首页 > 最新文献

2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)最新文献

英文 中文
Text Cluster Analysis Based on Haikou 12345 Hotline Data 基于海口市12345热线数据的文本聚类分析
JianZheng Hu, Caimao Li, Zhao Qiu, Ping Huang, GengQuan Xie
Haikou 12345 hotline is a system that processes a large number of help requests or complaints from the citizens in the city. The paper resorts to the concept of cluster-based machine mining approach to facilitate the process. According to the clustering results of the incoming texts in the system, governmental resources can be prioritized to handling the most publically important issues. In other words, the government personnel could have a better focus. Clustering is conducted dynamically in real time such that the decision-making can be performed in an optimal way to use the government resources, e.g., labor. In order for clustering, the system is designed the functions for preprocessing the data, data cleaning, Chinese word segmentation, and document deduplication before learning. Clustering uses a faster K-means algorithm to obtain more complete and efficient clustering results in an effective time.
海口12345热线是一个处理全市市民大量求助或投诉的系统。本文采用基于集群的机器挖掘方法的概念来促进这一过程。根据系统中输入文本的聚类结果,政府资源可以优先处理最重要的公共问题。换句话说,政府人员可以有更好的重点。实时动态地进行聚类,使决策以最优的方式使用政府资源,如劳动力。为了实现聚类,系统在学习前设计了数据预处理、数据清洗、中文分词、文档重复删除等功能。聚类采用更快的K-means算法,在有效时间内获得更完整、高效的聚类结果。
{"title":"Text Cluster Analysis Based on Haikou 12345 Hotline Data","authors":"JianZheng Hu, Caimao Li, Zhao Qiu, Ping Huang, GengQuan Xie","doi":"10.1109/CYBERC.2018.00043","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00043","url":null,"abstract":"Haikou 12345 hotline is a system that processes a large number of help requests or complaints from the citizens in the city. The paper resorts to the concept of cluster-based machine mining approach to facilitate the process. According to the clustering results of the incoming texts in the system, governmental resources can be prioritized to handling the most publically important issues. In other words, the government personnel could have a better focus. Clustering is conducted dynamically in real time such that the decision-making can be performed in an optimal way to use the government resources, e.g., labor. In order for clustering, the system is designed the functions for preprocessing the data, data cleaning, Chinese word segmentation, and document deduplication before learning. Clustering uses a faster K-means algorithm to obtain more complete and efficient clustering results in an effective time.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Accident Foresight System Using Bigdata Intelligent Random Forest Algorithm 基于大数据智能随机森林算法的车辆事故预测系统
A. Aburas, S. Eyono, Omesan Naidoo
commercial vehicles are used to improve people life. One of the main concern is the safety of these commercial vehicle during accidents. This research paper presents the idea of a Vehicle Accident Foresight System (VAFS). Accident datasets for VAFS are based on actual vehicle accident datasets extracted from open-source datasets. VAFS aims to analyze past accident data using the random forest algorithm to analyze and predict future accidents. One thousand decision trees are used in implementation. The implemented prototype consists of a dashboard which can specify accident locations according to time, it can also identify the elements which contribute the most to accident severity. The prediction model of VAFS has a minimum accuracy of 69% and a maximum accuracy of 100%.
