首页 > 最新文献

2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)最新文献

英文 中文
An Electronic Medical Record Management System Based on Smart Contracts 基于智能合约的电子病历管理系统
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00050
Weiwei Yang, Jie-Si Chen, Yeong-Sheng Chen
This study proposed a management system of the electronic medical records in the blockchain environment. In the proposed system, electronic medical records are first stored in the InterPlanetary File System (IPFS), and then the system generates the hash value, which will be sent to the smart contract to correlate with the patients' data. After that, if the medical staff's medical authority is confirmed by the system, the smart contract can send back the hash value that IPFS generated, and thus the system will present the complete electronic medical records. In the experimental simulation, the results showed that our proposed electronic medical record management and storage process not only can block forged or tampered electronic medical records via smart contracts, but also make it easy to integrate electronic medical records and share medical resources.
本研究提出了一种区块链环境下的电子病历管理系统。在提出的系统中,电子病历首先存储在星际文件系统(IPFS)中,然后系统生成哈希值,该哈希值将发送到智能合约以与患者数据相关联。之后,如果医护人员的医疗权限被系统确认,智能合约就可以发回IPFS生成的哈希值,系统就会呈现完整的电子病历。实验仿真结果表明,我们提出的电子病历管理和存储流程不仅可以通过智能合约阻止伪造或篡改的电子病历,而且可以方便地集成电子病历和共享医疗资源。
{"title":"An Electronic Medical Record Management System Based on Smart Contracts","authors":"Weiwei Yang, Jie-Si Chen, Yeong-Sheng Chen","doi":"10.1109/Ubi-Media.2019.00050","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00050","url":null,"abstract":"This study proposed a management system of the electronic medical records in the blockchain environment. In the proposed system, electronic medical records are first stored in the InterPlanetary File System (IPFS), and then the system generates the hash value, which will be sent to the smart contract to correlate with the patients' data. After that, if the medical staff's medical authority is confirmed by the system, the smart contract can send back the hash value that IPFS generated, and thus the system will present the complete electronic medical records. In the experimental simulation, the results showed that our proposed electronic medical record management and storage process not only can block forged or tampered electronic medical records via smart contracts, but also make it easy to integrate electronic medical records and share medical resources.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121419561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mixed Word Representation and Minimal Bi-GRU Model for Sentiment Analysis 情感分析的混合词表示和最小Bi-GRU模型
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00015
Yun Liu, Yanping Fu, Yajing Wang, Yong Cui, Zhiyuan Zhang
In the mission of natural language processing, sentiment analysis is a formidable challenge due to the complexity of deep network architecture and the lack of standard sentiment word representation. In this paper, we proposed a new learning method of the word representation for the comprehensive information of texts and a minimal Bi-GRU (bidirectional gate recurrent unit) model for the task of sentiment classification. First, for capturing sentiment information of words, the supervised three-layer network is used for construct sentiment word representation. We propose the mixed word representation to denote the classification characteristics, which combines the word embedding of neural probabilistic language model with the proposed the sentiment word representation. Next, we propose bidirectional GRU network including forward and backward propagation to consider the semantic relations before and after sentences, meanwhile, to simple the architecture, we apply minimal GRU network. Then, we combine minimal Bi-GRU model with the mixed word representation taking a full account of semantic and sentiment information to classify the sentiment data set as Movie Reviews and IMDB data set. Experimental results demonstrate that the simplicity of the model and superiority of the performance.
