首页 > 最新文献

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)最新文献

英文 中文
YOLO Approach in Digital Object Definition in Military Systems 军事系统数字对象定义中的YOLO方法
R. Benzer, Mithat Cagri Yildiz
Today, as surveillance systems are widely used for indoor and outdoor monitoring applications, there is a growing interest in real-time generation detection and there are many different applications for real-time generation detection and analysis. Two-dimensional videos; It is used in multimedia content-based indexing, information acquisition, visual surveillance and distributed cross-camera surveillance systems, human tracking, traffic monitoring and similar applications. It is of great importance for the development of systems for national security by following a moving target within the scope of military applications. In this research, a more efficient solution is proposed in addition to the existing methods. Therefore, we present YOLO, a new approach to object detection for military applications.
如今,随着监控系统广泛用于室内和室外监控应用,人们对实时发电检测的兴趣越来越大,实时发电检测和分析的应用也越来越多。二维视频;它用于多媒体内容索引、信息采集、视觉监控和分布式跨摄像头监控系统、人员跟踪、交通监控等应用。在军事应用范围内,跟踪移动目标对国家安全系统的发展具有重要意义。本研究在现有方法的基础上,提出了一种更有效的解决方案。因此,我们提出了一种新的军事目标检测方法YOLO。
{"title":"YOLO Approach in Digital Object Definition in Military Systems","authors":"R. Benzer, Mithat Cagri Yildiz","doi":"10.1109/IBIGDELFT.2018.8625314","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625314","url":null,"abstract":"Today, as surveillance systems are widely used for indoor and outdoor monitoring applications, there is a growing interest in real-time generation detection and there are many different applications for real-time generation detection and analysis. Two-dimensional videos; It is used in multimedia content-based indexing, information acquisition, visual surveillance and distributed cross-camera surveillance systems, human tracking, traffic monitoring and similar applications. It is of great importance for the development of systems for national security by following a moving target within the scope of military applications. In this research, a more efficient solution is proposed in addition to the existing methods. Therefore, we present YOLO, a new approach to object detection for military applications.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129941769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Cyberbullying in Social Networks Using Machine Learning Methods 使用机器学习方法检测社交网络中的网络欺凌
Elif Varol Altay, B. Alatas
Increasing Internet use and facilitating access to online communities such as social media have led to the emergence of cybercrime. Cyber bullying, a new form of bullying that emerged recently with the development of social networks, means sending messages that include slanderous statements, or verbally bullying other people or persons in front of the rest of the online community. The characteristics of online social networks enable cyberbullies to access places and countries that were previously unattainable. In this study; the use of natural language processing techniques and machine learning methods namely, Bayesian logistic regression, random forest algorithm, multilayer sensor, J48 algorithm and support vector machines have been used to determine cyber bullying. To the best of our knowledge, the successes of these algorithms with different metrics within different experiments have been compared for the first time to the real data.
互联网使用的增加和进入社交媒体等在线社区的便利导致了网络犯罪的出现。网络欺凌是最近随着社交网络的发展而出现的一种新的欺凌形式,指的是在网络社区的其他人面前发送包含诽谤性言论的信息,或口头欺凌他人或个人。在线社交网络的特点使网络欺凌者能够进入以前无法到达的地方和国家。在本研究中;利用自然语言处理技术和机器学习方法,即贝叶斯逻辑回归、随机森林算法、多层传感器、J48算法和支持向量机,已被用于确定网络欺凌。据我们所知,这些算法在不同实验中不同度量的成功首次与真实数据进行了比较。
{"title":"Detection of Cyberbullying in Social Networks Using Machine Learning Methods","authors":"Elif Varol Altay, B. Alatas","doi":"10.1109/IBIGDELFT.2018.8625321","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625321","url":null,"abstract":"Increasing Internet use and facilitating access to online communities such as social media have led to the emergence of cybercrime. Cyber bullying, a new form of bullying that emerged recently with the development of social networks, means sending messages that include slanderous statements, or verbally bullying other people or persons in front of the rest of the online community. The characteristics of online social networks enable cyberbullies to access places and countries that were previously unattainable. In this study; the use of natural language processing techniques and machine learning methods namely, Bayesian logistic regression, random forest algorithm, multilayer sensor, J48 algorithm and support vector machines have been used to determine cyber bullying. To the best of our knowledge, the successes of these algorithms with different metrics within different experiments have been compared for the first time to the real data.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131617732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things 一种安全接入物联网ZigBee 3.0网络的新模式
Emre Deniz, R. Samet
In these days, Internet has become an important part of the life. Especially in the modern Internet world, Internet of Things (IoT) is one of the most used technologies. IoT is a technology that collects and controls data including objects that communicate with each other with protocols. There are some cyber-attacks to the smart objects in IoT because they are connected to each other and the Internet. Due to the negative consequences of these attacks, information security of IoT becomes important. In this paper, ZigBee, that is one of the most common IoT technologies, is analyzed. A new model is proposed as a solution to vulnerability in ZigBee and the results of this model are evaluated.
