首页 > 最新文献

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)最新文献

英文 中文
Applications of Stream Data Mining on the Internet of Things: A Survey 流数据挖掘在物联网中的应用综述
E. Guler, S. Ozdemir
In the era of the Internet of Things (IoT), enormous amount of sensing devices collect and/or generate various sensory data over time for a wide range of fields and applications. Based on the nature of the application, these devices result in big or fast/real time data streams. The analytics technique on the subject matter used to discover new information, anticipate future predictions and make decisions on important issues makes IoT technology valuable for both the business world and the quality of everyday life. In this study, first of all, the concept of IoT and its architecture and relation with big and streaming data are emphasized. Information discovery process applied to the IoT streaming data is investigated and deep learning frameworks covered by this process are described comparatively. Finally, the most commonly used tools for analyzing IoT stream data are introduced and their characteristics are revealed.
在物联网(IoT)时代,大量的传感设备随着时间的推移收集和/或生成各种传感数据,用于广泛的领域和应用。根据应用程序的性质,这些设备会产生大量或快速/实时的数据流。用于发现新信息、预测未来预测和就重要问题做出决策的主题分析技术使物联网技术对商业世界和日常生活质量都有价值。在本研究中,首先强调了物联网的概念及其架构以及与大数据和流数据的关系。研究了应用于物联网流数据的信息发现过程,并对该过程所涵盖的深度学习框架进行了比较描述。最后,介绍了分析物联网流数据最常用的工具,并揭示了它们的特点。
{"title":"Applications of Stream Data Mining on the Internet of Things: A Survey","authors":"E. Guler, S. Ozdemir","doi":"10.1109/IBIGDELFT.2018.8625289","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625289","url":null,"abstract":"In the era of the Internet of Things (IoT), enormous amount of sensing devices collect and/or generate various sensory data over time for a wide range of fields and applications. Based on the nature of the application, these devices result in big or fast/real time data streams. The analytics technique on the subject matter used to discover new information, anticipate future predictions and make decisions on important issues makes IoT technology valuable for both the business world and the quality of everyday life. In this study, first of all, the concept of IoT and its architecture and relation with big and streaming data are emphasized. Information discovery process applied to the IoT streaming data is investigated and deep learning frameworks covered by this process are described comparatively. Finally, the most commonly used tools for analyzing IoT stream data are introduced and their characteristics are revealed.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122664939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Preserving Big Data Publishing 隐私保护大数据出版
Yavuz Canbay, Yilmaz Vural, Ş. Sağiroğlu
In order to gain more benefits from big data, they must be shared, published, analyzed and processed without having any harm or facing any violation and finally get better values from these analytics. The literature reports that this analytics brings an issue of privacy violations. This issue is also protected by law and bring fines to the companies, institutions or individuals. As a result, data collectors avoid to publish or share their big data due to these concerns. In order to obtain plausible solutions, there are a number of techniques to reduce privacy risks and to enable publishing big data while preserving privacy at the same time. These are known as privacy-preserving big data publishing (PPBDP) models. This study presents the privacy problem in big data, evaluates big data components from privacy perspective, privacy risks and protection methods in big data publishing, and reviews existing privacy-preserving big data publishing approaches and anonymization methods in literature. The results were finally evaluated and discussed, and new suggestions were presented.
