首页 > 最新文献

Int. J. Soc. Comput. Cyber Phys. Syst.最新文献

英文 中文
Detecting malicious users in the social networks using machine learning approach 利用机器学习方法检测社交网络中的恶意用户
Pub Date : 2021-09-17 DOI: 10.1504/ijsccps.2021.117959
H. L. Gururaj, U. Tanuja, V. Janhavi, B. Ramesh
Social networking plays a very important role in today's life. It helps to share ideas, information, multimedia messages and also provides the means of communication between the users. The popular social medias such as Facebook, Twitter, Instagram, etc., where the billions of data are being created in huge volume. Every user has their right to use any social media and a large number of users allowed malicious users by providing private or sensitive information, which results in security threats. In this research, they are proposing an natural language processing (NLP) technique to find suspicious users based on the daily conversations between the users. They demonstrated the behaviour of each user through their anomaly activities. Another machine learning technique called support vector machine (SVM) classifiers to detect the toxic comments in the comments blog. In this paper, the preliminary work concentrates on detecting the malicious user through the anomaly activities, behaviour profiles, messages and comment section.
社交网络在当今生活中扮演着非常重要的角色。它有助于分享想法、信息、多媒体消息,并提供用户之间的通信手段。流行的社交媒体,如Facebook, Twitter, Instagram等,其中数十亿的数据正在大量创建。每个用户都有使用任何社交媒体的权利,大量用户允许恶意用户提供私人或敏感信息,从而导致安全威胁。在这项研究中,他们提出了一种自然语言处理(NLP)技术,可以根据用户之间的日常对话来发现可疑用户。他们通过异常活动展示了每个用户的行为。另一种机器学习技术称为支持向量机(SVM)分类器,用于检测评论博客中的有毒评论。本文的前期工作主要集中在通过异常活动、行为配置文件、消息和评论部分检测恶意用户。
{"title":"Detecting malicious users in the social networks using machine learning approach","authors":"H. L. Gururaj, U. Tanuja, V. Janhavi, B. Ramesh","doi":"10.1504/ijsccps.2021.117959","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117959","url":null,"abstract":"Social networking plays a very important role in today's life. It helps to share ideas, information, multimedia messages and also provides the means of communication between the users. The popular social medias such as Facebook, Twitter, Instagram, etc., where the billions of data are being created in huge volume. Every user has their right to use any social media and a large number of users allowed malicious users by providing private or sensitive information, which results in security threats. In this research, they are proposing an natural language processing (NLP) technique to find suspicious users based on the daily conversations between the users. They demonstrated the behaviour of each user through their anomaly activities. Another machine learning technique called support vector machine (SVM) classifiers to detect the toxic comments in the comments blog. In this paper, the preliminary work concentrates on detecting the malicious user through the anomaly activities, behaviour profiles, messages and comment section.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The troika of artificial intelligence, emotional intelligence and customer intelligence 人工智能、情商和客户智能这三驾马车
Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100195
Manish Sharma, Shikha N. Khera, P. B. Sharma
Emotional intelligence is to recognise emotions and emotions can be recognised by analysing face. Face reflects emotions, and thus facial images can help to identify emotions. Emotions recognition can help in conducting qualitative market research techniques like focus groups; in-depth interviews and other which can be used to generate customer intelligence. This paper provides a cross-disciplinary view of Intelligence. This paper proposes a machine learning-based model to accomplish the task of identifying emotions from given facial images. This paper uses a public database and divides the images into four groups. The feature extraction has been done by principal component analysis and the feature selection by fisher discriminant ratio. The classification has been done by support vector machine using k cross-validation. The accuracy, specificity and sensitivity are encouraging. The average accuracy is 0.84
情商是识别情绪的能力,而情绪可以通过分析面部来识别。面部反映情绪,因此面部图像可以帮助识别情绪。情绪识别可以帮助进行定性市场研究技术,如焦点小组;深度访谈和其他可以用来产生客户情报的方法。这篇论文提供了智能的跨学科观点。本文提出了一种基于机器学习的模型来完成从给定的面部图像中识别情绪的任务。本文使用公共数据库,将图像分为四组。利用主成分分析进行特征提取,利用fisher判别比进行特征选择。使用k交叉验证的支持向量机完成了分类。其准确性、特异性和敏感性令人鼓舞。平均准确率为0.84
