首页 > 最新文献

2016 IEEE Symposium Series on Computational Intelligence (SSCI)最新文献

英文 中文
Evolving random graph generators: A case for increased algorithmic primitive granularity 进化随机图生成器:增加算法原语粒度的一个例子
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849929
A. Pope, D. Tauritz, A. Kent
Random graph generation techniques provide an invaluable tool for studying graph related concepts. Unfortunately, traditional random graph models tend to produce artificial representations of real-world phenomenon. Manually developing customized random graph models for every application would require an unreasonable amount of time and effort. In this work, a platform is developed to automate the production of random graph generators that are tailored to specific applications. Elements of existing random graph generation techniques are used to create a set of graph-based primitive operations. A hyper-heuristic approach is employed that uses genetic programming to automatically construct random graph generators from this set of operations. This work improves upon similar research by increasing the level of algorithmic sophistication possible with evolved solutions, allowing more accurate modeling of subtle graph characteristics. The versatility of this approach is tested against existing methods and experimental results demonstrate the potential to outperform conventional and state of the art techniques for specific applications.
随机图生成技术为研究图相关概念提供了宝贵的工具。不幸的是,传统的随机图模型倾向于产生对现实世界现象的人工表示。为每个应用程序手动开发定制的随机图模型需要大量的时间和精力。在这项工作中,开发了一个平台来自动生成适合特定应用的随机图形生成器。使用现有随机图生成技术的元素来创建一组基于图的基本操作。采用一种超启发式方法,利用遗传规划从这组操作中自动构造随机图生成器。这项工作在类似研究的基础上进行了改进,通过改进的解决方案提高了算法的复杂程度,允许更准确地建模微妙的图形特征。该方法的通用性与现有方法进行了测试,实验结果表明,在特定应用中,该方法具有优于传统和最先进技术的潜力。
{"title":"Evolving random graph generators: A case for increased algorithmic primitive granularity","authors":"A. Pope, D. Tauritz, A. Kent","doi":"10.1109/SSCI.2016.7849929","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849929","url":null,"abstract":"Random graph generation techniques provide an invaluable tool for studying graph related concepts. Unfortunately, traditional random graph models tend to produce artificial representations of real-world phenomenon. Manually developing customized random graph models for every application would require an unreasonable amount of time and effort. In this work, a platform is developed to automate the production of random graph generators that are tailored to specific applications. Elements of existing random graph generation techniques are used to create a set of graph-based primitive operations. A hyper-heuristic approach is employed that uses genetic programming to automatically construct random graph generators from this set of operations. This work improves upon similar research by increasing the level of algorithmic sophistication possible with evolved solutions, allowing more accurate modeling of subtle graph characteristics. The versatility of this approach is tested against existing methods and experimental results demonstrate the potential to outperform conventional and state of the art techniques for specific applications.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Morwilog: an ACO-based system for outlining multi-step attacks Morwilog:一个基于aco的系统,用于概述多步骤攻击
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849902
Julio Navarro-Lara, A. Deruyver, P. Parrend
Threat detection is one of the basic mechanisms for protecting a network, as prevention does not suffice. Finding an attack is difficult because the most harmful ones are specially prepared against a specific victim and crafted for the first time. The contribution of a human expert is still needed for their detection, no matter how effective automatic methods used nowadays can appear. Moreover, in many occasions intrusions can only be efficiently detected by analyzing its effects on more than one element in the network. Event and alert recollection offers a way to centralize information from a heterogeneous set of sources. Then, it can be normalized to a common language and analyzed as a whole by a security system. In this paper we propose Morwilog, an ant-inspired method for standing out the relationship between actions belonging to the same complex attack. Morwilog is conceived as a framework for alert correlation to be integrated in a multi-modular security system. Reinforcement learning is incorporated to it thanks to feedback from a human security expert.
