和滤波器的情况下,可以获得最佳的方向估计。
{"title":"Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation","authors":"A. Editya, T. Ahmad, H. Studiawan","doi":"10.1109/ISDFS55398.2022.9800790","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800790","url":null,"abstract":"Nowadays drones have an important role to help people in several aspects. For example, drones are very beneficial in military sector. In this sector, drones may have a collision with different reasons, such as human error and a malfunctioning system. Therefore, forensic investigation helps the authority to find out drone collision cause. One indication before having collision is a change of direction of the drone. This cause can be detected by analyzing drone flying direction which changes irregularly. In this paper, we propose to use direction estimation method to assist the forensic investigation of a drone collision. We apply optical flow methods, specifically Lucas-Kanade, Horn-Schunck, and Gunnar-Farnerback. Based on the experimental results, Lucas-Kanade technique can achieve the best direction estimation providing a specific motion vector and also a filter to reduce noise.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115052348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Context-Aware Data Augmentation for Efficient Object Detection by UAV Surveillance 基于上下文感知数据增强的无人机监控高效目标检测
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800798
Yuri G. Gordienko, Oleksandr Rokovyi, Oleg Alienin, S. Stirenko
The problem of object detection by YOLOv4 deep neural network (DNN) is considered on Stanford drone dataset (SDD) with object classes (pedestrians, bicyclists, cars, skateboarders, golf carts, and buses) collected by Unmanned Aerial Vehicle (UAV) video surveillance. Some frames (images) with labels were extracted from videos of this dataset and structured in the open-access SDD frames (SDDF) version (https://www.kaggle.com/yoctoman/stanford-drone-dataset-frames). The context-aware data augmentation (CADA) was proposed to change bounding box (BB) sizes by some percentage of its width and height. To investigate the possible effect of the dataset labeling quality the "dirty" and "clean" dataset versions were prepared, which differ by the evaluation subset only. CADA procedures lead to significant improvement of performance by loss and mean average precision (mAP) that can be observed both for "dirty" and "clean" evaluation subsets in comparison to experiments without CADA. Moreover, CADA procedures allow to get the mAP values on the "dirty" (real) evaluation subset that can be similar (and for some classes higher even) to the mAP values on the "clean" (ground-truth - GT) evaluation subset without CADA procedures. This effect can be explained by increase of signal-to-noise ratios for object-to-background pairs after IN-like cropping CADA procedures and then by increase of variability of object-to-background pair after subsequent OUT-like enlarging CADA procedures. It should be noted the non-commutative nature of CADA-based retraining procedures because their reverse direction like first-OUT-then-IN CADA in contrast to first-IN-then-OUT CADA did not lead to such a big increase of mAP values. Several CADA-sequences were analyzed and the best strategy consists in first-IN-then-OUT CADA procedures, where the extent of decrease and increase of BBs width and height can be different for various applications and datasets.
在斯坦福无人机数据集(SDD)上研究了YOLOv4深度神经网络(DNN)的目标检测问题,该数据集由无人机(UAV)视频监控收集对象类别(行人、骑自行车的人、汽车、滑板者、高尔夫球车和公共汽车)。从该数据集的视频中提取一些带有标签的帧(图像),并在开放获取的SDD帧(SDDF)版本(https://www.kaggle.com/yoctoman/stanford-drone-dataset-frames)中进行结构化。提出了基于上下文感知的数据增强(CADA)方法,通过一定比例的宽度和高度来改变边界框(BB)的大小。为了研究数据集标记质量可能产生的影响,我们准备了“脏”和“干净”数据集版本,它们仅通过评估子集不同。与没有CADA的实验相比,CADA程序通过损失和平均平均精度(mAP)显著提高了性能,这可以在“脏”和“干净”评估子集中观察到。此外,CADA过程允许获得“脏”(真实)评估子集上的mAP值,这些值可能与没有CADA过程的“干净”(基真- GT)评估子集上的mAP值相似(对于某些类甚至更高)。这种效应可以解释为在IN-like裁剪CADA程序后,物体-背景对的信噪比增加,然后在随后的OUT-like放大CADA程序后,物体-背景对的变异性增加。值得注意的是,基于CADA的再训练过程的非交换性,因为它们的反向(如先出后入CADA与先入后出CADA相比)并没有导致mAP值的如此大的增加。对多个CADA序列进行了分析,发现最佳策略是先入后出CADA程序,其中bb宽度和高度的减小和增加程度可以根据不同的应用和数据集而不同。
