Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00025
Jiling Cai, F. Chen, Daoping Zhu, Pingping Chen
The most conventional approaches for multi-path concurrent video transmission with H264/AVC coding are considering the distribution strategy to improve the video transmission quality under strict delay constraints. However, guaranteeing the smooth playback of real-time video is a challenge for conventional solutions due to the fluctuating status and scarce resources of wireless networks and subject to stringent end-to-end latency and packet loss. In order to address these critical issues, this paper leverages the properties of Scalable Video Coding (SVC) coding and joints flow assignment strategies to improve video transmission performance. It effectively aggregates the channel resources in heterogeneous networks and determines different SVC layer streams delivered upon different communication path statuses. In addition, the SVC base layer resources reservation scheme is proposed to reserve sufficient resources for subsequent SVC base layer streams as the current SVC streams are allocated. The semi-physical experiment results show that the proposed algorithm achieves 4–8 dB higher PSNR transmission quality than the conventional schemes with the influence of network time-varying characteristics.
{"title":"SVC-based and Flow Assignment Strategy for Multi-path Concurrent Video Transmission with Low-Latency","authors":"Jiling Cai, F. Chen, Daoping Zhu, Pingping Chen","doi":"10.1109/ACCC58361.2022.00025","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00025","url":null,"abstract":"The most conventional approaches for multi-path concurrent video transmission with H264/AVC coding are considering the distribution strategy to improve the video transmission quality under strict delay constraints. However, guaranteeing the smooth playback of real-time video is a challenge for conventional solutions due to the fluctuating status and scarce resources of wireless networks and subject to stringent end-to-end latency and packet loss. In order to address these critical issues, this paper leverages the properties of Scalable Video Coding (SVC) coding and joints flow assignment strategies to improve video transmission performance. It effectively aggregates the channel resources in heterogeneous networks and determines different SVC layer streams delivered upon different communication path statuses. In addition, the SVC base layer resources reservation scheme is proposed to reserve sufficient resources for subsequent SVC base layer streams as the current SVC streams are allocated. The semi-physical experiment results show that the proposed algorithm achieves 4–8 dB higher PSNR transmission quality than the conventional schemes with the influence of network time-varying characteristics.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00017
Yance Fang, Yucheng Xie, Peishun Liu
Most of the current attention algorithms focus on one-dimensional channel attention or two-dimensional positional attention, and the processed images are three-dimensional, so these attention modules often cannot focus on all the areas that need attention, resulting in some key information missing. The three-dimensional attention module is designed in this paper. it can obtain a three-dimensional image attention weight matrix by combining one-dimensional channel attention and two-dimensional position attention module, and can obtain a new image with attention allocation after calculation. this paper uses deep learning technology, combines the channel attention module and the position attention module, and designs a three-dimensional attention module. The three-dimensional attention module has good results in a variety of visual tasks. Compared with SENet, in Cifar100 dataset, ResNet50 as the main network added attention has a 1.12% improvement. On the PKU VehicleID dataset, it has an average 2% improvement over SENet.
{"title":"Research on A Three-Dimensional Attention Module","authors":"Yance Fang, Yucheng Xie, Peishun Liu","doi":"10.1109/ACCC58361.2022.00017","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00017","url":null,"abstract":"Most of the current attention algorithms focus on one-dimensional channel attention or two-dimensional positional attention, and the processed images are three-dimensional, so these attention modules often cannot focus on all the areas that need attention, resulting in some key information missing. The three-dimensional attention module is designed in this paper. it can obtain a three-dimensional image attention weight matrix by combining one-dimensional channel attention and two-dimensional position attention module, and can obtain a new image with attention allocation after calculation. this paper uses deep learning technology, combines the channel attention module and the position attention module, and designs a three-dimensional attention module. The three-dimensional attention module has good results in a variety of visual tasks. Compared with SENet, in Cifar100 dataset, ResNet50 as the main network added attention has a 1.12% improvement. On the PKU VehicleID dataset, it has an average 2% improvement over SENet.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00023
Yingao Duan, Shi-Sheng Wang, Hui Chen
Diabetic retinopathy is one of the disabling complications of diabetes mellitus that causes the loss of central vision if not recognized and cured at the earlier stage. Existing classification models cannot accurately distinguish early diabetic retinopathy due to the influence of vascular venation. We proposed an image enhancement method for removing blood vessels: use multiple reduced even convolution kernels for mean filtering to blur and shift the vascular features at different levels in the original image. Further, we use convolution block attention module and generative adversarial network in the model, so that the model can weigh the pathological feature weights of different channels in the feature map and has larger feature space. We evaluate the proposed method on EyePACS dataset. It could effectively improve the accuracy of model as compared to use the images without removing blood vessels. The experimental results show that this method can solve the classification difficulty of normal, mild and moderate non-proliferative diabetic retinopathy to some extent.