为了从大数据中获得更多的利益,必须在没有任何伤害或违反的情况下进行共享、发布、分析和处理,并最终从这些分析中获得更好的价值。文献报道,这种分析带来了侵犯隐私的问题。这一问题也受到法律保护,并对公司、机构或个人处以罚款。因此,由于这些担忧,数据收集者避免发布或分享他们的大数据。为了获得合理的解决方案,有许多技术可以降低隐私风险,并在保护隐私的同时发布大数据。这些被称为保护隐私的大数据发布(PPBDP)模型。本研究提出了大数据中的隐私问题,从隐私角度对大数据组成部分、大数据发布中的隐私风险和保护方法进行了评估,并对文献中现有的保护隐私的大数据发布方式和匿名化方法进行了综述。最后对结果进行了评价和讨论,并提出了新的建议。
{"title":"Privacy Preserving Big Data Publishing","authors":"Yavuz Canbay, Yilmaz Vural, Ş. Sağiroğlu","doi":"10.1109/IBIGDELFT.2018.8625358","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625358","url":null,"abstract":"In order to gain more benefits from big data, they must be shared, published, analyzed and processed without having any harm or facing any violation and finally get better values from these analytics. The literature reports that this analytics brings an issue of privacy violations. This issue is also protected by law and bring fines to the companies, institutions or individuals. As a result, data collectors avoid to publish or share their big data due to these concerns. In order to obtain plausible solutions, there are a number of techniques to reduce privacy risks and to enable publishing big data while preserving privacy at the same time. These are known as privacy-preserving big data publishing (PPBDP) models. This study presents the privacy problem in big data, evaluates big data components from privacy perspective, privacy risks and protection methods in big data publishing, and reviews existing privacy-preserving big data publishing approaches and anonymization methods in literature. The results were finally evaluated and discussed, and new suggestions were presented.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Performance Analysis of Map-Reduce Programming Model on In-Memory NoSQL Storage Platforms: A Case Study 内存NoSQL存储平台上Map-Reduce编程模型的性能分析
Secil Yuzuk, Murat G. Aktaş, M. Aktaş
The financial data analysis, which is the road map of the future and at the same time the mirror of today, is of vital importance for many institutions. Therefore, it is common to apply statistical analysis on financial data. In such cases, data size becomes very important when performing financial data analysis. While analyzing the financial data, as the size and variety of data and increase, one can achieve the most accurate financial data analysis outcome. However, the increase in data size also brings some disadvantages such as performance-loss due to processing large-scale data. These disadvantages occur in both query performance and various functions that are used in data analysis. In this respect, it is necessary to examine the data storage platforms comparatively, which will investigate the performance of query and statistical functions, used in financial data analysis, at the highest level for large-scale financial data sets. For this purpose, the first step of this study was to compare the performance of the query on the Relational and Non-SQL-based storage environments, and to compare the performance of the query in the single-node and double-node in-memory NoSQL data storage environment. To facilitate testing of these platforms; as the SQL database system, MSSQL was selected and as the distributed in-memory NoSQL database system, Hazelcast was selected. For different data sizes on these platforms, the run times of the query and statistical functions were measured. In order to examine the ability of the in-memory NoSQL data storage platforms, to manage and manipulate the data, map-reduce programming model was used. Performance tests on single nodes and multiple nodes show that in-memory NoSQL platforms are very successful compared to relational database systems. In addition, it has been found that in-memory NoSQL storage platforms provide higher performance gains when using the map-reduce programming model.
金融数据分析是未来的路线图,同时也是今天的镜子,对许多机构来说至关重要。因此,对财务数据进行统计分析是很常见的。在这种情况下,在执行财务数据分析时,数据大小变得非常重要。在分析财务数据时,随着数据的规模和种类的增加,可以获得最准确的财务数据分析结果。但是,数据量的增加也带来了一些缺点,比如处理大规模数据会导致性能下降。这些缺点既存在于查询性能中,也存在于数据分析中使用的各种功能中。在这方面,有必要对数据存储平台进行比较研究,这将在最高水平上考察大规模金融数据集在金融数据分析中使用的查询和统计功能的性能。为此,本研究的第一步是比较基于关系型和基于非sql的存储环境下查询的性能,比较单节点和双节点内存NoSQL数据存储环境下查询的性能。协助测试这些平台;SQL数据库系统选用MSSQL,分布式内存NoSQL数据库系统选用Hazelcast。对于这些平台上不同的数据大小,测量了查询和统计函数的运行时间。为了检验内存NoSQL数据存储平台对数据进行管理和操作的能力,采用map-reduce编程模型。在单节点和多节点上的性能测试表明,与关系数据库系统相比,内存NoSQL平台非常成功。此外,在使用map-reduce编程模型时,已经发现内存中的NoSQL存储平台提供了更高的性能增益。
{"title":"On the Performance Analysis of Map-Reduce Programming Model on In-Memory NoSQL Storage Platforms: A Case Study","authors":"Secil Yuzuk, Murat G. Aktaş, M. Aktaş","doi":"10.1109/IBIGDELFT.2018.8625300","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625300","url":null,"abstract":"The financial data analysis, which is the road map of the future and at the same time the mirror of today, is of vital importance for many institutions. Therefore, it is common to apply statistical analysis on financial data. In such cases, data size becomes very important when performing financial data analysis. While analyzing the financial data, as the size and variety of data and increase, one can achieve the most accurate financial data analysis outcome. However, the increase in data size also brings some disadvantages such as performance-loss due to processing large-scale data. These disadvantages occur in both query performance and various functions that are used in data