{"title":"Context-Aware Data Augmentation for Efficient Object Detection by UAV Surveillance","authors":"Yuri G. Gordienko, Oleksandr Rokovyi, Oleg Alienin, S. Stirenko","doi":"10.1109/ISDFS55398.2022.9800798","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800798","url":null,"abstract":"The problem of object detection by YOLOv4 deep neural network (DNN) is considered on Stanford drone dataset (SDD) with object classes (pedestrians, bicyclists, cars, skateboarders, golf carts, and buses) collected by Unmanned Aerial Vehicle (UAV) video surveillance. Some frames (images) with labels were extracted from videos of this dataset and structured in the open-access SDD frames (SDDF) version (https://www.kaggle.com/yoctoman/stanford-drone-dataset-frames). The context-aware data augmentation (CADA) was proposed to change bounding box (BB) sizes by some percentage of its width and height. To investigate the possible effect of the dataset labeling quality the \"dirty\" and \"clean\" dataset versions were prepared, which differ by the evaluation subset only. CADA procedures lead to significant improvement of performance by loss and mean average precision (mAP) that can be observed both for \"dirty\" and \"clean\" evaluation subsets in comparison to experiments without CADA. Moreover, CADA procedures allow to get the mAP values on the \"dirty\" (real) evaluation subset that can be similar (and for some classes higher even) to the mAP values on the \"clean\" (ground-truth - GT) evaluation subset without CADA procedures. This effect can be explained by increase of signal-to-noise ratios for object-to-background pairs after IN-like cropping CADA procedures and then by increase of variability of object-to-background pair after subsequent OUT-like enlarging CADA procedures. It should be noted the non-commutative nature of CADA-based retraining procedures because their reverse direction like first-OUT-then-IN CADA in contrast to first-IN-then-OUT CADA did not lead to such a big increase of mAP values. Several CADA-sequences were analyzed and the best strategy consists in first-IN-then-OUT CADA procedures, where the extent of decrease and increase of BBs width and height can be different for various applications and datasets.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123979562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Activity Recognition: A review 人类活动识别:综述
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800781
João Gonçalo Pereira, Joaquim Gonçalves
Human activity recognition (HAR) is important in people’s daily life, helping in both human-to-human interaction and interpersonal relations. In HAR, many studies are presented to show the best data and the best methods in order to predict activities with the most accuracy possible. These studies have different approaches to the problems that HAR present when the real-time is important. In this paper we aim to present some of the methods that exist as well as some of the existing dataset’s and understand the different techniques used. The results show that the CNN’s algorithms has better performance than the others, however more work need to be developed namely in production of adequate dataset’s for training
人类活动识别(HAR)在人们的日常生活中起着重要的作用,有助于人与人之间的互动和人际关系。在HAR中,提出了许多研究,以展示最佳数据和最佳方法,以便尽可能准确地预测活动。这些研究有不同的方法来解决HAR在实时性很重要时出现的问题。在本文中,我们旨在介绍一些现有的方法以及一些现有的数据集,并了解所使用的不同技术。结果表明,CNN的算法比其他算法有更好的性能,但是需要做更多的工作,即在产生足够的数据集进行训练
{"title":"Human Activity Recognition: A review","authors":"João Gonçalo Pereira, Joaquim Gonçalves","doi":"10.1109/ISDFS55398.2022.9800781","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800781","url":null,"abstract":"Human activity recognition (HAR) is important in people’s daily life, helping in both human-to-human interaction and interpersonal relations. In HAR, many studies are presented to show the best data and the best methods in order to predict activities with the most accuracy possible. These studies have different approaches to the problems that HAR present when the real-time is important. In this paper we aim to present some of the methods that exist as well as some of the existing dataset’s and understand the different techniques used. The results show that the CNN’s algorithms has better performance than the others, however more work need to be developed namely in production of adequate dataset’s for training","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114374582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Arabic YouTube Spam Using Data Mining Techniques 使用数据挖掘技术检测阿拉伯语YouTube垃圾邮件
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800840
Yahya M. Tashtoush, Areen Magableh, Omar Darwish, Lujain Smadi, Omar Alomari, Anood ALghazoo
Since YouTube became one of the sources of income, the number of users has increased significantly and the number of spammers who aim to spread viruses or to promote their videos and channels. These behaviors have led many YouTubers to close their channels or to disable the comments because YouTube does not have enough tools to prevent it. Filtering Arabic spam comments is a big challenge at all according to various dialects which hold a huge number of synonyms. In this work, we have classified these comments using different algorithms such as Decision Tree(DT), Support Vector Machine (SVM), Naive Bayes(NB), Random Forest, and k-Nearest Neighbor (k-NN).