在这些日子里,互联网已经成为生活的重要组成部分。特别是在现代互联网世界中,物联网(IoT)是最常用的技术之一。物联网是一种收集和控制数据的技术,包括通过协议相互通信的对象。物联网中的智能对象存在一些网络攻击,因为它们相互连接并连接到互联网。由于这些攻击的负面后果,物联网的信息安全变得重要。本文对最常见的物联网技术之一ZigBee进行了分析。提出了一种新的ZigBee漏洞模型,并对该模型的结果进行了评价。
{"title":"A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things","authors":"Emre Deniz, R. Samet","doi":"10.1109/IBIGDELFT.2018.8625315","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625315","url":null,"abstract":"In these days, Internet has become an important part of the life. Especially in the modern Internet world, Internet of Things (IoT) is one of the most used technologies. IoT is a technology that collects and controls data including objects that communicate with each other with protocols. There are some cyber-attacks to the smart objects in IoT because they are connected to each other and the Internet. Due to the negative consequences of these attacks, information security of IoT becomes important. In this paper, ZigBee, that is one of the most common IoT technologies, is analyzed. A new model is proposed as a solution to vulnerability in ZigBee and the results of this model are evaluated.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121476558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fighting Cyber Terrorism: Comparison of Turkey and Russia 打击网络恐怖主义:土耳其和俄罗斯的比较
Melih Burak Bicak, D. Bogdanova
In the 21st century computers and information technologies have rapidly developed, so now they are covering all areas of our life. And a new word and a new area were born with this trend - this is called Cyber. Cyber has brought to the world cyber attacks, which brought terrorism to this field. Now there are disputes among people about which attacks should be called terrorist attacks. The purpose of this study is to analyze cyber terrorism according to Turkish Law and Russian Law. In the first part of the study Russian and Turkish legislation about cyber terrorism are discussed separately. The second part contains comparison between these two countries and the conclusion.
在21世纪,计算机和信息技术迅速发展,所以现在它们覆盖了我们生活的各个领域。随着这种趋势,一个新词和一个新领域诞生了——这就是Cyber。网络给世界带来了网络攻击,网络攻击给这个领域带来了恐怖主义。现在人们对哪些袭击应该被称为恐怖袭击存在争议。本研究的目的是根据土耳其法律和俄罗斯法律来分析网络恐怖主义。在研究的第一部分,分别讨论了俄罗斯和土耳其的网络恐怖主义立法。第二部分是对两国的比较和结论。
{"title":"Fighting Cyber Terrorism: Comparison of Turkey and Russia","authors":"Melih Burak Bicak, D. Bogdanova","doi":"10.1109/IBIGDELFT.2018.8625270","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625270","url":null,"abstract":"In the 21st century computers and information technologies have rapidly developed, so now they are covering all areas of our life. And a new word and a new area were born with this trend - this is called Cyber. Cyber has brought to the world cyber attacks, which brought terrorism to this field. Now there are disputes among people about which attacks should be called terrorist attacks. The purpose of this study is to analyze cyber terrorism according to Turkish Law and Russian Law. In the first part of the study Russian and Turkish legislation about cyber terrorism are discussed separately. The second part contains comparison between these two countries and the conclusion.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117280603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Techniques in Profiling Big Datasets for Machine Learning with a Concise Review of Android Mobile Malware Datasets 分析机器学习大数据集的新技术&对Android移动恶意软件数据集的简要回顾
Gürol Canbek, Ş. Sağiroğlu, Tugba Taskaya Temizel
As the volume, variety, velocity aspects of big data are increasing, the other aspects such as veracity, value, variability, and venue could not be interpreted easily by data owners or researchers. The aspects are also unclear if the data is to be used in machine learning studies such as classification or clustering. This study proposes four techniques with fourteen criteria to systematically profile the datasets collected from different resources to distinguish from one another and see their strong and weak aspects. The proposed approach is demonstrated in five Android mobile malware datasets in the literature and in security industry namely Android Malware Genome Project, Drebin, Android Malware Dataset, Android Botnet, and Virus Total 2018. The results have shown that the proposed profiling methods reveal remarkable insight about the datasets comparatively and directs researchers to achieve big but more visible, qualitative, and internalized datasets.