商用车是用来改善人们生活的。其中一个主要问题是这些商用车在发生事故时的安全性。本文提出了车辆事故预警系统(VAFS)的思想。VAFS的事故数据集基于从开源数据集中提取的实际车辆事故数据集。VAFS旨在利用随机森林算法分析过去的事故数据,以分析和预测未来的事故。在实现过程中使用了一千个决策树。实现的原型包括一个仪表板,它可以根据时间指定事故地点,它还可以识别对事故严重程度贡献最大的元素。VAFS预测模型的最小精度为69%,最大精度为100%。
{"title":"Vehicle Accident Foresight System Using Bigdata Intelligent Random Forest Algorithm","authors":"A. Aburas, S. Eyono, Omesan Naidoo","doi":"10.1109/CYBERC.2018.00055","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00055","url":null,"abstract":"commercial vehicles are used to improve people life. One of the main concern is the safety of these commercial vehicle during accidents. This research paper presents the idea of a Vehicle Accident Foresight System (VAFS). Accident datasets for VAFS are based on actual vehicle accident datasets extracted from open-source datasets. VAFS aims to analyze past accident data using the random forest algorithm to analyze and predict future accidents. One thousand decision trees are used in implementation. The implemented prototype consists of a dashboard which can specify accident locations according to time, it can also identify the elements which contribute the most to accident severity. The prediction model of VAFS has a minimum accuracy of 69% and a maximum accuracy of 100%.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of Adversarial Examples on the Robustness of CAPTCHA 对抗样本对验证码鲁棒性的影响
Yang Zhang, Haichang Gao, Ge Pei, Shuai Kang, Xin Zhou
A good CAPTCHA(Completely Automated Public Turing Test to Tell Computers and Humans Apart) should be friendly for humans to solve but hard for computers. This balance between security and usability is hard to achieve. With the development of deep neural network techniques, increasingly more CAPTCHAs have been cracked. Recent works have shown deep neural networks to be highly susceptible to adversarial examples, which can reliably fool neural networks by adding noise that is imperceptible to humans that matches the needs of CAPTCHA design. In this paper, we study the effect of adversarial examples on CAPTCHA robustness (including image-selecting, clicking-based, and text-based CAPTCHAs). The experimental results demonstrate that adversarial examples have a positive effect on the robustness of CAPTCHA. Even if we fine tune the neural network, the impact of adversarial examples cannot be completely eliminated. At the end of this paper, suggestions are given on how to improve the security of CAPTCHA using adversarial examples.
一个好的CAPTCHA(完全自动化的公共图灵测试来区分计算机和人类)应该对人类友好,但对计算机来说很难解决。安全性和可用性之间的平衡很难实现。随着深度神经网络技术的发展,越来越多的验证码被破解。最近的研究表明,深度神经网络非常容易受到对抗性示例的影响,对抗性示例可以通过添加符合CAPTCHA设计需求的人类无法察觉的噪声来可靠地欺骗神经网络。在本文中,我们研究了对抗性示例对验证码鲁棒性的影响(包括图像选择、基于点击和基于文本的验证码)。实验结果表明,对抗样例对验证码的鲁棒性有积极的影响。即使我们对神经网络进行微调,对抗性样本的影响也不能完全消除。在本文的最后,通过对抗性实例对如何提高CAPTCHA的安全性提出了建议。
{"title":"Effect of Adversarial Examples on the Robustness of CAPTCHA","authors":"Yang Zhang, Haichang Gao, Ge Pei, Shuai Kang, Xin Zhou","doi":"10.1109/CYBERC.2018.00013","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00013","url":null,"abstract":"A good CAPTCHA(Completely Automated Public Turing Test to Tell Computers and Humans Apart) should be friendly for humans to solve but hard for computers. This balance between security and usability is hard to achieve. With the development of deep neural network techniques, increasingly more CAPTCHAs have been cracked. Recent works have shown deep neural networks to be highly susceptible to adversarial examples, which can reliably fool neural networks by adding noise that is imperceptible to humans that matches the needs of CAPTCHA design. In this paper, we study the effect of adversarial examples on CAPTCHA robustness (including image-selecting, clicking-based, and text-based CAPTCHAs). The experimental results demonstrate that adversarial examples have a positive effect on the robustness of CAPTCHA. Even if we fine tune the neural network, the impact of adversarial examples cannot be completely eliminated. At the end of this paper, suggestions are given on how to improve the security of CAPTCHA using adversarial examples.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128427418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Monadic Dynamic Slicing of Object-Oriented Programs 面向对象程序的一元动态切片
Bihuan Xu, Junyan Qian, Yingzhou Zhang, Shurong Zhu
Program slicing is an effective technique for narrowing the focus of attention to the relevant parts of a program. The dynamic slice contains only those statements that actually affect the variables in the slicing criterion, thus it is useful in software debugging, testing and maintenance. This paper proposes a new approach to dynamically slice object-oriented programs (OOPs) based on modular monadic semantics. It abstracts the computation of program slicing as a language-independent object, slice monad transformer, which can be applied to semantic descriptions of the program analyzed in a modular way, forming the corresponding monadic slicing algorithms. Such algorithms allow dynamic slices to be computed directly on abstract syntax, with no needs to explicitly construct intermediate structures such as dependence graphs or to record an execution history. Simultaneously, it could describe the basic object-oriented (OO) features such as encapsulation, inheritance and dynamic binding well. It has excellent reusability and language-flexibility properties comparing with the current dynamic slicing methods for OOPs.