analysis. In this respect, it is necessary to examine the data storage platforms comparatively, which will investigate the performance of query and statistical functions, used in financial data analysis, at the highest level for large-scale financial data sets. For this purpose, the first step of this study was to compare the performance of the query on the Relational and Non-SQL-based storage environments, and to compare the performance of the query in the single-node and double-node in-memory NoSQL data storage environment. To facilitate testing of these platforms; as the SQL database system, MSSQL was selected and as the distributed in-memory NoSQL database system, Hazelcast was selected. For different data sizes on these platforms, the run times of the query and statistical functions were measured. In order to examine the ability of the in-memory NoSQL data storage platforms, to manage and manipulate the data, map-reduce programming model was used. Performance tests on single nodes and multiple nodes show that in-memory NoSQL platforms are very successful compared to relational database systems. In addition, it has been found that in-memory NoSQL storage platforms provide higher performance gains when using the map-reduce programming model.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Review on RNA Secondary Structure Prediction Algorithms RNA二级结构预测算法研究进展
Ian Kings Oluoch, Abdullah Akalin, Yilmaz Vural, Yavuz Canbay
Undoubtedly, RNA has vital functions on organisms. As a single stranded nucleic acid, it tends to bend and twirl and it forms a stable structure of itself. This is what comes to be known as the RNA secondary structure. RNA secondary structure is of use in determining the functionalities of RNA sequences as well as in pharmaceutical developments. Furthermore, predicting the secondary structure of an RNA is a crucial step in predicting its tertiary structure, which is its three dimensional form. For the problem of RNA secondary structure, researchers have developed many algorithms over the years in an attempt to make accurate predictions. In this paper, we review some of the recent works that made use of artificial intelligence in RNA secondary structure prediction. The reviewed articles show that by the power of novel artificial intelligence methods and ensembles of the old techniques, there are promising outcomes for future research.
毫无疑问,RNA对生物体起着至关重要的作用。作为单链核酸,它具有弯曲和旋转的倾向,形成了稳定的自身结构。这就是我们所说的RNA二级结构。RNA二级结构用于确定RNA序列的功能以及在药物开发中。此外,预测RNA的二级结构是预测其三级结构(即RNA的三维形式)的关键一步。对于RNA二级结构的问题,研究人员多年来开发了许多算法,试图做出准确的预测。本文综述了近年来利用人工智能进行RNA二级结构预测的研究进展。回顾的文章表明,通过新的人工智能方法和旧技术的集成,未来的研究有很好的结果。
{"title":"A Review on RNA Secondary Structure Prediction Algorithms","authors":"Ian Kings Oluoch, Abdullah Akalin, Yilmaz Vural, Yavuz Canbay","doi":"10.1109/IBIGDELFT.2018.8625347","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625347","url":null,"abstract":"Undoubtedly, RNA has vital functions on organisms. As a single stranded nucleic acid, it tends to bend and twirl and it forms a stable structure of itself. This is what comes to be known as the RNA secondary structure. RNA secondary structure is of use in determining the functionalities of RNA sequences as well as in pharmaceutical developments. Furthermore, predicting the secondary structure of an RNA is a crucial step in predicting its tertiary structure, which is its three dimensional form. For the problem of RNA secondary structure, researchers have developed many algorithms over the years in an attempt to make accurate predictions. In this paper, we review some of the recent works that made use of artificial intelligence in RNA secondary structure prediction. The reviewed articles show that by the power of novel artificial intelligence methods and ensembles of the old techniques, there are promising outcomes for future research.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130687859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Static and Dynamic Analysis of Third Generation Cerber Ransomware 第三代Cerber勒索软件的静态和动态分析
Ilker Kara, M. Aydos
Cyber criminals have been extensively using malicious Ransomware software for years. Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motives for such attacks are not only limited to economical scumming. Illegal attacks on official databases may also target people with political or social power. Although billions of dollars have been spent for preventing or at least reducing the tremendous amount of losses, these malicious Ransomware attacks have been expanding and growing. Therefore, it is critical to perform technical analysis of such malicious codes and, if possible, determine the source of such attacks. It might be almost impossible to recover the affected files due to the strong encryption imposed on such files, however the determination of the source of Ransomware attacks have been becoming significantly important for criminal justice. Unfortunately, there are only a few technical analysis of real life attacks in the literature. In this work, a real life Ransomware attack on an official institute is investigated and fully analyzed. The analysis have been performed by both static and dynamic methods. The results show that the source of the Ransomware attack has been shown to be traceable from the server's whois information.