{"title":"The troika of artificial intelligence, emotional intelligence and customer intelligence","authors":"Manish Sharma, Shikha N. Khera, P. B. Sharma","doi":"10.1504/IJSCCPS.2019.100195","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100195","url":null,"abstract":"Emotional intelligence is to recognise emotions and emotions can be recognised by analysing face. Face reflects emotions, and thus facial images can help to identify emotions. Emotions recognition can help in conducting qualitative market research techniques like focus groups; in-depth interviews and other which can be used to generate customer intelligence. This paper provides a cross-disciplinary view of Intelligence. This paper proposes a machine learning-based model to accomplish the task of identifying emotions from given facial images. This paper uses a public database and divides the images into four groups. The feature extraction has been done by principal component analysis and the feature selection by fisher discriminant ratio. The classification has been done by support vector machine using k cross-validation. The accuracy, specificity and sensitivity are encouraging. The average accuracy is 0.84","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication schemes for social network users: a review 社交网络用户认证方案综述
Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100199
Swapnil S. Ninawe, P. Venkataram
Social networks have been very successful for information sharing due to the rapid development of communication and networking. As the technology modernised and many unprotected types of equipment are used in sharing information like events, knowledge, activities, etc., there is a need for a high protection of social networking sites by providing dynamic authentication for social networks users. It is no longer a question of determining whether a user is who or what he/she is declared to be, but it is essential to design a convenient and credible authentication based on activity, relation, etc., of users. Managing and handling such authentication of users is complex and hard for which broad range of technologies need to be called. In this paper, we review some of the existing authentication schemes for social network users. Mainly, we highlight advantages of the existing schemes along with some of the improvements that can be incorporated. We also highlight some of the attacks and their prevention in social networks.
由于通信和网络的快速发展,社交网络在信息共享方面取得了很大的成功。随着技术的现代化和许多未受保护的设备类型被用于共享事件,知识,活动等信息,因此需要通过为社交网络用户提供动态认证来高度保护社交网站。这不再是一个确定用户是否是谁或他/她被声明为什么的问题,而是基于用户的活动、关系等设计一个方便、可信的认证是至关重要的。管理和处理这样的用户身份验证是复杂和困难的,需要调用广泛的技术。在本文中,我们回顾了一些现有的社会网络用户认证方案。我们主要强调现有计划的优点,以及一些可纳入的改进措施。我们还重点介绍了社交网络中的一些攻击及其预防措施。
{"title":"Authentication schemes for social network users: a review","authors":"Swapnil S. Ninawe, P. Venkataram","doi":"10.1504/IJSCCPS.2019.100199","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100199","url":null,"abstract":"Social networks have been very successful for information sharing due to the rapid development of communication and networking. As the technology modernised and many unprotected types of equipment are used in sharing information like events, knowledge, activities, etc., there is a need for a high protection of social networking sites by providing dynamic authentication for social networks users. It is no longer a question of determining whether a user is who or what he/she is declared to be, but it is essential to design a convenient and credible authentication based on activity, relation, etc., of users. Managing and handling such authentication of users is complex and hard for which broad range of technologies need to be called. In this paper, we review some of the existing authentication schemes for social network users. Mainly, we highlight advantages of the existing schemes along with some of the improvements that can be incorporated. We also highlight some of the attacks and their prevention in social networks.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber-squatting: a cyber crime more than an unethical act 域名抢注:不仅仅是不道德的行为,更是一种网络犯罪
Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100197
Ramesh Chandra, Vaibhav Bhatnagar
Cyber-crimes are increasing day by day. They equally affect a person or a society as compared to other crimes. There are so many cyber-crimes such as hacking, phishing and cyber terrorism, etc. However there are some unethical activities that also affect a person or society such as cyber-squatting. This paper gives a glance about cyber-squatting which is consider as unethical practice, but as per the rate it is increasing day by day it is becoming necessary that it should be included in constitution. This paper illustrates cyber-squatting with the help of examples and some case studies.