在自然语言处理的任务中,由于深度网络结构的复杂性和缺乏标准的情感词表示,情感分析是一个巨大的挑战。在本文中,我们提出了一种新的文本综合信息的词表示学习方法和情感分类任务的最小Bi-GRU(双向门递归单元)模型。首先,为了捕获词的情感信息,采用监督三层网络构建情感词表示;我们提出了混合词表示来表示分类特征,它将神经概率语言模型的词嵌入与提出的情感词表示相结合。其次,我们提出了双向GRU网络,包括正向和反向传播,以考虑句子前后的语义关系,同时,为了简化结构,我们采用了最小GRU网络。然后,我们将最小Bi-GRU模型与充分考虑语义和情感信息的混合词表示相结合,将情感数据集分类为Movie Reviews和IMDB数据集。实验结果表明,该模型简单,性能优越。
{"title":"Mixed Word Representation and Minimal Bi-GRU Model for Sentiment Analysis","authors":"Yun Liu, Yanping Fu, Yajing Wang, Yong Cui, Zhiyuan Zhang","doi":"10.1109/Ubi-Media.2019.00015","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00015","url":null,"abstract":"In the mission of natural language processing, sentiment analysis is a formidable challenge due to the complexity of deep network architecture and the lack of standard sentiment word representation. In this paper, we proposed a new learning method of the word representation for the comprehensive information of texts and a minimal Bi-GRU (bidirectional gate recurrent unit) model for the task of sentiment classification. First, for capturing sentiment information of words, the supervised three-layer network is used for construct sentiment word representation. We propose the mixed word representation to denote the classification characteristics, which combines the word embedding of neural probabilistic language model with the proposed the sentiment word representation. Next, we propose bidirectional GRU network including forward and backward propagation to consider the semantic relations before and after sentences, meanwhile, to simple the architecture, we apply minimal GRU network. Then, we combine minimal Bi-GRU model with the mixed word representation taking a full account of semantic and sentiment information to classify the sentiment data set as Movie Reviews and IMDB data set. Experimental results demonstrate that the simplicity of the model and superiority of the performance.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Preprocessing Method for Solving Long Sequence Problem in Android Malware Detection Android恶意软件检测中一种解决长序列问题的预处理方法
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00012
Yi Ming Chen, C. H. Hsu, Kuo Chung Kuo Chung
Traditional machine learning mostly uses N-gram methods for serialization data prediction, which is not only time-consuming in the pre-processing but also computationally expensive for the model. For the current common malware detection methods, a variety of features such as API, system call, control flow, and permissions are used for machine learning analysis. However, these features depend on expert analysis and to extract multiple features is also time-consuming. This study uses Dalvik opcode as a feature, which is information rich and easy to extract. However, for the time series features of the opcode, the LSTM model and other sequence models will need effective dimension reduction approach because of the long sequence problem and variable feature length, resulting in poor training performance and long training time. Some study uses the training Embedding layer and Autoencoder to reduce the feature dimension. This method requires a layer of network training time. Another method is through feature selection. This method will result in different results as long as the data set changes or the sequence semantic is lost after feature selection. Therefore, in order to solve the above problems, this paper proposes a new preprocessing method to solve the long sequence problem that the LSTM model will encounter, so as to achieve fast training and high accuracy. This study uses a new pre-processing approach combined with an LSTM model to detect malware and achieve 95.58% accuracy on Drebin 10 family and only take 45 seconds to train a model. In addition, in the face of the small training sample problems common to deep learning, this research experiment also proved effective.
传统的机器学习多采用N-gram方法进行序列化数据预测,不仅预处理时间长,而且模型计算量大。对于目前常见的恶意软件检测方法,使用API、系统调用、控制流、权限等多种特性进行机器学习分析。然而,这些特征依赖于专家的分析,并且提取多个特征也很耗时。本研究采用Dalvik操作码作为特征,信息丰富,易于提取。然而,对于操作码的时间序列特征,LSTM模型和其他序列模型由于序列问题长,特征长度多变,需要有效的降维方法,导致训练性能差,训练时间长。一些研究使用训练嵌入层和自编码器来降低特征维数。这种方法需要一层网络的训练时间。另一种方法是通过特征选择。只要数据集发生变化或特征选择后序列语义丢失,这种方法就会导致不同的结果。因此,为了解决上述问题,本文提出了一种新的预处理方法来解决LSTM模型会遇到的长序列问题,从而实现快速训练和高精度。本研究采用一种新的预处理方法结合LSTM模型来检测恶意软件,在Drebin 10家族上准确率达到95.58%,训练模型仅需45秒。此外,面对深度学习常见的小训练样本问题,本研究实验也被证明是有效的。
