首页 > 最新文献

2013 Ninth International Conference on Computational Intelligence and Security最新文献

英文 中文
Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document 基于云模型的文本文档认证零水印算法
Xitong Qi, Yuling Liu
Content authentication of text document has become a major concern in the current digital era. In this paper, a zero-watermark algorithm is proposed for Chinese text documents content authentication. Firstly, the frequencies of different part-of-speech (POS) tags are obtained through natural language processing technology. And they are used to calculate the expect value and entropy, which can be as text features. Then a watermark is generated by one-dimensional forward cloud model generator using the expect value and entropy. The watermark is sent to be registered and stored in the trusted third party called Certificate Authority (CA). If authentication is necessary, we calculate the similarity between the watermark of disputed text and its watermark registered in CA. Experimental results show that the algorithm is robust against content-preserving attacks while sensitive to malicious tampering.
文本文档的内容认证已成为当今数字时代人们关注的焦点。本文提出了一种用于中文文本文档内容认证的零水印算法。首先,通过自然语言处理技术获取不同词性标签的频率;用它们来计算期望值和熵,作为文本特征。然后利用期望值和熵,利用一维正演云模生成器生成水印。水印被发送到被称为证书颁发机构(CA)的可信第三方进行注册和存储。如果需要认证,我们计算争议文本的水印与CA注册的水印之间的相似度。实验结果表明,该算法对内容保留攻击具有鲁棒性,同时对恶意篡改敏感。
{"title":"Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document","authors":"Xitong Qi, Yuling Liu","doi":"10.1109/CIS.2013.155","DOIUrl":"https://doi.org/10.1109/CIS.2013.155","url":null,"abstract":"Content authentication of text document has become a major concern in the current digital era. In this paper, a zero-watermark algorithm is proposed for Chinese text documents content authentication. Firstly, the frequencies of different part-of-speech (POS) tags are obtained through natural language processing technology. And they are used to calculate the expect value and entropy, which can be as text features. Then a watermark is generated by one-dimensional forward cloud model generator using the expect value and entropy. The watermark is sent to be registered and stored in the trusted third party called Certificate Authority (CA). If authentication is necessary, we calculate the similarity between the watermark of disputed text and its watermark registered in CA. Experimental results show that the algorithm is robust against content-preserving attacks while sensitive to malicious tampering.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Analysis of Software Supportable Tasks Related with ISO/IEC 15408 与ISO/IEC 15408相关的软件可支持任务分析
Ning Zhang, A. Suhaimi, Y. Goto, Jingde Cheng
From the perspective of information security engineering, ISO/IEC 15408, one of ISO/IEC security standards, plays an important role to ensure the whole security of an information/software system. ISO/IEC 15408 is a complex security standard which requires involvement of wide range of participants to perform a quite number of tasks as well as various documents. ISO/IEC 15408 is periodically reviewed and maintained to achieve ongoing improvement so that workflow of tasks and contents/format of documents related with the standard are changed according to changes of the standards. Consequently, it is difficult to do all of the tasks related with ISO/IEC 15408 without any supporting tools. However, there is no study to identify which tasks related with ISO/IEC 15408 can be supported by software tools. Indeed, no one makes clear what the tasks and participants exist. This paper presents the first analysis to identify all software supportable tasks related with ISO/IEC 15408. The paper enumerates all of the participants, documents, and tasks related with ISO/IEC 15408 and shows relationship among them, and identifies all software supportable tasks. The analysis and its results become a basis to construct an information security engineering environment based on ISO/IEC 15408 for ensuring the whole security of an information/software system.