程序切片是一种有效的技术,可以将注意力集中在程序的相关部分。动态切片只包含那些实际影响切片标准中的变量的语句,因此它在软件调试、测试和维护中很有用。提出了一种基于模块化一元语义的面向对象程序动态切片方法。它将程序切片的计算抽象为一个独立于语言的对象——切片单元转换器(slice monad transformer),它可以应用于以模块化方式分析的程序的语义描述,形成相应的单元切片算法。这样的算法允许在抽象语法上直接计算动态切片,而不需要显式地构造诸如依赖关系图之类的中间结构或记录执行历史。同时,它能很好地描述面向对象的基本特性,如封装、继承和动态绑定等。与目前面向对象的动态切片方法相比,该方法具有良好的可重用性和语言灵活性。
{"title":"Monadic Dynamic Slicing of Object-Oriented Programs","authors":"Bihuan Xu, Junyan Qian, Yingzhou Zhang, Shurong Zhu","doi":"10.1109/CYBERC.2018.00053","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00053","url":null,"abstract":"Program slicing is an effective technique for narrowing the focus of attention to the relevant parts of a program. The dynamic slice contains only those statements that actually affect the variables in the slicing criterion, thus it is useful in software debugging, testing and maintenance. This paper proposes a new approach to dynamically slice object-oriented programs (OOPs) based on modular monadic semantics. It abstracts the computation of program slicing as a language-independent object, slice monad transformer, which can be applied to semantic descriptions of the program analyzed in a modular way, forming the corresponding monadic slicing algorithms. Such algorithms allow dynamic slices to be computed directly on abstract syntax, with no needs to explicitly construct intermediate structures such as dependence graphs or to record an execution history. Simultaneously, it could describe the basic object-oriented (OO) features such as encapsulation, inheritance and dynamic binding well. It has excellent reusability and language-flexibility properties comparing with the current dynamic slicing methods for OOPs.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GR-PMS: A Geomagnetism-Based Real-Time Positioning Mechanism of Smart Phones GR-PMS:一种基于地磁的智能手机实时定位机制
Shijun Chen, Dawei Chen, Yuanyuan Wang, Yuanyuan Wu
The use of geomagnetic information as indoor positioning technology based on location fingerprints has shown its unique technical superiority. However, the differences in the built-in geomagnetic sensors in different mobile phones make it difficult to achieve the desired positioning accuracy. In light of this problem, the author of this paper proposes a real-time positioning mechanism of smart phones based on geomagnetism. In an indoor environment with certain stability, a standard sensor of geomagnetism acquisition is used to collect data so that different models of mobile phones can achieve geomagnetic positioning through similarity matching algorithms. The method proposed solves the problem of differences of the builtin sensors of different mobile phones, reduces the time of geomagnetic positioning, improves its accuracy, and reduces the cost.