多年来,网络犯罪分子一直在广泛使用恶意勒索软件。勒索软件是恶意软件的一个子集,其中受害者计算机上的数据被锁定,通常是通过加密,并且在被勒索的数据被解密并返回给受害者之前要求付款。这种攻击的动机不仅限于经济诈骗。对官方数据库的非法攻击也可能针对拥有政治或社会权力的人。尽管已经花费了数十亿美元来防止或至少减少巨大的损失,但这些恶意勒索软件攻击一直在扩大和增长。因此,对此类恶意代码进行技术分析,如果可能的话,确定此类攻击的来源是至关重要的。由于对这些文件施加了强大的加密,恢复受影响的文件几乎是不可能的,然而,确定勒索软件攻击的来源对刑事司法来说已经变得非常重要。不幸的是,文献中对现实生活中的攻击的技术分析很少。在这项工作中,对官方机构的真实勒索软件攻击进行了调查和充分分析。采用静态和动态两种方法进行了分析。结果表明,从服务器的whois信息可以追踪到勒索软件攻击的来源。
{"title":"Static and Dynamic Analysis of Third Generation Cerber Ransomware","authors":"Ilker Kara, M. Aydos","doi":"10.1109/IBIGDELFT.2018.8625353","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625353","url":null,"abstract":"Cyber criminals have been extensively using malicious Ransomware software for years. Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motives for such attacks are not only limited to economical scumming. Illegal attacks on official databases may also target people with political or social power. Although billions of dollars have been spent for preventing or at least reducing the tremendous amount of losses, these malicious Ransomware attacks have been expanding and growing. Therefore, it is critical to perform technical analysis of such malicious codes and, if possible, determine the source of such attacks. It might be almost impossible to recover the affected files due to the strong encryption imposed on such files, however the determination of the source of Ransomware attacks have been becoming significantly important for criminal justice. Unfortunately, there are only a few technical analysis of real life attacks in the literature. In this work, a real life Ransomware attack on an official institute is investigated and fully analyzed. The analysis have been performed by both static and dynamic methods. The results show that the source of the Ransomware attack has been shown to be traceable from the server's whois information.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Detecting Port Scan Attempts with Comparative Analysis of Deep Learning and Support Vector Machine Algorithms 用深度学习和支持向量机算法的比较分析检测端口扫描尝试
Dogukan Aksu, M. Ali Aydın
Compared to the past, developments in computer and communication technologies have provided extensive and advanced changes. The usage of new technologies provide great benefits to individuals, companies, and governments, however, it causes some problems against them. For example, the privacy of important information, security of stored data platforms, availability of knowledge etc. Depending on these problems, cyber terrorism is one of the most important issues in todays world. Cyber terror, which caused a lot of problems to individuals and institutions, has reached a level that could threaten public and country security by various groups such as criminal organizations, professional persons and cyber activists. Thus, Intrusion Detection Systems (IDS) have been developed to avoid cyber attacks. In this study, deep learning and support vector machine (SVM) algorithms were used to detect port scan attempts based on the new CICIDS2017 dataset and 97.80%, 69.79% accuracy rates were achieved respectively.