网络犯罪日益增多。与其他犯罪相比,它们对个人或社会的影响是一样的。有很多网络犯罪,如黑客攻击、网络钓鱼和网络恐怖主义等。然而,也有一些不道德的活动也会影响一个人或社会,比如域名抢注。本文简要介绍了域名抢注,这是一种不道德的行为,但随着其日益增长的速度,将其纳入宪法是必要的。本文通过实例和案例分析来阐述域名抢注问题。
{"title":"Cyber-squatting: a cyber crime more than an unethical act","authors":"Ramesh Chandra, Vaibhav Bhatnagar","doi":"10.1504/IJSCCPS.2019.100197","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100197","url":null,"abstract":"Cyber-crimes are increasing day by day. They equally affect a person or a society as compared to other crimes. There are so many cyber-crimes such as hacking, phishing and cyber terrorism, etc. However there are some unethical activities that also affect a person or society such as cyber-squatting. This paper gives a glance about cyber-squatting which is consider as unethical practice, but as per the rate it is increasing day by day it is becoming necessary that it should be included in constitution. This paper illustrates cyber-squatting with the help of examples and some case studies.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121319292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-preserving targeted online advertising 保护隐私的定向在线广告
Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100196
Ainish Dave, Hardik Gajera, M. Das
Preserving privacy of the user data is one of the important requirements in several practical applications. In recent times, the targeted advertisement is found a potential business model that the services provider can use it for revenue growth. As the advertising server (ad-server) tracks the user's activity through the user's browsing history or through the user's mobile application feature for future purposes, the privacy of user's data could fall in hand of many parties without the knowledge of the user. In this paper, a scheme for privacy preserving targeted online advertisement is presented. The proposed scheme uses homomorphic encryption aiming at extracting keywords from web pages in real-time when a user is browsing web pages. A user can avail the services privately from the ad-server by perform the computation on encrypted data stored in the server. The proposed scheme is compared with some related schemes and the experimental results show that the proposed scheme is efficient and practical
保护用户数据的隐私是许多实际应用中的重要要求之一。近年来,定向广告被发现是一种潜在的商业模式,服务提供商可以利用它来增加收入。由于广告服务器(ad-server)通过用户的浏览历史记录或通过用户的移动应用功能来跟踪用户的活动以备将来使用,用户数据的隐私可能会在用户不知情的情况下落入许多人手中。本文提出了一种保护隐私的定向在线广告方案。该方案采用同态加密技术,在用户浏览网页时实时从网页中提取关键词。用户可以通过对存储在服务器上的加密数据进行计算来私下利用广告服务器提供的服务。实验结果表明,该方案具有较好的有效性和实用性
{"title":"Privacy-preserving targeted online advertising","authors":"Ainish Dave, Hardik Gajera, M. Das","doi":"10.1504/IJSCCPS.2019.100196","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100196","url":null,"abstract":"Preserving privacy of the user data is one of the important requirements in several practical applications. In recent times, the targeted advertisement is found a potential business model that the services provider can use it for revenue growth. As the advertising server (ad-server) tracks the user's activity through the user's browsing history or through the user's mobile application feature for future purposes, the privacy of user's data could fall in hand of many parties without the knowledge of the user. In this paper, a scheme for privacy preserving targeted online advertisement is presented. The proposed scheme uses homomorphic encryption aiming at extracting keywords from web pages in real-time when a user is browsing web pages. A user can avail the services privately from the ad-server by perform the computation on encrypted data stored in the server. The proposed scheme is compared with some related schemes and the experimental results show that the proposed scheme is efficient and practical","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of an efficient and intelligent Indian maritime borderline alert system using IoT 利用物联网实施高效智能的印度海上边界警报系统
Pub Date : 2019-06-14 DOI: 10.1504/IJSCCPS.2019.100184
M. Jerlin, Anindya Das, Joshua Agbonjaru
The sea border issues are crucial to nations where it is hard to have a track of boarder for fishermen. About 180,000 fishing vessels of assorted forms are involved in fishing along the Indian-Sri Lankan maritime border. But fishing activities in that region has always been an agitating factor, ever since violence broke out in Sri Lanka about three decades ago. This problem however this can be solved only by an efficient and intelligent boundary alert system using IoT. Internet of things has the technology to make it possible for monitoring the sea border levels to know the border location. The Intelligent Maritime Borderline Alter System or IMBAS incorporates the new methodology of IoT for saving the fishermen's life as well as their sole assets in which their mode of income depends. The methodology includes tracking the position of the boat in real time using a differential GPS system and keeping the boat in safe waters, well inside the Indian Territory. The system will also notify the ground control as and when the boat approaches the maritime borderline.