从信息安全工程的角度来看,ISO/IEC 15408作为ISO/IEC安全标准之一,对保证信息/软件系统的整体安全起着重要的作用。ISO/IEC 15408是一个复杂的安全标准,需要广泛的参与者参与执行相当多的任务以及各种文件。ISO/IEC 15408定期评审和维护,以实现持续改进,使与标准相关的工作流程和文件的内容/格式根据标准的变化而变化。因此,如果没有任何支持工具,很难完成与ISO/IEC 15408相关的所有任务。然而,没有研究确定哪些与ISO/IEC 15408相关的任务可以由软件工具支持。事实上,没有人清楚地知道存在什么任务和参与者。本文提出了第一个分析,以确定与ISO/IEC 15408相关的所有软件支持任务。本文列举了所有与ISO/IEC 15408相关的参与者、文档和任务,并显示了它们之间的关系,并确定了所有软件支持的任务。分析结果为构建基于ISO/IEC 15408标准的信息安全工程环境,保证信息/软件系统的整体安全提供了依据。
{"title":"An Analysis of Software Supportable Tasks Related with ISO/IEC 15408","authors":"Ning Zhang, A. Suhaimi, Y. Goto, Jingde Cheng","doi":"10.1109/CIS.2013.132","DOIUrl":"https://doi.org/10.1109/CIS.2013.132","url":null,"abstract":"From the perspective of information security engineering, ISO/IEC 15408, one of ISO/IEC security standards, plays an important role to ensure the whole security of an information/software system. ISO/IEC 15408 is a complex security standard which requires involvement of wide range of participants to perform a quite number of tasks as well as various documents. ISO/IEC 15408 is periodically reviewed and maintained to achieve ongoing improvement so that workflow of tasks and contents/format of documents related with the standard are changed according to changes of the standards. Consequently, it is difficult to do all of the tasks related with ISO/IEC 15408 without any supporting tools. However, there is no study to identify which tasks related with ISO/IEC 15408 can be supported by software tools. Indeed, no one makes clear what the tasks and participants exist. This paper presents the first analysis to identify all software supportable tasks related with ISO/IEC 15408. The paper enumerates all of the participants, documents, and tasks related with ISO/IEC 15408 and shows relationship among them, and identifies all software supportable tasks. The analysis and its results become a basis to construct an information security engineering environment based on ISO/IEC 15408 for ensuring the whole security of an information/software system.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case Study 一个高可靠和高性能的数据分布策略:一个RAID-5案例研究
Saifeng Zeng, Ligu Zhu, Lei Zhang
With the development of the storage medium, such as the emerging of the SSD, the tradition way of data distribution can't keep up with the pace of the storage device development. Specifically, for example, Traditional RAID only enhanced the performance or reliability in the single storage medium and all the data are distributed in the same storage medium. But with the wide range of using raid, the problem of RAID data adventure has come to the surface gradually. Furthermore, under the mode of RAID-5 read modify-write (R-M-W), operation system collapse or the storage medium write error would lead to the damage of data, which could not be recovered and this problem is named write hole. According to the above problem, this paper proposes a new data distribution strategy, which is called high reliable and performance data distribution strategy (RPDD). RPDD use the high performance storage medium as a cache which is named storage cache. The most of the data is wrote to the storage cache and then distribute the data to the other logic relationship storage medium. As a result, the data is distributed in a hybrid storage medium. In order to take a better analysis of the RPDD in the next, we have combined RPDD in the RAID-5, which is named RAID-5-RPDD. RAID5-RPDD employs the dynamic scheduling mechanism, data transfer and hybrid consistency mechanism between the SSD and magnetic media storage devices to resolve the problem. In consequence, it can protect the RAID stripe data consistency under the condition of R-M-W and increase the I/O performance without the impact of the cost. In addition, it can improve the reliability of the RAID-5. The simulation test results show that RAID-5-RPDD I/O performance increase at the range of 9% with little penalty of the resource consumption.