随着大数据的数量、种类、速度等方面的不断增加,其他方面如准确性、价值、可变性和地点等,数据所有者或研究人员很难理解。这些方面也不清楚数据是否用于机器学习研究,如分类或聚类。本研究提出了四种技术和十四个标准来系统地分析从不同资源收集的数据集,以区分彼此,并看到它们的优缺点。该方法在文献和安全行业中的五个Android移动恶意软件数据集(Android malware Genome Project, Drebin, Android malware Dataset, Android Botnet和Virus Total 2018)中得到了验证。结果表明,所提出的分析方法相对而言揭示了对数据集的深刻见解,并指导研究人员实现更大但更可见、定性和内部化的数据集。
{"title":"New Techniques in Profiling Big Datasets for Machine Learning with a Concise Review of Android Mobile Malware Datasets","authors":"Gürol Canbek, Ş. Sağiroğlu, Tugba Taskaya Temizel","doi":"10.1109/IBIGDELFT.2018.8625275","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625275","url":null,"abstract":"As the volume, variety, velocity aspects of big data are increasing, the other aspects such as veracity, value, variability, and venue could not be interpreted easily by data owners or researchers. The aspects are also unclear if the data is to be used in machine learning studies such as classification or clustering. This study proposes four techniques with fourteen criteria to systematically profile the datasets collected from different resources to distinguish from one another and see their strong and weak aspects. The proposed approach is demonstrated in five Android mobile malware datasets in the literature and in security industry namely Android Malware Genome Project, Drebin, Android Malware Dataset, Android Botnet, and Virus Total 2018. The results have shown that the proposed profiling methods reveal remarkable insight about the datasets comparatively and directs researchers to achieve big but more visible, qualitative, and internalized datasets.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier 基于随机森林和深度学习分类器的递归特征消除入侵检测系统
S. Ustebay, Zeynep Turgut, M. Aydin
In this study, an intrusion detection system (IDS) has been proposed to detect malicious in computer networks. The proposed system is studied on the CICIDS2017 dataset, which is the biggest dataset available online. In order to overcome the challenges big data created, it is aimed to determine the effects of the features on the data set and to find the most effective features that can differentiate the data in the most meaningful way. Therefore, recursive feature elimination is performed via random forest and the importance value of the features are calculated. Intrusions are detected with the accuracy of 91% by Deep Multilayer Perceptron (DMLP) structure using the obtained features.
本文提出了一种入侵检测系统(IDS)来检测计算机网络中的恶意行为。该系统在CICIDS2017数据集上进行了研究,该数据集是在线可用的最大数据集。为了克服大数据带来的挑战,其目的是确定特征对数据集的影响,并找到能够以最有意义的方式区分数据的最有效特征。因此,通过随机森林进行递归特征消除,并计算特征的重要值。利用得到的特征,采用深度多层感知器(Deep Multilayer Perceptron, DMLP)结构对入侵进行检测,准确率达到91%。
{"title":"Intrusion Detection System with Recursive Feature Elimination by Using Random Forest and Deep Learning Classifier","authors":"S. Ustebay, Zeynep Turgut, M. Aydin","doi":"10.1109/IBIGDELFT.2018.8625318","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625318","url":null,"abstract":"In this study, an intrusion detection system (IDS) has been proposed to detect malicious in computer networks. The proposed system is studied on the CICIDS2017 dataset, which is the biggest dataset available online. In order to overcome the challenges big data created, it is aimed to determine the effects of the features on the data set and to find the most effective features that can differentiate the data in the most meaningful way. Therefore, recursive feature elimination is performed via random forest and the importance value of the features are calculated. Intrusions are detected with the accuracy of 91% by Deep Multilayer Perceptron (DMLP) structure using the obtained features.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121972625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Comparision of String Matching Algorithms on Spam Email Detection 字符串匹配算法在垃圾邮件检测中的比较
C. Varol, H. Abdulhadi
Email is one of the most expedient approach to transfer messages among people all over the world. Its features, specifically reliability, quickness, and low cost makes it popular and useful among people in most parts of businesses and society. On the other hand, this popularity also created new harmful actions, such as email attacks (spam) in cyberspace. Spam is arguably one of the main reasons of drowning the WWW with many copies of similar messages generated through anonymous senders, which yields to time/space wasting of the email account holder and also a large virus and malware threat to Email providers. In spite of employing various filters to handle spam problem such as machine learning and content-based filtering, spammers are still able to bypass these defense mechanisms. In this paper, we investigate the use of string matching algorithms for spam email detection. Particularly this work examines and compares the efficiency of six well-known string matching algorithms, namely Longest Common Subsequence (LCS), Levenshtein Distance (LD), Jaro, Jaro-Winkler, Bi-gram, and TFIDF on two various datasets which are Enron corpus and CSDMC2010 spam dataset. We observed that Bi-gram algorithm performs best in spam detection in both datasets.