海上边界问题对那些难以追踪渔民边界的国家至关重要。大约有18万艘各种形式的渔船在印度-斯里兰卡海上边界捕鱼。但自从大约30年前斯里兰卡爆发暴力冲突以来,该地区的捕鱼活动一直是一个令人不安的因素。然而,这个问题只能通过使用物联网的高效智能边界警报系统来解决。物联网的技术使监测海洋边界高度了解边界位置成为可能。智能海上边界改变系统(IMBAS)结合了物联网的新方法,以拯救渔民的生命以及他们收入模式所依赖的唯一资产。该方法包括使用差分GPS系统实时跟踪船的位置,并将船保持在印度领土内的安全水域。该系统还将在船只接近海上分界线时通知地面控制中心。
{"title":"Implementation of an efficient and intelligent Indian maritime borderline alert system using IoT","authors":"M. Jerlin, Anindya Das, Joshua Agbonjaru","doi":"10.1504/IJSCCPS.2019.100184","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100184","url":null,"abstract":"The sea border issues are crucial to nations where it is hard to have a track of boarder for fishermen. About 180,000 fishing vessels of assorted forms are involved in fishing along the Indian-Sri Lankan maritime border. But fishing activities in that region has always been an agitating factor, ever since violence broke out in Sri Lanka about three decades ago. This problem however this can be solved only by an efficient and intelligent boundary alert system using IoT. Internet of things has the technology to make it possible for monitoring the sea border levels to know the border location. The Intelligent Maritime Borderline Alter System or IMBAS incorporates the new methodology of IoT for saving the fishermen's life as well as their sole assets in which their mode of income depends. The methodology includes tracking the position of the boat in real time using a differential GPS system and keeping the boat in safe waters, well inside the Indian Territory. The system will also notify the ground control as and when the boat approaches the maritime borderline.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127501272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data analytics in healthcare: opportunities, challenges and techniques 医疗保健中的大数据分析:机遇、挑战和技术
Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10005265
Madhu Kumari, Singh Vijendra
Big data has evolved as a most challenging field of study and research area. It has drawn much attention during the last few years and influences our modern society including business, government, healthcare, and in research in almost every discipline. Big data has a huge potential to improve healthcare. A proper analysis of existing healthcare data fabricates most suitable predictive results and cut the cost and time of treatment. The collaboration of IT and healthcare industry has revolutionarised the healthcare management system. This paper attempts to merge the description of big data by integrating various concepts and definitions from the different researchers and academicians. This paper highlights the potential and corresponding challenges in healthcare data analysis. A summarisation on different research trends within healthcare data analysis is presented.