与过去相比,计算机和通信技术的发展带来了广泛而先进的变化。新技术的使用给个人、公司和政府带来了巨大的利益,然而,它也给他们带来了一些问题。例如,重要信息的隐私性、存储数据平台的安全性、知识的可用性等。基于这些问题,网络恐怖主义是当今世界最重要的问题之一。网络恐怖给个人和机构带来了许多问题,已经达到了可以威胁公共和国家安全的程度,犯罪组织、专业人士和网络活动家等各种团体。因此,入侵检测系统(IDS)被开发出来以避免网络攻击。在本研究中,基于新的CICIDS2017数据集,使用深度学习和支持向量机(SVM)算法检测端口扫描尝试,准确率分别达到97.80%和69.79%。
{"title":"Detecting Port Scan Attempts with Comparative Analysis of Deep Learning and Support Vector Machine Algorithms","authors":"Dogukan Aksu, M. Ali Aydın","doi":"10.1109/IBIGDELFT.2018.8625370","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625370","url":null,"abstract":"Compared to the past, developments in computer and communication technologies have provided extensive and advanced changes. The usage of new technologies provide great benefits to individuals, companies, and governments, however, it causes some problems against them. For example, the privacy of important information, security of stored data platforms, availability of knowledge etc. Depending on these problems, cyber terrorism is one of the most important issues in todays world. Cyber terror, which caused a lot of problems to individuals and institutions, has reached a level that could threaten public and country security by various groups such as criminal organizations, professional persons and cyber activists. Thus, Intrusion Detection Systems (IDS) have been developed to avoid cyber attacks. In this study, deep learning and support vector machine (SVM) algorithms were used to detect port scan attempts based on the new CICIDS2017 dataset and 97.80%, 69.79% accuracy rates were achieved respectively.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132124487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism 大数据、深度学习与打击网络恐怖主义国际大会
International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism
大数据、深度学习与打击网络恐怖主义国际大会
{"title":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","authors":"","doi":"10.1109/ibigdelft.2018.8625368","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625368","url":null,"abstract":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1711 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Font and Turkish Letter Recognition in Images with Deep Learning 深度学习图像中的字体和土耳其字母识别
A. Sevik, P. Erdoğmuş, Erdi Yalein
The purpose of this article is to recognize letter and especially font from images which are containing texts. In order to perform recognition process, primarily, the text in the image is divided into letters. Then, each letter is sended to the recognition system. Results are filtered according to vowels which are most used in Turkish texts. As a result, font of the text is obtained. In order to separate letters from text, an algorithm used which developed by us to do separation. This algorithm has been developed considering Turkish characters which has dots or accent such as i, j, ü, ö and g and helps these characters to be perceived by the system as a whole. In order to provide recognition of Turkish characters, all possibilities were created for each of these characters and the algorithm was formed accordingly. After recognizing the each character, these individual parts are sended to the pre-trained deep convolutional neural network. In addition, a data set has been created for this pre-trained network. The data set contains nearly 13 thousands of letters with 227*227*3 size have been created with different points, fonts and letters. As a result, 100 percent of success has been attained in the training. %79.08 letter and %75 of font success has been attained in the tests.
本文的目的是从包含文本的图像中识别字母,特别是字体。为了进行识别过程,首先将图像中的文本分成字母。然后,每封信都被发送到识别系统。结果根据在土耳其文本中使用最多的元音进行过滤。从而得到文本的字体。为了从文本中分离字母,我们开发了一种算法来进行分离。这个算法是考虑到土耳其字符有点或重音,如i, j, ü, ö和g,并帮助这些字符被系统作为一个整体来感知。为了提供对土耳其字符的识别,为每个字符创建了所有的可能性,并相应地形成了算法。在识别每个字符后,这些单独的部分被发送到预训练的深度卷积神经网络。此外,还为这个预训练的网络创建了一个数据集。数据集包含近13000个字母,大小为227*227*3,用不同的点、字体和字母创建。因此,在培训中取得了100%的成功。在测试中,字母和字体的成功率分别达到了%79.08和%75。
{"title":"Font and Turkish Letter Recognition in Images with Deep Learning","authors":"A. Sevik, P. Erdoğmuş, Erdi Yalein","doi":"10.1109/IBIGDELFT.2018.8625333","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625333","url":null,"abstract":"The purpose of this article is to recognize letter and especially font from images which are containing texts. In order to perform recognition process, primarily, the text in the image is divided into letters. Then, each letter is sended to the recognition system. Results are filtered according to vowels which are most used in Turkish texts. As a result, font of the text is obtained. In order to separate letters from text, an algorithm used which developed by us to do separation. This algorithm has been developed considering Turkish characters which has dots or accent such as i, j, ü, ö and g and helps these characters to be perceived by the system as a whole. In order to provide recognition of Turkish characters, all possibilities were created for each of these characters and the algorithm was formed accordingly. After recognizing the each character, these individual parts are sended to the pre-trained deep convolutional neural network. In addition, a data set has been created for this pre-trained network. The data set contains nearly 13 thousands of letters with 227*227*3 size have been created with different points, fonts and letters. As a result, 100 percent of success has been attained in the training. %79.08 letter and %75 of font success has been attained in the tests.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129437871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Decentralized Application for Secure Messaging in a Trustless Environment 无信任环境中安全消息传递的去中心化应用
M. Abdulaziz, Davut Çulha, A. Yazici
Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.