威胁检测是保护网络的基本机制之一,预防是不够的。发现攻击是困难的,因为最有害的攻击是专门针对特定受害者准备的,并且是第一次制作的。无论现在使用的自动检测方法多么有效,对它们的检测仍然需要人类专家的贡献。此外,在许多情况下,入侵只能通过分析其对网络中多个元素的影响来有效检测。事件和警报回忆提供了一种方法来集中来自异构源集的信息。然后,可以将其规范化为通用语言,并由安全系统进行整体分析。在本文中,我们提出了Morwilog,这是一种anti -inspired方法,用于区分属于同一复杂攻击的操作之间的关系。Morwilog被认为是一个警报关联的框架,将被集成到一个多模块安全系统中。由于人类安全专家的反馈,强化学习被纳入其中。
{"title":"Morwilog: an ACO-based system for outlining multi-step attacks","authors":"Julio Navarro-Lara, A. Deruyver, P. Parrend","doi":"10.1109/SSCI.2016.7849902","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849902","url":null,"abstract":"Threat detection is one of the basic mechanisms for protecting a network, as prevention does not suffice. Finding an attack is difficult because the most harmful ones are specially prepared against a specific victim and crafted for the first time. The contribution of a human expert is still needed for their detection, no matter how effective automatic methods used nowadays can appear. Moreover, in many occasions intrusions can only be efficiently detected by analyzing its effects on more than one element in the network. Event and alert recollection offers a way to centralize information from a heterogeneous set of sources. Then, it can be normalized to a common language and analyzed as a whole by a security system. In this paper we propose Morwilog, an ant-inspired method for standing out the relationship between actions belonging to the same complex attack. Morwilog is conceived as a framework for alert correlation to be integrated in a multi-modular security system. Reinforcement learning is incorporated to it thanks to feedback from a human security expert.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126273801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
“BioVid Emo DB”: A multimodal database for emotion analyses validated by subjective ratings “BioVid Emo DB”:一个多模式的情感分析数据库,通过主观评分验证
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849931
Lin Zhang, Steffen Walter, Xueyao Ma, P. Werner, A. Al-Hamadi, H. Traue, Sascha Gruss
The precondition of productive data mining is having an efficient database to work on. The BioVid Emo DB is a multimodal database recorded for the purpose of analyzing human affective states and data mining related to emotion. Psychophysiological signals such as Skin Conductance Level, Electrocardiogram, Trapezius Electromyogram and also 4 video signals were recorded. 5 discrete emotions (amusement, sadness, anger, disgust and fear) were elicited by 15 standardized film clips. 94 participants watched them, rated them in terms of the experienced emotional level and selected the film clips that evoked the strongest emotion. A preliminary analysis of the subjective ratings made during the experiment is presented. The dataset is available for other researchers.
高效数据挖掘的前提是要有一个高效的数据库。BioVid Emo DB是一个多模态数据库,用于分析人类情感状态和与情感相关的数据挖掘。记录皮肤电导水平、心电图、斜方肌电图等心理生理信号及4个视频信号。15个标准化的电影片段引发了5种不同的情绪(娱乐、悲伤、愤怒、厌恶和恐惧)。94名参与者观看了这些电影,根据体验到的情感水平对它们进行了评级,并选择了唤起最强烈情感的电影片段。对实验中所作的主观评定作了初步分析。该数据集可供其他研究人员使用。
{"title":"“BioVid Emo DB”: A multimodal database for emotion analyses validated by subjective ratings","authors":"Lin Zhang, Steffen Walter, Xueyao Ma, P. Werner, A. Al-Hamadi, H. Traue, Sascha Gruss","doi":"10.1109/SSCI.2016.7849931","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849931","url":null,"abstract":"The precondition of productive data mining is having an efficient database to work on. The BioVid Emo DB is a multimodal database recorded for the purpose of analyzing human affective states and data mining related to emotion. Psychophysiological signals such as Skin Conductance Level, Electrocardiogram, Trapezius Electromyogram and also 4 video signals were recorded. 5 discrete emotions (amusement, sadness, anger, disgust and fear) were elicited by 15 standardized film clips. 94 participants watched them, rated them in terms of the experienced emotional level and selected the film clips that evoked the strongest emotion. A preliminary analysis of the subjective ratings made during the experiment is presented. The dataset is available for other researchers.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Automatic multi-step signature derivation from taint graphs 从污染图自动多步签名派生
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7850076
M. Ussath, Feng Cheng, C. Meinel
An increasing number of attacks use advanced tactics, techniques and methods to compromise target systems and environments. Such multi-step attacks are often able to bypass existing prevention and detection systems, such as Intrusion Detection Systems (IDSs), firewalls and anti-virus solutions. These security systems either use an anomaly-based or a signature-based detection approach. For systems that utilize a signature-based approach, it is relevant to use precise detection signatures to identify attacks. The creation of signatures is often complex and time consuming, especially for multi-step attacks. In this paper, we propose a signature derivation approach that automatically creates multi-step detection signatures from taint graphs. The approach uses the recorded log events of an attack and the event attribute tainting approach to correlate the events and to create a taint graph. This graph, which provides comprehensive details about the attack, is then used to derive a precise multi-step detection signature. Therewith, this approach can reduce the needed time to create a multi-step signature as well as the complexity of this process. For the evaluation of the proposed approach, we simulated a multi-step attack with real world attack tools and methods. Based on the recorded log events and the implemented signature derivation system we automatically derived a multi-step detection signature that describes all relevant events and their relations.