自从YouTube成为收入来源之一以来,用户数量大幅增加,旨在传播病毒或宣传其视频和频道的垃圾邮件发送者的数量也大幅增加。这些行为导致许多YouTube用户关闭了他们的频道或禁用评论,因为YouTube没有足够的工具来防止它。过滤阿拉伯垃圾评论是一个很大的挑战,因为各种方言都有大量的同义词。在这项工作中,我们使用不同的算法,如决策树(DT)、支持向量机(SVM)、朴素贝叶斯(NB)、随机森林和k-近邻(k-NN),对这些评论进行了分类。
{"title":"Detecting Arabic YouTube Spam Using Data Mining Techniques","authors":"Yahya M. Tashtoush, Areen Magableh, Omar Darwish, Lujain Smadi, Omar Alomari, Anood ALghazoo","doi":"10.1109/ISDFS55398.2022.9800840","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800840","url":null,"abstract":"Since YouTube became one of the sources of income, the number of users has increased significantly and the number of spammers who aim to spread viruses or to promote their videos and channels. These behaviors have led many YouTubers to close their channels or to disable the comments because YouTube does not have enough tools to prevent it. Filtering Arabic spam comments is a big challenge at all according to various dialects which hold a huge number of synonyms. In this work, we have classified these comments using different algorithms such as Decision Tree(DT), Support Vector Machine (SVM), Naive Bayes(NB), Random Forest, and k-Nearest Neighbor (k-NN).","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Approach to Detect Fake News Using eXtreme Gradient Boosting 一种利用极端梯度增强检测假新闻的新方法
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800777
S. Reddy, Santanu Mandal, Varanasi L. V. S. K. B. Kasyap, K. AswathyR.
The usage of social media has expanded in recent years, allowing them to get news from around the world at any time. This in turn, is questioning the authenticity of the news that is being spread both globally and locally. Fake news such as misinformation, gossips is widely disseminated on social media having a negative impact on society and lives of the people. As a result, much study is being is carried out in order to detect them. The data can be clustered into smaller groups based on the type of news using a few learning approaches. A novel method has been proposed for prediction of the authenticity of the news of the LIAR dataset [1] using Logistic Regression and a boosting algorithm eXtreme Gradient Boosting (XGBoost) for efficacy, computational pace and performance of the model. This method detects fake news by analyzing the semantic and syntactic connections between sentences. Various graphs (like heat maps, bar charts) are plotted to show the distribution of the authenticity of news and also to compare the predicted result with the actual one. The proposed strategy addresses the effects of the hoax's global spread. People are hungry for information to defend themselves and others in a community where humans are confronting large-scale risks from harms. Some key traits such as Sentimental features, Content-based features, Frequency features, and Hybrid features (combinations of two or more features) are incorporated for early prediction of fake news spread via social media. The liar dataset is used to train the method and tested for accurate results. The experimental accuracy is found out to be 98%.