利用地磁信息作为基于位置指纹的室内定位技术,显示出其独特的技术优势。然而,不同手机内置的地磁传感器存在差异,难以达到预期的定位精度。针对这一问题,本文提出了一种基于地磁的智能手机实时定位机制。在具有一定稳定性的室内环境下,采用标准的地磁采集传感器采集数据,不同型号的手机通过相似度匹配算法实现地磁定位。该方法解决了不同手机内置传感器的差异问题,缩短了地磁定位时间,提高了定位精度,降低了成本。
{"title":"GR-PMS: A Geomagnetism-Based Real-Time Positioning Mechanism of Smart Phones","authors":"Shijun Chen, Dawei Chen, Yuanyuan Wang, Yuanyuan Wu","doi":"10.1109/CYBERC.2018.00098","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00098","url":null,"abstract":"The use of geomagnetic information as indoor positioning technology based on location fingerprints has shown its unique technical superiority. However, the differences in the built-in geomagnetic sensors in different mobile phones make it difficult to achieve the desired positioning accuracy. In light of this problem, the author of this paper proposes a real-time positioning mechanism of smart phones based on geomagnetism. In an indoor environment with certain stability, a standard sensor of geomagnetism acquisition is used to collect data so that different models of mobile phones can achieve geomagnetic positioning through similarity matching algorithms. The method proposed solves the problem of differences of the builtin sensors of different mobile phones, reduces the time of geomagnetic positioning, improves its accuracy, and reduces the cost.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application Research of YOLO v2 Combined with Color Identification YOLO v2与颜色识别相结合的应用研究
XiaWen Zhang, Zhao Qiu, Ping Huang, JianZheng Hu, JingYu Luo
In order to be able to make the image recognition and color recognition better fusion and application, this paper uses the YOLO v2 network that achieves excellent results in the target detection field, which can be through the training of traffic light samples to achieve the high speed and accuracy of identifying and positioning the traffic lights, in combination with the HSV color model, design the ratio of the red and green colors in the located area, identify the red and green colors, and then determine the status of the traffic lights. Through this study, we can understand the possibility of using YOLO v2 network in more fields, and at the same time combine color recognition to make YOLO v2 can get more extensive application.
为了能够更好的融合图像识别和颜色识别和应用,本文使用YOLO v2意思网络,达到良好的结果在目标探测领域,可以通过红绿灯的训练样本来实现识别和定位的速度和精度高的交通灯,结合HSV颜色模型,设计比红色和绿色颜色的位置区域,识别出红色和绿色的颜色,然后确定交通灯的状态。通过本研究,我们可以了解在更多领域使用YOLO v2网络的可能性,同时结合颜色识别,使YOLO v2能够得到更广泛的应用。
{"title":"Application Research of YOLO v2 Combined with Color Identification","authors":"XiaWen Zhang, Zhao Qiu, Ping Huang, JianZheng Hu, JingYu Luo","doi":"10.1109/CYBERC.2018.00036","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00036","url":null,"abstract":"In order to be able to make the image recognition and color recognition better fusion and application, this paper uses the YOLO v2 network that achieves excellent results in the target detection field, which can be through the training of traffic light samples to achieve the high speed and accuracy of identifying and positioning the traffic lights, in combination with the HSV color model, design the ratio of the red and green colors in the located area, identify the red and green colors, and then determine the status of the traffic lights. Through this study, we can understand the possibility of using YOLO v2 network in more fields, and at the same time combine color recognition to make YOLO v2 can get more extensive application.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115311910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Full Multicast Reconfigurable Non-blocking Permutation Network 全组播可重构非阻塞置换网络
Hang Yuan, Leibo Liu, Hui Li, S. Yin, Shaojun Wei
Interconnection network is a fundamental communication pattern in processor architecture. The area, delay and multicast capacity of interconnection networks have strict requirement. In this paper Reconfigurable Non-blocking Multicast Permutation Network (RMPN) is a kind of routing unit that configurable and data path reconfigurable network. It consists of a switch subnet and a broadcast subnet. It can achieve the input data Non-blocking full Multicast and bit permutation under certain conditions. RMPN can be used to cascade for larger networks easily and configured by bidirectional self-routing. Compared to the previous network, RMPN can reduce number of routing units by 67%, path length by 27.7%and configuration size by 75%.