{"title":"A Novel Preprocessing Method for Solving Long Sequence Problem in Android Malware Detection","authors":"Yi Ming Chen, C. H. Hsu, Kuo Chung Kuo Chung","doi":"10.1109/Ubi-Media.2019.00012","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00012","url":null,"abstract":"Traditional machine learning mostly uses N-gram methods for serialization data prediction, which is not only time-consuming in the pre-processing but also computationally expensive for the model. For the current common malware detection methods, a variety of features such as API, system call, control flow, and permissions are used for machine learning analysis. However, these features depend on expert analysis and to extract multiple features is also time-consuming. This study uses Dalvik opcode as a feature, which is information rich and easy to extract. However, for the time series features of the opcode, the LSTM model and other sequence models will need effective dimension reduction approach because of the long sequence problem and variable feature length, resulting in poor training performance and long training time. Some study uses the training Embedding layer and Autoencoder to reduce the feature dimension. This method requires a layer of network training time. Another method is through feature selection. This method will result in different results as long as the data set changes or the sequence semantic is lost after feature selection. Therefore, in order to solve the above problems, this paper proposes a new preprocessing method to solve the long sequence problem that the LSTM model will encounter, so as to achieve fast training and high accuracy. This study uses a new pre-processing approach combined with an LSTM model to detect malware and achieve 95.58% accuracy on Drebin 10 family and only take 45 seconds to train a model. In addition, in the face of the small training sample problems common to deep learning, this research experiment also proved effective.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generating a 3D Hand Model from Position of Fingertip Using Image Processing Technique 利用图像处理技术从指尖位置生成三维手部模型
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00020
Natthapach Anuwattananon, S. Ruengittinun
A gesture from hands and fingers have rich meanings in communication even without a word of sound. It would be very useful if a computer can understand a hand gesture. Hence, we can use a hand gesture to communicate with a robot and perform certain activities. This study focuses on tracking the position of each fingertip and palm to make a computer knows the gesture of a hand. The proposed solution was initially implemented using a MS Kinect camera while capturing a depth image of a human hand. Then, we applied some image processing algorithms to track the positions of fingertips. Finally, the result was visualized in a real-time 3D hand model based on the movements/signs given by a human hand. The experiment results indicate that the proposed approach can literally track the positions of a fingertip.
即使没有声音,手和手指的手势在交流中也有丰富的含义。如果计算机能理解一个手势,那将是非常有用的。因此,我们可以使用手势与机器人进行交流并执行某些活动。这项研究的重点是跟踪每个指尖和手掌的位置,让电脑知道手的手势。提出的解决方案最初是通过MS Kinect摄像头来实现的,同时捕捉人手的深度图像。然后,我们应用了一些图像处理算法来跟踪指尖的位置。最后,根据人手的动作/手势,将结果显示在实时3D手部模型中。实验结果表明,该方法可以准确地跟踪指尖的位置。
{"title":"Generating a 3D Hand Model from Position of Fingertip Using Image Processing Technique","authors":"Natthapach Anuwattananon, S. Ruengittinun","doi":"10.1109/Ubi-Media.2019.00020","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00020","url":null,"abstract":"A gesture from hands and fingers have rich meanings in communication even without a word of sound. It would be very useful if a computer can understand a hand gesture. Hence, we can use a hand gesture to communicate with a robot and perform certain activities. This study focuses on tracking the position of each fingertip and palm to make a computer knows the gesture of a hand. The proposed solution was initially implemented using a MS Kinect camera while capturing a depth image of a human hand. Then, we applied some image processing algorithms to track the positions of fingertips. Finally, the result was visualized in a real-time 3D hand model based on the movements/signs given by a human hand. The experiment results indicate that the proposed approach can literally track the positions of a fingertip.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124529810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning Approach for Dynamic Object Understanding Using SIFT 基于SIFT的动态对象理解深度学习方法
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00033
Yuan-Tsung Chang, T. Shih
Deep learning is a method that is very commonly used in image recognition. We use the SIFT method to extract feature points, so that the machine can detect the objects in the motion images and they can be integrated into the operation of the robot arm to judge and capture specific objects. This method is also used to detect whether the parameters of the object meet the predetermined values. It will provide a warning if the predetermined values are not met. This can be used to identify the good and defective products on the production line. In the CNN database we have trained more than 30,000 images and improved the last step of SIFT algorithm to demonstrate that our new method can achieve better accuracy.