近年来,社交媒体的使用已经扩大,使他们能够随时获得来自世界各地的新闻。这反过来又对全球和当地传播的新闻的真实性提出了质疑。虚假信息、流言蜚语等虚假新闻在社交媒体上广泛传播,对社会和人民生活产生了负面影响。因此,为了探测它们,正在进行大量的研究。使用一些学习方法,可以根据新闻类型将数据聚类成更小的组。已经提出了一种新的方法来预测说谎者数据集的新闻真实性[1],使用逻辑回归和增强算法极端梯度增强(XGBoost)来提高模型的有效性、计算速度和性能。该方法通过分析句子之间的语义和句法联系来检测假新闻。绘制各种图形(如热图、条形图)来显示新闻真实性的分布,并将预测结果与实际结果进行比较。拟议的策略解决了骗局全球传播的影响。在人类面临大规模危害风险的社区中,人们渴望获得信息来保护自己和他人。一些关键特征,如情感特征、基于内容的特征、频率特征和混合特征(两个或两个以上特征的组合)被纳入早期预测假新闻通过社交媒体传播。骗子数据集用于训练方法并测试准确的结果。实验结果表明,该方法的精度可达98%。
{"title":"A Novel Approach to Detect Fake News Using eXtreme Gradient Boosting","authors":"S. Reddy, Santanu Mandal, Varanasi L. V. S. K. B. Kasyap, K. AswathyR.","doi":"10.1109/ISDFS55398.2022.9800777","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800777","url":null,"abstract":"The usage of social media has expanded in recent years, allowing them to get news from around the world at any time. This in turn, is questioning the authenticity of the news that is being spread both globally and locally. Fake news such as misinformation, gossips is widely disseminated on social media having a negative impact on society and lives of the people. As a result, much study is being is carried out in order to detect them. The data can be clustered into smaller groups based on the type of news using a few learning approaches. A novel method has been proposed for prediction of the authenticity of the news of the LIAR dataset [1] using Logistic Regression and a boosting algorithm eXtreme Gradient Boosting (XGBoost) for efficacy, computational pace and performance of the model. This method detects fake news by analyzing the semantic and syntactic connections between sentences. Various graphs (like heat maps, bar charts) are plotted to show the distribution of the authenticity of news and also to compare the predicted result with the actual one. The proposed strategy addresses the effects of the hoax's global spread. People are hungry for information to defend themselves and others in a community where humans are confronting large-scale risks from harms. Some key traits such as Sentimental features, Content-based features, Frequency features, and Hybrid features (combinations of two or more features) are incorporated for early prediction of fake news spread via social media. The liar dataset is used to train the method and tested for accurate results. The experimental accuracy is found out to be 98%.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transfer Learning based Classification of Plasmodium Falciparum Parasitic Blood Smear Images 基于迁移学习的恶性疟原虫寄生血涂片图像分类
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800796
Sai Dheeraj Gummadi, Anirban Ghosh, Yeswanth Vootla
A transfer learning-based convolutional neural network (CNN) architecture is used in the current study to differentiate parasitic malaria cell images from the healthy ones and localize the parasites in infected images using global average pooling(GAP) and heat map. Malaria is a serious malady that can even lead to death in the absence of timely diagnosis. With the use of computerized malaria diagnosis, the suggested solution tackles the problem of timely detection and eases the strain on health care. Three transfer learning-based neural network architectures are studied and compared in terms of their accuracy, precision, sensitivity and specificity. The optimal model with less number of false negatives was then interfaced with a newly developed web service which can be easily accessed and used by common people. The studied models were trained and evaluated on 27,558 single cell images, yielding a maximum accuracy of 96.88%, with 97.35% sensitivity, 96.41% specificity, 96.89% F1-Score, and 96.44% precision.
本研究采用基于迁移学习的卷积神经网络(CNN)架构来区分寄生虫疟疾细胞图像和健康疟疾细胞图像,并利用全球平均池(GAP)和热图对感染图像中的寄生虫进行定位。疟疾是一种严重的疾病,如果没有及时诊断,甚至可能导致死亡。通过使用计算机化疟疾诊断,建议的解决办法解决了及时发现的问题,减轻了保健方面的压力。研究并比较了三种基于迁移学习的神经网络结构的准确性、精密度、灵敏度和特异性。然后将假阴性数较少的最优模型与新开发的web服务相连接,该服务可以方便地为普通人访问和使用。该模型对27558张单细胞图像进行了训练和评估,最高准确率为96.88%,灵敏度为97.35%,特异性为96.41%,F1-Score为96.89%,精度为96.44%。