{"title":"Classification of Diabetic Retinopathy via Vascular Removal","authors":"Yingao Duan, Shi-Sheng Wang, Hui Chen","doi":"10.1109/ACCC58361.2022.00023","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00023","url":null,"abstract":"Diabetic retinopathy is one of the disabling complications of diabetes mellitus that causes the loss of central vision if not recognized and cured at the earlier stage. Existing classification models cannot accurately distinguish early diabetic retinopathy due to the influence of vascular venation. We proposed an image enhancement method for removing blood vessels: use multiple reduced even convolution kernels for mean filtering to blur and shift the vascular features at different levels in the original image. Further, we use convolution block attention module and generative adversarial network in the model, so that the model can weigh the pathological feature weights of different channels in the feature map and has larger feature space. We evaluate the proposed method on EyePACS dataset. It could effectively improve the accuracy of model as compared to use the images without removing blood vessels. The experimental results show that this method can solve the classification difficulty of normal, mild and moderate non-proliferative diabetic retinopathy to some extent.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129978081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00028
I. Suleimenov, Y. Vitulyova, A. Bakirov
Hybrid-base numbering systems are proposed; each digit of a number recorded in the system corresponds to some prime number. Subdivisions using for recording of a number in the frames of proposed approach correspond to specific Galois fields that correspond to the prime numbers that form the base of the coding system. Division of a digit into subunits is based on the theory of algebraic rings, which allows the number to be represented as a linear combination of idempotent elements with coefficients corresponding to the elements of the Galois fields. A specific example of binary-ternary logic where operations are performed in a number system with a base equal to six is considered. It is shown that operations in the decimal number system can similarly be reduced to operations in binary-ternary logic. The issues of practical use of algorithms based on hybrid number systems are discussed. In particular, a scheme of an adder operating with binary-ternary logic is proposed. The advantages of the proposed approach in terms of the possibility of its use in computing machinery on innovative element base are discussed.
{"title":"Hybrid Number Systems: Application for Calculations in Galois Fields","authors":"I. Suleimenov, Y. Vitulyova, A. Bakirov","doi":"10.1109/ACCC58361.2022.00028","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00028","url":null,"abstract":"Hybrid-base numbering systems are proposed; each digit of a number recorded in the system corresponds to some prime number. Subdivisions using for recording of a number in the frames of proposed approach correspond to specific Galois fields that correspond to the prime numbers that form the base of the coding system. Division of a digit into subunits is based on the theory of algebraic rings, which allows the number to be represented as a linear combination of idempotent elements with coefficients corresponding to the elements of the Galois fields. A specific example of binary-ternary logic where operations are performed in a number system with a base equal to six is considered. It is shown that operations in the decimal number system can similarly be reduced to operations in binary-ternary logic. The issues of practical use of algorithms based on hybrid number systems are discussed. In particular, a scheme of an adder operating with binary-ternary logic is proposed. The advantages of the proposed approach in terms of the possibility of its use in computing machinery on innovative element base are discussed.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At present, there are many semantic segmentation algorithms with excellent performance for intelligent driving vehicles, but most of them are only work well on scenes with good illumination. In order to solve the problem of scene segmentation under low illumination, this paper proposes a novel semantic segmentation algorithm which combines visible and infrared images. In this algorithm, two parallel encoders are designed as the input of the image, and the decoder divides the fused image output from the encoder. The model is based on ResNet algorithm, and the residual attention module is used in each branch to mine and enhance the spatial features of multilevel channels to extract image information. Experiments are carried out on publicly available thermal infrared and visible data sets. The results show that the algorithm proposed in this paper is superior to the algorithm using only visible images in semantic segmentation of traffic environment.
{"title":"Semantic Segmentation Algorithm for Night Traffic Scene Based on Visible and Infrared Images","authors":"Xiaona Xie, Zhiyong Xu, Jiang Tao, Jianying Yuan, Sidong Wu","doi":"10.1109/ACCC58361.2022.00024","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00024","url":null,"abstract":"At present, there are many semantic segmentation algorithms with excellent performance for intelligent driving vehicles, but most of them are only work well on scenes with good illumination. In order to solve the problem of scene segmentation under low illumination, this paper proposes a novel semantic segmentation algorithm which combines visible and infrared images. In this algorithm, two parallel encoders are designed as the input of the image, and the decoder divides the fused image output from the encoder. The model is based on ResNet algorithm, and the residual attention module is used in each branch to mine and enhance the spatial features of multilevel channels to extract image information. Experiments are carried out on publicly available thermal infrared and visible data sets. The results show that the algorithm proposed in this paper is superior to the algorithm using only visible images in semantic segmentation of traffic environment.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114171704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00026
Xuejun Liang, Yunfeng Bian, Tingting Lin, Gang Liu
Since Ubiquitous Sensor Network (USN) has the feature that sensor nodes frequently send small amount of data. The access network shall support small data transmission with minimal network impact. This paper proposes an access middleware for sensor traffic processing with much less complexity and thus much higher transmission efficiency. It helps fixed access network to save the bandwidth and reduce the complexity of network protocol stack. For downstream traffic, a network address mapping approach is presented to facilitate the package transmission to the non-IP/local-IP sensor nodes. In contrast with current solution, the destination information is not encapsulated in the application layer and more bandwidth can be saved especially when large amount of sensor nodes accessing to the telecom network. Our solution has no impact on the implementation of current applications while bringing the advantages of low complexity, low cost and high transmission efficiency to the access network.