深度学习是一种在图像识别中非常常用的方法。我们使用SIFT方法提取特征点,使机器能够检测运动图像中的物体,并将其整合到机械臂的操作中,对特定物体进行判断和捕获。该方法还用于检测目标参数是否满足预定值。如果不满足预定值,它将提供警告。这可以用来识别生产线上的良品和次品。在CNN数据库中,我们训练了3万多张图像,并对SIFT算法的最后一步进行了改进,证明我们的新方法可以达到更好的准确率。
{"title":"A Deep Learning Approach for Dynamic Object Understanding Using SIFT","authors":"Yuan-Tsung Chang, T. Shih","doi":"10.1109/Ubi-Media.2019.00033","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00033","url":null,"abstract":"Deep learning is a method that is very commonly used in image recognition. We use the SIFT method to extract feature points, so that the machine can detect the objects in the motion images and they can be integrated into the operation of the robot arm to judge and capture specific objects. This method is also used to detect whether the parameters of the object meet the predetermined values. It will provide a warning if the predetermined values are not met. This can be used to identify the good and defective products on the production line. In the CNN database we have trained more than 30,000 images and improved the last step of SIFT algorithm to demonstrate that our new method can achieve better accuracy.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125562793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Whole Slide Ki-67 Proliferation Analysis System for Breast Carcinoma 全幻灯片Ki-67乳腺癌增殖分析系统
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00048
C. Ko, Chun-Hung Lin, Chih-Hung Chuang, Chuan-Yu Chang, Shih-Hao Chang, Ji-Han Jiang
The expression of Ki-67 with IHC stain has been utilized to assess the prognosis of breast cancer, and the degree of cellular differentiation and proliferation rate. Recently, some researchers utilize the index to predict metastasis of breast carcinoma. In traditional pathological screening, manual assessment of Ki-67 proliferative index may be limited by manual evaluation from different pathologists. Especially, inconsistent biopsy staining would affect the quantitation of Ki-67 proliferation so that developing an automatic system to assess Ki-67 proliferation index poses a big challenge. The goal of this paper is to propose an automatic analysis system to evaluate the degrees of Ki-67 proliferation on IHC stained cells of breast tissue using image processing and machine intelligence techniques. The proposed system not only can assist physicians diagnose, but also provides important information of treatment and prognosis. In order to validate the evaluation performance, we compared with visual assessments by a pathologist and the ImmnuoRatio (i.e., a web-based evaluation system in Ki-67 expression) developed by Vilppu J Tuominen et al.[1] via a number of Ki-67 stained samples for patients with breast carcinoma. Experimental results also demonstrate that the proposed system can automatically, accurately and reliably assess the Ki-67 proliferation index on the breast tissue images with a precision of around 87.37%. However, the accuracy evaluating with ImmunoRatio only can reach 75.82% with the same samples. Moreover, our proposed system also provides various interaction functions including browsing, navigation, and quantitative analyses for pathologists who evaluate the expression of the Ki-67 proliferation.
通过免疫组化染色检测Ki-67的表达可用于评价乳腺癌的预后、细胞分化程度和增殖率。近年来,一些研究者利用该指数预测乳腺癌的转移。在传统的病理筛查中,Ki-67增殖指数的人工评估可能会受到不同病理医师人工评估的限制。特别是活检染色不一致会影响Ki-67增殖的定量,因此开发一种自动评估Ki-67增殖指数的系统是一个很大的挑战。本文的目的是提出一种基于图像处理和机器智能技术的乳腺组织免疫组化染色细胞Ki-67增殖程度的自动分析系统。该系统不仅能辅助医生诊断,还能提供重要的治疗和预后信息。为了验证评估效果,我们将病理学家的视觉评估与Vilppu J Tuominen等人[1]开发的immunoratio(即Ki-67表达的基于网络的评估系统)进行了比较,通过对乳腺癌患者的一些Ki-67染色样本进行了分析。实验结果还表明,该系统能够自动、准确、可靠地评估乳腺组织图像上的Ki-67增殖指数,准确率约为87.37%。然而,在相同的样品下,用ImmunoRatio评价的准确率只能达到75.82%。此外,我们提出的系统还为病理学家评估Ki-67增殖表达提供了多种交互功能,包括浏览、导航和定量分析。
{"title":"A Whole Slide Ki-67 Proliferation Analysis System for Breast Carcinoma","authors":"C. Ko, Chun-Hung Lin, Chih-Hung Chuang, Chuan-Yu Chang, Shih-Hao Chang, Ji-Han Jiang","doi":"10.1109/Ubi-Media.2019.00048","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00048","url":null,"abstract":"The expression of Ki-67 with IHC stain has been utilized to assess the prognosis of breast cancer, and the degree of cellular differentiation and proliferation rate. Recently, some researchers utilize the index to predict metastasis of breast carcinoma. In traditional pathological screening, manual assessment of Ki-67 proliferative index may be limited by manual evaluation from different pathologists. Especially, inconsistent biopsy staining would affect the quantitation of Ki-67 proliferation so that developing an automatic system to assess Ki-67 proliferation index poses a big challenge. The goal of this paper is to propose an automatic analysis system to evaluate the degrees of Ki-67 proliferation on IHC stained cells of breast tissue using image processing and machine intelligence techniques. The proposed system not only can assist physicians diagnose, but also provides important information of treatment and prognosis. In order to validate the evaluation performance, we compared with visual assessments by a pathologist and the ImmnuoRatio (i.e., a web-based evaluation system in Ki-67 expression) developed by Vilppu J Tuominen et al.