{"title":"Transfer Learning based Classification of Plasmodium Falciparum Parasitic Blood Smear Images","authors":"Sai Dheeraj Gummadi, Anirban Ghosh, Yeswanth Vootla","doi":"10.1109/ISDFS55398.2022.9800796","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800796","url":null,"abstract":"A transfer learning-based convolutional neural network (CNN) architecture is used in the current study to differentiate parasitic malaria cell images from the healthy ones and localize the parasites in infected images using global average pooling(GAP) and heat map. Malaria is a serious malady that can even lead to death in the absence of timely diagnosis. With the use of computerized malaria diagnosis, the suggested solution tackles the problem of timely detection and eases the strain on health care. Three transfer learning-based neural network architectures are studied and compared in terms of their accuracy, precision, sensitivity and specificity. The optimal model with less number of false negatives was then interfaced with a newly developed web service which can be easily accessed and used by common people. The studied models were trained and evaluated on 27,558 single cell images, yielding a maximum accuracy of 96.88%, with 97.35% sensitivity, 96.41% specificity, 96.89% F1-Score, and 96.44% precision.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning based Lightweight Model for Seizure Detection using Spectrogram Images 基于深度学习的基于频谱图图像的癫痫检测轻量级模型
Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800802
Mohd. Maaz Khan, Irfan Mabood Khan, Omar Farooq
Epilepsy is a severe neurological disorder, which is onset by the abrupt and erratic electrical gushing in the neurons. Epileptic seizures can be diagnosed by monitoring the brain’s electrical activity using Electroencephalogram (EEG) signals. Conventionally this analysis was done manually by neurologists and had various limitations, but now it is increasingly being automated to save time, minimize human errors and relieve the neurologists from excessive burden. In this study, the EEG signals are first converted into spectrograms. These spectrograms are then fed into the proposed Convolutional Neural Network (CNN) model to automatically learn the robust features and perform binary classification. The proposed CNN model, containing only 3.94 million parameters, obtained an accuracy of 90.9% and achieved precision, recall, and AUC of 91.1%, 93.5% and 97.9% respectively. This work is extended by applying transfer learning on four pre-trained networks VGG16, ResNet, DenseNet, and Inception using the same dataset. Among all these networks, DenseNet achieves the best performance having an accuracy of 92.6% followed by ResNet with an accuracy of 90.3%, Inception with an accuracy of 88.8%, and VGG16 having an accuracy of 88.5%. Although DenseNet achieves slightly better accuracy than the proposed CNN model, it contains almost twice the parameters (8.1 million) in the base model.
癫痫是一种严重的神经系统疾病,由神经元中突然和不稳定的电流涌出引起。癫痫病发作可以通过使用脑电图(EEG)信号监测大脑的电活动来诊断。传统上,这种分析是由神经科医生手动完成的,并且有各种限制,但现在越来越多地实现自动化,以节省时间,最大限度地减少人为错误,减轻神经科医生的过度负担。在本研究中,首先将脑电信号转换成频谱图。然后将这些谱图输入到所提出的卷积神经网络(CNN)模型中,以自动学习鲁棒特征并进行二值分类。本文提出的CNN模型仅包含394万个参数,准确率为90.9%,准确率、召回率和AUC分别为91.1%、93.5%和97.9%。通过使用相同的数据集在四个预训练网络VGG16、ResNet、DenseNet和Inception上应用迁移学习,扩展了这项工作。在所有这些网络中,DenseNet的准确率达到了92.6%,表现最好,其次是ResNet的准确率为90.3%,Inception的准确率为88.8%,VGG16的准确率为88.5%。尽管DenseNet的准确率略高于所提出的CNN模型,但其包含的参数几乎是基础模型的两倍(810万个)。
{"title":"Deep Learning based Lightweight Model for Seizure Detection using Spectrogram Images","authors":"Mohd. Maaz Khan, Irfan Mabood Khan, Omar Farooq","doi":"10.1109/ISDFS55398.2022.9800802","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800802","url":null,"abstract":"Epilepsy is a severe neurological disorder, which is onset by the abrupt and erratic electrical gushing in the neurons. Epileptic seizures can be diagnosed by monitoring the brain’s electrical activity using Electroencephalogram (EEG) signals. Conventionally this analysis was done manually by neurologists and had various limitations, but now it is increasingly being automated to save time, minimize human errors and relieve the neurologists from excessive burden. In this study, the EEG signals are first converted into spectrograms. These spectrograms are then fed into the proposed Convolutional Neural Network (CNN) model to automatically learn the robust features and perform binary classification. The proposed CNN model, containing only 3.94 million parameters, obtained an accuracy of 90.9% and achieved precision, recall, and AUC of 91.1%, 93.5% and 97.9% respectively. This work is extended by applying transfer learning on four pre-trained networks VGG16, ResNet, DenseNet, and Inception using the same dataset. Among all these networks, DenseNet achieves the best performance having an accuracy of 92.6% followed by ResNet with an accuracy of 90.3%, Inception with an accuracy of 88.8%, and VGG16 having an accuracy of 88.5%. Although DenseNet achieves slightly better accuracy than the proposed CNN model, it contains almost twice the parameters (8.1 million) in the base model.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 10th International Symposium on Digital Forensics and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1