越来越多的攻击使用先进的战术、技术和方法来破坏目标系统和环境。这种多步骤攻击通常能够绕过现有的防御和检测系统,例如入侵检测系统(ids)、防火墙和反病毒解决方案。这些安全系统要么使用基于异常的检测方法,要么使用基于签名的检测方法。对于使用基于签名的方法的系统,使用精确的检测签名来识别攻击是相关的。签名的创建通常是复杂和耗时的,特别是对于多步骤攻击。本文提出了一种从污染图中自动生成多步检测签名的签名派生方法。该方法使用记录的攻击日志事件和事件属性污染方法来关联事件并创建污染图。此图提供了有关攻击的全面细节,然后用于派生精确的多步骤检测签名。因此,该方法可以减少创建多步签名所需的时间,并降低该过程的复杂性。为了评估所提出的方法,我们用真实世界的攻击工具和方法模拟了一个多步骤攻击。基于所记录的日志事件和实现的签名派生系统,自动生成了描述所有相关事件及其关系的多步检测签名。
{"title":"Automatic multi-step signature derivation from taint graphs","authors":"M. Ussath, Feng Cheng, C. Meinel","doi":"10.1109/SSCI.2016.7850076","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7850076","url":null,"abstract":"An increasing number of attacks use advanced tactics, techniques and methods to compromise target systems and environments. Such multi-step attacks are often able to bypass existing prevention and detection systems, such as Intrusion Detection Systems (IDSs), firewalls and anti-virus solutions. These security systems either use an anomaly-based or a signature-based detection approach. For systems that utilize a signature-based approach, it is relevant to use precise detection signatures to identify attacks. The creation of signatures is often complex and time consuming, especially for multi-step attacks. In this paper, we propose a signature derivation approach that automatically creates multi-step detection signatures from taint graphs. The approach uses the recorded log events of an attack and the event attribute tainting approach to correlate the events and to create a taint graph. This graph, which provides comprehensive details about the attack, is then used to derive a precise multi-step detection signature. Therewith, this approach can reduce the needed time to create a multi-step signature as well as the complexity of this process. For the evaluation of the proposed approach, we simulated a multi-step attack with real world attack tools and methods. Based on the recorded log events and the implemented signature derivation system we automatically derived a multi-step detection signature that describes all relevant events and their relations.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dempster-Shafer logical model for fuzzy Description Logics 模糊描述逻辑的Dempster-Shafer逻辑模型
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849960
Loukia Karanikola, Isambo Karali
Description Logics, defined as a family of knowledge representation languages, have gained a lot of popularity, due to their connection with the Semantic Web, and more precisely, with the Web Ontology Language - OWL (OWL-DL). Vague information cannot be considered negligible when dealing with Semantic Web tasks. In this context, the definition of fuzzy DLs has been emerged. The Semantics of any DL is defined by an interpretation, which can be considered as a state of a world, where a DL formula (crisp or fuzzy) holds. In our method, we consider an uncertainty extension in a fuzzy DL, in the sense that an axiom holds with a belief degree. In order to represent these axioms, we assume Dempster-Shafer basic probability assignments on states of world (interpretations). We define the concept of Dempster-Shafer Fuzzy interpretation, in order to define semantics for our DL.