随着存储介质的发展,如SSD的出现,传统的数据分发方式已经跟不上存储设备发展的步伐。例如,传统的RAID只是提高单个存储介质的性能或可靠性,所有的数据都分布在同一个存储介质中。但是随着raid的广泛应用,raid数据冒险问题也逐渐浮出水面。此外,在RAID-5读修改写(R-M-W)模式下,操作系统崩溃或存储介质写错误会导致数据损坏,无法恢复,这种问题被称为写洞。针对上述问题,本文提出了一种新的数据分发策略,即高可靠高性能数据分发策略(RPDD)。RPDD使用高性能存储介质作为缓存,称为存储缓存。大部分数据被写入存储缓存,然后分发到其他逻辑关系存储介质中。因此,数据分布在混合存储介质中。为了在下文中更好地分析RPDD,我们将RPDD合并到RAID-5中,命名为RAID-5-RPDD。RAID5-RPDD采用固态硬盘与磁性介质存储设备之间的动态调度机制、数据传输和混合一致性机制来解决这一问题。因此,它可以在不影响成本的情况下,保护RAID分条数据在读写条件下的一致性,提高I/O性能。此外,还可以提高RAID-5的可靠性。模拟测试结果表明,RAID-5-RPDD I/O性能提高了9%,而资源消耗的损失很小。
{"title":"A High Reliable and Performance Data Distribution Strategy: A RAID-5 Case Study","authors":"Saifeng Zeng, Ligu Zhu, Lei Zhang","doi":"10.1109/CIS.2013.74","DOIUrl":"https://doi.org/10.1109/CIS.2013.74","url":null,"abstract":"With the development of the storage medium, such as the emerging of the SSD, the tradition way of data distribution can't keep up with the pace of the storage device development. Specifically, for example, Traditional RAID only enhanced the performance or reliability in the single storage medium and all the data are distributed in the same storage medium. But with the wide range of using raid, the problem of RAID data adventure has come to the surface gradually. Furthermore, under the mode of RAID-5 read modify-write (R-M-W), operation system collapse or the storage medium write error would lead to the damage of data, which could not be recovered and this problem is named write hole. According to the above problem, this paper proposes a new data distribution strategy, which is called high reliable and performance data distribution strategy (RPDD). RPDD use the high performance storage medium as a cache which is named storage cache. The most of the data is wrote to the storage cache and then distribute the data to the other logic relationship storage medium. As a result, the data is distributed in a hybrid storage medium. In order to take a better analysis of the RPDD in the next, we have combined RPDD in the RAID-5, which is named RAID-5-RPDD. RAID5-RPDD employs the dynamic scheduling mechanism, data transfer and hybrid consistency mechanism between the SSD and magnetic media storage devices to resolve the problem. In consequence, it can protect the RAID stripe data consistency under the condition of R-M-W and increase the I/O performance without the impact of the cost. In addition, it can improve the reliability of the RAID-5. The simulation test results show that RAID-5-RPDD I/O performance increase at the range of 9% with little penalty of the resource consumption.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NISLVMP: Improved Virtual Machine-Based Software Protection NISLVMP:改进的基于虚拟机的软件保护
Huaijun Wang, Dingyi Fang, Guanghui Li, Xiaoyan Yin, Bo Zhang, Y. Gu
The VM (Virtual Machine)-based software protection technique provides an effective solution to protect software, making it extremely difficult to analyze and crack. This technique has become the research focus of software protection. In this paper, we introduce the general design ideas of this technique. However, there exist some vulnerabilities in the design. We introduce these vulnerabilities in detail and come up with some improvements to mitigate them. We design and develop a VM-based protection system, named NISLVMP, and carry out some experiments with it. The results show that the improvements are effective.
基于VM (Virtual Machine)的软件保护技术为软件提供了有效的保护方案,使软件极难被分析和破解。该技术已成为软件保护领域的研究热点。在本文中,我们介绍了该技术的一般设计思想。但是,在设计中也存在一些漏洞。我们详细介绍了这些漏洞,并提出了一些改进措施来缓解它们。我们设计并开发了一个基于虚拟机的保护系统NISLVMP,并进行了一些实验。结果表明,改进是有效的。
{"title":"NISLVMP: Improved Virtual Machine-Based Software Protection","authors":"Huaijun Wang, Dingyi Fang, Guanghui Li, Xiaoyan Yin, Bo Zhang, Y. Gu","doi":"10.1109/CIS.2013.107","DOIUrl":"https://doi.org/10.1109/CIS.2013.107","url":null,"abstract":"The VM (Virtual Machine)-based software protection technique provides an effective solution to protect software, making it extremely difficult to analyze and crack. This technique has become the research focus of software protection. In this paper, we introduce the general design ideas of this technique. However, there exist some vulnerabilities in the design. We introduce these vulnerabilities in detail and come up with some improvements to mitigate them. We design and develop a VM-based protection system, named NISLVMP, and carry out some experiments with it. The results show that the improvements are effective.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"826 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A New Evolutionary Algorithm for Portfolio Optimization and Its Application 一种新的投资组合优化进化算法及其应用
Weijia Wang, Jie Hu
Value-at-Risk (VaR) and Conditional Value-at-Risk (CVaR) are two of the most widely used and important risk measures in financial risk management models. Because VaR and CVaR portfolio optimization models are often nonlinear and non-convex optimization models, traditional optimization methods usually can not get their global optimal solutions, instead, they often get a local optimal solution. In this paper, the uniform design is integrated into evolutionary algorithm to enhance the search ability of the evolutionary algorithm. The resulted algorithm will has a strong search ability and has more possibility to get the global optimal solution. Based on this idea, a new evolutionary algorithm is proposed for VaR and CVaR optimization models. Computer simulations on ten randomly chosen stocks from Shenzhen Stock Exchange in China are conducted and the analysis to the results is given. The experiment results indicate the proposed algorithm is efficient.