电子邮件是在世界各地的人们之间传递信息的最方便的方法之一。它的特点,特别是可靠、快速和低成本,使它在商业和社会的大部分领域受到人们的欢迎和使用。另一方面,这种流行也产生了新的有害行为,例如网络空间中的电子邮件攻击(垃圾邮件)。垃圾邮件可以说是淹没WWW的主要原因之一,因为匿名发送者产生了许多类似的邮件副本,这不仅浪费了电子邮件帐户持有人的时间/空间,也给电子邮件提供商带来了巨大的病毒和恶意软件威胁。尽管使用了各种过滤器来处理垃圾邮件问题,例如机器学习和基于内容的过滤,但垃圾邮件发送者仍然能够绕过这些防御机制。在本文中,我们研究了使用字符串匹配算法来检测垃圾邮件。特别是这项工作检查并比较了六种著名的字符串匹配算法的效率,即最长公共子序列(LCS), Levenshtein距离(LD), Jaro, Jaro- winkler, Bi-gram和TFIDF在安然语料库和CSDMC2010垃圾邮件数据集两个不同的数据集上的效率。我们观察到,在两个数据集中,双图算法在垃圾邮件检测中表现最好。
{"title":"Comparision of String Matching Algorithms on Spam Email Detection","authors":"C. Varol, H. Abdulhadi","doi":"10.1109/IBIGDELFT.2018.8625317","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625317","url":null,"abstract":"Email is one of the most expedient approach to transfer messages among people all over the world. Its features, specifically reliability, quickness, and low cost makes it popular and useful among people in most parts of businesses and society. On the other hand, this popularity also created new harmful actions, such as email attacks (spam) in cyberspace. Spam is arguably one of the main reasons of drowning the WWW with many copies of similar messages generated through anonymous senders, which yields to time/space wasting of the email account holder and also a large virus and malware threat to Email providers. In spite of employing various filters to handle spam problem such as machine learning and content-based filtering, spammers are still able to bypass these defense mechanisms. In this paper, we investigate the use of string matching algorithms for spam email detection. Particularly this work examines and compares the efficiency of six well-known string matching algorithms, namely Longest Common Subsequence (LCS), Levenshtein Distance (LD), Jaro, Jaro-Winkler, Bi-gram, and TFIDF on two various datasets which are Enron corpus and CSDMC2010 spam dataset. We observed that Bi-gram algorithm performs best in spam detection in both datasets.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application Areas of Community Detection: A Review 社区检测的应用领域综述
Arzum Karatas, Serap Sahin
In the realm of today's real world, information systems are represented by complex networks. Complex networks contain a community structure inherently. Community is a set of members strongly connected within members and loosely connected with the rest of the network. Community detection is the task of revealing inherent community structure. Since the networks can be either static or dynamic, community detection can be done on both static and dynamic networks as well. In this study, we have talked about taxonomy of community detection methods with their shortages. Then we examine and categorize application areas of community detection in the realm of nature of complex networks (i.e., static or dynamic) by including sub areas of criminology such as fraud detection, criminal identification, criminal activity detection and bot detection. This paper provides a hot review and quick start for researchers and developers in community detection area.