描述逻辑被定义为一系列知识表示语言,由于与语义Web,更准确地说,与Web本体语言OWL (OWL- dl)的联系而得到了广泛的应用。在处理语义Web任务时,模糊信息不能被认为是可以忽略的。在这种背景下,模糊dl的定义出现了。任何DL的语义都是由一个解释定义的,它可以被认为是一个世界的状态,其中DL公式(清晰或模糊)成立。在我们的方法中,我们考虑模糊深度学习中的不确定性扩展,即公理具有一个置信度。为了表示这些公理,我们假设了世界状态(解释)的Dempster-Shafer基本概率赋值。为了定义DL的语义,我们定义了Dempster-Shafer模糊解释的概念。
{"title":"Dempster-Shafer logical model for fuzzy Description Logics","authors":"Loukia Karanikola, Isambo Karali","doi":"10.1109/SSCI.2016.7849960","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849960","url":null,"abstract":"Description Logics, defined as a family of knowledge representation languages, have gained a lot of popularity, due to their connection with the Semantic Web, and more precisely, with the Web Ontology Language - OWL (OWL-DL). Vague information cannot be considered negligible when dealing with Semantic Web tasks. In this context, the definition of fuzzy DLs has been emerged. The Semantics of any DL is defined by an interpretation, which can be considered as a state of a world, where a DL formula (crisp or fuzzy) holds. In our method, we consider an uncertainty extension in a fuzzy DL, in the sense that an axiom holds with a belief degree. In order to represent these axioms, we assume Dempster-Shafer basic probability assignments on states of world (interpretations). We define the concept of Dempster-Shafer Fuzzy interpretation, in order to define semantics for our DL.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122017314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using a knowledge-based security orchestration tool to reduce the risk of browser compromise 使用基于知识的安全编排工具来降低浏览器泄露的风险
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849910
D. Leon, Venkata A. Bhandari, Ananth A. Jillepalli, Frederick T. Sheldon
Today, web browsers are used to access and modify sensitive data and systems including intranets and critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully patched. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations in a diverse browsing ecosystem. However, in our research, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure browsing ecosystem. We analyzed in detail more than a thousand browser security configuration options in three major browsers and found that only 17 had common names with common semantics. In this paper, we describe the results of this in-depth analysis. We also describe a knowledge-based solution, Open Browser GP, that would enable organizations to implement highly-granular secure configurations for their information and operational technology (IT/OT) browsing ecosystem.
今天,web浏览器被用来访问和修改敏感数据和系统,包括内部网和关键控制系统。由于其计算能力和网络连接性,浏览器容易受到几种类型的攻击,即使完全打了补丁。浏览器也是网络钓鱼攻击的主要目标。许多浏览器攻击,包括网络钓鱼,可以通过在不同的浏览生态系统中使用特定于站点、用户和设备的安全配置来防止或减轻。然而,在我们的研究中,我们发现所有主流浏览器都公开不同的安全配置过程、选项名称、值和语义。这导致了一个极其难以保护的浏览生态系统。我们详细分析了三种主要浏览器中的一千多个浏览器安全配置选项,发现只有17个具有具有共同语义的通用名称。在本文中,我们描述了这一深入分析的结果。我们还描述了一个基于知识的解决方案,Open Browser GP,它将使组织能够为其信息和操作技术(IT/OT)浏览生态系统实现高粒度的安全配置。
{"title":"Using a knowledge-based security orchestration tool to reduce the risk of browser compromise","authors":"D. Leon, Venkata A. Bhandari, Ananth A. Jillepalli, Frederick T. Sheldon","doi":"10.1109/SSCI.2016.7849910","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849910","url":null,"abstract":"Today, web browsers are used to access and modify sensitive data and systems including intranets and critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully patched. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations in a diverse browsing ecosystem. However, in our research, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure browsing ecosystem. We analyzed in detail more than a thousand browser security configuration options in three major browsers and found that only 17 had common names with common semantics. In this paper, we describe the results of this in-depth analysis. We also describe a knowledge-based solution, Open Browser GP, that would enable organizations to implement highly-granular secure configurations for their information and operational technology (IT/OT) browsing ecosystem.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115819212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Padding the dimensions for knowledge transfer in the dynamic vector evaluated particle swarm optimisation algorithm 在动态向量中填充知识传递的维度,评估粒子群优化算法
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7850236
Mardé Helbig
Most real world problems have more than one objective, with at least two objectives in conflict with one another and at least one objective that is dynamic in nature. The dynamic vector evaluated particle swarm optimisation (DVEPSO) algorithm is a co-operative algorithm, where each sub-swarm solves only one objective function and therefore, each sub-swarm optimises only a sub-set of decision variables. Knowledge is shared amongst the sub-swarms when the particles' velocity is updated, by using the position of the global guide of the subswarm or of another sub-swarm. The global guide can only provide information about the decision variables that are applicable to the objective function that its sub-swarm is optimising. Therefore, padding is required for the other decision variables. This paper investigates various padding approaches, namely using the sub-swarm's global best, using the personal best (pbest) of another particle in the sub-swarm, using the global best (gbest) of another sub-swarm or performing parent-centric crossover on another particle's position, pbest and gbest. Results indicate that using a random gbest or pbest performed well in fast changing environments, and using the sub-swarm's gbest performed well in slowly changing environments.