互连网络是处理器体系结构中的一种基本通信模式。互连网络的面积、时延和组播容量都有严格的要求。可重构无阻塞组播置换网络(RMPN)是一种可配置、数据路径可重构的路由单元网络。它由交换机子网和广播子网组成。它可以在一定条件下实现输入数据的无阻塞全组播和位置换。RMPN可以很容易地用于大型网络的级联,并且可以通过双向自路由进行配置。与之前的网络相比,RMPN可以减少67%的路由单元,减少27.7%的路径长度,减少75%的配置大小。
{"title":"A Full Multicast Reconfigurable Non-blocking Permutation Network","authors":"Hang Yuan, Leibo Liu, Hui Li, S. Yin, Shaojun Wei","doi":"10.1109/CYBERC.2018.00092","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00092","url":null,"abstract":"Interconnection network is a fundamental communication pattern in processor architecture. The area, delay and multicast capacity of interconnection networks have strict requirement. In this paper Reconfigurable Non-blocking Multicast Permutation Network (RMPN) is a kind of routing unit that configurable and data path reconfigurable network. It consists of a switch subnet and a broadcast subnet. It can achieve the input data Non-blocking full Multicast and bit permutation under certain conditions. RMPN can be used to cascade for larger networks easily and configured by bidirectional self-routing. Compared to the previous network, RMPN can reduce number of routing units by 67%, path length by 27.7%and configuration size by 75%.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126554721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier 基于SPIN验证器的盲中介体电子投票协议安全性分析
L. Babenko, I. Pisarev
Cryptographic protocols are the basis for the security of any protected system, including the electronic voting system. One of the most effective ways to analyze protocol security is to use verifiers. In this paper, the formal verifier SPIN was used to analyze the security of the cryptographic protocol for e-voting, which is based on model checking using linear temporal logic (LTL). The cryptographic protocol of electronic voting is described. The main structural units of the Promela language used for simulation in the SPIN verifier are described. The model of the electronic voting protocol in the language Promela is given. The interacting parties, transferred data, the order of the messages transmitted between the parties are described. Security of the cryptographic protocol using the SPIN tool is verified. The simulation of the protocol with active intruder using the man in the middle attack (MITM) to substitute data is made. In the simulation results it is established that the protocol correctly handles the case of an active attack on the parties' authentication.
加密协议是任何受保护系统(包括电子投票系统)安全的基础。分析协议安全性的最有效方法之一是使用验证器。本文利用形式验证器SPIN对基于线性时间逻辑(LTL)模型检验的电子投票加密协议的安全性进行了分析。介绍了电子投票的加密协议。描述了用于SPIN验证器仿真的Promela语言的主要结构单元。给出了Promela语言的电子投票协议模型。描述了相互作用的各方、传输的数据、各方之间传输的消息顺序。使用SPIN工具验证加密协议的安全性。利用中间人攻击(MITM)替代数据,对主动入侵协议进行了仿真。仿真结果表明,该协议能够正确处理主动攻击双方身份验证的情况。
{"title":"Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier","authors":"L. Babenko, I. Pisarev","doi":"10.1109/CYBERC.2018.00019","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00019","url":null,"abstract":"Cryptographic protocols are the basis for the security of any protected system, including the electronic voting system. One of the most effective ways to analyze protocol security is to use verifiers. In this paper, the formal verifier SPIN was used to analyze the security of the cryptographic protocol for e-voting, which is based on model checking using linear temporal logic (LTL). The cryptographic protocol of electronic voting is described. The main structural units of the Promela language used for simulation in the SPIN verifier are described. The model of the electronic voting protocol in the language Promela is given. The interacting parties, transferred data, the order of the messages transmitted between the parties are described. Security of the cryptographic protocol using the SPIN tool is verified. The simulation of the protocol with active intruder using the man in the middle attack (MITM) to substitute data is made. In the simulation results it is established that the protocol correctly handles the case of an active attack on the parties' authentication.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123805556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security of Multi-antenna Laptop Wirelessly Access to Internet of Things Networks 多天线笔记本电脑无线接入物联网网络的安全性
Juan Zhao, Xiaolong Xu
It is very important to assure the security of laptop access to internet of things (IoT) networks, where all the channels are wireless. In this paper, we design an algorithm to select the proper legitimate laptop to access IoT networks with one eavesdropper in the same networks. Both of each legitimate laptop and the eavesdropper laptop are equipped with multiple antennas as widely applied in 4G, 4G and wireless local area networks (WLAN). It is assumed that the maximum ratio transmit (MRT) and the maximum ratio receive (MRC) are respectively applied at the transmitter and the receiver for each legitimate laptop. The MRC receiver is also employed by each eavesdropper laptop. Our objective is to maximize the throughput of the legitimate laptop yet minimizing the throughput of the eavesdropper laptop over the whole networks. Numerical simulations demonstrate the gain of the proposed method as compared to the reference schemes.