在当今的现实世界中,信息系统由复杂的网络表示。复杂网络本质上包含着一种社区结构。社区是一组成员的集合,成员之间紧密相连,与网络的其他部分松散相连。群落检测是揭示固有群落结构的任务。由于网络可以是静态的,也可以是动态的,因此社区检测也可以在静态和动态网络上进行。在本研究中,我们讨论了社区检测方法的分类和它们的不足。然后,我们通过包括犯罪学的子领域,如欺诈检测、犯罪识别、犯罪活动检测和机器人检测,在复杂网络(即静态或动态)的性质领域中检查和分类社区检测的应用领域。本文为社区检测领域的研究人员和开发人员提供了一个热点综述和快速入门。
{"title":"Application Areas of Community Detection: A Review","authors":"Arzum Karatas, Serap Sahin","doi":"10.1109/IBIGDELFT.2018.8625349","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625349","url":null,"abstract":"In the realm of today's real world, information systems are represented by complex networks. Complex networks contain a community structure inherently. Community is a set of members strongly connected within members and loosely connected with the rest of the network. Community detection is the task of revealing inherent community structure. Since the networks can be either static or dynamic, community detection can be done on both static and dynamic networks as well. In this study, we have talked about taxonomy of community detection methods with their shortages. Then we examine and categorize application areas of community detection in the realm of nature of complex networks (i.e., static or dynamic) by including sub areas of criminology such as fraud detection, criminal identification, criminal activity detection and bot detection. This paper provides a hot review and quick start for researchers and developers in community detection area.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism 大数据、深度学习与打击网络恐怖主义国际大会
Proceedings
诉讼
{"title":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","authors":"","doi":"10.1109/ibigdelft.2018.8625369","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625369","url":null,"abstract":"Proceedings","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"24 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120857127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Neural Network Based Offline Signature Verification Application 基于卷积神经网络的离线签名验证应用
Muhammed Mutlu Yapici, Adem Tekerek, Nurettin Topaloglu
One of the most important biometric authentication technique is signature. Nowadays, there are two types of signatures, offline (static) and online (dynamic). Online signatures have higher distinctive features but offline signatures have fewer distinctive features. So offline signatures are more difficult to verify. In addition, the most important drawback of offline signatures is that they cannot be signed with the same way even by the most talented signer. This is called intra-personal variability. All these make the offline signature verification a challenging problem for researchers. In this study, we proposed a Deep Learning (DL) based offline signature verification method to prevent signature fraud by malicious people. The DL method used in the study is the Convolutional Neural Network (CNN). CNN was designed and trained separately for two different models such one Writer Dependent (WD) and the other Writer Independent (WI). The experimental results showed that WI has 62.5% of success and WD has 75% of success. It is predicted that the success of the obtained results will increase if the CNN method is supported by adding extra feature extraction methods.
生物特征认证技术中最重要的技术之一就是签名。目前,签名有离线(静态)和在线(动态)两种类型。在线签名的显著性特征较高,离线签名的显著性特征较少。因此,离线签名更难以验证。此外,离线签名最重要的缺点是,即使是最有才华的签名者也不能以相同的方式签名。这就是所谓的个人内部变异。这些都使得离线签名验证成为一个具有挑战性的问题。在这项研究中,我们提出了一种基于深度学习(DL)的离线签名验证方法,以防止恶意人员的签名欺诈。研究中使用的深度学习方法是卷积神经网络(CNN)。CNN分别针对两种不同的模型进行设计和训练,一种是Writer Dependent (WD),另一种是Writer Independent (WI)。实验结果表明,WI的成功率为62.5%,WD的成功率为75%。可以预测,如果加入额外的特征提取方法来支持CNN方法,得到的结果的成功率将会提高。
{"title":"Convolutional Neural Network Based Offline Signature Verification Application","authors":"Muhammed Mutlu Yapici, Adem Tekerek, Nurettin Topaloglu","doi":"10.1109/IBIGDELFT.2018.8625290","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625290","url":null,"abstract":"One of the most important biometric authentication technique is signature. Nowadays, there are two types of signatures, offline (static) and online (dynamic). Online signatures have higher distinctive features but offline signatures have fewer distinctive features. So offline signatures are more difficult to verify. In addition, the most important drawback of offline signatures is that they cannot be signed with the same way even by the most talented signer. This is called intra-personal variability. All these make the offline signature verification a challenging problem for researchers. In this study, we proposed a Deep Learning (DL) based offline signature verification method to prevent signature fraud by malicious people. The DL method used in the study is the Convolutional Neural Network (CNN). CNN was designed and trained separately for two different models such one Writer Dependent (WD) and the other Writer Independent (WI). The experimental results showed that WI has 62.5% of success and WD has 75% of success. It is predicted that the success of the obtained results will increase if the CNN method is supported by adding extra feature extraction methods.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1