大多数现实世界的问题都有不止一个目标,至少有两个目标相互冲突,至少有一个目标本质上是动态的。动态向量评估粒子群优化算法(DVEPSO)是一种协作算法,其中每个子群只求解一个目标函数,因此每个子群只优化决策变量的子集。当粒子的速度更新时,通过使用子群或另一个子群的全局向导的位置,在子群之间共享知识。全局向导只能提供适用于其子群正在优化的目标函数的决策变量信息。因此,需要填充其他决策变量。本文研究了各种填充方法,即使用子群的全局最佳,使用子群中另一个粒子的个人最佳(pbest),使用另一个子群的全局最佳(gbest)或在另一个粒子的位置,pbest和gbest上进行以父母为中心的交叉。结果表明,在快速变化的环境中,使用随机gbest或pbest的效果较好,而在缓慢变化的环境中,使用子群的gbest效果较好。
{"title":"Padding the dimensions for knowledge transfer in the dynamic vector evaluated particle swarm optimisation algorithm","authors":"Mardé Helbig","doi":"10.1109/SSCI.2016.7850236","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7850236","url":null,"abstract":"Most real world problems have more than one objective, with at least two objectives in conflict with one another and at least one objective that is dynamic in nature. The dynamic vector evaluated particle swarm optimisation (DVEPSO) algorithm is a co-operative algorithm, where each sub-swarm solves only one objective function and therefore, each sub-swarm optimises only a sub-set of decision variables. Knowledge is shared amongst the sub-swarms when the particles' velocity is updated, by using the position of the global guide of the subswarm or of another sub-swarm. The global guide can only provide information about the decision variables that are applicable to the objective function that its sub-swarm is optimising. Therefore, padding is required for the other decision variables. This paper investigates various padding approaches, namely using the sub-swarm's global best, using the personal best (pbest) of another particle in the sub-swarm, using the global best (gbest) of another sub-swarm or performing parent-centric crossover on another particle's position, pbest and gbest. Results indicate that using a random gbest or pbest performed well in fast changing environments, and using the sub-swarm's gbest performed well in slowly changing environments.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115861708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EvoBoids: Co-design of a physical and virtual game using Artificial Evolution EvoBoids:使用人工进化技术共同设计物理和虚拟游戏
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7850281
David C. Alvarez-Charris, A. Pérez-Uribe, H. Satizábal, Jesús A. López
We present the co-design of a gaming scenario between an Artificial Evolution algorithm and a human designer. Such co-design is twofold, consisting of an initial stage in which a genetic algorithm is used to evolve the control parameters that define the behavior of a group of virtual agents. This produces interesting and unexpected results not only creating differentiated behaviors but also increasing the flexibility of the character to adapt to a given objective. In the second stage of the game design a human interplay was introduced in adding other elements to the game, such as other characters and new game dynamics. In this paper we introduce a game that integrates virtual and physical characters while taking advantage of such co-design approach. The physical character consists of a robot which controlled through a Natural User Interface can be part of the game by interacting with other characters in the virtual environment.