大数据已经发展成为一个最具挑战性的研究领域。在过去的几年里,它引起了人们的广泛关注,影响着我们的现代社会,包括商业、政府、医疗保健和几乎所有学科的研究。大数据在改善医疗保健方面具有巨大潜力。对现有医疗保健数据进行适当的分析可以生成最合适的预测结果,并减少治疗成本和时间。IT和医疗保健行业的合作使医疗保健管理系统发生了革命性的变化。本文试图通过整合不同研究者和学者的各种概念和定义,对大数据的描述进行合并。本文强调了医疗保健数据分析的潜力和相应的挑战。摘要在医疗保健数据分析不同的研究趋势提出。
{"title":"Big data analytics in healthcare: opportunities, challenges and techniques","authors":"Madhu Kumari, Singh Vijendra","doi":"10.1504/IJSCCPS.2017.10005265","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005265","url":null,"abstract":"Big data has evolved as a most challenging field of study and research area. It has drawn much attention during the last few years and influences our modern society including business, government, healthcare, and in research in almost every discipline. Big data has a huge potential to improve healthcare. A proper analysis of existing healthcare data fabricates most suitable predictive results and cut the cost and time of treatment. The collaboration of IT and healthcare industry has revolutionarised the healthcare management system. This paper attempts to merge the description of big data by integrating various concepts and definitions from the different researchers and academicians. This paper highlights the potential and corresponding challenges in healthcare data analysis. A summarisation on different research trends within healthcare data analysis is presented.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data sharing sensitivity, relevance, and social traits in social information retrieval 社会信息检索中的数据共享敏感性、相关性与社会特征
Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10009736
Christoph Fuchs, Georg Groh
This paper evaluates a social information retrieval system where users can query each other for information. The approached user can reply to queries ('manual mode scenario') based on her knowledge. In addition, a social product search scenario is evaluated, where results are enriched with items bought or viewed by a social peer group ('social product search scenario'). Each scenario is tested with more than 120 participants. Our findings suggest that asking others reveals relevant results. The injection of socially motivated result items in result list for product queries did not increase quality. Users share more private information using strong ties. In addition, a reactive sharing pattern (which does not rely on previously published material, but queries directly using a pull regime) increases the amount of data for social information retrieval. The majority of questions covered recommendations in media, travel, technology, and food and personal opinions on technology-related topics and travel.
本文评估了一个用户可以相互查询信息的社会信息检索系统。接近的用户可以根据她的知识回答问题(“手动模式场景”)。此外,还对社交产品搜索场景进行了评估,在该场景中,通过社交同伴群体购买或查看的商品丰富了结果(“社交产品搜索场景”)。每个场景都有超过120名参与者参与测试。我们的研究结果表明,询问他人可以得到相关的结果。在产品查询的结果列表中注入社会动机的结果项并没有提高质量。用户通过强关系分享更多的私人信息。此外,响应式共享模式(不依赖于先前发布的材料,而是直接使用pull机制进行查询)增加了用于社会信息检索的数据量。大多数问题涉及媒体、旅游、科技和食品方面的建议,以及对科技相关话题和旅游的个人意见。
{"title":"Data sharing sensitivity, relevance, and social traits in social information retrieval","authors":"Christoph Fuchs, Georg Groh","doi":"10.1504/IJSCCPS.2017.10009736","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10009736","url":null,"abstract":"This paper evaluates a social information retrieval system where users can query each other for information. The approached user can reply to queries ('manual mode scenario') based on her knowledge. In addition, a social product search scenario is evaluated, where results are enriched with items bought or viewed by a social peer group ('social product search scenario'). Each scenario is tested with more than 120 participants. Our findings suggest that asking others reveals relevant results. The injection of socially motivated result items in result list for product queries did not increase quality. Users share more private information using strong ties. In addition, a reactive sharing pattern (which does not rely on previously published material, but queries directly using a pull regime) increases the amount of data for social information retrieval. The majority of questions covered recommendations in media, travel, technology, and food and personal opinions on technology-related topics and travel.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130432412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaos based novel cryptographic technique based on a new logistic map 基于一种新的逻辑映射的混沌密码技术
Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10009740
A. A. Shah, S. A. Parah
In today's information age, a lot of data is being transferred over insecure channels like intranet and internet. This data needs to be secured against various attacks from an eavesdropper/intruder, etc. Of late chaotic encryption has caught the attention of research community round the globe for securing data, due to excellent characteristics of chaos such as data mixing, sensitivity to initial conditions, and ergodicity. In this work, we propose a novel modular logistic map (MLM) and show that it has better properties like larger Lyapunov exponent (LE), uniform invariant density, mixing and higher range of bifurcation parameter, etc., compared to basic logistic map. We have further exploited these properties of MLM for designing a secure robust, strong and efficient text cryptosystem. It has been further shown that encryption and decryption time using proposed scheme is quite small and hence the proposed cryptosystem suitable for real-time encryption applications.