[1] via a number of Ki-67 stained samples for patients with breast carcinoma. Experimental results also demonstrate that the proposed system can automatically, accurately and reliably assess the Ki-67 proliferation index on the breast tissue images with a precision of around 87.37%. However, the accuracy evaluating with ImmunoRatio only can reach 75.82% with the same samples. Moreover, our proposed system also provides various interaction functions including browsing, navigation, and quantitative analyses for pathologists who evaluate the expression of the Ki-67 proliferation.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Collaborative DDoS Defense Platform Based on Blockchain Technology 基于区块链技术的协同DDoS防御平台
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00010
L. Yeh, Jiun-Long Huang, Ting-Yin Yen, Jen-Wei Hu
In this paper, we propose a consortium blockchainbased system sharing malicious IP to prevent further attacks happening among other hosts. In our scheme, every security operation center (SOC) serving as a blockchain-node uploads some suspicious IPs to find the potential attackers' IPs. A smart contract is responsible for comparing the loaded IPs and the existing ones without human interference. If IPs in different lists are matched with certain degree, this system will respond by giving the whole list of malicious IP. By means of these steps, shares of IP lists are achieved and attacks are prevented in advance. Besides, when uploading and sharing, we utilize elliptic curve cryptography to ensure data confidentiality and integrity.
在本文中,我们提出了一个基于区块链的联盟系统,共享恶意IP,以防止其他主机之间发生进一步的攻击。在我们的方案中,每个安全运营中心(SOC)作为一个区块链节点,上传一些可疑的ip来寻找潜在攻击者的ip。智能合约负责在没有人为干扰的情况下比较加载的ip和现有的ip。如果不同列表中的IP匹配到一定程度,系统将给出整个恶意IP列表作为响应。通过这些步骤,实现了IP列表的共享,并提前阻止了攻击。此外,在上传和分享时,我们采用椭圆曲线加密,确保数据的保密性和完整性。
{"title":"A Collaborative DDoS Defense Platform Based on Blockchain Technology","authors":"L. Yeh, Jiun-Long Huang, Ting-Yin Yen, Jen-Wei Hu","doi":"10.1109/Ubi-Media.2019.00010","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00010","url":null,"abstract":"In this paper, we propose a consortium blockchainbased system sharing malicious IP to prevent further attacks happening among other hosts. In our scheme, every security operation center (SOC) serving as a blockchain-node uploads some suspicious IPs to find the potential attackers' IPs. A smart contract is responsible for comparing the loaded IPs and the existing ones without human interference. If IPs in different lists are matched with certain degree, this system will respond by giving the whole list of malicious IP. By means of these steps, shares of IP lists are achieved and attacks are prevented in advance. Besides, when uploading and sharing, we utilize elliptic curve cryptography to ensure data confidentiality and integrity.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cloud Technology: Opportunities for Cybercriminals and Security Challenges 云技术:网络罪犯的机会和安全挑战
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00013
Leo Willyanto Santoso
Nowadays, there is a growing of interest about cloud technology to many companies around the world. That's why many companies trying and implementing cloud computing technologies in their business processes. This research will examine the security requirements that will apply for companies and organizations when they choose to move to a cloud service solution. The study is carried out because cloud services are very desirable in many industries today. Migrating to cloud services would often results in great benefits both financially and administratively. The concerns raised by the transition are how security should be handled. Many companies suffer from a lack of knowledge and it is seen as a big risk to make the transition. This leads to the question that the research strive to answer - which security demands will the transition to a cloud service implicate? In this paper we explain which security requirements are available both for local solutions and cloud solutions. We draw conclusions about what differences there are, what requirements are mutual, which ones are new and which ones are absent if a transition is made to cloud services. The result of this research is an evaluation that companies and organizations can use as a basis when they plan to implement this particular transition.