我们提出了人工进化算法和人类设计师之间的游戏场景的共同设计。这种协同设计是双重的,包括一个初始阶段,其中使用遗传算法来进化控制参数,这些参数定义了一组虚拟代理的行为。这产生了有趣且意想不到的结果,不仅创造了不同的行为,还增加了角色适应特定目标的灵活性。在游戏设计的第二个阶段,我们在游戏中添加了其他元素,如其他角色和新的游戏动态,从而引入了人类互动。在本文中,我们将介绍一款整合了虚拟和物理角色并利用这种协同设计方法的游戏。物理角色由一个机器人组成,通过自然用户界面进行控制,可以通过与虚拟环境中的其他角色互动而成为游戏的一部分。
{"title":"EvoBoids: Co-design of a physical and virtual game using Artificial Evolution","authors":"David C. Alvarez-Charris, A. Pérez-Uribe, H. Satizábal, Jesús A. López","doi":"10.1109/SSCI.2016.7850281","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7850281","url":null,"abstract":"We present the co-design of a gaming scenario between an Artificial Evolution algorithm and a human designer. Such co-design is twofold, consisting of an initial stage in which a genetic algorithm is used to evolve the control parameters that define the behavior of a group of virtual agents. This produces interesting and unexpected results not only creating differentiated behaviors but also increasing the flexibility of the character to adapt to a given objective. In the second stage of the game design a human interplay was introduced in adding other elements to the game, such as other characters and new game dynamics. In this paper we introduce a game that integrates virtual and physical characters while taking advantage of such co-design approach. The physical character consists of a robot which controlled through a Natural User Interface can be part of the game by interacting with other characters in the virtual environment.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Induced aggregation operators in the ordered weighted average sum 有序加权平均和中的诱导聚合算子
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7850148
J. Merigó, N. Alrajeh, M. Peris-Ortiz
The ordered weighted average (OWA) aggregation is an extension of the classical weighted average by using a reordering process of the arguments in a decreasing or increasing way. This article presents new averaging aggregation operators by using sums and order inducing variables. This approach produces the induced ordered weighted average sum (IOWAS). The IOWAS operator aggregates a set of sums using a complex reordering process based on order-inducing variables. This approach includes a different types of aggregation structures including the well-known OWA families. The work presents additional generalizations by using generalized and quasi-arithmetic means. The paper ends with a simple numerical example that shows how to aggregate with this new approach.
有序加权平均(OWA)聚合是对经典加权平均的扩展,通过对参数以递减或递增的方式进行重新排序。本文利用和和和序诱导变量提出了一种新的平均聚合算子。这种方法产生了诱导有序加权平均和(IOWAS)。IOWAS操作符使用基于顺序诱导变量的复杂重新排序过程聚合一组总和。这种方法包括不同类型的聚合结构,包括众所周知的OWA家族。本文通过使用广义和准算术方法给出了附加的推广。文章最后以一个简单的数值例子说明了如何使用这种新方法进行聚合。
{"title":"Induced aggregation operators in the ordered weighted average sum","authors":"J. Merigó, N. Alrajeh, M. Peris-Ortiz","doi":"10.1109/SSCI.2016.7850148","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7850148","url":null,"abstract":"The ordered weighted average (OWA) aggregation is an extension of the classical weighted average by using a reordering process of the arguments in a decreasing or increasing way. This article presents new averaging aggregation operators by using sums and order inducing variables. This approach produces the induced ordered weighted average sum (IOWAS). The IOWAS operator aggregates a set of sums using a complex reordering process based on order-inducing variables. This approach includes a different types of aggregation structures including the well-known OWA families. The work presents additional generalizations by using generalized and quasi-arithmetic means. The paper ends with a simple numerical example that shows how to aggregate with this new approach.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131969518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security analysis on InfiniBand protocol implementations ib协议实现的安全性分析
Pub Date : 2016-12-01 DOI: 10.1109/SSCI.2016.7849903
Kul Prasad Subedi, D. Dasgupta, Bo Chen
The growing popularity of high performance computing has led to a new focus on bypassing or eliminating traditional I/O operations that are usually the bottlenecks for fast processing of large data volumes. One such solution uses a new network communication protocol called InfiniBand (IB) which supports remote direct memory access without making two copies of data (one in user space and the other in kernel space) and thus provides very low latency and very high throughput. To this end, for many industries, IB has now become a promising inter-connect protocol over Ethernet technologies. Ensuring the security of this new protocol is critical since more and more companies are moving towards it. To ensure the security of IB, the first step is to have a thorough understand of the vulnerabilities of its current implementations, which is unfortunately still missing in the literature. In this paper, we aim to fill this gap. In particular, we perform a static code analysis as well as protocol testing in order to examine security features in IB architecture from the implementation perspective. While our extensive penetration testing could not find any significant security loopholes; there are certain aspects in both the design and the implementations that need to be addressed. Our focus is in the implementation perspective. Specifically, we found there is a significant use for a number of vulnerable functions (e.g., memcpy, sprintf, and char) as well as obsolete functions (e.g., memalign) that we believe should be replaced with alternative functions such as memmove, snprintf, getline, and posix memalign. We believe our work will benefit both the protocol developers as well as the users by taking the first step to ensure the security of IB protocol.