在当今的信息时代,大量的数据是通过内部网和互联网等不安全的渠道传输的。这些数据需要保护,以防止来自窃听者/入侵者等的各种攻击。由于混沌具有数据混合、对初始条件敏感、遍历性等优异的特性,近年来混沌加密技术在数据安全方面引起了全球研究界的关注。在这项工作中,我们提出了一种新的模块化逻辑映射(MLM),并证明了与基本逻辑映射相比,它具有更大的Lyapunov指数(LE)、均匀不变密度、混合和更大的分岔参数范围等更好的特性。我们进一步利用传销的这些特性来设计一个安全、健壮、强大和高效的文本密码系统。进一步证明,该方案的加解密时间非常短,适合于实时加密应用。
{"title":"Chaos based novel cryptographic technique based on a new logistic map","authors":"A. A. Shah, S. A. Parah","doi":"10.1504/IJSCCPS.2017.10009740","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10009740","url":null,"abstract":"In today's information age, a lot of data is being transferred over insecure channels like intranet and internet. This data needs to be secured against various attacks from an eavesdropper/intruder, etc. Of late chaotic encryption has caught the attention of research community round the globe for securing data, due to excellent characteristics of chaos such as data mixing, sensitivity to initial conditions, and ergodicity. In this work, we propose a novel modular logistic map (MLM) and show that it has better properties like larger Lyapunov exponent (LE), uniform invariant density, mixing and higher range of bifurcation parameter, etc., compared to basic logistic map. We have further exploited these properties of MLM for designing a secure robust, strong and efficient text cryptosystem. It has been further shown that encryption and decryption time using proposed scheme is quite small and hence the proposed cryptosystem suitable for real-time encryption applications.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme 基于lorenz混沌和异或的图像加密方案分析
Pub Date : 2017-12-19 DOI: 10.1504/IJSCCPS.2017.10009739
I. Saini, Phool Singh, A. K. Yadav
In this paper, analysis of Lorenz-chaos and exclusive-OR based image encryption scheme has been presented. The Lorenz system is used in shuffling the positions of image pixels in the spatial-domain and gray values of pixels are altered with exclusive-OR operation. The encryption scheme has been validated for grayscale images using MATLAB 7.14 and is sensitive to the encryption parameters of the Lorenz system. The experimental results establish that the key-space is large enough to resist brute-force attack, and demonstrate the scheme's resistance to noise and occlusion attacks. Statistical and correlation analysis of adjacent pixels are also performed.
本文分析了基于lorenz混沌和异或的图像加密方案。利用洛伦兹系统变换图像像素在空间域中的位置,并通过异或运算改变像素的灰度值。该加密方案在MATLAB 7.14环境下对灰度图像进行了验证,对洛伦兹系统的加密参数敏感。实验结果表明,密钥空间足够大,可以抵抗蛮力攻击,并证明了该方案具有抗噪声和遮挡攻击的能力。对相邻像素进行了统计和相关分析。
{"title":"Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme","authors":"I. Saini, Phool Singh, A. K. Yadav","doi":"10.1504/IJSCCPS.2017.10009739","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10009739","url":null,"abstract":"In this paper, analysis of Lorenz-chaos and exclusive-OR based image encryption scheme has been presented. The Lorenz system is used in shuffling the positions of image pixels in the spatial-domain and gray values of pixels are altered with exclusive-OR operation. The encryption scheme has been validated for grayscale images using MATLAB 7.14 and is sensitive to the encryption parameters of the Lorenz system. The experimental results establish that the key-space is large enough to resist brute-force attack, and demonstrate the scheme's resistance to noise and occlusion attacks. Statistical and correlation analysis of adjacent pixels are also performed.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121753281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Int. J. Soc. Comput. Cyber Phys. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1