区块链技术作为一种在无信任环境中确保数据完整性、保密性和可用性的手段,受到了广泛关注。它们旨在通过利用网络的聚合能力来抵御恶意攻击,从而保护数据免受内部和外部网络攻击。在本文中,我们将利用以太坊耳语协议创建我们自己的去中心化消息传递应用程序。我们的应用程序将能够以安全和匿名的方式发送加密消息。我们将利用以太坊平台部署我们的区块链网络。由于其分布式特性和通信协议的适应性,该应用程序可以抵抗大多数抑制策略。
{"title":"A Decentralized Application for Secure Messaging in a Trustless Environment","authors":"M. Abdulaziz, Davut Çulha, A. Yazici","doi":"10.1109/IBIGDELFT.2018.8625362","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625362","url":null,"abstract":"Blockchain technology has been seeing widespread interest as a means to ensure the integrity, confidentiality and availability of data in a trustless environment. They are designed to protect data from both internal and external cyberattacks by utilizing the aggregated power of the network to resist malicious efforts. In this article, we will create our own decentralized messaging application utilizing the Ethereum Whisper protocol. Our application will be able to send encrypted messages both securely and anonymously. We will utilize the Ethereum platform to deploy our blockchain network. This application would be resistant to most suppression tactics due to its distributed nature and adaptability of its communication protocol.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128331318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Deep Learning in Intrusion Detection Systems 入侵检测系统中的深度学习
Gozde Karatas, Onder Demir, Ozgur Koray Sahingoz
In recent years, due to the emergence of boundless communication paradigm and increased number of networked digital devices, there is a growing concern about cybersecurity which tries to preserve either the information or the communication technology of the system. Intruders discover new attack types day by day, therefore to prevent these attacks firstly they need to be identified correctly by the used intrusion detection systems (IDSs), and then proper responses should be given. IDSs, which play a very crucial role for the security of the network, consist of three main components: data collection, feature selection/conversion and decision engine. The last component directly affects the efficiency of the system and use of machine learning techniques is one of most promising research areas. Recently, deep learning has been emerged as a new approach which enables the use of Big Data with a low training time and high accuracy rate with its distinctive learning mechanism. Consequently, it has been started to use in IDS systems. In this paper, it is aimed to survey deep learning based intrusion detection system approach by making a comparative work of the literature and by giving the background knowledge either in deep learning algorithms or in intrusion detection systems.
近年来,由于无限通信范式的出现和网络化数字设备数量的增加,网络安全越来越受到关注,网络安全试图保护系统的信息或通信技术。入侵者每天都在发现新的攻击类型,因此为了防止这些攻击,首先需要使用入侵检测系统(ids)正确识别这些攻击,然后给出适当的响应。入侵防御系统对网络安全起着至关重要的作用,它主要由数据采集、特征选择/转换和决策引擎三个部分组成。最后一个组成部分直接影响系统的效率和使用机器学习技术是最有前途的研究领域之一。近年来,深度学习作为一种新的学习方法,以其独特的学习机制,使大数据的使用具有低训练时间和高准确率的特点。因此,它已开始在IDS系统中使用。本文通过对文献的比较,以及对深度学习算法和入侵检测系统的背景知识的介绍,对基于深度学习的入侵检测系统方法进行了综述。
{"title":"Deep Learning in Intrusion Detection Systems","authors":"Gozde Karatas, Onder Demir, Ozgur Koray Sahingoz","doi":"10.1109/IBIGDELFT.2018.8625278","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625278","url":null,"abstract":"In recent years, due to the emergence of boundless communication paradigm and increased number of networked digital devices, there is a growing concern about cybersecurity which tries to preserve either the information or the communication technology of the system. Intruders discover new attack types day by day, therefore to prevent these attacks firstly they need to be identified correctly by the used intrusion detection systems (IDSs), and then proper responses should be given. IDSs, which play a very crucial role for the security of the network, consist of three main components: data collection, feature selection/conversion and decision engine. The last component directly affects the efficiency of the system and use of machine learning techniques is one of most promising research areas. Recently, deep learning has been emerged as a new approach which enables the use of Big Data with a low training time and high accuracy rate with its distinctive learning mechanism. Consequently, it has been started to use in IDS systems. In this paper, it is aimed to survey deep learning based intrusion detection system approach by making a comparative work of the literature and by giving the background knowledge either in deep learning algorithms or in intrusion detection systems.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127526308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
期刊
2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1