风险价值(VaR)和条件风险价值(CVaR)是金融风险管理模型中应用最广泛和最重要的两个风险度量。由于VaR和CVaR组合优化模型往往是非线性非凸优化模型,传统的优化方法往往不能得到全局最优解,而往往只能得到局部最优解。本文将均匀设计融入到进化算法中,增强了进化算法的搜索能力。所得到的算法将具有较强的搜索能力,更有可能得到全局最优解。在此基础上,提出了一种新的VaR和CVaR优化模型的进化算法。对深圳证券交易所随机选取的10只股票进行了计算机模拟,并对模拟结果进行了分析。实验结果表明,该算法是有效的。
{"title":"A New Evolutionary Algorithm for Portfolio Optimization and Its Application","authors":"Weijia Wang, Jie Hu","doi":"10.1109/CIS.2013.24","DOIUrl":"https://doi.org/10.1109/CIS.2013.24","url":null,"abstract":"Value-at-Risk (VaR) and Conditional Value-at-Risk (CVaR) are two of the most widely used and important risk measures in financial risk management models. Because VaR and CVaR portfolio optimization models are often nonlinear and non-convex optimization models, traditional optimization methods usually can not get their global optimal solutions, instead, they often get a local optimal solution. In this paper, the uniform design is integrated into evolutionary algorithm to enhance the search ability of the evolutionary algorithm. The resulted algorithm will has a strong search ability and has more possibility to get the global optimal solution. Based on this idea, a new evolutionary algorithm is proposed for VaR and CVaR optimization models. Computer simulations on ten randomly chosen stocks from Shenzhen Stock Exchange in China are conducted and the analysis to the results is given. The experiment results indicate the proposed algorithm is efficient.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parametric Study of Fuzzy Number Linear Programming 模糊数线性规划的参数化研究
Yanling Jia, Yan Yang, Yihua Zhong
This paper is devoted to show the effect of the continuous variational parameter in the objective function coefficients on the optimum solution, which is an extension of the sensitivity analysis of fuzzy number linear programming. We prove that if the parameter is in a certain range, this problem has a unique optimal solution, otherwise it has non-unique optimal solutions or is unbounded or infeasible. Then, the optimal value function is a fuzzy linear function of the parameter. Finally, numerical examples demonstrate the theorem and illustrate the computational procedure.
本文研究了目标函数系数中连续变分参数对最优解的影响,这是模糊数线性规划灵敏度分析的推广。证明了如果参数在一定范围内,则该问题存在唯一最优解,否则问题存在非唯一最优解或无界或不可行的。然后,最优值函数是参数的模糊线性函数。最后,通过数值算例对定理进行了验证,并举例说明了计算过程。
{"title":"Parametric Study of Fuzzy Number Linear Programming","authors":"Yanling Jia, Yan Yang, Yihua Zhong","doi":"10.1109/CIS.2013.78","DOIUrl":"https://doi.org/10.1109/CIS.2013.78","url":null,"abstract":"This paper is devoted to show the effect of the continuous variational parameter in the objective function coefficients on the optimum solution, which is an extension of the sensitivity analysis of fuzzy number linear programming. We prove that if the parameter is in a certain range, this problem has a unique optimal solution, otherwise it has non-unique optimal solutions or is unbounded or infeasible. Then, the optimal value function is a fuzzy linear function of the parameter. Finally, numerical examples demonstrate the theorem and illustrate the computational procedure.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coercion: A Distributed Clustering Algorithm for Categorical Data 强制:分类数据的分布式聚类算法
Bin Wang, Yang Zhou, Xinhong Hei
Clustering is an important technology in data mining. Squeezer is one such clustering algorithm for categorical data and it is more efficient than most existing algorithms for categorical data. But Squeezer is time consuming for very large datasets which are distributed in different servers. Thus, we employ the distributed thinking to improve Squeezer and a distributed algorithm for categorical data called Coercion is proposed in this paper. In order to present detailed complexity results for Coercion, we also conduct an experimental study with standard as well as synthetic data sets to demonstrate the effectiveness of the new algorithm.