高性能计算的日益普及导致了对绕过或消除传统I/O操作的新关注,这些操作通常是快速处理大数据量的瓶颈。其中一种解决方案使用一种称为InfiniBand (IB)的新网络通信协议,它支持远程直接内存访问,而无需生成两个数据副本(一个在用户空间,另一个在内核空间),因此提供了非常低的延迟和非常高的吞吐量。为此,对于许多行业来说,IB现在已经成为以太网技术上有前途的互连协议。确保这个新协议的安全性至关重要,因为越来越多的公司正在转向它。为了确保IB的安全性,第一步是彻底了解其当前实现的漏洞,不幸的是,这在文献中仍然缺失。在本文中,我们的目标是填补这一空白。特别是,我们执行静态代码分析和协议测试,以便从实现的角度检查IB架构中的安全特性。虽然我们广泛的渗透测试没有发现任何重大的安全漏洞;在设计和实现中都有某些方面需要解决。我们的重点是在实现方面。具体来说,我们发现许多易受攻击的函数(例如,memcpy、sprintf和char)以及过时的函数(例如,memalign)都有很大的用处,我们认为应该用memmove、snprintf、getline和posix memalign等替代函数来替换它们。我们相信,我们的工作将为确保IB协议的安全性迈出第一步,从而使协议开发者和用户都受益。
{"title":"Security analysis on InfiniBand protocol implementations","authors":"Kul Prasad Subedi, D. Dasgupta, Bo Chen","doi":"10.1109/SSCI.2016.7849903","DOIUrl":"https://doi.org/10.1109/SSCI.2016.7849903","url":null,"abstract":"The growing popularity of high performance computing has led to a new focus on bypassing or eliminating traditional I/O operations that are usually the bottlenecks for fast processing of large data volumes. One such solution uses a new network communication protocol called InfiniBand (IB) which supports remote direct memory access without making two copies of data (one in user space and the other in kernel space) and thus provides very low latency and very high throughput. To this end, for many industries, IB has now become a promising inter-connect protocol over Ethernet technologies. Ensuring the security of this new protocol is critical since more and more companies are moving towards it. To ensure the security of IB, the first step is to have a thorough understand of the vulnerabilities of its current implementations, which is unfortunately still missing in the literature. In this paper, we aim to fill this gap. In particular, we perform a static code analysis as well as protocol testing in order to examine security features in IB architecture from the implementation perspective. While our extensive penetration testing could not find any significant security loopholes; there are certain aspects in both the design and the implementations that need to be addressed. Our focus is in the implementation perspective. Specifically, we found there is a significant use for a number of vulnerable functions (e.g., memcpy, sprintf, and char) as well as obsolete functions (e.g., memalign) that we believe should be replaced with alternative functions such as memmove, snprintf, getline, and posix memalign. We believe our work will benefit both the protocol developers as well as the users by taking the first step to ensure the security of IB protocol.","PeriodicalId":120288,"journal":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2016 IEEE Symposium Series on Computational Intelligence (SSCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1