{"title":"An Access Middleware for Sensor Traffic Control","authors":"Xuejun Liang, Yunfeng Bian, Tingting Lin, Gang Liu","doi":"10.1109/ACCC58361.2022.00026","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00026","url":null,"abstract":"Since Ubiquitous Sensor Network (USN) has the feature that sensor nodes frequently send small amount of data. The access network shall support small data transmission with minimal network impact. This paper proposes an access middleware for sensor traffic processing with much less complexity and thus much higher transmission efficiency. It helps fixed access network to save the bandwidth and reduce the complexity of network protocol stack. For downstream traffic, a network address mapping approach is presented to facilitate the package transmission to the non-IP/local-IP sensor nodes. In contrast with current solution, the destination information is not encapsulated in the application layer and more bandwidth can be saved especially when large amount of sensor nodes accessing to the telecom network. Our solution has no impact on the implementation of current applications while bringing the advantages of low complexity, low cost and high transmission efficiency to the access network.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"1175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114170963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00008
Siyu Gao, Yu Xiao, Ye He, Jianfeng Wen
Android mobile applications integrate a large number of third-party libraries (SDKs) to improve the efficiency of development and enhance the functionality of mobile applications, some SDKs have security vulnerabilities and misuse of access rights, which can cause security and privacy hazards to mobile applications. SDK version detection and vulnerability detection are the basis of mobile application security analysis, this paper proposes an LSH-based SDK version identification method. The method does SDK detection based on class hierarchy, extracts SDK source code fine-grained features using multipartition box LSH, and achieves SDK version detection by multi-feature fusion. On the basis of version identification, it does vulnerability warning and recommendation for insecure SDK versions. Collected more than 70 types and 1100 different versions of popular SDK data to build SDK information database, vulnerability database and scoring database. Verified and analyzed for 453 APPs, and the detection tool is better than other tools in the same category.
{"title":"Mobile Application SDK Version Detection and Security Alert Based on Multi-partition LSH","authors":"Siyu Gao, Yu Xiao, Ye He, Jianfeng Wen","doi":"10.1109/ACCC58361.2022.00008","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00008","url":null,"abstract":"Android mobile applications integrate a large number of third-party libraries (SDKs) to improve the efficiency of development and enhance the functionality of mobile applications, some SDKs have security vulnerabilities and misuse of access rights, which can cause security and privacy hazards to mobile applications. SDK version detection and vulnerability detection are the basis of mobile application security analysis, this paper proposes an LSH-based SDK version identification method. The method does SDK detection based on class hierarchy, extracts SDK source code fine-grained features using multipartition box LSH, and achieves SDK version detection by multi-feature fusion. On the basis of version identification, it does vulnerability warning and recommendation for insecure SDK versions. Collected more than 70 types and 1100 different versions of popular SDK data to build SDK information database, vulnerability database and scoring database. Verified and analyzed for 453 APPs, and the detection tool is better than other tools in the same category.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00027
I. Suleimenov, D. Matrassulova
An analogue of the Dirac δ-function is proposed, constructed for the case of Galois fields, and providing the possibility of conveniently reducing operations of multivalued logics to algebraic ones, including for the purposes of digital signal processing. It is shown that this function admits a convenient representation in the form of a binomial polynomial, whose coefficients take a constant value equal to one. The verification of the obtained results is carried out by the method of comparison with the proof of Wilson's theorem obtained using the theory of algebraic fields. An analogue of Wilson's theorem is obtained for the case of the binomial coefficients mentioned above and its visual illustration is given using an analogue of Pascal's triangle constructed for the case of simple Galois fields.