如今,世界各地的许多公司对云技术越来越感兴趣。这就是为什么许多公司尝试在其业务流程中实现云计算技术的原因。本研究将检查公司和组织在选择迁移到云服务解决方案时将适用的安全要求。之所以进行这项研究,是因为当今许多行业都非常需要云服务。迁移到云服务通常会在财务和管理上带来巨大的好处。过渡引起的关注是如何处理安全问题。许多公司都存在知识匮乏的问题,这被视为转型的一大风险。这就引出了该研究试图回答的问题——向云服务的过渡意味着哪些安全需求?在本文中,我们将解释哪些安全需求可用于本地解决方案和云解决方案。我们得出结论:如果向云服务过渡,存在哪些差异,哪些需求是相互的,哪些是新的,哪些是不存在的。这项研究的结果是一个评估,当公司和组织计划实施这一特定的转变时,可以将其作为基础。
{"title":"Cloud Technology: Opportunities for Cybercriminals and Security Challenges","authors":"Leo Willyanto Santoso","doi":"10.1109/Ubi-Media.2019.00013","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00013","url":null,"abstract":"Nowadays, there is a growing of interest about cloud technology to many companies around the world. That's why many companies trying and implementing cloud computing technologies in their business processes. This research will examine the security requirements that will apply for companies and organizations when they choose to move to a cloud service solution. The study is carried out because cloud services are very desirable in many industries today. Migrating to cloud services would often results in great benefits both financially and administratively. The concerns raised by the transition are how security should be handled. Many companies suffer from a lack of knowledge and it is seen as a big risk to make the transition. This leads to the question that the research strive to answer - which security demands will the transition to a cloud service implicate? In this paper we explain which security requirements are available both for local solutions and cloud solutions. We draw conclusions about what differences there are, what requirements are mutual, which ones are new and which ones are absent if a transition is made to cloud services. The result of this research is an evaluation that companies and organizations can use as a basis when they plan to implement this particular transition.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scalable Master-Slave Isomorphic Module for IoT Service System 面向物联网服务系统的可扩展主从同构模块
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00051
Wen-Yo Lee, C. Shih, Ti-Hung Chen, Yung-Hui Chen
This paper shows a master-slave module, which is based on a PCB board. The isomorphic circuit board can be the master or the slave through setup the configuration bits. The design can be introduced to several industrial fields, for example, the remote-based control system and the procedure control system, etc. According to the previous work of the researches, the IoT have been introduced to design the industrial equipment; nevertheless, there still have a lot of applications do not have been served. The IoT offers the information all about a system, so the equipment can be taken care anywhere anytime. In this paper, a dental system for the teeth root examining system is developed by the isomorphic master-slave module. It reduces not only the hardware complexity, but also the system development cost.