确保笔记本电脑访问物联网(IoT)网络的安全性非常重要,因为所有通道都是无线的。在本文中,我们设计了一种算法来选择合适的合法笔记本电脑访问同一网络中的一个窃听者的物联网网络。合法笔记本电脑和窃听笔记本电脑都配备了多天线,广泛应用于4G、4G和无线局域网(WLAN)。假设每个合法的笔记本电脑在发送端和接收端分别应用最大发送比(MRT)和最大接收比(MRC)。每个窃听者笔记本电脑也使用MRC接收器。我们的目标是最大化合法笔记本电脑的吞吐量,同时最小化整个网络上窃听笔记本电脑的吞吐量。数值模拟结果表明,与参考方案相比,该方法具有较高的增益。
{"title":"Security of Multi-antenna Laptop Wirelessly Access to Internet of Things Networks","authors":"Juan Zhao, Xiaolong Xu","doi":"10.1109/CYBERC.2018.00095","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00095","url":null,"abstract":"It is very important to assure the security of laptop access to internet of things (IoT) networks, where all the channels are wireless. In this paper, we design an algorithm to select the proper legitimate laptop to access IoT networks with one eavesdropper in the same networks. Both of each legitimate laptop and the eavesdropper laptop are equipped with multiple antennas as widely applied in 4G, 4G and wireless local area networks (WLAN). It is assumed that the maximum ratio transmit (MRT) and the maximum ratio receive (MRC) are respectively applied at the transmitter and the receiver for each legitimate laptop. The MRC receiver is also employed by each eavesdropper laptop. Our objective is to maximize the throughput of the legitimate laptop yet minimizing the throughput of the eavesdropper laptop over the whole networks. Numerical simulations demonstrate the gain of the proposed method as compared to the reference schemes.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130419694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IQ Imbalance Compensation Based on Cordic Algorithm in VLC-OFDM System VLC-OFDM系统中基于Cordic算法的IQ不平衡补偿
Peng Liu, Yarong Guo, Yue-ming Li, Song Liu
This study investigates the problem of in-phase and quadrature (IQ) imbalance in the visible light communication (VLC) system. The effectiveness of the blind compensation method based on coordinate rotation digital computer (cordic) algorithm against the IQ imbalance is discussed. We further verify the proposed compensation method with QPSK and 16QAM signals respectively, with simulated impairments caused by the light emitting diode (LED) nonlinearity. Additionally, the analysis of Monte Carlo simulation under the assumption of different signal-to-noise ratio (SNR) is showed where in some cases, the compensation intensity increases as the SNR increases.
研究了可见光通信(VLC)系统中的同相和正交(IQ)失衡问题。讨论了基于坐标旋转数字计算机(cordic)算法的盲补偿方法对IQ不平衡的有效性。我们进一步用QPSK和16QAM信号分别验证了所提出的补偿方法,并模拟了LED非线性引起的损伤。此外,对不同信噪比下的蒙特卡罗仿真进行了分析,在某些情况下,补偿强度随着信噪比的增大而增大。
{"title":"IQ Imbalance Compensation Based on Cordic Algorithm in VLC-OFDM System","authors":"Peng Liu, Yarong Guo, Yue-ming Li, Song Liu","doi":"10.1109/CYBERC.2018.00089","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00089","url":null,"abstract":"This study investigates the problem of in-phase and quadrature (IQ) imbalance in the visible light communication (VLC) system. The effectiveness of the blind compensation method based on coordinate rotation digital computer (cordic) algorithm against the IQ imbalance is discussed. We further verify the proposed compensation method with QPSK and 16QAM signals respectively, with simulated impairments caused by the light emitting diode (LED) nonlinearity. Additionally, the analysis of Monte Carlo simulation under the assumption of different signal-to-noise ratio (SNR) is showed where in some cases, the compensation intensity increases as the SNR increases.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129906947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1