聚类是数据挖掘中的一项重要技术。Squeezer算法就是这样一种分类数据聚类算法,它比大多数现有的分类数据聚类算法都要高效。但是对于分布在不同服务器上的大型数据集来说,Squeezer非常耗时。因此,我们采用分布式思维对Squeezer进行改进,并提出了一种分类数据的分布式强制算法。为了提供详细的强制复杂性结果,我们还使用标准和合成数据集进行了实验研究,以证明新算法的有效性。
{"title":"Coercion: A Distributed Clustering Algorithm for Categorical Data","authors":"Bin Wang, Yang Zhou, Xinhong Hei","doi":"10.1109/CIS.2013.149","DOIUrl":"https://doi.org/10.1109/CIS.2013.149","url":null,"abstract":"Clustering is an important technology in data mining. Squeezer is one such clustering algorithm for categorical data and it is more efficient than most existing algorithms for categorical data. But Squeezer is time consuming for very large datasets which are distributed in different servers. Thus, we employ the distributed thinking to improve Squeezer and a distributed algorithm for categorical data called Coercion is proposed in this paper. In order to present detailed complexity results for Coercion, we also conduct an experimental study with standard as well as synthetic data sets to demonstrate the effectiveness of the new algorithm.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Vocal Segments Detection in Popular Music 自动声乐片段检测在流行音乐
Liming Song, Ming Li, Yonghong Yan
We propose a technique for the automatic vocal segments detection in an acoustical polyphonic music signal. We use a combination of several characteristics specific to singing voice as the feature and employ a Gaussian Mixture Model (GMM) classifier for vocal and non-vocal classification. We have employed a pre-processing of spectral whitening and archived a performance of 81.3% over the RWC popular music dataset.
提出了一种声学复调音乐信号中人声片段的自动检测技术。我们使用歌唱声音特定的几个特征的组合作为特征,并使用高斯混合模型(GMM)分类器进行声乐和非声乐分类。我们采用了光谱白化预处理,并在RWC流行音乐数据集上存档了81.3%的性能。
{"title":"Automatic Vocal Segments Detection in Popular Music","authors":"Liming Song, Ming Li, Yonghong Yan","doi":"10.1109/CIS.2013.80","DOIUrl":"https://doi.org/10.1109/CIS.2013.80","url":null,"abstract":"We propose a technique for the automatic vocal segments detection in an acoustical polyphonic music signal. We use a combination of several characteristics specific to singing voice as the feature and employ a Gaussian Mixture Model (GMM) classifier for vocal and non-vocal classification. We have employed a pre-processing of spectral whitening and archived a performance of 81.3% over the RWC popular music dataset.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124258965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Research of Stock Predictive Model Based on the Combination of CART and DBSCAN 基于CART与DBSCAN相结合的股票预测模型研究
Yibu Ma
Along with the development of electronic and intelligence in the world's stock market advances, the accumulation of the stock data grows larger over time. It is of great concern on the ways to find the hidden rules of information in the mass of data. Given the background above, this paper explores the methods of data mining by using the combination of Decision tree algorithm and Clustering algorithm. In addition, this paper accomplishes stock forecasting by combining CART algorithm and DBSCAN algorithm to build a predictive model with good applicability through a large number of experiments for parameter testing. According to the works above, the predictive model has a high accuracy and provides a scientific theory supporting the investment decisions.