{"title":"Using the Relationship between the Theory of Algebraic Fields and Number Theory for Developing Promising Methods of Digital Signal Processing","authors":"I. Suleimenov, D. Matrassulova","doi":"10.1109/ACCC58361.2022.00027","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00027","url":null,"abstract":"An analogue of the Dirac δ-function is proposed, constructed for the case of Galois fields, and providing the possibility of conveniently reducing operations of multivalued logics to algebraic ones, including for the purposes of digital signal processing. It is shown that this function admits a convenient representation in the form of a binomial polynomial, whose coefficients take a constant value equal to one. The verification of the obtained results is carried out by the method of comparison with the proof of Wilson's theorem obtained using the theory of algebraic fields. An analogue of Wilson's theorem is obtained for the case of the binomial coefficients mentioned above and its visual illustration is given using an analogue of Pascal's triangle constructed for the case of simple Galois fields.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00016
Jianjun Sun
In order to improve the accuracy of sentiment analysis, this paper presents a new method for sentiment analysis of BiLSTM-cnn text based on self attention mechanism and dense connection. Methods BiLSTM-CNN-Attmodel was established. Firstly, BiLSTM was introduced to extract context words. Then, the convolutional neural network(CNN) is used to extract local semantic features. Combined with DenseNet dense connection module, the memory strength of the whole model is improved, and the utilization rate of weight information is enhanced. Finally, Self-attention mechanism is used to improve the ability of model mining information. This paper selects the data sets of chndenticorp and CCF2012 to train the optimal value of the DenseNet feature mapping matrix. The optimal value is brought into the model contrast experiment. In the experiment, the accuracy rate, recall rate and F value of this method are all greater than 91%, which is the highest among the models. It effectively improves the accuracy of text sentiment analysis, and has high research and practical value.
{"title":"BiLSTM-CNN Text Emotion Analysis Based on Self Attention Mechanism and Dense Connection","authors":"Jianjun Sun","doi":"10.1109/ACCC58361.2022.00016","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00016","url":null,"abstract":"In order to improve the accuracy of sentiment analysis, this paper presents a new method for sentiment analysis of BiLSTM-cnn text based on self attention mechanism and dense connection. Methods BiLSTM-CNN-Attmodel was established. Firstly, BiLSTM was introduced to extract context words. Then, the convolutional neural network(CNN) is used to extract local semantic features. Combined with DenseNet dense connection module, the memory strength of the whole model is improved, and the utilization rate of weight information is enhanced. Finally, Self-attention mechanism is used to improve the ability of model mining information. This paper selects the data sets of chndenticorp and CCF2012 to train the optimal value of the DenseNet feature mapping matrix. The optimal value is brought into the model contrast experiment. In the experiment, the accuracy rate, recall rate and F value of this method are all greater than 91%, which is the highest among the models. It effectively improves the accuracy of text sentiment analysis, and has high research and practical value.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-01DOI: 10.1109/ACCC58361.2022.00010
Yasir Glani, Luo Ping, Syed Asad Shah
IoT malware applications significantly threaten user privacy and security. Traditionally, IoT developers have focused primarily on hardware, but connectivity requires additional embedded software, usually developed by third-party developers. Unfortunately, third-party code is not always secure and trustworthy, and it frequently contains bugs and malicious code, which leaves IoT devices vulnerable. We propose the AASH technique (IoT Malware Detection) a novel technique that can detect malware at the source code level using the Adler-32 hash function and Fibonacci search. Previously, DROIDMD technique and SQVDT technique have been proposed to detect malware on Android and Linux devices. According to the authors, their schemes are scalable and can be deployed on IoT devices. However, their technique suffers from lower accuracy and takes longer to detect malicious code. The performance measurement shows that our proposed AASH technique is comparatively better than DROIDMD and SQVDT techniques in terms of accuracy and malware detection. AASH is reliable, efficient, and can be deployed on a large-scale level.
{"title":"AASH: A Lightweight and Efficient Static IoT Malware Detection Technique at Source Code Level","authors":"Yasir Glani, Luo Ping, Syed Asad Shah","doi":"10.1109/ACCC58361.2022.00010","DOIUrl":"https://doi.org/10.1109/ACCC58361.2022.00010","url":null,"abstract":"IoT malware applications significantly threaten user privacy and security. Traditionally, IoT developers have focused primarily on hardware, but connectivity requires additional embedded software, usually developed by third-party developers. Unfortunately, third-party code is not always secure and trustworthy, and it frequently contains bugs and malicious code, which leaves IoT devices vulnerable. We propose the AASH technique (IoT Malware Detection) a novel technique that can detect malware at the source code level using the Adler-32 hash function and Fibonacci search. Previously, DROIDMD technique and SQVDT technique have been proposed to detect malware on Android and Linux devices. According to the authors, their schemes are scalable and can be deployed on IoT devices. However, their technique suffers from lower accuracy and takes longer to detect malicious code. The performance measurement shows that our proposed AASH technique is comparatively better than DROIDMD and SQVDT techniques in terms of accuracy and malware detection. AASH is reliable, efficient, and can be deployed on a large-scale level.","PeriodicalId":285531,"journal":{"name":"2022 3rd Asia Conference on Computers and Communications (ACCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}