本文介绍了一种基于PCB板的主从模块。通过设置配置位,同构电路板可以是主从板。该设计可应用于多个工业领域,如远程控制系统、过程控制系统等。根据前人的研究成果,将物联网引入工业设备设计;尽管如此,仍有很多应用程序没有得到服务。物联网提供有关系统的所有信息,因此可以随时随地照顾设备。本文采用同构主从模块开发了牙根检测系统的牙系统。它不仅降低了硬件复杂度,而且降低了系统开发成本。
{"title":"Scalable Master-Slave Isomorphic Module for IoT Service System","authors":"Wen-Yo Lee, C. Shih, Ti-Hung Chen, Yung-Hui Chen","doi":"10.1109/Ubi-Media.2019.00051","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00051","url":null,"abstract":"This paper shows a master-slave module, which is based on a PCB board. The isomorphic circuit board can be the master or the slave through setup the configuration bits. The design can be introduced to several industrial fields, for example, the remote-based control system and the procedure control system, etc. According to the previous work of the researches, the IoT have been introduced to design the industrial equipment; nevertheless, there still have a lot of applications do not have been served. The IoT offers the information all about a system, so the equipment can be taken care anywhere anytime. In this paper, a dental system for the teeth root examining system is developed by the isomorphic master-slave module. It reduces not only the hardware complexity, but also the system development cost.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124383613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspect-Based Sentiment Analysis with the Multiple-Element Attention and Part of Speech 基于方面的多要素注意和词性情感分析
Pub Date : 2019-08-01 DOI: 10.1109/Ubi-Media.2019.00016
Ning Liu, Bo Shen, Kun Mi, Mingdong Sun, Naiyue Chen
Aspect-based Sentiment analysis (ABSA) is a rapidly growing field of research in natural language processing. ABSA is a fine-grained task of Sentiment analysis. How to capture precise sentiment expressions in a sentence towards the specific aspect remains a challenge. In this paper, we propose a novel neural network, named Multiple-element Attention LSTM (MEA-LSTM) to alleviate the problem of self-attention or binary-element attention used in the ABSA task. These attention mechanisms mentioned above are weak attention, they ignore the information of aspect target or sentence representation. To capture the precise sentiment expressions, we make use of multiple-element attention to assign different importance degrees of different words in a sentence. To store these informative aspect-dependent representations, extra representation memory is designed. Part of speech (POS) is an important feature in identifying the sentiment expressions in the ABSA task. We combine POS with the LSTM in the proposed MEA-LSTM. Experimental results show that our proposed model acquires state-of-the-art accuracy at both restaurant and laptop datasets. Besides, a rule of thumb about choosing the number of hops is given on both datasets.
基于方面的情感分析(ABSA)是自然语言处理中一个快速发展的研究领域。ABSA是一种细粒度的情感分析任务。如何准确地捕捉句子中针对特定方面的情感表达仍然是一个挑战。本文提出了一种新的神经网络,称为多元素注意LSTM (MEA-LSTM),以缓解ABSA任务中使用的自注意或二元注意问题。这些注意机制都是弱注意机制,它们忽略了方面、目标或句子表征的信息。为了捕捉精确的情感表达,我们使用多元素注意来分配句子中不同单词的不同重要程度。为了存储这些信息丰富的方面相关表示,设计了额外的表示存储器。词性是识别ABSA任务中情感表达的一个重要特征。在提出的MEA-LSTM中,我们将POS与LSTM结合起来。实验结果表明,我们提出的模型在餐馆和笔记本电脑数据集上都获得了最先进的精度。此外,在两个数据集上给出了选择跳数的经验法则。
{"title":"Aspect-Based Sentiment Analysis with the Multiple-Element Attention and Part of Speech","authors":"Ning Liu, Bo Shen, Kun Mi, Mingdong Sun, Naiyue Chen","doi":"10.1109/Ubi-Media.2019.00016","DOIUrl":"https://doi.org/10.1109/Ubi-Media.2019.00016","url":null,"abstract":"Aspect-based Sentiment analysis (ABSA) is a rapidly growing field of research in natural language processing. ABSA is a fine-grained task of Sentiment analysis. How to capture precise sentiment expressions in a sentence towards the specific aspect remains a challenge. In this paper, we propose a novel neural network, named Multiple-element Attention LSTM (MEA-LSTM) to alleviate the problem of self-attention or binary-element attention used in the ABSA task. These attention mechanisms mentioned above are weak attention, they ignore the information of aspect target or sentence representation. To capture the precise sentiment expressions, we make use of multiple-element attention to assign different importance degrees of different words in a sentence. To store these informative aspect-dependent representations, extra representation memory is designed. Part of speech (POS) is an important feature in identifying the sentiment expressions in the ABSA task. We combine POS with the LSTM in the proposed MEA-LSTM. Experimental results show that our proposed model acquires state-of-the-art accuracy at both restaurant and laptop datasets. Besides, a rule of thumb about choosing the number of hops is given on both datasets.","PeriodicalId":259542,"journal":{"name":"2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133407259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 Twelfth International Conference on Ubi-Media Computing (Ubi-Media)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1