随着世界股票市场电子化和智能化的发展,股票数据的积累随着时间的推移越来越大。如何在海量数据中发现信息的隐藏规律是一个备受关注的问题。在此背景下,本文探索了将决策树算法与聚类算法相结合的数据挖掘方法。此外,本文结合CART算法和DBSCAN算法完成了股票预测,通过大量的实验进行参数检验,建立了适用性较好的预测模型。通过以上工作,该预测模型具有较高的准确性,为投资决策提供了科学的理论支持。
{"title":"The Research of Stock Predictive Model Based on the Combination of CART and DBSCAN","authors":"Yibu Ma","doi":"10.1109/CIS.2013.40","DOIUrl":"https://doi.org/10.1109/CIS.2013.40","url":null,"abstract":"Along with the development of electronic and intelligence in the world's stock market advances, the accumulation of the stock data grows larger over time. It is of great concern on the ways to find the hidden rules of information in the mass of data. Given the background above, this paper explores the methods of data mining by using the combination of Decision tree algorithm and Clustering algorithm. In addition, this paper accomplishes stock forecasting by combining CART algorithm and DBSCAN algorithm to build a predictive model with good applicability through a large number of experiments for parameter testing. According to the works above, the predictive model has a high accuracy and provides a scientific theory supporting the investment decisions.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Botnet-Oriented Collaborative Defense Scheme Description Language 面向僵尸网络的协同防御方案描述语言
Liming Huan, Yang-Zhe Yu, Liangshuang Lv, Shiying Li, Chunhe Xia
Botnets are one of the most serious threats to Internet security. Isolated and single point security defense technologies can't effectively counteract large-scale, distributed botnet attacks, such as Spamming and Distributed Denial of service attack. Collaboration among different kind of security devices is needed. To solve this problem, we proposed a conceptual model of botnet collaborative defense scheme and designed a Botnet Collaborative Defense Scheme Description Language (BCDSDL).Then, we outlined its EBNF expressions. The BCDSDL can uniformly describe the defense tasks and relations among tasks of different kinds of security devices, and provides a language level interface for diverse security devices achieving information sharing and linkage defense. At last, we realized the simulation of collaborative defense schemes described by BCDSDL in GTNetS. The experiment results show that BCDSDL is efficient and easy to use.
僵尸网络是对互联网安全最严重的威胁之一。孤立的、单点的安全防御技术无法有效抵御大规模、分布式的僵尸网络攻击,如垃圾邮件、分布式拒绝服务攻击等。不同类型的安全设备之间需要协作。针对这一问题,提出了僵尸网络协同防御方案的概念模型,并设计了僵尸网络协同防御方案描述语言(BCDSDL)。然后,我们概述了它的EBNF表达式。BCDSDL可以统一描述不同类型安全设备的防御任务和任务间的关系,为不同类型的安全设备提供语言级接口,实现信息共享和联动防御。最后,在GTNetS中实现了BCDSDL描述的协同防御方案的仿真。实验结果表明,BCDSDL是一种高效且易于使用的算法。
{"title":"A Botnet-Oriented Collaborative Defense Scheme Description Language","authors":"Liming Huan, Yang-Zhe Yu, Liangshuang Lv, Shiying Li, Chunhe Xia","doi":"10.1109/CIS.2013.143","DOIUrl":"https://doi.org/10.1109/CIS.2013.143","url":null,"abstract":"Botnets are one of the most serious threats to Internet security. Isolated and single point security defense technologies can't effectively counteract large-scale, distributed botnet attacks, such as Spamming and Distributed Denial of service attack. Collaboration among different kind of security devices is needed. To solve this problem, we proposed a conceptual model of botnet collaborative defense scheme and designed a Botnet Collaborative Defense Scheme Description Language (BCDSDL).Then, we outlined its EBNF expressions. The BCDSDL can uniformly describe the defense tasks and relations among tasks of different kinds of security devices, and provides a language level interface for diverse security devices achieving information sharing and linkage defense. At last, we realized the simulation of collaborative defense schemes described by BCDSDL in GTNetS. The experiment results show that BCDSDL is efficient and easy to use.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121094594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 Ninth International Conference on Computational Intelligence and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1